Abstract:
Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold.
Abstract:
Systems and methods for seamless automated updating of a subscriber's address book based on relationships or “links” created between a subscriber and their contacts. The contacts are stored in a centralized addressbook database, and any updates to a subscriber's profile or record within the database results in an update to each of the subscriber's contacts' local address books stored on the contacts' devices. The system includes communication devices on a network being associated with subscribers of the network and an application server hosting an addressbook application, the application server having linking logic that creates a link between the subscribers where a modification of the first address on the addressbook database by the first subscriber results in a subsequent modification of the first address within a local copy of the addressbook database stored on a memory on the second device associated with the second subscriber.
Abstract:
An electronic display page may be displayed on an electronic display and electronic input elements may be displayed on the electronic display. If there are additional input elements, the additional electronic input elements may be accepted from an electronic input device for the electronic presentation and the additional electronic input elements may be added to the existing electronic input elements. The new electronic display page may be added to the electronic display page to create a sequence of electronic display pages, and the sequence of electronic display pages may be displayed.
Abstract:
A system, method and software for isolating information handling system memory system devices are disclosed. In dual-channel double-data-rate memory system implementations, teachings of the present disclosure facilitate accurate identification of memory system devices that fail diagnostic testing or cause memory errors. A BIOS level application is provided which permits user or application selection and isolation of memory system devices or components, thereby eliminating the need for physical removal of such components during testing as well as permitting continued use of the information handling system with defective memory system devices isolated.
Abstract:
System(s), method(s), and device(s) that incorporate a current physical location value associated with a communication device as part of internet protocol (IP) are presented. An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device.
Abstract:
Utilizing dynamic heuristic transitions between local and remote data for displaying electronic communications is provided. A computer may load one or more folders associated with the electronic communications. The computer may then determine an initial mode for viewing the electronic communications. The computer may then display the remote data upon determining that the initial mode for viewing the electronic communications is an online mode or display the local data upon determining that the initial mode is offline. The computer may then synchronize local data and the remote data to update the local data. The computer may then automatically transition from displaying the remote data to displaying the local data after the update of the local data. The computer may also automatically transition from displaying the local data to displaying the remote data after determining that the local data is out of date.
Abstract:
Consistent with the present disclosure, a method and apparatus for providing a uniform spectral gain of an optical amplifier is provided. Namely, a “balancing” step is carried out in which an optical channel having the lowest power level input to an optical circuit, such as an dynamic gain equalizer (DGE), is assigned a zero “attenuation error” and is substantially un-attenuated by the DGE. The lowest power level optical signal does not require further attenuation and effectively serves as a reference power level, which the power levels of the remaining optical signals are set to. For example, remaining optical signals are assigned either positive or negative attenuation errors relative to the zero attenuation error based on optical signal input powers to the DGE and accumulated DGE attenuations over time. Those optical signals having a negative attenuation error are substantially unattenuated by the DGE, because such optical signals are adequately attenuated and do not require further attenuation. On the other hand, the DGE is controlled to attenuate those optical signals having positive attenuation errors to thereby flatten the output spectrum of the amplifier. In one example, interpolation techniques may be employed to control those portions of the DGE (e.g., attenuators or pixels) that do not receive a channel, such that adjacent pixels that receive channels may impart a desired amount of attenuation. In addition, further interpolation may be provided to appropriately control the DGE pixels, if the number of channels supplied to the DGE is different than the number of pixels of the DGE.
Abstract:
A method is provided for identifying a calling party to a called party utilizing biometric information. Biometric information of first calling party is received. If stored, a calling party profile is retrieved based on first calling party biometric information. A call is placed to a called party. The first calling party profile is provided to called party. A biometric information change from first calling party biometric information to a second calling party biometric information is automatically detected, and it is determined whether the second party biometric information is stored. If stored, a second calling party profile of second calling party is retrieved and is provided to called party. Responsive to determining that the biometric information for second calling party is not stored, the called party is notified that the second calling party is communicating and the second calling party profile is automatically created based on second calling party biometric information.
Abstract:
In accordance with an aspect of the invention, a method and system are disclosed for constructing an embedded signature in order to facilitate post-facto detection of leakage of sensitive data. The leakage detection mechanism involves: 1) identifying at least one set of words in an electronic document containing sensitive data, the set of words having a low frequency of occurrence in a first collection of electronic documents; and, 2) transmitting a query to search a second collection of electronic documents for any electronic document that contains the set of words having a low frequency of occurrence. This leakage detection mechanism has at least the following advantages: a) it is tamper-resistant; b) it avoids the need to add a watermark to the sensitive data, c) it can be used to locate the sensitive data even if the leakage occurred before the embedded signature was ever identified; and, d) it can be used to detect an embedded signature regardless of whether the data is being presented statically or dynamically.