Search

Glenn S Benson

age ~63

from Newton, MA

Also known as:
  • Glenn M Benson
Phone and address:
76 Sheridan St, Newton, MA 02465
(617)3325704

Glenn Benson Phones & Addresses

  • 76 Sheridan St, West Newton, MA 02465 • (617)3325704
  • 34 Alden St, West Newton, MA 02465 • (617)3325704
  • Newton, MA
  • Bethel, ME
  • Woburn, MA
  • San Jose, CA
  • Olney, MD
  • Boca Raton, FL
  • Keysville, GA

Work

  • Position:
    Executive, Administrative, and Managerial

Education

  • Degree:
    Bachelor's degree or higher

Specialities

Administrative Law • Appeals • Energy • Energy Litigation • Energy Regulation & Policy • Infrastructure Project Development & Finance • Energy Project Permitting & Development • Environment, Energy & Resources • Cleantech • Oil & Gas • Federal Grants & Loans • Energy Power Marketing • Energy - State Utility Regulation • Energy - Solar

Lawyers & Attorneys

Glenn Benson Photo 1

Glenn Benson - Lawyer

view source
Specialties:
Administrative Law
Appeals
Energy
Energy Litigation
Energy Regulation & Policy
Infrastructure Project Development & Finance
Energy Project Permitting & Development
Environment, Energy & Resources
Cleantech
Oil & Gas
Federal Grants & Loans
Energy Power Marketing
Energy - State Utility Regulation
Energy - Solar
ISLN:
900510876
Admitted:
1994
University:
Syracuse University, A.B., 1990
Law School:
University of Virginia School of Law, J.D., 1993
Name / Title
Company / Classification
Phones & Addresses
Glenn Benson
incorporator
The Huntsville Firefighters Association, Local No. 1833, Inc
ORGANIZED EXCLUSIVELY FOR CHARITABLE & EDUCATIONAL PURPOSES
Glenn Benson
Director of Engineering, Maintenance Staff
Bostonva Health Care System
Health/Allied Services
940 Belmont St, Brockton, MA 02301
Glenn Benson
Director of Engineering
Boston VA Research Institute, Inc.
Research · Operates As Research Grant Administrators
150 S Huntington Ave, 151B, Boston, MA 02130
150 S Huntington Ave, Boston, MA 02130
(617)7381313
Glenn Benson
Developer
Emptoris, Inc
Custom Computer Programing Computer Systems Design · Custom Computer Programming Computer Systems Design · Prepackaged Software Services · Accountant
200 Wheeler Rd, Burlington, MA 01803
(781)9939212
Glenn Benson
Director of Engineering, Facilities Manager, Maintenance Staff
Va Hospital
Administrative Veterans' Affairs · Anesthesiology
1400 Vfw Pkwy, Boston, MA 02132
(617)3237700
Glenn Benson
Director of Engineering, Maintenance Staff
Veterans Health Administration
General Hospital · Medical Doctor's Office Administrative Veterans' Affairs · Health/Allied Services
1400 Vfw Pkwy, Boston, MA 02132
(617)3237700, (617)3565623

Us Patents

  • Electronically Verified Digital Signature And Document Delivery System And Method

    view source
  • US Patent:
    7082538, Jul 25, 2006
  • Filed:
    Oct 3, 2001
  • Appl. No.:
    09/970147
  • Inventors:
    Thaddeus Bouchard - Andover MA, US
    Glenn Benson - Newton MA, US
  • Assignee:
    Omtool, Ltd. - Andover MA
  • International Classification:
    H04L 9/00
    H04L 9/30
  • US Classification:
    713181, 380277, 380293
  • Abstract:
    The secure messaging system of the invention encrypts an electronic document using a symmetric key and transmits the encrypted document and related message parameters to a recipient whose identity is then authenticated by a web server. The web server dynamically regenerates the symmetric key from a hidden key and from the message parameters accompanying the encrypted document, and thus avoids having to maintain a central repository of encrypted documents as required by typical “post and pick-up” encrypted messaging systems. Further, an audit trail produced while practicing the invention provides timestamped message digest data for a plurality of time intervals, where the message digests for adjacent time intervals are computationally linked together. The audit trail effectively enables timestamped message digest data to verify not only the existence of a document during a first time interval, but also to verify the existence of documents encountered in a prior time interval.
  • Portable Security Transaction Protocol

    view source
  • US Patent:
    8190893, May 29, 2012
  • Filed:
    Jul 1, 2004
  • Appl. No.:
    10/882527
  • Inventors:
    Glenn Stuart Benson - Newton MA, US
    Joseph R. Calaceto - Ridgewood NJ, US
    Russell M. Logar - Breezy Point NY, US
  • Assignee:
    JP Morgan Chase Bank - New York NY
  • International Classification:
    H04L 9/32
    H04L 29/06
    G06F 21/00
    G06F 7/04
    G06F 15/16
    G06F 17/30
  • US Classification:
    713170, 713168, 713172, 713181, 726 2, 726 9, 726 20, 726 21, 726 27, 726 28, 726 29, 726 30
  • Abstract:
    A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc. In general, the first data item will be a short alphanumeric string and the second data item will generally be much larger, e. g. , a 128 bit sequence to be used principally for data authentication. According to another aspect of the present invention, consequential evidence of the transaction may be secured to provide after-the-fact evidence of the transaction.
  • System And Method For Anti-Phishing Authentication

    view source
  • US Patent:
    8583926, Nov 12, 2013
  • Filed:
    Apr 26, 2006
  • Appl. No.:
    11/411576
  • Inventors:
    Glenn S. Benson - Newton MA, US
  • Assignee:
    JPMorgan Chase Bank, N.A. - New York NY
  • International Classification:
    H04L 9/32
  • US Classification:
    713169, 726 5, 726 19
  • Abstract:
    Embodiments of the invention are directed to a method for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted commitment to the client. The method can also include receiving a one-time password (OTP) from the client, and validating the OTP. The method can also include sending a commitment key, to be authenticated by the client, receiving a static password from the client and authenticating the client. Embodiments of the invention are directed to a system for providing security against phishing attacks. The system can include one or more servers configured to receive a login ID from a client, and provide an encrypted commitment to the client. The processors can be configured to receive a one-time password (OTP) from the client, validate the OTP, send a commitment key, to be authenticated by the client, receive a static password from the client and authenticate the client.
  • Payload Layer Security For File Transfer

    view source
  • US Patent:
    20060190723, Aug 24, 2006
  • Filed:
    Aug 18, 2005
  • Appl. No.:
    11/206352
  • Inventors:
    Glenn Benson - Newton MA, US
  • Assignee:
    JP Morgan Chase Bank - New York NY
  • International Classification:
    H04L 9/00
  • US Classification:
    713165000
  • Abstract:
    A method for providing file transfer security includes receiving an authentication file including a first key and authentication information, extracting the first key from the authentication file, decrypting the authentication information with the first key, and validating the authentication information. The authentication information is encrypted, and may include a nonce, a timestamp, and/or a second key. A system for providing file transfer security includes a DMZ proxy programmed and configured to receive an authentication file from a client including authentication information. The DMZ proxy extracts a first key from the authentication file, decrypts the authentication information with the first key, and validates the authentication information.
  • System And Method For Partner Key Management

    view source
  • US Patent:
    20100332399, Dec 30, 2010
  • Filed:
    Jun 29, 2010
  • Appl. No.:
    12/826311
  • Inventors:
    Glenn Benson - Newton MA, US
    Sean Croston - Andover MA, US
  • International Classification:
    G06Q 40/00
    H04L 9/28
    H04L 9/32
  • US Classification:
    705 71, 705 44
  • Abstract:
    A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key, infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures.
  • System And Method For End To End Encryption

    view source
  • US Patent:
    20120131331, May 24, 2012
  • Filed:
    Jun 24, 2011
  • Appl. No.:
    13/168148
  • Inventors:
    Glenn BENSON - Newton MA, US
  • Assignee:
    JPMorgan Chase Bank - New York NY
  • International Classification:
    H04L 9/32
    H04L 29/06
  • US Classification:
    713155
  • Abstract:
    Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a user password from a user; (2) using the computer processor, the application combining the user password and a password extension; (3) using the computer processor, the application cryptographically processing the combined user password and password extension, resulting cryptographic public information; and (4) providing the cryptographic public information to a server. The user password is not provided to the server. In another embodiment, a method for user authentication includes (1) using a computer processor, receiving a login page from a server; (2) sending a Hash-based Message Authentication Code to the server; and (3) receiving an authentication from the server. In one embodiment, the login page may include a transkey and a value B.
  • System And Method For Device Registration And Authentication

    view source
  • US Patent:
    20130179681, Jul 11, 2013
  • Filed:
    Jun 8, 2012
  • Appl. No.:
    13/492126
  • Inventors:
    Glenn Benson - Newton MA, US
    Salvatore Richard Re - Westfield NJ, US
  • Assignee:
    JPMORGAN CHASE BANK, N.A. - New York NY
  • International Classification:
    H04L 9/32
  • US Classification:
    713155
  • Abstract:
    Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.
  • Systems And Methods For Trusted Path Secure Communication

    view source
  • US Patent:
    20200177395, Jun 4, 2020
  • Filed:
    Feb 7, 2020
  • Appl. No.:
    16/784863
  • Inventors:
    - Arlington VA, US
    Glenn S. Benson - Newton MA, US
  • International Classification:
    H04L 9/32
    G06Q 20/38
    G06F 21/57
    G06F 21/60
    G06F 21/64
    H04L 29/06
    H04W 12/10
    H04W 12/12
    H04W 12/00
    G06F 21/53
    G06F 21/56
  • Abstract:
    A system for establishing a trusted path for secure communication between client devices and server devices, such as between an account holder and a financial institution, can provide the core security attributes of confidentiality (of the parties), integrity (of the information), anti-replay (protection against replay fraud) and/or anti-tampering (protection against unauthorized changes to information being exchanged and/or modules that generate and communicate such information). A messaging layer implementation in favor of a transport layer implementation can provide a trusted path. This infrastructure features secure cryptographic key storage, and implementation of a trusted path built using the cryptographic infrastructure. The trusted path protects against unauthorized information disclosure, modification, or replays. These services can effectively protect against Man-in-the-Middle, Man-in-the-Application, and other attacks.

Resumes

Glenn Benson Photo 2

Glenn Benson

view source
Work:
Huntsville Fire Rescue 1982 - 2013
Captain
Glenn Benson Photo 3

Director Of Information Security Architecture, Senior Vice President

view source
Location:
West Newton, MA
Industry:
Financial Services
Work:
Santander Bank, N.a.
Director of Information Security Architecture, Senior Vice President

Inauth, Inc. Jun 2014 - Dec 2017
Chief Architect and Product Manager

J.p. Morgan Feb 2001 - Jun 2014
Executive Director and Distinguished Engineer

Omtool Jan 2000 - Dec 2000
Security Architect

Siemens Jan 1994 - Dec 1999
Architect
Education:
Georgia Institute of Technology 1985 - 1989
Doctorates, Doctor of Philosophy, Computer Science
Carnegie Mellon University 1980 - 1984
Bachelors, Bachelor of Science, Computer Science
Skills:
Security
Enterprise Software
Information Security
Enterprise Architecture
Sdlc
Computer Security
Network Security
It Strategy
Identity Management
Integration
Strategy
Architecture
Software Development
Information Security Management
Data Center
Cloud Computing
Agile Methodologies
Business Continuity
Pki
Infrastructure
Cryptography
Solution Architecture
Disaster Recovery
Testing
Application Architecture
System Architecture
Distributed Systems
Unix
Solaris
Architectures
Software Development Life Cycle
Linux
Software Engineering
Perl
Cyber Security
Java Enterprise Edition
Identity and Access Management
Middleware
Ssl
Entrepreneurship
Privacy
Compliance
Glenn Benson Photo 4

Glenn Benson

view source

Youtube

Glenn Medeiros - Nothing's Gonna Change My Lo...

Formed in the late 1970's by Leonard Silver, Amherst Records has a var...

  • Duration:
    3m 53s

George Benson - Nothing's Gonna Change My Lov...

For Valentine's day today, February 14, 2022, this is the ultimate lov...

  • Duration:
    3m 54s

Stigmatizing Crime in Black Communities | Gle...

Support The Glenn Show at In this excerpt from a Substack subscriber...

  • Duration:
    12m 32s

I've Been Searchin' (Nobody Like You)

Provided to YouTube by Rhino Atlantic I've Been Searchin' (Nobody Like...

  • Duration:
    5m 31s

All for You

Provided to YouTube by Jive All for You Glenn Jones All Of You 1990 ...

  • Duration:
    4m 35s

Glenn Jones - All For You & All For You Inter...

From the 1990 Album All For You Produced by Barry Eastmond & Timmy All...

  • Duration:
    5m 31s

Myspace

Glenn Benson Photo 5

Glenn Benson

view source
Locality:
Marshall, Texas
Gender:
Male
Birthday:
1948

Plaxo

Glenn Benson Photo 6

Glenn Benson

view source
Chase Home Finance

Flickr

Facebook

Glenn Benson Photo 15

Glenn Benson

view source
Glenn Benson Photo 16

Glenn Pinky Benson

view source
Glenn Benson Photo 17

Glenn Benson

view source
Glenn Benson Photo 18

Glenn Benson

view source
Glenn Benson Photo 19

Glenn Benson

view source
Glenn Benson Photo 20

Glenn Benson

view source
Glenn Benson Photo 21

Glenn Benson

view source
Glenn Benson Photo 22

Glenn Benson

view source

Googleplus

Glenn Benson Photo 23

Glenn Benson

Glenn Benson Photo 24

Glenn Benson

Glenn Benson Photo 25

Glenn Benson

Classmates

Glenn Benson Photo 26

Glenn Benson

view source
Schools:
West Springfield High School Springfield VA 1982-1986
Community:
Frank Mulkey, Wendy Hill, Barbara Bayles, Judy Shutack
Glenn Benson Photo 27

Glenn Benson

view source
Schools:
Norfolk Collegiate High School Norfolk VA 1994-1998
Community:
Malaika King, Jody Tuttle, David Klinetop, Jo Black, Donald Berger
Glenn Benson Photo 28

Glenn Benson, Jefferson H...

view source
Glenn Benson Photo 29

Newton High School, Newto...

view source
Graduates:
Glenn Benson (1981-1985),
Lori Nemeth (1975-1982),
Susan Cole (1956-1960),
Daniel Anticoli (1997-2001),
Jackie Bond (1976-1980)
Glenn Benson Photo 30

Clearview Regional High S...

view source
Graduates:
Derek Federovich (1993-1997),
Glenn Benson (1984-1988),
Howard Rooney (1964-1968),
Ingrid Arbe (1991-1995)
Glenn Benson Photo 31

University of Oregon - B...

view source
Graduates:
Poh Meng Thomas Kok (1987-1991),
Stefanie Simonsen (1993-1994),
Dennis Wortman (1963-1968),
Glenn Benson (1958-1959),
Alison Benson (1991-1995)

Get Report for Glenn S Benson from Newton, MA, age ~63
Control profile