US 12,463,951 B2
Hands free access management and credential protection
Mordecai Barkan, Palo Alto, CA (US)
Filed by Mordecai Barkan, Palo Alto, CA (US)
Filed on Aug. 8, 2021, as Appl. No. 17/396,735.
Application 17/396,735 is a continuation in part of application No. 16/530,108, filed on Aug. 2, 2019, granted, now 11,184,763.
Prior Publication US 2021/0377241 A1, Dec. 2, 2021
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/08 (2013.01) [H04L 63/0245 (2013.01); H04L 63/123 (2013.01); H04L 63/126 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A secured computing system comprising:
a first computing system, the first computing system including any of a personal computer, a notebook, a tablet, a smartphone, a watch, a ring, a dedicated computing system or combination thereof;
the first computing system executes processes and communicates user's information with a secured site; and
a second computing system, the second computing system including any of a personal computer, a notebook, a tablet, a smartphone, a server, a watch, a ring or combination thereof;
the second computing system executes processes and communicates user's information with the secured site;
a user operates the secured computing system to communicate with the secured site where the first computing system and the second computing system are used simultaneously;
a pairing function is employed by the secured site to identify the first computing system and the second computing system as the secured computing system;
a first session between the first computing system and the secured site runs concurrently to a second session between the second computing system and the secured site;
the first session and the second session communicate user's information to and from the secured site;
the secured site configured to combine the first session and the second session into a single session to support security functions including any of user authentication, verify session integrity, support content validation, detect hacking attempt, storing sensitive information, detecting and parsing character strings, seeding, encryption, decryption, storing and retrieving information, sending data to the second computing system, or combination thereof.