Patents by Inventor James E. Bennison

James E. Bennison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11895225
    Abstract: A method, system, and digital recording medium provides for convenient and trustworthy user authentication with a computing device combining four authentication factors through use of a remote authentication system (RAS). An identity token (Device-ID) cryptographically bound to the user's computing device is generated as a first authentication factor. A password known only to the user is a second factor. Cryptographic signatures generated from the user's biometric minutiae is a third factor. A random challenge received from the RAS is a fourth factor.
    Type: Grant
    Filed: July 13, 2022
    Date of Patent: February 6, 2024
    Inventor: James E. Bennison
  • Publication number: 20230412367
    Abstract: A method, system, and digital recording medium provides for convenient and trustworthy user authentication with a computing device combining four authentication factors through use of a remote authentication system (RAS). An identity token (Device-ID) cryptographically bound to the user's computing device is generated as a first authentication factor. A password known only to the user is a second factor. Cryptographic signatures generated from the user's biometric minutiae is a third factor. A random challenge received from the RAS is a fourth factor.
    Type: Application
    Filed: August 31, 2023
    Publication date: December 21, 2023
    Inventor: James E. Bennison
  • Publication number: 20230155812
    Abstract: A method, system, and digital recording medium provides for convenient and trustworthy user authentication with a computing device combining four authentication factors through use of a remote authentication system (RAS). An identity token (Device-ID) cryptographically bound to the user's computing device is generated as a first authentication factor. A password known only to the user is a second factor. Cryptographic signatures generated from the user's biometric minutiae is a third factor. A random challenge received from the RAS is a fourth factor.
    Type: Application
    Filed: July 13, 2022
    Publication date: May 18, 2023
    Inventor: James E. Bennison
  • Patent number: 11556675
    Abstract: A system and a method for a supply-chain hardware integrity for electronics defense (SHIELD) dielet embedded over a component of a device, a radio frequency identification (RFID) probe system coupled to the SHIELD dielet, and a secure server system communicating with the RFID probe system that can enable security services is provided. Embodiments include a multi-function SHIELD software defined, hardware enabled security system that provides hardware identity, anti-tamper, encryption key generation and management, trusted platform module services, and cryptographic software security services for a device.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: January 17, 2023
    Assignee: Northrop Grumman Systems Corporation
    Inventor: James E. Bennison
  • Patent number: 11405189
    Abstract: A method, system, and digital recording medium provides for convenient and trustworthy user authentication with a computing device combining four authentication factors through use of a remote authentication system (RAS). An identity token (Device-ID) cryptographically bound to the user's computing device is generated as a first authentication factor. A password known only to the user is a second factor. Cryptographic signatures generated from the user's biometric minutiae is a third factor. A random challenge received from the RAS is a fourth factor.
    Type: Grant
    Filed: November 18, 2021
    Date of Patent: August 2, 2022
    Inventor: James E. Bennison
  • Publication number: 20210182436
    Abstract: A system and a method for a supply-chain hardware integrity for electronics defense (SHIELD) dielet embedded over a component of a device, a radio frequency identification (RFID) probe system coupled to the SHIELD dielet, and a secure server system communicating with the RFID probe system that can enable security services is provided. Embodiments include a multi-function SHIELD software defined, hardware enabled security system that provides hardware identity, anti-tamper, encryption key generation and management, trusted platform module services, and cryptographic software security services for a device.
    Type: Application
    Filed: December 16, 2019
    Publication date: June 17, 2021
    Inventor: JAMES E. BENNISON
  • Patent number: 9647843
    Abstract: Disclosed are a system and method of performing secure computations on a protected database. Embodiments of the method provide, in a secure processor, a database of cryptographically hashed values based on a database of cleartext values, receive a cryptographically hashed query value as input into the secure processor wherein the query value is a hash of a cleartext value that corresponds to a cleartext query, perform a comparison operation within the secure processor to determine the presence of the hashed query value within the database of cryptographically hashed values and provide the results of the comparison operation to an external interface of the secure processor, wherein the contents of the database of cryptographically hashed values and the comparison operations are encapsulated within the secure processor and unexposed externally therefrom.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: May 9, 2017
    Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATION
    Inventor: James E. Bennison
  • Publication number: 20160366176
    Abstract: A method for improving enterprise network security may include accessing a plurality of reputation scoring sources for a corresponding plurality of reputation scores, determining an aggregate reputation score based on the plurality of reputation scores, and, in response to a domain name service request, generating a response including information indicative of the aggregate reputation score.
    Type: Application
    Filed: June 10, 2016
    Publication date: December 15, 2016
    Inventor: James E. Bennison
  • Publication number: 20160197728
    Abstract: Disclosed are a system and method of performing secure computations on a protected database. Embodiments of the method provide, in a secure processor, a database of cryptographically hashed values based on a database of cleartext values, receive a cryptographically hashed query value as input into the secure processor wherein the query value is a hash of a cleartext value that corresponds to a cleartext query, perform a comparison operation within the secure processor to determine the presence of the hashed query value within the database of cryptographically hashed values and provide the results of the comparison operation to an external interface of the secure processor, wherein the contents of the database of cryptographically hashed values and the comparison operations are encapsulated within the secure processor and unexposed externally therefrom.
    Type: Application
    Filed: March 14, 2016
    Publication date: July 7, 2016
    Inventor: James E. BENNISON
  • Patent number: 9286488
    Abstract: Disclosed are a system and method of performing secure computations on a protected database. Embodiments of the method provide, in a secure processor, a database of cryptographically hashed values based on a database of cleartext values, receive a cryptographically hashed query value as input into the secure processor wherein the query value is a hash of a cleartext value that corresponds to a cleartext query, perform a comparison operation within the secure processor to determine the presence of the hashed query value within the database of cryptographically hashed values and provide the results of the comparison operation to an external interface of the secure processor, wherein the contents of the database of cryptographically hashed values and the comparison operations are encapsulated within the secure processor and unexposed externally therefrom.
    Type: Grant
    Filed: March 12, 2014
    Date of Patent: March 15, 2016
    Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATION
    Inventor: James E. Bennison
  • Publication number: 20140281578
    Abstract: Disclosed are a system and method of performing secure computations on a protected database. Embodiments of the method provide, in a secure processor, a database of cryptographically hashed values based on a database of cleartext values, receive a cryptographically hashed query value as input into the secure processor wherein the query value is a hash of a cleartext value that corresponds to a cleartext query, perform a comparison operation within the secure processor to determine the presence of the hashed query value within the database of cryptographically hashed values and provide the results of the comparison operation to an external interface of the secure processor, wherein the contents of the database of cryptographically hashed values and the comparison operations are encapsulated within the secure processor and unexposed externally therefrom.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 18, 2014
    Applicant: Northrop Grumman Systems Corporation
    Inventor: James E. Bennison