Stephen J. Billick - Austin TX, US Saurabh Kumar - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 11/00
US Classification:
714 36, 713 2
Abstract:
A system, method and software for isolating information handling system memory system devices are disclosed. In dual-channel double-data-rate memory system implementations, teachings of the present disclosure facilitate accurate identification of memory system devices that fail diagnostic testing or cause memory errors. A BIOS level application is provided which permits user or application selection and isolation of memory system devices or components, thereby eliminating the need for physical removal of such components during testing as well as permitting continued use of the information handling system with defective memory system devices isolated.
System And Method For Voice Authentication Over A Computer Network
Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold.
A method is provided for identifying a calling party to a called party utilizing biometric information. Biometric information of first calling party is received. If stored, a calling party profile is retrieved based on first calling party biometric information. A call is placed to a called party. The first calling party profile is provided to called party. A biometric information change from first calling party biometric information to a second calling party biometric information is automatically detected, and it is determined whether the second party biometric information is stored. If stored, a second calling party profile of second calling party is retrieved and is provided to called party. Responsive to determining that the biometric information for second calling party is not stored, the called party is notified that the second calling party is communicating and the second calling party profile is automatically created based on second calling party biometric information.
Employing Physical Location Geo-Spatial Co-Ordinate Of Communication Device As Part Of Internet Protocol
System(s), method(s), and device(s) that incorporate a current physical location value associated with a communication device as part of internet protocol (IP) are presented. An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device.
Dynamically Updated Web-Enabled And Embedded Contact Address In Communication Devices
Saurabh Kumar - Jersey City NJ, US Mina Awad - Edison NJ, US Piyush Anoop Doshi - Marlboro NJ, US Bhavin A. Doshi - Marlboro NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
G06F 15/16 H04M 3/42
US Classification:
709202, 4554142
Abstract:
Systems and methods for seamless automated updating of a subscriber's address book based on relationships or “links” created between a subscriber and their contacts. The contacts are stored in a centralized addressbook database, and any updates to a subscriber's profile or record within the database results in an update to each of the subscriber's contacts' local address books stored on the contacts' devices. The system includes communication devices on a network being associated with subscribers of the network and an application server hosting an addressbook application, the application server having linking logic that creates a link between the subscribers where a modification of the first address on the addressbook database by the first subscriber results in a subsequent modification of the first address within a local copy of the addressbook database stored on a memory on the second device associated with the second subscriber.
Saurabh Kumar - Jersey City NJ, US Sorabh Saxena - Edison NJ, US Anand K. Singh - Marlboro NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
H04N 7/15
US Classification:
348 1402, 348E07083
Abstract:
Devices, systems, and methods are disclosed for connecting a plurality of mobile devices in a videoconference over a cellular network via a videoconferencing server. At least one of the mobile devices includes a camera to capture a video of a participant in the videoconference. The video is transmitted to the videoconferencing server on the cellular network. The videoconferencing server edits the video and sends the edited video to receiving mobile devices in real-time. The receiving mobile devices output the video as a projection by using an internal mobile projector or transmit the video to an external display device. A sending mobile device may also act as a receiving mobile device, such that each of the participants may view video of other participants in his/her own background/environment while communicating with the other participants. In some variations, the videoconferencing server removes the background from the video and may replace the background such that the images of participants are placed in front of a new background or in each other's background.
System And Method For Voice Authentication Over A Computer Network
Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold.
Methods, Systems, And Products For Address Translation In Residential Networks
SAURABH KUMAR - JERSEY CITY NJ, US JAYANTA DAS - MORGANVILLE NJ, US BHAVIN DOSHI - MARLBORO NJ, US ANAND SINGH - MARLBORO NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Atlanta GA
International Classification:
G06F 15/16
US Classification:
709217
Abstract:
Methods, systems, and products translate addresses in residential networks. A residential gateway translates requests for content such that the residential gateway appears as both a requestor and a destination for requested content, regardless of an actual requesting device or a desired output device.
News
Delhi minor rape accused sent to Delhi, villagers boycott his family
Muzaffarpur senior superintendent of police Saurabh Kumar said the local police had extended full co-operation to the Delhi team, leading to the arrest of the accused from Chiknauta, where Manojs in-laws live.