Patent application number | Description | Published |
20100145709 | SYSTEM AND METHOD FOR VOICE AUTHENTICATION - Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold. | 06-10-2010 |
20110032870 | EMPLOYING PHYSICAL LOCATION GEO-SPATIAL CO-ORDINATE OF COMMUNICATION DEVICE AS PART OF INTERNET PROTOCOL - System(s), method(s), and device(s) that incorporate a current physical location value associated with a communication device as part of internet protocol (IP) are presented. An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device. | 02-10-2011 |
20110082896 | Dynamically Updated Web-Enabled and Embedded Contact Address in Communication Devices - Systems and methods for seamless automated updating of a subscriber's address book based on relationships or “links” created between a subscriber and their contacts. The contacts are stored in a centralized addressbook database, and any updates to a subscriber's profile or record within the database results in an update to each of the subscriber's contacts' local address books stored on the contacts' devices. The system includes communication devices on a network being associated with subscribers of the network and an application server hosting an addressbook application, the application server having linking logic that creates a link between the subscribers where a modification of the first address on the addressbook database by the first subscriber results in a subsequent modification of the first address within a local copy of the addressbook database stored on a memory on the second device associated with the second subscriber. | 04-07-2011 |
20110176667 | BIOMETRIC IDENTIFICATION IN COMMUNICATION - A method is provided for identifying a calling party to a called party utilizing biometric information. Biometric information of first calling party is received. If stored, a calling party profile is retrieved based on first calling party biometric information. A call is placed to a called party. The first calling party profile is provided to called party. A biometric information change from first calling party biometric information to a second calling party biometric information is automatically detected, and it is determined whether the second party biometric information is stored. If stored, a second calling party profile of second calling party is retrieved and is provided to called party. Responsive to determining that the biometric information for second calling party is not stored, the called party is notified that the second calling party is communicating and the second calling party profile is automatically created based on second calling party biometric information. | 07-21-2011 |
20120056971 | Virtual Presence Via Mobile - Devices, systems, and methods are disclosed for connecting a plurality of mobile devices in a videoconference over a cellular network via a videoconferencing server. At least one of the mobile devices includes a camera to capture a video of a participant in the videoconference. The video is transmitted to the videoconferencing server on the cellular network. The videoconferencing server edits the video and sends the edited video to receiving mobile devices in real-time. The receiving mobile devices output the video as a projection by using an internal mobile projector or transmit the video to an external display device. A sending mobile device may also act as a receiving mobile device, such that each of the participants may view video of other participants in his/her own background/environment while communicating with the other participants. In some variations, the videoconferencing server removes the background from the video and may replace the background such that the images of participants are placed in front of a new background or in each other's background. | 03-08-2012 |
20120078639 | System and Method for Voice Authentication Over a Computer Network - Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold. | 03-29-2012 |
20130007190 | Methods, Systems, and Products for Address Translation in Residential Networks - Methods, systems, and products translate addresses in residential networks. A residential gateway translates requests for content such that the residential gateway appears as both a requestor and a destination for requested content, regardless of an actual requesting device or a desired output device. | 01-03-2013 |
20130070919 | BIOMETRIC IDENTIFICATION IN COMMUNICATION - A method is provided for identifying a calling party to a called party utilizing biometric information. Biometric information of first calling party is received. If stored, a calling party profile is retrieved based on first calling party biometric information. A call is placed to a called party. The first calling party profile is provided to called party. A biometric information change from first calling party biometric information to a second calling party biometric information is automatically detected, and it is determined whether the second party biometric information is stored. If stored, a second calling party profile of second calling party is retrieved and is provided to called party. Responsive to determining that the biometric information for second calling party is not stored, the called party is notified that the second calling party is communicating and the second calling party profile is automatically created based on second calling party biometric information. | 03-21-2013 |
20130332994 | EMPLOYING PHYSICAL LOCATION GEO-SPATIAL CO-ORDINATE OF COMMUNICATION DEVICE AS PART OF INTERNET PROTOCOL - A current physical location value associated is incorporated with a communication device as part of internet protocol (IP). An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device. | 12-12-2013 |
20140304775 | EMPLOYING PHYSICAL LOCATION GEO-SPATIAL CO-ORDINATE OF COMMUNICATION DEVICE AS PART OF INTERNET PROTOCOL - A current physical location value associated is incorporated with a communication device as part of internet protocol (IP). An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device. | 10-09-2014 |
20140359164 | Methods, Systems, and Products for Address Translation - Methods, systems, and products translate addresses in residential networks. A residential gateway translates requests for content such that the residential gateway appears as both a requestor and a destination for requested content, regardless of an actual requesting device or a desired output device. | 12-04-2014 |
20150073807 | SYSTEM AND METOD FOR VOICE AUTHENTICATION OVER A COMPUTER NETWORK - Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, transmitting an authentication request to an authentication server, which compares the speech sample to a previously established speech profile associated with the user, receiving a response from the authentication server, and providing access to the restricted access resource based on the response. | 03-12-2015 |