Patents by Inventor Glenn Stuart Benson
Glenn Stuart Benson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11689510Abstract: A method includes requesting, by a first computing device having a first application and a first Transport Layer Security (TLS) library, a sequence of cryptographic keys obtained by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, requesting, by a second computing device having a second application and a second TLS library, the sequence of cryptographic keys obtained by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, and communicating between the first application of the first computing device to the second application of the second computing device using the sequence of cryptographic keys based on the agent key.Type: GrantFiled: October 1, 2021Date of Patent: June 27, 2023Assignee: TrustFour Technologies, Inc.Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Patent number: 11658948Abstract: A method includes linking a first application with a first Transport Layer Security (TLS) library, linking a second application with a second TLS library, obtaining a sequence of cryptographic keys by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, obtaining the sequence of cryptographic keys by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, establishing communication between the first TLS library and the first agent to create a first trusted relationship, establishing communication between the second TLS library and the second agent to create a second trusted relationship, and establishing a third trusted relationship between the first agent and the second agent.Type: GrantFiled: October 1, 2021Date of Patent: May 23, 2023Assignee: TrustFour Technologies, Inc.Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Publication number: 20230107962Abstract: A method includes requesting, by a first computing device having a first application and a first transport layer security (TLS) library, a sequence of cryptographic keys from a first mutual key management service (MKMS), the sequence of cryptographic keys based on an MKMS key, requesting, by a second computing device having a second application and a second TLS library, the sequence of cryptographic keys from a second MKMS, performing, by the first MKMS having a first certificate and the second MKMS having a second certificate, an authorization, comparing, by one of the first MKMS and the second MKMS, a second MGroup identifier with a first MGroup rule, and the first MKMS and the second MKMS creating the sequence of cryptographic keys based on the MKMS key.Type: ApplicationFiled: October 1, 2021Publication date: April 6, 2023Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Publication number: 20220182364Abstract: A method includes linking a first application with a first Transport Layer Security (TLS) library, linking a second application with a second TLS library, obtaining a sequence of cryptographic keys by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, obtaining the sequence of cryptographic keys by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, establishing communication between the first TLS library and the first agent to create a first trusted relationship, establishing communication between the second TLS library and the second agent to create a second trusted relationship, and establishing a third trusted relationship between the first agent and the second agent.Type: ApplicationFiled: October 1, 2021Publication date: June 9, 2022Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Publication number: 20220182413Abstract: A method includes requesting, by a first computing device having a first application and a first Transport Layer Security (TLS) library, a sequence of cryptographic keys obtained by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, requesting, by a second computing device having a second application and a second TLS library, the sequence of cryptographic keys obtained by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, and communicating between the first application of the first computing device to the second application of the second computing device using the sequence of cryptographic keys based on the agent key.Type: ApplicationFiled: October 1, 2021Publication date: June 9, 2022Inventors: Glenn Stuart Benson, Robert Alan Levine
-
Patent number: 10110559Abstract: Systems and methods for web application firewall tunneling are disclosed. In one embodiment, the method may include (1) receiving a plurality of characters entered by a user into a field of a HTML page that is executed in a client runtime environment of a client device; (2) executing a client tunneling application to encode at least some of the characters; (3) passing the plurality of characters through the web application firewall; (4) executing a server tunneling application to decode the encoded characters; and (5) providing the plurality of characters, including the decoded characters, to a host application. Parts of the method may be performed by at least one computer processor.Type: GrantFiled: April 27, 2015Date of Patent: October 23, 2018Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Stuart Benson, Christiaan Paul Akre, Russell M. Logar
-
Patent number: 9608826Abstract: A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.Type: GrantFiled: June 29, 2010Date of Patent: March 28, 2017Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Stuart Benson, Sean Croston
-
Patent number: 9043893Abstract: Systems and methods for web application firewall tunneling are disclosed. In one embodiment, the method may include (1) receiving a plurality of characters entered by a user into a field of a HTML page that is executed in a client runtime environment of a client device; (2) executing a client tunneling application to encode at least some of the characters; (3) passing the plurality of characters through the web application firewall; (4) executing a server tunneling application to decode the encoded characters; and (5) providing the plurality of characters, including the decoded characters, to a host application. Parts of the method may be performed by at least one computer processor.Type: GrantFiled: June 21, 2012Date of Patent: May 26, 2015Assignee: JPMorgan Chase Bank, N.A.Inventors: Glenn Stuart Benson, Christiaan Paul Akre, Russell M. Logar
-
Patent number: 8583928Abstract: A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc.Type: GrantFiled: April 16, 2012Date of Patent: November 12, 2013Assignee: JP Morgan Chase BankInventors: Glenn Stuart Benson, Joseph R. Calaceto, Russell M. Logar
-
Publication number: 20120260093Abstract: A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc.Type: ApplicationFiled: April 16, 2012Publication date: October 11, 2012Applicant: JP MORGAN CHASE BANKInventors: Glenn Stuart Benson, Joseph R. Calaceto, Russell M. Logar
-
Patent number: 8190893Abstract: A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc. In general, the first data item will be a short alphanumeric string and the second data item will generally be much larger, e.g., a 128 bit sequence to be used principally for data authentication. According to another aspect of the present invention, consequential evidence of the transaction may be secured to provide after-the-fact evidence of the transaction.Type: GrantFiled: July 1, 2004Date of Patent: May 29, 2012Assignee: JP Morgan Chase BankInventors: Glenn Stuart Benson, Joseph R. Calaceto, Russell M. Logar
-
Patent number: 5935246Abstract: A copy protection mechanism for protecting software against copying, consists of a challenge mechanism embedded in each protected item of software. The challenge mechanism has no access to the customer's private keying material. In operation, the challenge mechanism sends a random challenge to the customer's signature server. The signature server signs the challenge, using the customer's private keying material and then returns the signed challenge to the challenge mechanism. The challenge mechanism then verifies the signed challenge, using the customer's public keying material, and prohibits the customer from using some or all of the protected item of software unless the verification is successful. The mechanism permits every customer to receive an identical copy of the copy protected program with the embedded challenge mechanism.Type: GrantFiled: April 11, 1997Date of Patent: August 10, 1999Assignee: International Computers LimitedInventor: Glenn Stuart Benson