Patents by Inventor Glenn Benson
Glenn Benson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11489673Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.Type: GrantFiled: May 27, 2020Date of Patent: November 1, 2022Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Glenn Benson, Salvatore Richard Re
-
Publication number: 20200295940Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1)receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.Type: ApplicationFiled: May 27, 2020Publication date: September 17, 2020Inventors: Glenn Benson, Salvatore Richard Re
-
Patent number: 10762501Abstract: A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.Type: GrantFiled: February 16, 2017Date of Patent: September 1, 2020Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Glenn Benson, Sean Croston
-
Patent number: 10708059Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.Type: GrantFiled: June 14, 2018Date of Patent: July 7, 2020Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Benson, Salvatore Richard Re
-
Publication number: 20180302223Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.Type: ApplicationFiled: June 14, 2018Publication date: October 18, 2018Inventors: Glenn Benson, Salvatore Richard Re
-
Patent number: 10027485Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.Type: GrantFiled: February 4, 2015Date of Patent: July 17, 2018Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Benson, Salvatore Richard Re
-
Publication number: 20170161737Abstract: A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.Type: ApplicationFiled: February 16, 2017Publication date: June 8, 2017Inventors: Glenn Benson, Sean Croston
-
Patent number: 8984276Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.Type: GrantFiled: June 8, 2012Date of Patent: March 17, 2015Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Benson, Salvatore Richard Re
-
Patent number: 8775794Abstract: Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a user password from a user; (2) using the computer processor, the application combining the user password and a password extension; (3) using the computer processor, the application cryptographically processing the combined user password and password extension, resulting cryptographic public information; and (4) providing the cryptographic public information to a server. The user password is not provided to the server. In another embodiment, a method for user authentication includes (1) using a computer processor, receiving a login page from a server; (2) sending a Hash-based Message Authentication Code to the server; and (3) receiving an authentication from the server. In one embodiment, the login page may include a transkey and a value B.Type: GrantFiled: June 24, 2011Date of Patent: July 8, 2014Assignee: JPMorgan Chase Bank, N.A.Inventor: Glenn Benson
-
Publication number: 20130179681Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.Type: ApplicationFiled: June 8, 2012Publication date: July 11, 2013Applicant: JPMORGAN CHASE BANK, N.A.Inventors: Glenn Benson, Salvatore Richard Re
-
Publication number: 20120131331Abstract: Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a user password from a user; (2) using the computer processor, the application combining the user password and a password extension; (3) using the computer processor, the application cryptographically processing the combined user password and password extension, resulting cryptographic public information; and (4) providing the cryptographic public information to a server. The user password is not provided to the server. In another embodiment, a method for user authentication includes (1) using a computer processor, receiving a login page from a server; (2) sending a Hash-based Message Authentication Code to the server; and (3) receiving an authentication from the server. In one embodiment, the login page may include a transkey and a value B.Type: ApplicationFiled: June 24, 2011Publication date: May 24, 2012Applicant: JPMorgan Chase BankInventor: Glenn BENSON
-
Publication number: 20100332399Abstract: A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key, infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.Type: ApplicationFiled: June 29, 2010Publication date: December 30, 2010Inventors: Glenn Benson, Sean Croston
-
Publication number: 20060190723Abstract: A method for providing file transfer security includes receiving an authentication file including a first key and authentication information, extracting the first key from the authentication file, decrypting the authentication information with the first key, and validating the authentication information. The authentication information is encrypted, and may include a nonce, a timestamp, and/or a second key. A system for providing file transfer security includes a DMZ proxy programmed and configured to receive an authentication file from a client including authentication information. The DMZ proxy extracts a first key from the authentication file, decrypts the authentication information with the first key, and validates the authentication information.Type: ApplicationFiled: August 18, 2005Publication date: August 24, 2006Applicant: JP Morgan Chase BankInventor: Glenn Benson
-
Patent number: 7082538Abstract: The secure messaging system of the invention encrypts an electronic document using a symmetric key and transmits the encrypted document and related message parameters to a recipient whose identity is then authenticated by a web server. The web server dynamically regenerates the symmetric key from a hidden key and from the message parameters accompanying the encrypted document, and thus avoids having to maintain a central repository of encrypted documents as required by typical “post and pick-up” encrypted messaging systems. Further, an audit trail produced while practicing the invention provides timestamped message digest data for a plurality of time intervals, where the message digests for adjacent time intervals are computationally linked together. The audit trail effectively enables timestamped message digest data to verify not only the existence of a document during a first time interval, but also to verify the existence of documents encountered in a prior time interval.Type: GrantFiled: October 3, 2001Date of Patent: July 25, 2006Assignee: Omtool, Ltd.Inventors: Thaddeus Bouchard, Glenn Benson
-
Publication number: 20050091492Abstract: A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc. In general, the first data item will be a short alphanumeric string and the second data item will generally be much larger, e.g., a 128 bit sequence to be used principally for data authentication. According to another aspect of the present invention, consequential evidence of the transaction may be secured to provide after-the-fact evidence of the transaction.Type: ApplicationFiled: July 1, 2004Publication date: April 28, 2005Inventors: Glenn Benson, Joseph Calaceto, Russell Logar
-
Patent number: 6678665Abstract: A method for protecting an item of software, wherein at least one challenge means is associated with said protected item of software, and at least one response means accesses one private keying material. The challenge means has no access to said private keying material. The response means proves to the challenge means that the response means has access to the private keying material using an asymmetric probabilistic proof, e.g., zero knowledge proof. The challenge means validates this proof using the public keying material that corresponds to the response means' private keying material.Type: GrantFiled: October 2, 1997Date of Patent: January 13, 2004Assignee: Fujitsu Siemens ComputerInventors: Glenn Benson, Markus Dichtl
-
Patent number: 6651169Abstract: A method for protecting an item of software, wherein at least one challenge is associated with the protected item of software, and at least one response accesses one private keying material. The challenge has no access to the private keying material. The challenge and the response are generating shared secret information, respectively, in accordance with an asymmetric confidentiality scheme. The response proves that it discovered the shared secret and the challenge validates the proof. The challenge proof validation procedure uses the public keying material that corresponds to the response private keying material.Type: GrantFiled: September 30, 1997Date of Patent: November 18, 2003Assignee: Fujitsu Siemens ComputersInventors: Glenn Benson, Markus Dichtl
-
Publication number: 20020091928Abstract: The secure messaging system of the invention encrypts an electronic document using a symmetric key and transmits the encrypted document and related message parameters to a recipient whose identity is then authenticated by a web server. The web server dynamically regenerates the symmetric key from a hidden key and from the message parameters accompanying the encrypted document, and thus avoids having to maintain a central repository of encrypted documents as required by typical “post and pick-up” encrypted messaging systems. Further, an audit trail produced while practicing the invention provides timestamped message digest data for a plurality of time intervals, where the message digests for adjacent time intervals are computationally linked together. The audit trail effectively enables timestamped message digest data to verify not only the existence of a document during a first time interval, but also to verify the existence of documents encountered in a prior time interval.Type: ApplicationFiled: October 3, 2001Publication date: July 11, 2002Inventors: Thaddeus Bouchard, Glenn Benson
-
Patent number: 6334118Abstract: A software rental system and method are provided having at least one rented program permitting at least one service to a customer with a customer's response means. The rented program has no access to a customer's private keying material. Using asymmetric cryptography, the customer's response means proves to the rented program that the customer's response means has access to the customer's private keying material. The rented program does not permit the at least one service to the customer unless the proof is successful.Type: GrantFiled: March 23, 1998Date of Patent: December 25, 2001Assignee: Siemens AktiengesellschaftInventor: Glenn Benson
-
Patent number: 6301660Abstract: A computer system is provided having a protection mechanism for protecting the contents of a file. The protection mechanism has at least one Viewer program, at least one challenge associated with the Viewer program and the file, and at least one response with private keying material that it can access. The challenge has no access to the private keying material. The response can prove that it has access to the private keying material by interacting with the challenge using an asymmetric cryptographic scheme. The challenge can instruct the Viewer program to avoid using some or all of the file's content unless the proof is successful.Type: GrantFiled: March 23, 1998Date of Patent: October 9, 2001Assignee: Siemens AktiengesellschaftInventor: Glenn Benson