Methods, Systems and Computer Program Products for Secure Access to Information
First Claim
1. A method of providing secure communications, comprising:
- creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system;
providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and
accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. Related systems and computer program products are also provided.
-
Citations
20 Claims
-
1. A method of providing secure communications, comprising:
-
creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for providing secure communications, the system being configured to:
-
create a safe user account on a secure access system based on provision of at least one strong authenticator to be associated with a user of the secure access system; provide a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and access the information of the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product for providing secure communications, the computer program product comprising:
-
a computer readable storage medium having computer readable program code embodied therein, the computer readable program code comprising; computer readable program code configured to create a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; computer readable program code configured to provide a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information of a referring organization, the referring organization being registered with the secure access system; and computer readable program code configured to access the information of the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification