METHOD AND APPARATUS FOR ACCELERATED AUTHENTICATION
First Claim
1. A method comprising:
- receiving first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user, wherein user credentials are used to authenticate a user;
determining whether the first portion of user credentials is valid; and
if the first portion of user credentials is valid, then determining to send second data that indicates a valid value for the second portion of user credentials for the first user.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for accelerated authentication include receiving first data that indicates a first portion of user credentials for a first user but not a second portion. It is verified whether the first portion of user credentials is valid. If the first portion of user credentials is valid, then second data that indicates a valid value for the second portion of user credentials for the first user is sent. Other techniques include receiving first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user. A first message that indicates the first portion of user credentials is sent to a remote process that initiates authentication of the first user based on the first portion of user credentials before receiving second data that indicates the second portion of user credentials for the first user.
-
Citations
21 Claims
-
1. A method comprising:
-
receiving first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user, wherein user credentials are used to authenticate a user; determining whether the first portion of user credentials is valid; and if the first portion of user credentials is valid, then determining to send second data that indicates a valid value for the second portion of user credentials for the first user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
receiving first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user, wherein user credentials are used to authenticate a user; and before receiving second data that indicates the second portion of user credentials for the first user, determining to send a first message that indicates the first portion of user credentials to a remote process that initiates authentication of the first user based on the first portion of user credentials. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; receive first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user, wherein user credentials are used to authenticate a user; determine whether the first portion of user credentials is valid; and if the first portion of user credentials is valid, then determine to send second data that indicates a valid value for the second portion of user credentials for the first user. - View Dependent Claims (17)
-
-
18. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least; receive first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user, wherein user credentials are used to authenticate a user; and before receiving second data that indicates the second portion of user credentials for the first user, determining to send a first message that indicates the first portion of user credentials to a remote process that initiates authentication of the first user based on the first portion of user credentials. - View Dependent Claims (19, 20)
-
-
21-46. -46. (canceled)
Specification