While conventional devices have provided significantly enhanced security for data processing systems, databases and other information resources there still remains an unsatisfied need for a further improved system that eliminates the need for public keys or IDs, thus further minimizing invasion of privacy, security risk and exposure.