A biometric sample of the user is received at a biometric interface of a device as part of a biometric authentication request by the user, with the biometric sample characterized by a match score when the biometric sample matches at least one stored template that uniquely identifies the user. The presence of a context usage override condition of the biometric authentication request causes a context usage factor to be updated based upon the context usage override condition. A biometric recognition threshold required for the user to access the application and indicative of a threshold security level required for biometric authentication is calculated based on the context usage factor. The user is permitted to access the application when the match score of the biometric sample is at least equal to the biometric recognition threshold.
YUK L. LI - COLONIA NJ, US PADMAJA RAMADAS - DAVIE FL, US
Assignee:
MOTOROLA, INC. - Schaumburg IL
International Classification:
H04L 9/00
US Classification:
713186
Abstract:
Customized biometric authentication based at least in part upon usage history and learning capabilities of a user is provided. A biometric sample of a user received at a biometric interface of a device is compared with at least one stored template that uniquely identifies the user, and a match score generated when the biometric sample matches one of the stored templates. The match score is compared to a match score threshold value of an application that the user is attempting to access to generate match score comparison results, and an updated false reject ratio (FRR) for the last N matches of the user is calculated. The user is allowed to access the application when the match score comparison results indicate that the match score is at least equal to the match score threshold value and the updated FRR is less than a FRR threshold value of the application.
Systems And Methods For Composing And Providing Media Clips Using Distributed Computing Architecture
- Basking Ridge NJ, US Indraneel Sen - Livingston NJ, US Yuk Lun Li - Morganville NJ, US Dan Sun - Bridgewater NJ, US
International Classification:
H04L 12/58 H04L 29/08
Abstract:
A system may include a first device and a second device. The first device may be configured to select a second device for providing a first User Equipment device (UE) with media clips in accordance with Application Programming Interface (API) calls from a second UE. The second device may be configured to: receive a first API call from the second UE to generate and provide a media clip; generate the media clip; and send the generated media clip to the first UE.
Systems And Methods For Securely Sharing Context Between Mec Clusters
A first network device may receive a notification over a network; in response to the notification, cause a virtualized operating system (OS) and a hypervisor of the first network device to obtain state units from one or more of first hardware components and virtual components; create a context state transfer package (CSTP) based on the state units; and forward the CSTP from the first network device to a second network device over the network. The second network device may receive the CSTP from the first network device; unpack the CSTP to obtain the state units; and put, at the second network device, second hardware components and virtual components of the second network device in a same state as the first hardware components and virtual components when the state units were obtained at the first network device.
Systems And Methods For Providing Discovery And Hierarchical Management Of Distributed Multi-Access Edge Computing
- Arlington VA, US Weimin LIU - Chatham NJ, US Yuk Lun LI - Morganville NJ, US
International Classification:
H04L 29/08 G06F 16/22 G06F 16/23
Abstract:
A device may store first data structures that include first data identifying computing resources provided at an edge of a network for a computing environment. The device may store second data structures that include second data identifying aggregations of portions of the first data, and may store a third data structure that includes third data identifying an aggregation of the second data. The device may receive, from a first client device, client data identifying an address and resources associated with the first client device, and may update a first data structure based on the client data. The device may update a second data structure based on updating the first data structure, and may update the third data structure based on updating the second data structure. The device may provide a notification indicating that the first client device has been added as a computing resource for the computing environment.
Systems And Methods For Controlling Video Wall Content Using Air Gestures
- Arlington VA, US Yuk Lun Li - Morganville NJ, US
International Classification:
G06F 3/01 G06K 9/00 G06T 7/20 G06T 7/70 G06F 3/14
Abstract:
A device may include a memory storing instructions and processor configured to execute the instructions to receive a video image stream of a scene. The device may be further configured to perform person detection on the received video image stream to identify a plurality of persons; perform gesture detection on the received video image stream to identify a gesture; select a person from the plurality of persons to associate with the identified gesture; and use the identified gesture to enable the selected person to control an object or area displayed on a video screen associated with the scene.
Data Content Chain Of Custody And Integrity Validation
- Arlington VA, US Weimin Liu - Chatham NJ, US Yuk Lun Li - Morganville NJ, US Mohammad Raheel Khalid - Budd Lake NJ, US Ravi Sharma - Freehold NJ, US Dan Sun - Bridgewater NJ, US
International Classification:
G06F 21/64 H04L 9/32
Abstract:
A device obtains previously created data content. The device unmasks and extracts one or more chain of custody blocks stored in association with the data content. The one or more chain of custody blocks includes chain of custody data identifying who, when, where, and, with what hardware and/or software, created or edited the data content. The device analyzes the one or more chain of custody blocks and validates an origination of the data content based on the analysis of the one or more chain of custody blocks.
Systems And Methods For Managing Uplink And Downlink Throughput
- Arlington VA, US Indraneel Sen - Livingston NJ, US Yuk Lun Li - Morganville NJ, US Weimin Liu - Chatham NJ, US Dan Sun - Bridgewater NJ, US
International Classification:
H04W 72/04 H04L 5/14
Abstract:
A method may include receiving, at a wireless station, device capability information associated with a number of user equipment (UE) devices and determining, by the wireless station, uplink and downlink configurations for a number of carriers associated with the wireless station. The method may also include configuring uplink and downlink time slots for each of the carriers based on the determined uplink and downlink configurations and modifying the uplink and downlink configurations for at least some of the carriers over time based on data usage or congestion associated with the at least some of the plurality of carriers.