Abstract:
A method and an apparatus are disclosed that enable an enhanced, interactive voice response (IVR) system to securely authenticate a user at a telecommunications terminal, without some of the disadvantages in the prior art. In particular, after the user at the telecommunications terminal requests access to a resource, the controlling IVR system of the illustrative embodiment issues a random challenge sequence to the user, along with interspersed “camouflage elements” and one or more directions as to how to respond. The user is then free to speak a returned sequence that answers the combined challenge sequence and interspersed camouflage elements; as a result, an eavesdropper overhearing the user hears what sounds like a random number or string. In short, the technique of the illustrative embodiment uses a challenge-response exchange of a substitution cipher interspersed with camouflage elements.
Abstract:
Methods and apparatuses are disclosed for enabling the response to a command from a wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, a server maintains an updated list of the locations of fixed and wireless terminals within an area (e.g., an IEEE 802.11 wireless access point's area of coverage, a CDMA base station's cell, etc.). When a user issues a command to his or her wireless terminal, the command is transmitted to the server. The server determines whether there are any other nearby wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that environment.
Abstract:
An apparatus and methods are disclosed for enabling the response to a command at a personal wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, the personal wireless terminal determines wirelessly (e.g., via Bluetooth, etc.) whether there are any other nearby personal wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that particular environment of nearby users. In some embodiments, authorization is also at least partially based on one or more additional factors, such as the identity of the user of the personal wireless terminal, the identify of nearby users, the nature of the command, one or more arguments of a command, the value of a datum retrieved by a query, and the date and time (i.e., “calendrical time”).
Abstract:
An apparatus for enabling signals directed to a first telecommunications terminal to be forwarded intelligently to a second telecommunications terminal in the vicinity of the first terminal is disclosed. In particular, the illustrative embodiment automatically forwards signals from a first terminal to the closest terminal in the network that the first terminal is authorized to forward to. The closest authorized terminal is determined via short-range wireless communication between the first terminal and other terminals in the first terminal's vicinity. In the illustrative embodiment, the terminals communicate with each other via Bluetooth transceivers.
Abstract:
A method is disclosed that enables a user to determine which resources are both skills-qualified and available to perform a specified task, without some of the costs, disadvantages, and limitations of techniques in the prior art. The illustrative embodiment of the present invention is based on the recognition that the consideration of various conditions of availability, in addition to the consideration of the skills present, affects the outcome of identifying the resources that can and will perform a task. In other words, the illustrative embodiment of the present invention enables a user to determine which resources can perform one or more tasks, based on the criteria of: (i) a skills requirement, (ii) a geographic requirement, and (iii) a time requirement.
Abstract:
A method and apparatus for enabling a user of a telecommunications terminal to specify desired characteristics for the recipient of a call in lieu of a contact identifier are disclosed. The illustrative embodiment enables a user to specify one or more of the following criteria for a recipient: (i) a role requirement that specifies a role (e.g., a nurse, a doctor, etc.); (ii) a capability requirement that specifies one or more capabilities (e.g., able to speak Spanish, etc.); (iii) a location requirement (e.g., on the third floor of Building A, etc.); and (iv) a cardinality descriptor for the number of recipients (e.g., one recipient, at least three recipients, etc.). The illustrative embodiment also employs availability data (e.g., a schedule, etc.) and rules to determine whether a particular person is available to receive a call.