METHOD AND APPARATUS FOR MANAGING USER PROVIDED ACCESS TOKENS
2 Assignments
0 Petitions
Accused Products
Abstract
A method comprises receiving an additional user provided access token requesting application at a device already having a user provided access token requesting application. The method also comprises requesting information from a user of said device if an access token of one of said applications is to be changed to that of the other of said applications and accepting verification by one of said applications as verification of another of said applications.
-
Citations
44 Claims
-
1-24. -24. (canceled)
-
25. An apparatus comprising a processor and a memory including software, the memory and the software configured to, with the processor, cause the apparatus to at least:
-
receive an additional user provided access token requesting application at a device already having a user provided access token requesting application; request information from a user of said device if an access token of one of said applications is to be changed to that of the other of said applications; and use one of said access tokens for verification of at least one of said applications. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A computer program product comprising:
at least one computer readable non-transitory memory medium having program code stored thereon, the program code which when executed by an apparatus cause the apparatus at least to; receive an additional user provided access token requesting application at a device already having a user provided access token requesting application; request information from a user of said device if an access token of one of said applications is to be changed to that of the other of said applications; and use one of said access tokens for verification of at least one of said applications.
-
41. A method comprising:
-
receiving an additional user provided access token requesting application at a device already having a user provided access token requesting application; requesting information from a user of said device if an access token of one of said applications is to be changed to that of the other of said applications; and using one of said access tokens for verification of at least one of said applications. - View Dependent Claims (42, 43, 44)
-
Specification