Abstract:
A system (100) for intelligent caching and network management. The system (100) includes event and time information (102) representing a user's schedule, a location database (106) including information about destination devices (110) and capabilities of the destination devices (110), a predictor (104) which receives the event and time information (102) and the information and capabilities of the destination devices to predict a location of the user and/or resources needed at the location, such that the resources are transferred to the user at a location when and where the resources are needed. User preference profiles (108), which include user preference information, are further employed by the predictor (104) to predict a location of the user and/or resources needed at the location.
Abstract:
A system and method for verifying user identity, in accordance with the present invention, includes a conversational system (114) for receiving inputs from a user (110) and transforming the inputs into formal commands. A behavior verifier (118) is coupled to the conversational system (114) for extracting features from the inputs. The features include behavior patterns of the user. The behavior verifier (118) is adapted to compare the input behavior to a behavior model (214) to determine if the user is authorized to interact with the system.
Abstract:
A system and method for verifying user identity, in accordance with the present invention, includes a conversational system (114) for receiving inputs from a user (110) and transforming the inputs into formal commands. A behavior verifier (118) is coupled to the conversational system (114) for extracting features from the inputs. The features include behavior patterns of the user. The behavior verifier (118) is adapted to compare the input behavior to a behavior model (214) to determine if the user is authorized to interact with the system.
Abstract:
A system (100) for intelligent caching and network management. The system (100) includes event and time information (102) representing a user's schedule, a location database (106) including information about destination devices (110) and capabilities of the destination devices (110), a predictor (104) which receives the event and time information (102) and the information and capabilities of the destination devices to predict a location of the user and/or resources needed at the location, such that the resources are transferred to the user at a location when and where the resources are needed. User preference profiles (108), which include user preference information, are further employed by the predictor (104) to predict a location of the user and/or resources needed at the location.
Abstract:
An authentication framework is provided which enables dynamic user authentication that combines multiple authentication objects using a shared context and that permits customizable interaction design to suit varying user preferences and transaction/application requirements. Such a framework provides a high degree of flexibility, accuracy, convenience and robustness. In one illustrative aspect of the invention, an automated technique for user authentication comprises the following steps/operations. First, user input is obtained. At least a portion of the user input is associated with two or more verification objects. Then, the user is verified based on the two or more verification objects in accordance with at least one verification policy operating on a context shared across the two or more verification objects. The user authentication technique of the invention may preferably be implemented in a flexible, distributed architecture comprising at least one client device coupled to at least one verification server. The client device and the verification server may operate together to perform the user authentication techniques of the invention.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and an apparatus for sequential user authentication using one or more error rates, which characterize each security challenge. SOLUTION: To acquire a intermediate authentication result, at least one knowledge challenge is attempted for a user, and the user challenge is continued until accumulated authentication results satisfy one or more criteria. The intermediate authentication result is based on one or more probabilities of errors for mis-acceptance and mis-rejection for every knowledge challenge. The probability of errors for mis-acceptance indicates a probability that the response is made by another user who has correctly answered for knowledge challenges, and the probability of errors for mis-rejection indicates a probability that the response is made by an authentic user who does not correctly answer for knowledge challenges. The probabilities of errors for mis-acceptance and mis-rejection can be adjusted based on known information on field data or specified challenges. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a device for automatically discriminating a command boundary in a conversation type natural language system. SOLUTION: This device comprises a voice recognizing device 20 for converting an input signal into a recognized text 30 and a boundary discriminating device 40 connected to the voice recognizing device 20 to receive the recognized text 30 and determine whether a command is present in the recognized text 30 or not. The boundary discriminating device 40 outputs the command when the command is present in the recognized text 30. The method for discriminating a command boundary in a conversation type natural language system is also included.
Abstract:
In accordance with the invention, a method and system for accessing a dialog system 101 employing a plurality of different clients 100, includes providing a first client device for accessing a conversational system 300 and presenting a command to the conversational system 300 by converting the command to a form understandable to the conversational system. The command is interpreted by employing a mediator 302, a dialog manager 303 and a multi-modal history 304 to determine the intent of the command based on a context of the command. A second client device is determined based on a predetermined device preference stored in the conversational system. An application is abstracted (400) to perform the command, and the results of the performance of the command are sent to the second client device.
Abstract:
A method and system, which may be implemented by employing a program, perform method steps of a natural language understanding (NLU) system which include tagging, 200, recognized words of a command input to the NLU system to associate the command with a context, and translating, 300, the command to at least one formal command based on the tagged words. A top ranked formal command is determined, 400, based on scoring of the tagged recognized words and scoring translations of the at least one formal command. Whether the top ranked formal command is accepted is determined by comparing a feature vector of the top ranked formal command to representations of feature vectors stored in an accept model. The top ranked formal command is executed, 500, if accepted and incorrect commands are prevented from execution.