A method and system determine network based access to restricted systems. The method includes receiving a request for a permission access status of a party seeking access to one of the restricted systems. A database of periodically updated lists of …