CPC G06F 21/45 (2013.01) [G06F 21/602 (2013.01); G06F 21/62 (2013.01); G06F 21/73 (2013.01); G06F 2221/2141 (2013.01)] | 8 Claims |
1. A method whereby a first software program executing on a user's computing device requests, said user to enter a Personal Launch Code (PLC), known only by a rightful account owner, and said PLC is then used as an element in the validation of the identity and authorization of said user's computing device to gain account access by integrating said PLC into the creation of an Anonymous Access Key (AAK), consisting of selected distinctive identifiers gathered by said first software program executing on said computing device and combined with the Personal Launch Code (PLC) entered by said user comprising:
a. Launching said first software program executing on said computing device, and
b. Said first software program displays a query visible to said user requesting said PLC be entered by said user, and
c. Said first software program gathers selected distinctive identifiers from said computing device, consisting of unique identifiers representing hardware and software modules residing on said computing device, and
d. Said first software program transmits said collected selected distinctive identifiers and said user entered PLC via the Internet to an online Validation Service, and
e. Said online Validation Service receives said selected distinctive identifiers and said PLC and determines which selected distinctive identifiers are required to construct the Anonymous Access Key (AAK), and
f. Said online Validation Service hashes said selected distinctive identifiers and said PLC into one or more hashed results, and
g. Said online Validation Service then compares said one or more hashed results against its online database of hashed results and, if said one or more hashed results is matched against a stored hashed result in said online database of hashed results, access is granted to said computing device seeking access and
h. If said one or more hashed results is not matched against any hashed result in said online database of hashed results, a status is returned to said first software program executing on said computing device that said computing device has not been validated and account access has been denied.
|