Methods, Systems and Computer Program Products for Secure Access to Information
First Claim
1. A method of providing secure communications, the method comprising:
- receiving, at a processor associated with a secure access system, a request to create, on the secure access system, a safe user account for a user to enable the user to access resources associated with a referring organization, the user associated with an identification, the identification associated with the referring organization;
in response to the request, providing, by the processor, a plurality of types of authenticators for association with the safe user account;
receiving, by the processor, a selection of a type of authenticator;
creating the safe user account for the user, the safe user account associated with an authenticator corresponding to the type of authenticator selected; and
receiving, at the processor from the user, the identification associated with the referring organization and the authenticator associated with the safe user account to enable the user to gain access to the resources associated with the referring organization.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. Related systems and computer program products are also provided.
-
Citations
20 Claims
-
1. A method of providing secure communications, the method comprising:
-
receiving, at a processor associated with a secure access system, a request to create, on the secure access system, a safe user account for a user to enable the user to access resources associated with a referring organization, the user associated with an identification, the identification associated with the referring organization; in response to the request, providing, by the processor, a plurality of types of authenticators for association with the safe user account; receiving, by the processor, a selection of a type of authenticator; creating the safe user account for the user, the safe user account associated with an authenticator corresponding to the type of authenticator selected; and receiving, at the processor from the user, the identification associated with the referring organization and the authenticator associated with the safe user account to enable the user to gain access to the resources associated with the referring organization. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A secure access system for providing secure communications, the system comprising:
-
a processor; and a memory storing computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising receiving a request to create, on the secure access system, a safe user account for a user to enable the user to access resources associated with a referring organization, the user associated with an identification, the identification associated with the referring organization, in response to the request, providing a plurality of types of authenticators for association with the safe user account, receiving a selection of a type of authenticator, creating the safe user account for the user, the safe user account associated with an authenticator corresponding to the type of authenticator selected, and receiving, from the user, the identification associated with the referring organization and the authenticator associated with the safe user account to enable the user to gain access to the resources associated with the referring organization. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer readable medium device storing computer-executable instructions which, when executed by a processor of a secure access system, cause the processor to perform operations comprising:
-
receiving a request to create, on the secure access system, a safe user account for a user to enable the user to access resources associated with a referring organization, the user associated with an identification, the identification associated with the referring organization; in response to the request, providing a plurality of types of authenticators for association with the safe user account; receiving a selection of a type of authenticator; creating the safe user account for the user, the safe user account associated with an authenticator corresponding to the type of authenticator selected; and receiving, from the user, the identification associated with the referring organization and the authenticator associated with the secure user account to enable the user to gain access to the resources of the referring organization. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification