Abstract:
A method of authenticating an entity includes associating a local identity of the entity with a global identity of the entity, the local identity being associated with a first one of a plurality of restricted access zones, associating the global identity of the entity with particular ones of the plurality of restricted access zones for granting access to the particular ones of the plurality of restricted access zones, receiving an authentication request from the entity to access a second one of the plurality of access zones where the authentication request includes the local identity of the entity, and authenticating the entity for access to the second one of the plurality of access zones responsive to receiving the authentication request when the second one of the plurality of restricted access zones is one of the particular ones of the plurality of restricted access zones that are associated with the global identity of the entity,
Abstract:
An individual's identity is verifiable using voice biometrics. A voice biometric system includes a receiver configured to receive, from a remote communications device, a voice biometric sample of a party attempting to obtain a service from a remote system. The service is provided contingent on authentication of the party as the individual. The voice biometric system also includes a processor configured to compare the voice biometric sample received by the receiver to voice biometric information obtained from a storage to authenticate the identity of the party as the individual. The receiver and processor are provided within a communications network.
Abstract:
A method for providing a service over a communications network includes interacting, by a first networked communications apparatus, over the communications network with a remote requesting party according to a script. The method also includes interacting, by the first networked communications apparatus, with a second networked communications apparatus according to the script based on information received from the remote requesting party.
Abstract:
A centralized biometric system for verifying the identity of a user over a communications network includes a device that stores biometric information in association with information that identifies users. The system further includes a receiver that receives, from a media content presentation device via a communications network, a biometric sample provided by a user requesting media content from a provider. The provider delivers the media content requested by the user from the communications network to the media content presentation device for receipt by the user contingent upon the identity of the user being verified. The system further includes a processor that compares the biometric sample provided by the user to stored biometric information of the user. The processor verifies the identity of the user upon a sufficient correspondence between the biometric sample provided by the user and the stored biometric information of the user.
Abstract:
A method of authenticating an entity includes associating a local identity of the entity with a global identity of the entity, the local identity being associated with a first one of a plurality of restricted access zones, associating the global identity of the entity with particular ones of the plurality of restricted access zones for granting access to the particular ones of the plurality of restricted access zones, receiving an authentication request from the entity to access a second one of the plurality of access zones where the authentication request includes the local identity of the entity, and authenticating the entity for access to the second one of the plurality of access zones responsive to receiving the authentication request when the second one of the plurality of restricted access zones is one of the particular ones of the plurality of restricted access zones that are associated with the global identity of the entity.
Abstract:
A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a client application on a computing device that is to be utilized as an authentication factor for the MFA service. A computing device enrollment procedure is utilized to enroll the computing device on which the client application was installed for the MFA service. A voice enrollment procedure is utilized to create a voice print for the user of the computing device that is to be utilized as an authentication factor for the MFA service. An authentication procedure is utilized to provide multi-factor authenticated access to a service, such as an online service that provides access to sensitive account information.
Abstract:
A user's identity is authenticated by evaluating the identity of the user using a plurality of authentication techniques, the plurality of authentication techniques generating a plurality of numerical confidence indicators, respectively, of the identity of the user, associating a plurality of authentication technique weights with the plurality of numerical confidence indicators, respectively, and calculating a weighted combination of the respective numerical confidence indicators using the plurality of authentication technique weights to generate a composite numerical confidence indicator of the identity of the user.
Abstract:
A user's identity is authenticated by evaluating the identity of the user using a plurality of authentication techniques, the plurality of authentication techniques generating a plurality of numerical confidence indicators, respectively, of the identity of the user, associating a plurality of authentication technique weights with the plurality of numerical confidence indicators, respectively, and calculating a weighted combination of the respective numerical confidence indicators using the plurality of authentication technique weights to generate a composite numerical confidence indicator of the identity of the user.
Abstract:
A method for providing a service over a communications network includes interacting, by a first networked communications apparatus, with a second networked communications apparatus. The second networked communications apparatus interacts with the first networked communications apparatus according to a script based on information received from a remote requesting party. The remote requesting party interacts over the communications network with the second networked communications apparatus according to the script.
Abstract:
A system and method are disclosed for providing access to an interactive service offering. A method incorporating teachings of the present disclosure may include receiving a first communication in a format that complies with a first protocol. The first communication may be associated with a desired interaction between a first device and a voice activated service (VAS) platform. The method may also include receiving a second communication in a different format that complies with a different protocol. The second communication may be associated with a desired interaction between a different device and the VAS platform. A system implementing the method may recognize that a platform does not support the first protocol, and translate the first communication to a platform-supported format to facilitate the desired interaction.