Abstract:
Systems and methods are describe wherein a service provider provides media services that can include, but are not limited to, telephone, radio, interactive and television services. A user residence and/or a user receiving device are designated as a primary location or device for receiving the services of the service provider. An authorization center authenticates a request to provide the service(s) at one or more secondary location/device. The verification process can include, but is not limited to, password(s), Personal Identification Numbers (PIN) and biometric identifiers such as voice, retina, finger print and DNA.
Abstract:
Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for detachable media playback. The system can detach individual channels of a media presentation from a first device and transfer them to nearby devices. The method causes a computing device to play media content having multiple channels to a user on a first device, identify a set of media playback devices nearby to the first device, identify playback capabilities and a status for each of the set of nearby devices, match a channel of the media content with at least one of the set of media playback devices and the identified playback capabilities and the status of the set of media playback devices, and transfer the matched channel to the at least one of the set of media playback devices. A central server can transfer the matched channel to other media playback devices.
Abstract:
An audio content item, submitted by and spoken in a voice of an author, is received and registered along with an insertion point and associated content information. An audio advertisement submitted by an advertiser is received and registered. At least one targeting criterion is associated with the audio advertisement. User information and at least one content pushing criterion are stored for a user. Without being selected by the user, the audio content item is automatically selected for pushing to the user based on the content information satisfying the at least one content pushing criterion. The audio advertisement is automatically selected for insertion at the insertion point based on the content information and the user information satisfying the at least one targeting criteria. A package that includes the audio content item with the audio advertisement inserted at the insertion point is created and pushed to the user.
Abstract:
A centralized biometric system is provided for verifying an individual's identity over a communications network. The system includes a storage that stores biometric information in association with information that identifies an individual. The system also includes a receiver that receives, from one of a communications device and a network communications platform, a biometric sample from a party attempting to obtain a service from the one of the communications device and the network communications platform. The service is provided contingent on authentication of the party as the individual. The system also includes a processor that compares the biometric sample to the biometric information to authenticate the identity of the party as the individual.
Abstract:
A receiver receives from a remote system a voice biometric sample from a party attempting to obtain a service from the apparatus using the remote system. A processor selectively determines when to request authentication of the party by a remote voice biometric system. A transmitter transmit a request to the party to provide the voice biometric sample responsive to the processor determining to request authentication of the party. The apparatus provides the service contingent upon authentication of the party by the remote voice biometric system.
Abstract:
A change management system is integrated with a transaction tool management system including a processor for scheduling a change in status of at least one transaction tool of the transaction tool management system. The system includes a receiver that receives a request for approval of the change in the status of the at least one transaction tool, a storage that stores the received request, a transaction tool classification process module that classifies transaction tools, and a change management module that schedules the change in status when the request for approval is approved. The change management module uses classification information from the transaction tool classification process module to schedule the change in status. The change management system uses information available from the transaction tool management system to schedule the change in the status of the at least one transaction tool managed by the transaction tool management system.
Abstract:
Securing inter-process communications includes receiving, from a device that supports a first process that is an instantiation of a first application being executed, a request to initiate inter-process communications. Securing inter-process communications also includes replying to the device with a request for information of a first digital certificate that uniquely authenticates an identity of the first process. An identity of a second process that is a distinct instantiation of the first application is authenticated using a second digital certificate distinct from the first digital certificate.
Abstract:
A method includes receiving at a first computer a new certificate which is to replace an old certificate associated with the first computer and associating by the first computer the new certificate with the first computer. In response to the first computer associating the new certificate with the first computer, the first computer accesses an email address book of the first computer having information identifying a second computer as having received the old certificate to determine from the information that the second computer is to associate the new certificate in place of the old certificate with the first computer. In turn, the first computer transmits the new certificate to the second computer for the second computer to associate the new certificate with the first computer.
Abstract:
A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred.
Abstract:
A method for providing a service over a communications network includes interacting, by a first networked communications apparatus, over the communications network with a remote requesting party according to a script. The method also includes interacting, by the first networked communications apparatus, with a second networked communications apparatus according to the script based on information received from the remote requesting party.