A secure token access
distributed database system to provide
verification of someone's or something's identity quickly and securely is provided, wherein such
database and
system is readily scalable from local to nationwide to worldwide use. The
system specifically addresses the use of an authenticated user identification (ID) where any accepted
authentication scheme can be employed in combination with a number of secure enabled databases connected by any means, including LAN, WAN, Internet, and dedicated lines, to provide value-added data in real-time at the main point of security contact. Furthermore, the instant invention provides a concept by which a potentially unlimited number of secure enabled databases containing various kinds of data potentially useful to a requesting entity, are either connected by some network means, or exposed to
the Internet through a secure connection. Data transfer may also be bi-directional. As part of the security incident
information exchange, data may not only be received by the requesting entity, but the provider
database may also receive updated information. Requests may be progressive in nature. Data contained in a response from one
database may cause the requesting application to send out a new, modified request for the ID based on that data. Moreover, continual update of the incident data may continue even after sufficient information has been received to make a security decision, e.g., grant entry. If subsequent data arrives that could affect that decision, it may provide authorities and security personnel with timely data and an opportunity for appropriate and
effective action.