摘要 |
Methods, apparatuses, and techniques for authenticating users of a network are described. Once a user has been authenticated on a first network, authentication information from the first network can be used by the user to gain access to the user's accounts on other networks using the same or different network enabled devices or consoles. |