The present invention includes the use of at least three separate parties, a First Party, a Second Party, and a Third Party, with the First Party holding First Party Information, and the Third Party having an interest in Third Party Information held by the Second Party. The First Party requests to access Third Party Information held by the Second Party. The First Party's request is forwarded from the Second Party to the Third Party and is accompanied by some form of authorization information. Authorization is provided to the First Party by the Third Party by the transfer of the authorization information from the Third Party to said First Party, which authorizes the First Party to obtain the Third Party Information from the Second Party. Although at least three parties can be involved, two of these parties could be the same.

 
Web www.patentalert.com

> Vulnerability assessment and authentication of a computer by a local scanner

~ 00355