| CPC G06F 21/71 (2013.01) [G06F 21/31 (2013.01); G06F 21/602 (2013.01); G06Q 20/401 (2013.01); H04L 67/133 (2022.05)] | 17 Claims |

|
1. A method for password-less authentication and login onto an application by utilizing one or more processors and one or more memories, the method comprising:
storing digital driver's license (DDL) information data of a user onto a computing device utilized by the user;
receiving user input via selection of an icon among a plurality of icons displayed on a user interface of the computing device, wherein the selected icon indicates registration option of the computing device via an external database that also stores the DDL information data of the user;
extracting, in response to receiving user input, the DDL information data from the computing device;
calling an application programming interface (API) associated with external database to extract the DDL information data of the user from the external database;
comparing the DDL information data of the user extracted from the computing device with the DDL information data of the user extracted from the external database;
validating the DDL information data of the user extracted from the computing device when it is determined that the DDL information data of the user extracted from the computing device exactly matches the DDL information data of the user extracted from the external database;
creating, in response to validating, a DDL secret private key;
storing the DDL secret private key onto both an internal database and a secured environment within the computing device;
transmitting an electronic notification to the application that the registration of the computing device is successful;
displaying the electronic notification indicating successful registration onto the user interface;
receiving a login request from the user, via the user interface, to login onto the application; and
when it is determined that the registration of the computing device is successful, automatically executing the following login process in response to the login request:
extracting the DDL secret private key from the computing device of the user;
extracting the DDL secret private key associated with the user from the internal database;
validating the DDL secret private key extracted from the computing device when it is determined that the DDL secret private key extracted from the computing device exactly matches the DDL secret private key extracted from the internal database; and
allowing login access to the application in response to validating the DDL secret private key.
|