Method of protecting the identifying information of persons and computing devices, specifically those devices which are capable of sensing, capturing, receiving, transmitting, processing and storing digital information

20170237568 ยท 2017-08-17

    Inventors

    Cpc classification

    International classification

    Abstract

    The present invention relates to the secure identification, authentication, protection and transfer of personal and computing device identifying information between computing devices. Specifically the present invention is a method that removes the need to expose personal or computing device identifying information, while such information is in transit between computing devices.

    Claims

    1. A method for protecting and securing the privacy of identifying information unique to persons and to computing devices capable of sensing, capturing, receiving, transmitting, processing and storing information comprising: generating a unique hardware identifier for a transmitting or receiving computer device, using multiple hardware or firmware immutable identifying data or information; generating a unique salt on a secure cloud server or an non-cloud server; applying a hash and the unique generated salt to the unique hardware identifier; storing the hashed and salted unique hardware identifier in an encrypted registry on a secure cloud server or non-cloud server; submitting a request from a computing device to access information resident on a separate computing device containing information related to a person or a computing device; generating a unique privacy identifier on the requesting computing device using multiple immutable identifying data or information containing the targeted or requested personal or machine identifying information in any database, file, chipset, random access memory or any device capable of sensing, capturing, storing, processing, receiving or transmitting data; validating a request from a computing device by matching the requesting computing device's unique hardware identifier with a unique hardware identifier stored in an encrypted registry in a secure cloud server or non-cloud server; passing the requesting computing device's unique privacy identifier, after validating the requesting computing device's unique hardware identifier with a secure cloud server or non-cloud server, to a computing device containing the requested data or information; deleting and never storing the unique hardware identifier on the requesting computing device; generating a unique privacy identifier on the requested computing device using multiple immutable identifying data or information containing the requested personal or machine identifying information in any database, file, chipset, random access memory or any device capable of sensing, capturing, storing, processing, receiving or transmitting data; validating the requesting computing device's unique privacy identifier by matching the requesting computing device unique privacy identifier with the unique privacy identifier generated by the requested computing device; accessing the requested information if the requesting and requested unique privacy identifiers match; deleting and never storing the unique privacy identifier generated by the requesting computing device; transferring the requested information, using the above described process, to the requesting computing device; and providing notification to the requesting computing device of completion of the request or denial of access.

    2. The method of claim 1, wherein the initiating step further comprises: installing software code that generates a unique hardware identifier on computing devices.

    3. The method of claim 1, wherein the initiating step further comprises: installing software code that generates a unique privacy identifier on computing devices.

    4. The method of claim 1, wherein the source values for the unique hardware identifier are selected from the group consisting of CPU ID, MAC, and NODE lock ID.

    5. The method of claim 1, wherein the source values for the unique privacy identifier for a person are selected from the group consisting of a social security number, date of birth and biometric identifiers.

    6. The method of claim 1, wherein a person's identifying information is federated across connected and unconnected networks, systems, sub-systems, data repositories, computing devices and chipsets.

    7. The method of claim 1, wherein a computing device's identifying information is federated, securely, across connected and unconnected networks, systems, sub-systems, data repositories, computing devices and chipsets.

    8. The method of claim 1, wherein secure access control is enabled for machine to machine communication, including computing devices capable of sensing, capturing, receiving, transmitting, processing and storing information.

    9. The method of claim 1, wherein the passing the unique hardware identifier step further comprises: generating a unique salt on a secure cloud server or an internal server; and applying a hash and the unique generated salt to the unique hardware identifier.

    10. The method of claim 1, wherein the passing the unique privacy identifier step further comprises: generating a unique salt on a secure cloud server or an internal server; and applying a hash and the unique generated salt to the unique privacy identifier.

    11. The method of claim 1, wherein the matching the unique hardware identifier step further comprises: comparing the requesting hashed and salted unique hardware identifier with a hashed and salted unique identifier stored in a cloud server or non-cloud server.

    12. The method of claim 1, wherein the matching the unique privacy identifier step further comprises: removing the salt on the requesting computer device's unique privacy identifier; and comparing the requesting hashed unique privacy identifier with a requested computing device's hashed unique privacy identifier.

    13. The method of claim 1, wherein the matching the unique hardware identifier step further comprises: decrypting the unique hardware identifier stored on a cloud server or non-cloud server; removing the salt on the unique hardware identifier stored on a cloud or non-cloud server; and comparing the hashed unique privacy identifier stored on a cloud server or non-cloud server with a requested computing device's hashed unique hardware identifier.

    14. The method of claim 1, wherein the salt application further comprises: retrieving a salt from a cloud server or non-cloud server.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0011] These as well as other features of the present invention will become more apparent upon reference to the drawings wherein:

    [0012] FIG. 1 is a representation of a process of generating a unique hardware identifier;

    [0013] FIG. 2 Is a representation of a process of generating a unique privacy identifier;

    [0014] FIG. 3 is a representation of a process of validating and matching a unique hardware identifier; and

    [0015] FIG. 4 is a representation of a process of validating and matching a unique privacy identifiers.

    DETAILED DESCRIPTION OF THE INVENTION

    [0016] The drawings referred to herein are for the purposes of illustrating the various aspects and uses of the present invention and are not meant to the scope of the present invention.

    [0017] Referring now to FIG. 1: unique hardware identifier generating software is installed on computing devices, [100]; a computing device selects immutable source identifying hardware values used to a generate unique hardware identifier, [110]; computing device generates a unique hardware identifier, [120]; computing device hashes the unique hardware identifier, [130]; a salt is applied to the hashed unique hardware identifier, [140]; and a computing device encrypts and stores the hashed and salted unique hardware identifier on a cloud or non-cloud server, [150].

    [0018] Referring now to FIG. 2: install unique privacy identifier generating software on computing devices that will request or receive personal or computing device identifying information, [200]; a requesting computing device requests information from another computing device, [210]; a requesting computing device selects immutable source identifying values from a specific data record or device containing such values, [220]; a requesting computing device generates a unique privacy identifier using the selected immutable source values, [230]; a requesting computing device hashes a unique privacy identifier, [240]; a requesting computing device retrieves salt from a cloud or non-cloud server, [250]; a requesting computing device applies a salt to the unique privacy identifier, [260]; and the hashed and salted unique privacy identifier is prepared for transmission to a requested computing device, [270].

    [0019] Referring now to FIG. 3: a requesting computing device selects its immutable source identifying hardware values used to a generate unique hardware identifier, [300]; a requesting computing device generates a unique hardware identifier using the selected source values, [310]; a requesting computing device hashes the unique hardware identifier, [320]; a requesting computing device retrieves a salt from the cloud or non-cloud server, [330]; a requesting computing device applies a salt to its hashed unique hardware identifier, [340]; a requesting computer device validates its generated unique hardware identifier against a unique hardware identifier stored on a cloud or non-cloud server, [350]; a computing device compares the requesting computing device unique hardware identifier with a stored unique hardware identifier, [360]; if the unique hardware identifiers do not match a no connection or possible security violation is logged, [370]; and if the unique hardware identifiers match, the requesting computing device passes its generated unique privacy identifier to a requested computing device containing the requested information, [380].

    [0020] Referring now to FIG. 4: a requested computing device receives a unique privacy identifier form a cloud or non-cloud server, [400]; a requested computing device selects immutable identifying values from its information repositories behind the requested computing device's firewall in order to generate a unique privacy number, [410]; a requested computing device generates a unique privacy identifier using the selected immutable source values, [420]; a requested computing device retrieves a requesting computing device's unique privacy identifier from a cloud or non-cloud server, [430]; a requested computing device hashes its generated unique privacy identifier, [440]; a requested computing device retrieves a salt from a cloud or non-cloud server, [450]; a requested computing device removes the salt from the requesting computing device's unique privacy identifier, [460]; a requested computing device compares a requesting computing device's unique privacy identifier with a requested computing device's unique privacy identifier, [470]; if the unique privacy identifiers do not match a no connection or possible security violation is logged, [480]; and if the unique privacy identifiers match, the information is re-identified and connected to the specific identified and matched record, [490].

    [0021] Additional modifications and improvements of the present invention may be apparent to those of ordinary skill in the art. Thus, the particular combination of steps and processes described and illustrated herein are intended to represent only certain embodiments of the present invention, and are not intended to serve as limitations of alternative methods within the spirit and scope of the invention.