Abstract:
Methods and apparatus to certify digital signatures are disclosed. An example method includes receiving a request to certify a digital signature from a user, receiving information about a physical characteristic of the user, comparing the information about the physical characteristic to stored physical characteristic information, and based on the comparison, at least one of certifying the digital signature based on the comparison or requesting certification of the digital signature based on the comparison.
Abstract:
An audio content item, submitted by and spoken in a voice of an author, is received and registered along with an insertion point and associated content information. An audio advertisement submitted by an advertiser is received and registered. At least one targeting criterion is associated with the audio advertisement. User information and at least one content pushing criterion are stored for a user. Without being selected by the user, the audio content item is automatically selected for pushing to the user based on the content information satisfying the at least one content pushing criterion. The audio advertisement is automatically selected for insertion at the insertion point based on the content information and the user information satisfying the at least one targeting criteria. A package that includes the audio content item with the audio advertisement inserted at the insertion point is created and pushed to the user.
Abstract:
A system is provided for managing a transaction tool for an individual. The system includes a receiver that receives a request from the individual to initiate a process for managing the transaction tool. A processor analyzes the request from the individual and dynamically selects, based upon the requested process, at least one authentication method to be used for authenticating the identity of the individual before the request can be honored. The selected authentication method(s) are used to verify the identity of the individual.
Abstract:
A scanner discovers digital certificates by scanning an address range. The scanner scans the address range to determine whether a digital certificate has been installed for each address in the address range. The scanner receives digital certificate information when the digital certificate has been installed for an address. The address range that is scanned may include addresses associated with an installed digital certificate and addresses not associated with an installed digital certificate.
Abstract:
A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a client application on a computing device that is to be utilized as an authentication factor for the MFA service. A computing device enrollment procedure is utilized to enroll the computing device on which the client application was installed for the MFA service. A voice enrollment procedure is utilized to create a voice print for the user of the computing device that is to be utilized as an authentication factor for the MFA service. An authentication procedure is utilized to provide multi-factor authenticated access to a service, such as an online service that provides access to sensitive account information.
Abstract:
A communications system obtains verification of an expected identity of a party from a remote centralized biometric system over a communications network. A forwarder forwards, over the communications network to the remote centralized biometric system when the party attempts to obtain a service using the communications system, a biometric sample from the party and information characterizing the expected identity of the party. A receiver receives, over the communications network from the remote centralized biometric system, verification that the biometric sample matches biometric information obtained by the remote centralized biometric system from a storage such that the expected identity of the party is verified as the identity of the party. The service is provided contingent on verification of the expected identity of the party as the identity of the party.
Abstract:
Systems and methods are describe wherein a service provider provides media services that can include, but are not limited to, telephone, radio, interactive and television services. A user residence and/or a user receiving device are designated as a primary location or device for receiving the services of the service provider. An authorization center authenticates a request to provide the service(s) at one or more secondary location/device. The verification process can include, but is not limited to, password(s), Personal Identification Numbers (PIN) and biometric identifiers such as voice, retina, finger print and DNA.
Abstract:
A method for using an update engine to promulgate a transaction tool to a recipient. The method may include the steps of: generating a transaction tool operation request signal wherein the transaction tool operation request signal includes a request for a new transaction tool and/or an updated transaction tool, transmitting the transaction tool operation request signal to a transaction tool issuer, receiving a transaction tool update signal from the transaction tool issuer wherein the transaction tool update signal includes a new transaction tool and/or an updated transaction tool, determining the recipient, and transmitting the transaction tool update signal to the recipient.
Abstract:
Inter-process communications between a first process and a second process are secured. A first process recognizes that inter-process communications must be initiated with a second process. A first computer that supports the first process submits a request to initiate inter-process communications with a second computer that supports the second process. The second computer replies to a request to initiate inter-process communications by replying to the first computer with a request for information of a digital certificate that authenticates the first process.