Patent application number | Description | Published |
20090089586 | Methods, Apparatus and Programs for Generating and Utilizing Content Signatures - The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method of generating a fingerprint associated with a content item including: pseudo-randomly selecting a segment of the content item; and utilizing a processor or electronic processing circuitry, fingerprinting the selected segment of content item as at least an identifier of the content item. Of course, other claims and combination are provided as well. | 04-02-2009 |
20090089587 | Methods, Apparatus and Programs for Generating and Utilizing Content Signatures - The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method comprising: obtaining a sequence of content identifiers, the sequence of content identifiers corresponding to one or more segments of a media signal; and utilizing at least a processor or electronic processing circuitry, carrying out a convolution operation based on the sequence of content identifiers and content signatures housed or stored in a database to identify the media signal. Of course, other claims and combination are provided as well. | 04-02-2009 |
20090187435 | SECURITY METHODS EMPLOYING DRIVERS LICENSES AND OTHER DOCUMENTS - Driver's licenses and other security documents include one or more machine-readable features, each conveying plural bits of information. These features are used in a variety of ways to increase security, and/or to enhance functionality. In one embodiment, data encoded on a driver's license is used at airport check-in, to link to a state DMV database and obtain information by which the document, and its custodian, can be authenticated. In like fashion, a license can be used to authenticate a bearer and/or his/her age prior to the sale of alcohol or tobacco products. In other embodiments, different elements of a driver's license (e.g., the substrate, photo, text data, and machine-readable data) are logically bound together (e.g., interlinked through payloads conveyed by different machine-readable features) as a deterrent against counterfeiting. Driver's licenses can be similarly logically bound to personal checks and other documents. Many other arrangements are also disclosed. | 07-23-2009 |
20090233621 | SYSTEMS AND METHODS FOR LOCATING A MOBILE DEVICE WITHIN A CELLULAR SYSTEM - A system for determining location and timing information in a cellular network includes a space-time calibration unit (SCU) and a plurality of nodes in communication with the SCU. Each node includes a node ping driver that receives frame synchronization information from a respective subset of cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local node clock. The system also includes a user handset that includes a handset ping driver that receives the frame synchronization information from a serving cell site and one or more neighbor cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local handset clock. The SCU uses the information from the node and handset ping drivers to determine a handset location. | 09-17-2009 |
20090285446 | Signal Embedding and Detection using Circular Structures in a Transform Domain of a Media Signal - Machine readable signals embedded in other media signals include a circular structure in a transform domain to facilitate detection. The machine readable signals are not apparent to human observers of rendered media containing the machine readable signals, such as images and documents. A detector captures the media signal, transforms it to the transform domain, and then uses the circular structure in the transform domain to facilitate detection despite rotation of the media signal. | 11-19-2009 |
20100042843 | Benchmarks for Digital Watermarking - The presently claimed invention relates generally to digital watermarking of data, e.g., representing video or audio. One claim recites a method including: obtaining data representing video or audio; using a multi-purpose electronic processor programmed for: transforming the data into a transform domain, analyzing the transformed data to identify a plurality of transform coefficients according to predetermined criteria, and altering the identified plurality of transform coefficients to carry a digital watermark; and analyzing the data to determine a baseline state for the digital watermark. Of course, other combinations and claims are provided too. | 02-18-2010 |
20100074466 | Using Classification Techniques in Digital Watermarking - A classification scheme assigns samples of the watermarked media to classes based on classification criteria indicating a likely presence of a watermarked signal. Once classified, the scheme determines statistical characteristics of the media signal for the classes, and assigns a figure of merit to the samples in each class. A watermark decoder (e.g., reader and/or detector) use the figure of merit to adapt a watermark decoding function to the statistical features of the classes, such as weighting to samples to improve watermark decoding. | 03-25-2010 |
20100202300 | SYSTEMS AND METHODS FOR SPACE-TIME DETERMINATIONS WITH REDUCED NETWORK TRAFFIC - Space-time solutions are determined by exchanging pings among nodes in a network. Each ping includes a current space-time state of the transmitting node, which includes the transmitting node's currently estimated location and corrected time (as a count stamp). A particular node in the network receives pings from the other nodes in the network and uses the data in the received pings to estimate its own current position and to correct its own free-running clock relative to a common system time. As a service to the network, the particular node then transmits its corrected time (as a count stamp) and estimated position to the other nodes. In some embodiments, the space-time solutions discussed herein are used as backup to other navigation systems, such as the Automatic Dependent Surveillance-Broadcast (ADS-B) system. | 08-12-2010 |
20100205445 | WATERMARK SYSTEMS AND METHODS - Various improvements relating to digital watermarking and related technologies are detailed, including methods that enhance security and functionality, and new articles including watermarked puzzles and marked DNA. | 08-12-2010 |
20110022937 | Assessing Quality of Service Using Digital Watermark Information - The disclosure details methods of measuring the quality of service of received media signals by analyzing digital watermarks embedded in such signals. The quality of a received video or audio signal can thereby be assessed without having the original version of the signal before transmission. Instead, the strength or quality of the embedded digital watermark is analyzed to determine the quality of the received signal. The degradation of a watermark signal is used to assess quality of service of signals, such as audio and video. Several other features and arrangements are also detailed. | 01-27-2011 |
20110274004 | SYSTEMS AND METHODS FOR SPACE-TIME DETERMINATIONS WITH REDUCED NETWORK TRAFFIC - Space-time solutions are determined by exchanging pings among nodes in a network. Each ping includes a current space-time state of the transmitting node, which includes the transmitting node's currently estimated location and corrected time (as a count stamp). A particular node in the network receives pings from the other nodes in the network and uses the data in the received pings to estimate its own current position and to correct its own free-running clock relative to a common system time. As a service to the network, the particular node then transmits its corrected time (as a count stamp) and estimated position to the other nodes. In some embodiments, the space-time solutions discussed herein are used as backup to other navigation systems, such as the Automatic Dependent Surveillance—Broadcast (ADS-B) system. | 11-10-2011 |
20120076295 | Message Key Generation - The disclosure relates to message encoding. One claim recites an apparatus comprising: electronic memory for storing a digital watermark plural-bit message; an electronic processor programmed for: providing a plural-bit seed; randomizing the plural-bit seed; and encoding the randomized plural-bit seed with convolutional encoding, the encoded, randomized plural-bit seed comprising a key for transforming the digital watermark plural-bit message. Of course, other claims and combinations are provided too. | 03-29-2012 |
20120076346 | Message Encoding - The present invention relates to message encoding. One claim recites a method of providing information to transform a plural-bit message for steganographic encoding, said method comprising: providing a unique plural-bit number; altering the unique plural-bit number; error correction encoding the altered, unique plural-bit number, wherein the error correction encoded, altered, unique plural-bit number comprises information for transforming an independent message. Of course, other claims and combinations are provided too. | 03-29-2012 |
20120076348 | METHODS, APPARATUS AND PROGRAMS FOR GENERATING AND UTILIZING CONTENT SIGNATURES - The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method of generating a fingerprint associated with a content item including: pseudo-randomly selecting a segment of the content item; and utilizing a processor or electronic processing circuitry, fingerprinting the selected segment of content item as at least an identifier of the content item. Of course, other claims and combination are provided as well. | 03-29-2012 |
20120179914 | Digital Watermark Key Generation - This disclosure relates to message encoding. One claim recites a digital watermark key generation method in which the key providing security for a plural-bit message. The method comprises: providing a plural-bit seed; randomizing the plural-bit seed; using a programmed electronic processor for encoding the randomized plural-bit seed with convolutional encoding, the encoded seed comprising a key; and transforming an independent message with the key, the independent message to be used in a digital watermark encoding process. Of course, other claims and combinations are provided too. | 07-12-2012 |
20120179951 | Digital Watermark Key Generation - This disclosure relates to message encoding. Once claim recites an apparatus comprising: electronic memory for buffering identifying data associated with an entity or client; and a multi-purpose electronic processor programmed for: modifying the identifying data with a random or pseudo-random signal; error correction encoding the modified identifying data; and transforming a plural-bit message with the error correction encoded, modified identifying data to produce a key for use with message encoding. Of course, other claims and combinations are provided as well. | 07-12-2012 |
20130337825 | Space Time Calibration for Networks Using State Model of Node Clock Parameters - A space time calibration method determines location and timing for nodes in a network using a model of the state of clocks in the network nodes and observations of clock count stamps over an observation interval. At least one of the nodes in the network is moving, and the nodes have free running clocks, with corresponding clock error parameters. The method obtains observations of clock stamps for transmissions between nodes occurring over a time interval. It applies the observations to a model of network state, and generates from the model an update of network state. This update is a function of the observations and an estimate of the network state. The network state provides estimates of location parameters and clock parameters of the nodes in the network. | 12-19-2013 |
20140141815 | SYSTEMS AND METHODS FOR LOCATING A MOBILE DEVICE WITHIN A CELLULAR SYSTEM - A system for determining location and timing information in a cellular network includes a space-time calibration unit (SCU) and a plurality of nodes in communication with the SCU. Each node includes a node ping driver that receives frame synchronization information from a respective subset of cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local node clock. The system also includes a user handset that includes a handset ping driver that receives the frame synchronization information from a serving cell site and one or more neighbor cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local handset clock. The SCU uses the information from the node and handset ping drivers to determine a handset location. | 05-22-2014 |
20140159959 | BODY-WORN PHASED-ARRAY ANTENNA - Several (in some cases many dozen) small antennae are integrated into or over a full body suit or clothing. These antennae preferably include an intra-suit or clothing wired connection to one or more small Ultra-Wide-Band (UWB) radios, e.g., in the 3-10 GHz range. In some cases, each antenna connection includes a variable delay, e.g., a few nanoseconds with picoseconds-scale resolution on the delays, thus allowing for the body-suit ensemble to act as a directional phased-array. One claim recites a radio wearable by a human comprising: a phased-array antenna including a plurality of antennae, the array being configured for wearing over or on a human body, the plurality of antennae provided for spatially positioning in multiple different regions over or on the human body; an RF radio; and a controller configured for: i) determining relative spatial position information for antennae within the phased-array antenna; and ii) using at least the relative spatial position information, controlling the radio to produce a directional UWB beam through the phased-array antenna. Another claim includes an antenna having a plurality of metamaterial elements. Of course, other claims and combinations are provided as well. | 06-12-2014 |
20140161254 | MESSAGE KEY GENERATION - The disclosure relates to message encoding. One claim recites an apparatus comprising: electronic memory for storing a plural-bit message; an electronic processor programmed for: obtaining a multi-bit seed; transforming the multi-bit seed by applying randomizing process; and encoding the transformed multi-bit seed with convolutional encoding, the encoded seed comprising a key for transforming the plural-bit message, the key providing security for the plural-bit message. Of course, other claims and combinations are provided too. | 06-12-2014 |
20140244514 | METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS AND TRANSACTIONS - The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites portable device comprising: a touch screen display; a video camera; a microphone for capturing ambient audio; memory for storing an image, and for storing components of a virtual wallet; and one or more processors. The one or more processors are configured for: controlling the video camera to capture imagery corresponding to a checkout terminal's display, the display displaying imagery including digital watermarking information hidden therein, the information including transaction information; processing captured imagery to decode the digital watermarking to obtain the transaction information; receiving user input corresponding to payment information included in a component of the virtual wallet; controlling communication with a remotely located third party, so that the transaction information and payment information are provided to the third party; outputting a request for user confirmation based on a request received from the third party; and controlling communication with the remotely located third party so that a user confirmation is provided to the third party. A great variety of other features, arrangements and claims are also detailed. | 08-28-2014 |
20140293091 | SENSOR-SYNCHRONIZED SPECTRALLY-STRUCTURED-LIGHT IMAGING - A smartphone is adapted for use as an imaging spectrometer, by synchronized pulsing of different LED light sources as different image frames are captured by the phone's CMOS image sensor. A particular implementation employs the CIE color matching functions, and/or their orthogonally transformed functions, to enable direct chromaticity capture. A great variety of other features and arrangements are also detailed. | 10-02-2014 |
20150055855 | LEARNING SYSTEMS AND METHODS - A sequence of images depicting an object is captured, e.g., by a camera at a point-of-sale terminal in a retail store. The object is identified, such as by a barcode or watermark that is detected from one or more of the images. Once the object's identity is known, such information is used in training a classifier (e.g., a machine learning system) to recognize the object from others of the captured images, including images that may be degraded by blur, inferior lighting, etc. In another arrangement, such degraded images are processed to identify feature points useful in fingerprint-based identification of the object. Feature points extracted from such degraded imagery aid in fingerprint-based recognition of objects under real life circumstances, as contrasted with feature points extracted from pristine imagery (e.g., digital files containing label artwork for such objects). A great variety of other features and arrangements—some involving designing classifiers so as to combat classifier copying—are also detailed. | 02-26-2015 |