Abstract:
Improved user authentication of a communication device is provided by expanding voice biometric authentication with a dynamically updated user profile formed of non-voice usage parameters. The non-voice usage parameters are collected during successful voice authentications to establish non-voice compensation controls. When a failed voice biometric authentication attempt is followed by a valid PIN entry, then a false rejection is determined, and a voice biometric threshold is adjusted to reduce the individual user-based false rejection rate along with the enablement of the non-voice usage controls.
Abstract:
Methods and apparatus for using a biometric template to control access to a user credential for a shared wireless communication device. One method includes receiving, from a mobile device, an authentication request. The authentication request includes a device credential associated with the mobile device. The method further includes receiving, from the mobile device, a request for a biometric template of a user. The method further includes determining, by reference to at least one of a group consisting of the device credential and an authorization database, that the mobile device is authorized to receive the biometric template of the user based on at least one attribute controlling a use of the biometric template. The method further includes, in response to determining that the mobile device is authorized to receive the biometric template of the user, conveying the biometric template of the user to the mobile device.
Abstract:
A method is provided for automatically deleting user passwords. Upon receiving a password-less user authentication a password grace period timer is started. Upon expiration of the password grace period timer the password is deleted if a user confidence score associated with the user is greater than a confidence threshold.
Abstract:
A method and apparatus for providing a lifetime extension to an identity assertion is provided herein. During operation a user will authenticate to an identity management server (also known as an authorization server or an authentication server) to obtain an identity assertion. An identity assertion will be provided upon successful authentication. The lifetime of the identity assertion will be based on whether or not biometric information of the user will be used by the device to which the assertion is being issued to identify the user prior to allowing the use of the identity assertion.
Abstract:
A method of assigning Multimedia Broadcast Multicast Service (E-MBMS) bearers in a Multimedia Broadcast Single Frequency Network (MBSFN) area in a 3GPP compliant wireless communication system is provided. An infrastructure device is operably coupled to a radio access network comprising one or more MBSFN areas, wherein each MBSFN area supports a plurality of E-MBMS bearers for transporting media streams to user equipments (UE). The infrastructure device receives, from a UE, an identifier of a preferred MBSFN area and a request for a boost to the quality of the transmissions. The infrastructure device assigns first and second E-MBMS bearers in an MBSFN area to support a call to the UE, the first and second E-MBMS bearers providing the same information to the UE in their media content streams. The UE may employ application layer time-diversity reception of the media content.
Abstract:
A method and mobile device for identifying a current user of the mobile device as a trusted user is provided. The mobile device determines that a current user of the mobile device is not the owner of the mobile device. The mobile device obtains a biometric sample of the current user and transmits an identification request message to a distributed identification system. The distributed identification system includes a group of mobile devices, each one that includes biometric data the owner of the device. The identification request message includes the biometric sample of the current user. If the biometric sample matches the sample of one of the mobile devices in the distributed identification system, that device sends an identity response to the originating mobile device. Upon receiving the identity response, the original mobile unit determines if the identity in the identity response matches a known identity of the mobile device, such as a member in the contact list. If so, the original mobile device remains unlocked. If there is no match, the mobile device assumes that the current user is unauthorized and locks the phone or performs other defensive measures.
Abstract:
A method and apparatus for dynamically controlling quality of service (QoS) is provided herein. During operation, a QoS manager will determine if a device is currently being used by an individual. The QoS of the device will then be tailored based on whether or not the device is currently being used by the individual. Devices that may be running applications, yet unused by anyone may have their QoS reduced. This will allow the QoS to be increased for devices that are currently being used.