US 12,335,239 B2
Personalized secure communication session management
Michael Joseph Frendo, Boulder, CO (US); Robert Taylor Bartlett, Wheat Ridge, CO (US); Alexander John Shockley, Denver, CO (US); and James M. Behmke, Duxbury, MA (US)
Assigned to Journey.ai, Denver, CA (US)
Filed by Journey.ai, Denver, CO (US)
Filed on Jul. 6, 2023, as Appl. No. 18/218,937.
Application 18/218,937 is a continuation of application No. 17/200,034, filed on Mar. 12, 2021, granted, now 11,736,445.
Prior Publication US 2023/0370430 A1, Nov. 16, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/18 (2006.01); G06F 21/42 (2013.01); G06F 21/62 (2013.01); H04L 9/40 (2022.01); H04L 12/46 (2006.01); H04L 9/12 (2006.01)
CPC H04L 63/0272 (2013.01) [H04L 12/4641 (2013.01); H04L 63/029 (2013.01); H04L 63/0428 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method, comprising:
authenticating, by a process, a user at a client device, the authenticating verifying that the user is both present at the client device and authorized to access one or more secured resources;
establishing, by the process in response to authenticating the user, a secure communication session for the client device to access the one or more secured resources;
confirming, by the process, at a later time during the secure communication session, whether the user is still authenticated at the client device;
maintaining, by the process, the access to the one or more secured resources on the secure communication session at the later time in response to the user still being authenticated at the client device at the later time; and
restricting, by the process, the access to the one or more secured resources on the secure communication session at the later time in response to the user not being authenticated at the client device at the later time due to the user no longer being present at the client device at which the user was authenticated, wherein:
i) additional persons are never authorized to access the one or more secured resources, and wherein restricting the access to the one or more secured resources on the secure communication session occurs in response to the detecting of an additional person, or
ii) the process receives an indication to expect the additional person during the secure communications session and, in response to the indication, maintains the access to the one or more secured resources.