Patents by Inventor Glenn A. Stuart
Glenn A. Stuart has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11689510Abstract: A method includes requesting, by a first computing device having a first application and a first Transport Layer Security (TLS) library, a sequence of cryptographic keys obtained by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, requesting, by a second computing device having a second application and a second TLS library, the sequence of cryptographic keys obtained by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, and communicating between the first application of the first computing device to the second application of the second computing device using the sequence of cryptographic keys based on the agent key.Type: GrantFiled: October 1, 2021Date of Patent: June 27, 2023Assignee: TrustFour Technologies, Inc.Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Patent number: 11658948Abstract: A method includes linking a first application with a first Transport Layer Security (TLS) library, linking a second application with a second TLS library, obtaining a sequence of cryptographic keys by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, obtaining the sequence of cryptographic keys by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, establishing communication between the first TLS library and the first agent to create a first trusted relationship, establishing communication between the second TLS library and the second agent to create a second trusted relationship, and establishing a third trusted relationship between the first agent and the second agent.Type: GrantFiled: October 1, 2021Date of Patent: May 23, 2023Assignee: TrustFour Technologies, Inc.Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Publication number: 20230107962Abstract: A method includes requesting, by a first computing device having a first application and a first transport layer security (TLS) library, a sequence of cryptographic keys from a first mutual key management service (MKMS), the sequence of cryptographic keys based on an MKMS key, requesting, by a second computing device having a second application and a second TLS library, the sequence of cryptographic keys from a second MKMS, performing, by the first MKMS having a first certificate and the second MKMS having a second certificate, an authorization, comparing, by one of the first MKMS and the second MKMS, a second MGroup identifier with a first MGroup rule, and the first MKMS and the second MKMS creating the sequence of cryptographic keys based on the MKMS key.Type: ApplicationFiled: October 1, 2021Publication date: April 6, 2023Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Publication number: 20220182413Abstract: A method includes requesting, by a first computing device having a first application and a first Transport Layer Security (TLS) library, a sequence of cryptographic keys obtained by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, requesting, by a second computing device having a second application and a second TLS library, the sequence of cryptographic keys obtained by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, and communicating between the first application of the first computing device to the second application of the second computing device using the sequence of cryptographic keys based on the agent key.Type: ApplicationFiled: October 1, 2021Publication date: June 9, 2022Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Publication number: 20220182364Abstract: A method includes linking a first application with a first Transport Layer Security (TLS) library, linking a second application with a second TLS library, obtaining a sequence of cryptographic keys by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, obtaining the sequence of cryptographic keys by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, establishing communication between the first TLS library and the first agent to create a first trusted relationship, establishing communication between the second TLS library and the second agent to create a second trusted relationship, and establishing a third trusted relationship between the first agent and the second agent.Type: ApplicationFiled: October 1, 2021Publication date: June 9, 2022Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Patent number: 10110559Abstract: Systems and methods for web application firewall tunneling are disclosed. In one embodiment, the method may include (1) receiving a plurality of characters entered by a user into a field of a HTML page that is executed in a client runtime environment of a client device; (2) executing a client tunneling application to encode at least some of the characters; (3) passing the plurality of characters through the web application firewall; (4) executing a server tunneling application to decode the encoded characters; and (5) providing the plurality of characters, including the decoded characters, to a host application. Parts of the method may be performed by at least one computer processor.Type: GrantFiled: April 27, 2015Date of Patent: October 23, 2018Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Stuart Benson, Christiaan Paul Akre, Russell M. Logar
-
Patent number: 9608826Abstract: A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.Type: GrantFiled: June 29, 2010Date of Patent: March 28, 2017Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Stuart Benson, Sean Croston
-
Publication number: 20160288690Abstract: A caravan including: a chassis including wheels and a drawbar extending away from the wheels; a tow hitch mounted at a terminal end of the drawbar; a hollow body supported by the chassis, the body defining an internal volume and including an opening in a leading end of the body facing the tow hitch; and a slide-out extension mounted in the opening, the slide-out extension being slidingly moveable relative to the body between a closed position in which the slide-out extension is received within the body and closes the opening, and an open position in which the slide-out extension extends from the opening towards the tow hitch to thereby expand the internal volume of the body, the slide-out extension being at least partially supported by the drawbar when in the open position.Type: ApplicationFiled: November 13, 2014Publication date: October 6, 2016Inventor: Glenn Stuart Wills
-
Patent number: 9043893Abstract: Systems and methods for web application firewall tunneling are disclosed. In one embodiment, the method may include (1) receiving a plurality of characters entered by a user into a field of a HTML page that is executed in a client runtime environment of a client device; (2) executing a client tunneling application to encode at least some of the characters; (3) passing the plurality of characters through the web application firewall; (4) executing a server tunneling application to decode the encoded characters; and (5) providing the plurality of characters, including the decoded characters, to a host application. Parts of the method may be performed by at least one computer processor.Type: GrantFiled: June 21, 2012Date of Patent: May 26, 2015Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Stuart Benson, Christiaan Paul Akre, Russell M. Logar
-
Patent number: 8606625Abstract: A method, a system and a computer program product are directed towards determination of a variable toll for a particular target vehicle using a particular point-to-point travel segment of a particular toll road. The variable toll is calculated predicated upon a deviation of an instantaneous point-to-point traffic volume for the particular target vehicle exiting the toll road in comparison with an arbitrarily determined baseline point-to-point traffic volume. The instantaneous point-to-point traffic volume includes vehicles traveling at least a portion of the same point-to-point travel segment as the target vehicle during an effective time interval when the target vehicle traveled the point-to-point travel segment.Type: GrantFiled: July 9, 2012Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: David J. Delia, Wayne Michael Delia, Glenn Stuart Knickerbocker, Ann Katherine Walla
-
Patent number: 8583928Abstract: A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc.Type: GrantFiled: April 16, 2012Date of Patent: November 12, 2013Assignee: JP Morgan Chase BankInventors: Glenn Stuart Benson, Joseph R. Calaceto, Russell M. Logar
-
Patent number: 8375322Abstract: The invention addresses the need to view an entire document element, such as a photograph, paragraph, etc. when paging. A window generated by an application such as a browser includes a succession of document elements. The window has an actual top and an actual bottom. The computer system selects a paging step size automatically, wherein the paging step size is selected from a group. The group includes a first step size that is of a size such that paging downward by the first step size from the current window position advances the window to a location placing the top of the at least one document element a predetermined distance below the top of the window.Type: GrantFiled: June 20, 2008Date of Patent: February 12, 2013Assignee: International Busniess Machines CorporationInventors: Wayne Michael Delia, Glenn Stuart Knickerbocker
-
Publication number: 20120278138Abstract: A method, a system and a computer program product are directed towards determination of a variable toll for a particular target vehicle using a particular point-to-point travel segment of a particular toll road. The variable toll is calculated predicated upon a deviation of an instantaneous point-to-point traffic volume for the particular target vehicle exiting the toll road in comparison with an arbitrarily determined baseline point-to-point traffic volume. The instantaneous point-to-point traffic volume includes vehicles traveling at least a portion of the same point-to-point travel segment as the target vehicle during an effective time interval when the target vehicle traveled the point-to-point travel segment.Type: ApplicationFiled: July 9, 2012Publication date: November 1, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David J. Delia, Wayne Michael Delia, Glenn Stuart Knickerbocker, Ann Katherine Walla
-
Publication number: 20120260093Abstract: A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc.Type: ApplicationFiled: April 16, 2012Publication date: October 11, 2012Applicant: JP MORGAN CHASE BANKInventors: Glenn Stuart Benson, Joseph R. Calaceto, Russell M. Logar
-
Patent number: 8219443Abstract: A method, a system and a computer program product are directed towards determination of a variable toll for a particular target vehicle using a particular point-to-point travel segment of a particular toll road. The variable toll is calculated predicated upon a deviation of an instantaneous point-to-point traffic volume for the particular target vehicle exiting the toll road in comparison with an arbitrarily determined baseline point-to-point traffic volume. The instantaneous point-to-point traffic volume includes vehicles traveling at least a portion of the same point-to-point travel segment as the target vehicle during an effective time interval when the target vehicle traveled the point-to-point travel segment.Type: GrantFiled: February 4, 2009Date of Patent: July 10, 2012Assignee: International Business Machines CorporationInventors: David J. Delia, Wayne Michael Delia, Glenn Stuart Knickerbocker, Ann Katherine Walla
-
Patent number: 8190893Abstract: A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc. In general, the first data item will be a short alphanumeric string and the second data item will generally be much larger, e.g., a 128 bit sequence to be used principally for data authentication. According to another aspect of the present invention, consequential evidence of the transaction may be secured to provide after-the-fact evidence of the transaction.Type: GrantFiled: July 1, 2004Date of Patent: May 29, 2012Assignee: JP Morgan Chase BankInventors: Glenn Stuart Benson, Joseph R. Calaceto, Russell M. Logar
-
Publication number: 20110300229Abstract: Use of one or more of conjugated linoleic acid (CLA), high CLA milk fat, or one or more bovine milk lipid compositions to treat or prevent rotavirus infection.Type: ApplicationFiled: August 8, 2008Publication date: December 8, 2011Applicant: FONTERRA CO-OPERATIVE GROUP LIMITEDInventors: Glenn Stuart Buchan, Kerry Therese Buchan, Michelle Avril McConnell, Clare Elizabeth Fitzpatrick, Alastair Kenneth Hugh MacGibbon
-
Publication number: 20100198664Abstract: A method, a system and a computer program product are directed towards determination of a variable toll for a particular target vehicle using a particular point-to-point travel segment of a particular toll road. The variable toll is calculated predicated upon a deviation of an instantaneous point-to-point traffic volume for the particular target vehicle exiting the toll road in comparison with an arbitrarily determined baseline point-to-point traffic volume. The instantaneous point-to-point traffic volume includes vehicles traveling at least a portion of the same point-to-point travel segment as the target vehicle during an effective time interval when the target vehicle traveled the point-to-point travel segment.Type: ApplicationFiled: February 4, 2009Publication date: August 5, 2010Applicant: International Business Machines CorporationInventors: David J. Delia, Wayne Michael Delia, Glenn Stuart Knickerbocker, Ann Katherine Walla
-
Patent number: D939866Type: GrantFiled: December 15, 2020Date of Patent: January 4, 2022Inventor: Glenn Stuart Maginness
-
Patent number: D970886Type: GrantFiled: December 15, 2020Date of Patent: November 29, 2022Inventor: Glenn Stuart Maginness