A secure token access distributed database system to provide verification
of someone's or something's identity quickly and securely is provided,
wherein such database and system is readily scalable from local to
nationwide to worldwide use. The system specifically addresses the use of
an authenticated user identification (ID) where any accepted
authentication scheme can be employed in combination with a number of
secure enabled databases connected by any means, including LAN, WAN,
Internet, and dedicated lines, to provide value-added data in real-time
at the main point of security contact. Furthermore, the instant invention
provides a concept by which a potentially unlimited number of secure
enabled databases containing various kinds of data potentially useful to
a requesting entity, are either connected by some network means, or
exposed to the Internet through a secure connection. Data transfer may
also be bi-directional. As part of the security incident information
exchange, data may not only be received by the requesting entity, but the
provider database may also receive updated information. Requests may be
progressive in nature. Data contained in a response from one database may
cause the requesting application to send out a new, modified request for
the ID based on that data. Moreover, continual update of the incident
data may continue even after sufficient information has been received to
make a security decision, e.g., grant entry. If subsequent data arrives
that could affect that decision, it may provide authorities and security
personnel with timely data and an opportunity for appropriate and
effective action.