Patent application number | Description | Published |
20090154683 | INTEGRATED DISPARATE INTELLIGENT PERIPHERALS - A method for providing a service includes monitoring, by a first networked communications apparatus, interaction between a second networked communications apparatus and a remote requesting party over a first communications network. The method also includes interacting, by the first networked communications apparatus, with the remote requesting party over the first communications network upon detecting a predetermined action in monitoring the interaction between the second networked communications apparatus and the remote requesting party over the first communications network. | 06-18-2009 |
20090190737 | Caller Authentication System - A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred. | 07-30-2009 |
20100100931 | TRANSACTION TOOL MANAGEMENT INTEGRATION WITH CHANGE MANAGEMENT - A change management system coordinates information of a transaction tool managed by a transaction tool management system. The system includes a receiver that receives, over a communications network, activity information and/or lifecycle event information for the transaction tool. The system also includes a storage that stores the received information. Additionally, the system includes a processor that manages a change in a status of the transaction tool based on the received information. | 04-22-2010 |
20100275013 | Method for Communicating Certificates to Computers - A method includes receiving at a first computer a new certificate which is to replace an old certificate associated with the first computer and associating by the first computer the new certificate with the first computer. In response to the first computer associating the new certificate with the first computer, the first computer accesses an email address book of the first computer having information identifying a second computer as having received the old certificate to determine from the information that the second computer is to associate the new certificate in place of the old certificate with the first computer. In turn, the first computer transmits the new certificate to the second computer for the second computer to associate the new certificate with the first computer. | 10-28-2010 |
20100322405 | INTEGRATED DISPARATE INTELLIGENT PERIPHERALS - Integrating services provided by intelligent peripherals in a communications network, includes interacting, by a first intelligent peripheral of a first type, with a second intelligent peripheral of a second type which interacts with the first intelligent peripheral of the first type according to a script based on information received from a remote requesting party. The remote requesting party interacts, over the communications network, with the second intelligent peripheral of the second type according to the script. The first intelligent peripheral of the first type and the second intelligent peripheral of the second type are different from each other. | 12-23-2010 |
20110032074 | Enhanced Biometric Authentication - Enhanced biometric authentication is achieved by combining a user's inherent biometric data with the user's knowledge of a secret glyph. In one embodiment, a touchpad is provided on which the user may use a finger to indicate a plurality of strokes that form a distinct glyph. Image stabilization may be used to extract a readable fingerprint from the strokes, and the glyph and finger print are matched to a stored profile. The glyph may be one or more alphanumeric characters that represent a password. The user can then enter the password on the touch pad with his finger. If the fingerprint and password both match, the user is authenticated. | 02-10-2011 |
20110078447 | SECURE INTER-PROCESS COMMUNICATIONS - Securing inter-process communications includes receiving, from a device that supports a first process that is an instantiation of a first application being executed, a request to initiate inter-process communications. Securing inter-process communications also includes replying to the device with a request for information of a first digital certificate that uniquely authenticates an identity of the first process. An identity of a second process that is a distinct instantiation of the first application is authenticated using a second digital certificate distinct from the first digital certificate. | 03-31-2011 |
20110119138 | Service to Push Author-Spoken Audio Content with Targeted Audio Advertising to Users - A particular method includes receiving, via an interactive voice response (IVR) unit, an audio content item during a first call. An indication of an insertion point at which to insert audio advertising in the audio content item is also received during the first call. The method further includes receiving via the IVR unit an audio advertisement during a second call. The audio advertisement is automatically inserted into the audio content item at the insertion point to create a package. | 05-19-2011 |
20110145859 | SYSTEM AND METHOD FOR DETACHABLE MEDIA DEVICES AND CONTENT - Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for detachable media playback. The system can detach individual channels of a media presentation from a first device and transfer them to nearby devices. The method causes a computing device to play media content having multiple channels to a user on a first device, identify a set of media playback devices nearby to the first device, identify playback capabilities and a status for each of the set of nearby devices, match a channel of the media content with at least one of the set of media playback devices and the identified playback capabilities and the status of the set of media playback devices, and transfer the matched channel to the at least one of the set of media playback devices. A central server can transfer the matched channel to other media playback devices. | 06-16-2011 |
20110154452 | Methods, Systems and Computer Program Products for Secure Access to Information - Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. Related systems and computer program products are also provided. | 06-23-2011 |
20110257975 | VOICE OVER IP BASED BIOMETRIC AUTHENTICATION - A receiver receives from a remote system a voice biometric sample from a party attempting to obtain a service from the apparatus using the remote system. A processor selectively determines when to request authentication of the party by a remote voice biometric system. A transmitter transmit a request to the party to provide the voice biometric sample responsive to the processor determining to request authentication of the party. The apparatus provides the service contingent upon authentication of the party by the remote voice biometric system. | 10-20-2011 |
20120029984 | SYSTEM AND METHOD OF PACKAGE CREATION THAT INCLUDES AUDIO CONTENT AND AUDIO ADVERTISING - A particular method includes receiving, via an interactive voice response unit, an audio content item during a first call. An indication of an insertion point at which to insert audio advertising in the audio content item is also received. The method further includes receiving via the interactive voice response unit an audio advertisement during a second call. The audio advertisement is automatically inserted into the audio content item at the insertion point to create a package. | 02-02-2012 |
20120078638 | CENTRALIZED BIOMETRIC AUTHENTICATION - A communications system includes a receiver and at least one transmitter. The receiver receives, from different intermediate systems, biometric samples from parties attempting to obtain services from the intermediate systems and information characterizing the expected identifies of the parties. The at least one transmitter transmits, to the intermediate systems, verification that the biometric samples match pre-registered biometric information obtained from a storage device such that the expected identities of the parties is verified as the identities of the parties. | 03-29-2012 |
20120272250 | TRANSACTION TOOL MANAGEMENT INTERGRATION WITH CHANGE MANAGEMENT - A change management system is integrated with a transaction tool management system including a processor for scheduling a change in status of at least one transaction tool of the transaction tool management system. The system includes a receiver that receives a request for approval of the change in the status of the at least one transaction tool, a storage that stores the received request, a transaction tool classification process module that classifies transaction tools, and a change management module that schedules the change in status when the request for approval is approved. The change management module uses classification information from the transaction tool classification process module to schedule the change in status. The change management system uses information available from the transaction tool management system to schedule the change in the status of the at least one transaction tool managed by the transaction tool management system. | 10-25-2012 |
20130142404 | Methods, Systems, Devices, and Products for Authenticating Users - Enhanced biometric authentication is achieved by combining a user's inherent biometric data with the user's knowledge of a secret glyph. In one embodiment, a touchpad is provided on which the user may use a finger to indicate a plurality of strokes that form a distinct glyph. Image stabilization may be used to extract a readable fingerprint from the strokes, and the glyph and finger print are matched to a stored profile. The glyph may be one or more alphanumeric characters that represent a password. The user can then enter the password on the touch pad with his finger. If the fingerprint and password both match, the user is authenticated. | 06-06-2013 |
20140075530 | VOICE OVER IP BASED VOICE BIOMETRIC AUTHENTICATION - A request from a party is received by a receiver from a remote system. The request from the party is received when the party attempts to obtain a service using the remote system. A selective determination is made to request, over a network, authentication of the party by a remote biometric system. A request is sent to the remote system for the party to provide a biometric sample responsive to determining to request authentication of the party. The service is provided contingent upon authentication of the party by the remote biometric system. | 03-13-2014 |
20140101729 | Methods, Systems and Computer Program Products for Secure Access to Information - Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. Related systems and computer program products are also provided. | 04-10-2014 |
20140180821 | MEDIA SERVICES WITH ACCESS CONTROL - Systems and methods are describe wherein a service provider provides media services that can include, but are not limited to, telephone, radio, interactive and television services. A user residence and/or a user receiving device are designated as a primary location or device for receiving the services of the service provider. An authorization center authenticates a request to provide the service(s) at one or more secondary location/device. The verification process can include, but is not limited to, password(s), Personal Identification Numbers (PIN) and biometric identifiers such as voice, retina, finger print and DNA. | 06-26-2014 |
20140223171 | METHODS AND APPARATUS TO CERTIFY DIGITAL SIGNATURES - Methods and apparatus to certify digital signatures are disclosed. An example method includes retrieving, from a first database, a first geographical location associated with an identification number associated with a network device and identified in a request to certify a digital signature, comparing the first geographical location associated with the identification number to a second geographical location to verify the second geographical location, determining that the first geographical location matches the second geographical location, and certifying the digital signature to indicate an authenticity of the digital signature based on the verification of the second geographical location and a comparison of (a) biometric information associated with a user associated with the request and (b) stored biometric information. | 08-07-2014 |
20140328473 | CALLER AUTHENTICATION SYSTEM - A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred. | 11-06-2014 |
20150074778 | Methods, Systems, Devices, and Products for Authenticating Users - Enhanced biometric authentication combines a user's inherent biometric data with the user's password, code, or other secret glyph. For example, the user's finger makes an input on a touchpad. An image of a fingerprint is extracted from the input, along with the user's password, code, or other secret glyph. In one input, then, the user's finger serves two authentication schemes for increased security. | 03-12-2015 |
20150089585 | Scored Factor-Based Authentication - Concepts and technologies are disclosed herein for scored factor-based authentication. A verification service can receive an authentication request from a requestor, wherein the authentication request identifies a transaction. The verification service can determine a risk associated with the transaction, an authentication score based upon the risk, a plurality of groups of authentication factors, each of which the authentication score. The verification service can provide factor group data identifying the plurality of groups of authentication factors to the requestor. | 03-26-2015 |