. . "The method and system is directed at situations where the user desires to log into a system from a computer or other electronic device that may not be secure, including for example from computers or devices other than the user's own and/or by using a communications connection that may not be secure, such as a wireless network connection." . . .