Abstract:
A method for accessing a remote network includes identifying a content server associated with the remote network, generating a uniform resource locator, embedding additional data in the uniform resource locator, encrypting the uniform resource locator, and accessing a server in the remote network identified by the uniform resource locator. The method further includes wherein the additional data comprises authentication data, a delivery session identification, a time stamp, or comprises subscriber identification data. The URL may provide access to the content server for a time period indicated by the time stamp. The method includes wherein at least the subscriber identification data prevents unauthorized sharing of the URL.
Abstract:
Methods and apparatus to certify digital signatures are disclosed. An example method includes retrieving, from a first database, a first geographical location associated with an identification number associated with a network device and identified in a request to certify a digital signature, comparing the first geographical location associated with the identification number to a second geographical location to verify the second geographical location, and in response to the verification of the second geographical location and to a comparison of (a) biometric information associated with a user associated with the request and (b) stored biometric information, instructing a certificate issuer to certify the digital signature to indicate an authenticity of the digital signature.
Abstract:
A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred.
Abstract:
A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred.
Abstract:
Methods and apparatus to certify digital signatures are disclosed. An example method includes retrieving, from a first database, a first geographical location associated with an identification number associated with a network device and identified in a request to certify a digital signature, comparing the first geographical location associated with the identification number to a second geographical location to verify the second geographical location, determining that the first geographical location matches the second geographical location, and certifying the digital signature to indicate an authenticity of the digital signature based on the verification of the second geographical location and a comparison of (a) biometric information associated with a user associated with the request and (b) stored biometric information.
Abstract:
Methods and apparatus to certify digital signatures are disclosed. An example method includes retrieving, from a first database, a first geographical location associated with an identification number associated with a network device and identified in a request to certify a digital signature, comparing the first geographical location associated with the identification number to a second geographical location to verify the second geographical location, and in response to the verification of the second geographical location and to a comparison of (a) biometric information associated with a user associated with the request and (b) stored biometric information, instructing a certificate issuer to certify the digital signature to indicate an authenticity of the digital signature.
Abstract:
Methods and apparatus to certify digital signatures are disclosed. An example method includes retrieving, from a first database, a first geographical location associated with an identification number associated with a network device and identified in a request to certify a digital signature, comparing the first geographical location associated with the identification number to a second geographical location to verify the second geographical location, determining that the first geographical location matches the second geographical location, and certifying the digital signature to indicate an authenticity of the digital signature based on the verification of the second geographical location and a comparison of (a) biometric information associated with a user associated with the request and (b) stored biometric information.
Abstract:
A method for accessing a remote network includes identifying a content server associated with the remote network, generating a uniform resource locator, embedding additional data in the uniform resource locator, encrypting the uniform resource locator, and accessing a server in the remote network identified by the uniform resource locator. The method further includes wherein the additional data comprises authentication data, a delivery session identification, a time stamp, or comprises subscriber identification data. The URL may provide access to the content server for a time period indicated by the time stamp. The method includes wherein at least the subscriber identification data prevents unauthorized sharing of the URL.