UNIVERSAL SECURE REGISTRY
First Claim
1. A method of controlling access to a plurality of secure computer networks using a secure registry system located remotely from the secure computer networks, the secure registry system including a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks, the method comprising:
- receiving authentication information from an entity at a secure computer network of the plurality of secure computer networks;
communicating the authentication information to the secure registry system;
validating the authentication information at the secure registry system;
receiving from the secure registry system an indication of whether the entity is authorized to access the secure computer network; and
granting the entity access to the secure computer network when the authentication information of the entity corresponds to one of the plurality of users and denying the entity access to the secure computer network when the authentication information of the user does not correspond to one of the plurality of users.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for controlling access to a plurality of secure computer networks using a secure registry system is disclosed. The secure registry system includes a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks. The method and system facilitate receiving authentication information from an entity at a secure computer network, communicating the authentication information to the secure registry system, validating the authentication information at the secure registry system, receiving from the secure registry system an indication of whether the entity is authorized to access the secure computer network, and granting the entity access to the secure computer network when the authentication information of the entity corresponds to one of the plurality of users.
-
Citations
36 Claims
-
1. A method of controlling access to a plurality of secure computer networks using a secure registry system located remotely from the secure computer networks, the secure registry system including a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks, the method comprising:
-
receiving authentication information from an entity at a secure computer network of the plurality of secure computer networks;
communicating the authentication information to the secure registry system;
validating the authentication information at the secure registry system;
receiving from the secure registry system an indication of whether the entity is authorized to access the secure computer network; and
granting the entity access to the secure computer network when the authentication information of the entity corresponds to one of the plurality of users and denying the entity access to the secure computer network when the authentication information of the user does not correspond to one of the plurality of users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of controlling access to a secure computer network using a secure registry system, the secure registry system including a database containing selected data of a plurality of users authorized to access the secure computer network and selected data identifying the secure computer network, the method comprising:
-
receiving an access request including authentication information and a computer network ID from an entity;
determining whether the authentication information is valid for any of the plurality of users;
accessing data when the authentication information of the entity is valid for one of the plurality of users to determine whether the entity is authorized to access the computer network identified by the computer network ID; and
allowing the entity to access the secure computer network when the authentication information of the entity is valid for one of the plurality of users authorized to access the computer network identified by the computer network ID. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification