US 12,105,792 B2
Personal launch code (PLC) created by an account owner and included within the creation of a device identification code defining the identity of a computing device seeking access to accounts
Gary William Streuter, Laguna Niguel, CA (US); and William Pat Price, Lake Havasu City, AZ (US)
Filed by Gary William Streuter, Laguna Niguel, CA (US); and William Pat Price, Lake Havasu City, AZ (US)
Filed on Mar. 27, 2022, as Appl. No. 17/656,648.
Claims priority of provisional application 63/167,145, filed on Mar. 29, 2021.
Prior Publication US 2022/0309148 A1, Sep. 29, 2022
Int. Cl. G06F 21/45 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); G06F 21/73 (2013.01)
CPC G06F 21/45 (2013.01) [G06F 21/602 (2013.01); G06F 21/62 (2013.01); G06F 21/73 (2013.01); G06F 2221/2141 (2013.01)] 8 Claims
OG exemplary drawing
 
1. A method whereby a first software program executing on a user's computing device requests, said user to enter a Personal Launch Code (PLC), known only by a rightful account owner, and said PLC is then used as an element in the validation of the identity and authorization of said user's computing device to gain account access by integrating said PLC into the creation of an Anonymous Access Key (AAK), consisting of selected distinctive identifiers gathered by said first software program executing on said computing device and combined with the Personal Launch Code (PLC) entered by said user comprising:
a. Launching said first software program executing on said computing device, and
b. Said first software program displays a query visible to said user requesting said PLC be entered by said user, and
c. Said first software program gathers selected distinctive identifiers from said computing device, consisting of unique identifiers representing hardware and software modules residing on said computing device, and
d. Said first software program transmits said collected selected distinctive identifiers and said user entered PLC via the Internet to an online Validation Service, and
e. Said online Validation Service receives said selected distinctive identifiers and said PLC and determines which selected distinctive identifiers are required to construct the Anonymous Access Key (AAK), and
f. Said online Validation Service hashes said selected distinctive identifiers and said PLC into one or more hashed results, and
g. Said online Validation Service then compares said one or more hashed results against its online database of hashed results and, if said one or more hashed results is matched against a stored hashed result in said online database of hashed results, access is granted to said computing device seeking access and
h. If said one or more hashed results is not matched against any hashed result in said online database of hashed results, a status is returned to said first software program executing on said computing device that said computing device has not been validated and account access has been denied.