Abstract:
A method includes receiving at a first computer a new certificate which is to replace an old certificate associated with the first computer and associating by the first computer the new certificate with the first computer. In response to the first computer associating the new certificate with the first computer, the first computer accesses an email address book of the first computer having information identifying a second computer as having received the old certificate to determine from the information that the second computer is to associate the new certificate in place of the old certificate with the first computer. In turn, the first computer transmits the new certificate to the second computer for the second computer to associate the new certificate with the first computer.
Abstract:
A change management system is integrated with a transaction tool management system including a processor for scheduling a change in status of at least one transaction tool of the transaction tool management system. The system includes a receiver that receives a request for approval of the change in the status of the at least one transaction tool, a storage that stores the received request, a transaction tool classification process module that classifies transaction tools, and a change management module that schedules the change in status when the request for approval is approved. The change management module uses classification information from the transaction tool classification process module to schedule the change in status. The change management system uses information available from the transaction tool management system to schedule the change in the status of the at least one transaction tool managed by the transaction tool management system.
Abstract:
Methods and apparatus to certify digital signatures are disclosed. An example method includes receiving a request to certify a digital signature from a user, receiving information about a physical characteristic of the user, comparing the information about the physical characteristic to stored physical characteristic information, and based on the comparison, at least one of certifying the digital signature based on the comparison or requesting certification of the digital signature based on the comparison.
Abstract:
A particular method includes receiving, via an interactive voice response unit, an audio content item during a first call. An indication of an insertion point at which to insert audio advertising in the audio content item is also received. The method further includes receiving via the interactive voice response unit an audio advertisement during a second call. The audio advertisement is automatically inserted into the audio content item at the insertion point to create a package.
Abstract:
A particular method includes receiving, via an interactive voice response (IVR) unit, an audio content item during a first call. An indication of an insertion point at which to insert audio advertising in the audio content item is also received during the first call. The method further includes receiving via the IVR unit an audio advertisement during a second call. The audio advertisement is automatically inserted into the audio content item at the insertion point to create a package.
Abstract:
Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong authenticator to be associated with a user of the secure access system; providing a unique login and the at least one strong authenticator associated with the user to the secure access system to gain access to information associated with a referring organization, the referring organization being registered with the secure access system; and accessing the information associated with the referring organization based on the unique login and the at least one strong authenticator provided to the secure access system. Related systems and computer program products are also provided.
Abstract:
Integrating services provided by intelligent peripherals in a communications network, includes interacting, by a first intelligent peripheral of a first type, with a second intelligent peripheral of a second type which interacts with the first intelligent peripheral of the first type according to a script based on information received from a remote requesting party. The remote requesting party interacts, over the communications network, with the second intelligent peripheral of the second type according to the script. The first intelligent peripheral of the first type and the second intelligent peripheral of the second type are different from each other.
Abstract:
Enhanced biometric authentication is achieved by combining a user's inherent biometric data with the user's knowledge of a secret glyph. In one embodiment, a touchpad is provided on which the user may use a finger to indicate a plurality of strokes that form a distinct glyph. Image stabilization may be used to extract a readable fingerprint from the strokes, and the glyph and finger print are matched to a stored profile. The glyph may be one or more alphanumeric characters that represent a password. The user can then enter the password on the touch pad with his finger. If the fingerprint and password both match, the user is authenticated.
Abstract:
Inter-process communications between a first process and a second process are secured. A first process recognizes that inter-process communications must be initiated with a second process. A first computer that supports the first process submits a request to initiate inter-process communications with a second computer that supports the second process. The second computer replies to a request to initiate inter-process communications by replying to the first computer with a request for information of a digital certificate that authenticates the first process.
Abstract:
A change management system coordinates information of a transaction tool managed by a transaction tool management system. The system includes a receiver that receives, over a communications network, activity information and/or lifecycle event information for the transaction tool. The system also includes a storage that stores the received information. Additionally, the system includes a processor that manages a change in a status of the transaction tool based on the received information.