Method and apparatus for accelerated authentication
First Claim
1. A method comprising:
- receiving, by a hardware processor, first data that indicates a first portion of a user credential for a first user but not a second portion of the user credential for the first user, wherein the first data is received in response to a sign-in prompt to a user to provide the user credential to authenticate the first user;
determining, by the hardware processor, whether the first portion of the user credential is valid; and
if the first portion of the user credential is valid, then determining, by the hardware processor, to send second data that indicates a valid value for the second portion of the user credential for the first user.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for accelerated authentication include receiving first data that indicates a first portion of user credentials for a first user but not a second portion. It is verified whether the first portion of user credentials is valid. If the first portion of user credentials is valid, then second data that indicates a valid value for the second portion of user credentials for the first user is sent. Other techniques include receiving first data that indicates a first portion of user credentials for a first user but not a second portion of user credentials for the first user. A first message that indicates the first portion of user credentials is sent to a remote process that initiates authentication of the first user based on the first portion of user credentials before receiving second data that indicates the second portion of user credentials for the first user.
27 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a hardware processor, first data that indicates a first portion of a user credential for a first user but not a second portion of the user credential for the first user, wherein the first data is received in response to a sign-in prompt to a user to provide the user credential to authenticate the first user; determining, by the hardware processor, whether the first portion of the user credential is valid; and if the first portion of the user credential is valid, then determining, by the hardware processor, to send second data that indicates a valid value for the second portion of the user credential for the first user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
receiving, by a hardware processor, first data that indicates a first portion of a user credential for a first user but not a second portion of the user credential for the first user, wherein the first data is received in response to a sign-in prompt to a user to provide the user credential to authenticate the first user; and before receiving second data that indicates the second portion of the user credential for the first user, determining, by the hardware processor, to send a first message that indicates the first portion of the user credential to a remote process that initiates authentication of the first user based on the first portion of the user credential. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
at least one hardware processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one hardware processor, cause the apparatus to at least; receive first data that indicates a first portion of a user credential for a first user but not a second portion of the user credential for the first user, wherein the first data is received in response to a sign-in prompt to a user to provide the user credential to authenticate the first user; determine whether the first portion of the user credential is valid; and if the first portion of the user credential is valid, then determine to send second data that indicates a valid value for the second portion of the user credential for the first user. - View Dependent Claims (17)
-
-
18. An apparatus comprising:
-
at least one hardware processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one hardware processor, cause the apparatus to at least; receive first data that indicates a first portion of a user credential for a first user but not a second portion of the user credential for the first user, wherein the first data is received in response to a sign-in prompt to a user to provide the user credential to authenticate the first user; and before receiving second data that indicates the second portion of the user credential for the first user, determining to send a first message that indicates the first portion of the user credential to a remote process that initiates authentication of the first user based on the first portion of the user credential. - View Dependent Claims (19, 20)
-
Specification