Universal secure registry
First Claim
1. A method of controlling access to a plurality of secure computer networks, the method comprising:
- using a secure registry system located remotely from the secure computer networks to control access to the plurality of secure computer networks, the secure computer networks including a first secure computer network and a second secure computer network, the secure registry system including;
a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks;
receiving first authentication information including a first non-predictable code at the secure registry system, the first authentication information provided by a first entity to the first secure computer network, the first authentication information generated with a first electronic ID device possessed by the first entity;
validating the first authentication information at the secure registry system, at least in part, by comparing the first non-predictable code to authentication information included in the database to determine whether the first non-predictable code corresponds to any of the plurality of users;
communicating from the secure registry system to the first secure computer network an indication of whether the first entity is authorized to access the first secure computer network, based on the validation, whereby the first entity is granted access to the first secure computer network where the first authentication information corresponds to a first one of the plurality of users and the first entity is denied access to the first secure computer network where the first authentication information does not correspond to any of the plurality of users;
receiving second authentication information including a second non-predictable code at the secure registry system, the second authentication information provided by a second entity to the second secure computer network, the second authentication information generated with a second electronic ID device possessed by the second entity;
validating the second authentication information at the secure registry system, at least in part, by comparing the second non-predictable code to the authentication information included in the database to determine whether the second non-predictable code corresponds to any of the plurality of users; and
communicating from the secure registry system to the second secure computer network an indication of whether the second entity is authorized to access the second secure computer network, based on the validation, whereby the second entity is granted access to the second secure computer network where the second authentication information corresponds to a second one of the plurality of users and the second entity is denied access to the secure computer network where the second authentication information does not correspond to any of the plurality of users.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for controlling access to a plurality of secure computer networks using a secure registry system is disclosed. The secure registry system includes a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks. The method and system facilitate receiving authentication information from an entity at a secure computer network, communicating the authentication information to the secure registry system, validating the authentication information at the secure registry system, receiving from the secure registry system an indication of whether the entity is authorized to access the secure computer network, and granting the entity access to the secure computer network when the authentication information of the entity corresponds to one of the plurality of users.
126 Citations
29 Claims
-
1. A method of controlling access to a plurality of secure computer networks, the method comprising:
-
using a secure registry system located remotely from the secure computer networks to control access to the plurality of secure computer networks, the secure computer networks including a first secure computer network and a second secure computer network, the secure registry system including; a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks; receiving first authentication information including a first non-predictable code at the secure registry system, the first authentication information provided by a first entity to the first secure computer network, the first authentication information generated with a first electronic ID device possessed by the first entity; validating the first authentication information at the secure registry system, at least in part, by comparing the first non-predictable code to authentication information included in the database to determine whether the first non-predictable code corresponds to any of the plurality of users; communicating from the secure registry system to the first secure computer network an indication of whether the first entity is authorized to access the first secure computer network, based on the validation, whereby the first entity is granted access to the first secure computer network where the first authentication information corresponds to a first one of the plurality of users and the first entity is denied access to the first secure computer network where the first authentication information does not correspond to any of the plurality of users; receiving second authentication information including a second non-predictable code at the secure registry system, the second authentication information provided by a second entity to the second secure computer network, the second authentication information generated with a second electronic ID device possessed by the second entity; validating the second authentication information at the secure registry system, at least in part, by comparing the second non-predictable code to the authentication information included in the database to determine whether the second non-predictable code corresponds to any of the plurality of users; and communicating from the secure registry system to the second secure computer network an indication of whether the second entity is authorized to access the second secure computer network, based on the validation, whereby the second entity is granted access to the second secure computer network where the second authentication information corresponds to a second one of the plurality of users and the second entity is denied access to the secure computer network where the second authentication information does not correspond to any of the plurality of users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A secure registry system for controlling access to a plurality of secure computer networks, the secure registry system comprising:
-
a database including secure data for each of a plurality of users authorized to access at least one of the plurality of secure computer networks, wherein each user of plurality of users is associated with a non-predictable code, respectively; a communication link to communicate information between the secure registry system and each of the plurality of secure computer networks; and a processor coupled to the database and programmed to receive first authentication information including a first non-predictable code via the communication link, the first authentication information generated by a first electronic ID device possessed by a first entity and provided by the first entity to a first secure computer network of the plurality of secure computer networks to which the first entity seeks access, the processor programmed to compare the first non-predictable code to authentication information included in the database to determine whether the first non-predictable code corresponds to any of the plurality of users, wherein the secure registry system communicates to the first secure computer network, via the communication link, a first indication that the first entity is authorized to access the first secure computer network where the first non-predictable code corresponds to a first user included in the plurality of users, wherein the processor is programmed to receive second authentication information including a second non-predictable code via the communication link, the second authentication information generated by a second electronic ID device possessed by a second entity and provided by the second entity to a second secure computer network of the plurality of secure computer networks to which the second entity seeks access, the processor programmed to compare the second non-predictable code to the authentication information included in the database to determine whether the second non-predictable code corresponds to any of the plurality of users, and wherein the secure registry system communicates to the second computer network, via the communication link, a second indication that the second entity is authorized to access the second secure computer network where the second non-predictable code corresponds to a second user included in the plurality of users. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
Specification