Systems and methods for controlling access to information on a network
where a first network entity receives a message requesting access to
stored information via a network communication. The received message
includes a first component encrypted with a first crypto-key associated
with the first network entity and a second component encrypted with a
second crypto-key associated with a second network entity such that both
can be decrypted by the first network entity. The second network entity
controls access to the network by the user. After receiving the message,
the first network entity decrypts the first component and the second
component and then transmits the stored information to the user based on
the content of the first component and the second component.