×

Universal secure registry

  • US 7,805,372 B2
  • Filed: 06/08/2007
  • Issued: 09/28/2010
  • Est. Priority Date: 02/21/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of controlling access to a plurality of secure computer networks, the method comprising:

  • using a secure registry system located remotely from the secure computer networks to control access to the plurality of secure computer networks, the secure computer networks including a first secure computer network and a second secure computer network, the secure registry system including;

    a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks;

    receiving first authentication information including a first non-predictable code at the secure registry system, the first authentication information provided by a first entity to the first secure computer network, the first authentication information generated with a first electronic ID device possessed by the first entity;

    validating the first authentication information at the secure registry system, at least in part, by comparing the first non-predictable code to authentication information included in the database to determine whether the first non-predictable code corresponds to any of the plurality of users;

    communicating from the secure registry system to the first secure computer network an indication of whether the first entity is authorized to access the first secure computer network, based on the validation, whereby the first entity is granted access to the first secure computer network where the first authentication information corresponds to a first one of the plurality of users and the first entity is denied access to the first secure computer network where the first authentication information does not correspond to any of the plurality of users;

    receiving second authentication information including a second non-predictable code at the secure registry system, the second authentication information provided by a second entity to the second secure computer network, the second authentication information generated with a second electronic ID device possessed by the second entity;

    validating the second authentication information at the secure registry system, at least in part, by comparing the second non-predictable code to the authentication information included in the database to determine whether the second non-predictable code corresponds to any of the plurality of users; and

    communicating from the secure registry system to the second secure computer network an indication of whether the second entity is authorized to access the second secure computer network, based on the validation, whereby the second entity is granted access to the second secure computer network where the second authentication information corresponds to a second one of the plurality of users and the second entity is denied access to the secure computer network where the second authentication information does not correspond to any of the plurality of users.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×