Abstract:
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.
Abstract:
The present invention is directed to mitigating peak traffic in a multimedia conference. In one aspect, one or more requests for starting a first type of conference over the network are received. Thereafter, a second type of conference is started based on predefined parameters, wherein the second type of conference consumes lower bandwidth than the first type of conference.
Abstract:
System and method to provide an immersive virtual world conference environment, the method including: establishing a live virtual world conference, by use of a virtual world server; recording, in a memory coupled to the virtual world server, events related to live participants in the live virtual world conference, wherein the live participants are communicatively coupled to the virtual world server; receiving a request from a first virtual user to experience the virtual world conference at a predetermined virtual time that is different than a present real time; retrieving from the memory events related to live participants that occurred no later than the predetermined virtual time; restoring a conference state based upon the retrieved events; and providing an interaction responsive to the conference state and the first virtual user, in order to produce the immersive virtual world conference state.
Abstract:
An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance.
Abstract:
Methods and apparatus are disclosed for authenticating a user based on the geo-location history of a geo-location-enabled wireless device (e.g., a GPS-enabled wireless telecommunications terminal, a smart card, an RFID tag, etc.). In a first illustrative embodiment, a user of a geo-location-enabled wireless telecommunications terminal (e.g., a GPS-enabled cell phone, a GPS-enabled notebook computer, etc.) who attempts to access a restricted resource is challenged with one or more questions that are generated from the terminal's geo-location history. In a second illustrative embodiment, a user of a data-processing system who attempts to access a restricted resource is asked to provide a username Z. The user is then challenged with one or more questions that are generated from the geo-location history of a wireless device that is associated with username Z (e.g., a cell phone that belongs to the user whose username is Z, etc.).
Abstract:
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.).
Abstract:
System and method to provide an immersive virtual world conference environment, the method including: establishing a live virtual world conference, by use of a virtual world server; recording, in a memory coupled to the virtual world server, events related to live participants in the live virtual world conference, wherein the live participants are communicatively coupled to the virtual world server; receiving a request from a first virtual user to experience the virtual world conference at a predetermined virtual time that is different than a present real time; retrieving from the memory events related to live participants that occurred no later than the predetermined virtual time; restoring a conference state based upon the retrieved events; and providing an interaction responsive to the conference state and the first virtual user, in order to produce the immersive virtual world conference state.
Abstract:
A conferencing system includes an authentication module for establishing a communication session. The communication session includes a communication interface to a plurality of participants. The conferencing system further includes a selection module for letting a participant select a leader among the plurality of participants. The conferencing system further includes a duplication module configured to provide audio and visual views of the communication session to the participant based upon audio and visual views of the communication session associated with the leader. The conferencing system further includes a recording module for storing a history of actions made by the leader in the conferencing system and letting the participant view the history of actions made by the leader and reach a present state of audio and visual views of the communication session associated with the leader.
Abstract:
A conferencing system includes an authentication module for establishing a communication session. The communication session includes a communication interface to a plurality of participants. The conferencing system further includes a selection module for letting a participant select a leader among the plurality of participants. The conferencing system further includes a duplication module configured to provide audio and visual views of the communication session to the participant based upon audio and visual views of the communication session associated with the leader. The conferencing system further includes a recording module for storing a history of actions made by the leader in the conferencing system and letting the participant view the history of actions made by the leader and reach a present state of audio and visual views of the communication session associated with the leader.
Abstract:
The present invention is directed to mitigating peak traffic in a multimedia conference. In one aspect, one or more requests for starting a first type of conference over the network are received. Thereafter, a second type of conference is started based on predefined parameters, wherein the second type of conference consumes lower bandwidth than the first type of conference.