Abstract:
Systems, methods, and computer-readable storage media for generating an immersive three-dimensional sound space for searching audio. The system generates a three-dimensional sound space having a plurality of sound sources playing at a same time, wherein each of the plurality of sound sources is assigned a respective location in the three-dimensional sound space relative to one another, and wherein a user is assigned a current location in the three-dimensional sound space relative to each respective location. Next, the system receives input from the user to navigate to a new location in the three-dimensional sound space. Based on the input, the system then changes each respective location of the plurality of sound sources relative to the new location in the three-dimensional sound space.
Abstract:
Methods and apparatus are disclosed for authenticating a user based on the geo-location history of a geo-location-enabled wireless device (e.g., a GPS-enabled wireless telecommunications terminal, a smart card, an RFID tag, etc.). In a first illustrative embodiment, a user of a geo-location-enabled wireless telecommunications terminal (e.g., a GPS-enabled cell phone, a GPS-enabled notebook computer, etc.) who attempts to access a restricted resource is challenged with one or more questions that are generated from the terminal's geo-location history. In a second illustrative embodiment, a user of a data-processing system who attempts to access a restricted resource is asked to provide a username Z. The user is then challenged with one or more questions that are generated from the geo-location history of a wireless device that is associated with username Z (e.g., a cell phone that belongs to the user whose username is Z, etc.).
Abstract:
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.
Abstract:
Systems, methods, and computer-readable storage media for generating an immersive three-dimensional sound space for searching audio. The system generates a three-dimensional sound space having a plurality of sound sources playing at a same time, wherein each of the plurality of sound sources is assigned a respective location in the three-dimensional sound space relative to one another, and wherein a user is assigned a current location in the three-dimensional sound space relative to each respective location. Next, the system receives input from the user to navigate to a new location in the three-dimensional sound space. Based on the input, the system then changes each respective location of the plurality of sound sources relative to the new location in the three-dimensional sound space.
Abstract:
Methods and apparatuses are disclosed for enabling the response to a command from a wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, a server maintains an updated list of the locations of fixed and wireless terminals within an area (e.g., an IEEE 802.11 wireless access point's area of coverage, a CDMA base station's cell, etc.). When a user issues a command to his or her wireless terminal, the command is transmitted to the server. The server determines whether there are any other nearby wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that environment.