Patent application number | Description | Published |
20080270801 | Watermarking a Media Signal by Adjusting Frequency Domain Values and Adapting to the Media Signal - A method of imperceptibly embedding a code signal in a media signal encodes auxiliary information in frequency components of the media signal. This method forms a code signal comprising a plurality of frequency components. The method embeds the code signal into the media signal by adjusting the frequency component relative to a neighboring component. The method changes selection of the plurality of frequency components corresponding to the codes signal for different instances of embedding the code signal in the media signal. The code signal may be used to encode a combination of fixed and variable message information in audio and image signals, including video. In one application, the attributes of the code signal are measured to determine broadcast signal quality. In another, the code signal robustly carries auxiliary information in distribution channels where distortion is common, such as compression, broadcast distortion, packet loss, digital to analog conversion, and ambient air transmission. | 10-30-2008 |
20080275906 | Content Indexing and Searching Using Content Identifiers and Associated Metadata - A method of indexing content for network searching comprises obtaining media content signals stored on a computer network; deriving content identifiers from the content signals; using the content identifiers to obtain metadata used to classify the media content signals; and creating a searchable index of the media content signals based on the metadata, wherein users access the searchable index on the distributed computer network to submit a search query for the searchable index to retrieve links to the media content signals. | 11-06-2008 |
20080279536 | TRANSMARKING OF MULTIMEDIA SIGNALS - The presently claimed invention relates generally to digital watermarking and data hiding. One claim recites a method including: receiving data representing video, the data comprising at least first digital watermarking embedded therein; decoding the first digital watermarking embedded in the data to obtain a first identifier; and then converting the data into low bandwidth Internet video; and embedding at least the first identifier with digital watermarking into converted low bandwidth Internet video, the identifier identifying at least the video. Another claim recites a method including obtaining data representing at least video; analyzing the data to determine whether a first digital watermark is present in the data; if the first digital watermark is present in the data, embedding a second digital watermark in the data, the second digital watermark is more robust to an anticipated transformation relative to the first digital watermark; and then transforming the data according to the anticipated transformation. Of course, other combinations are described, enabled and claimed as well. | 11-13-2008 |
20090031134 | Digital watermarking with variable orientation and protocols - A method of digital watermarking selects a mapping of a digital watermark to audio or video content and an embedding gain to produce uniquely watermarked copies for distribution. The embedding method is implemented at points of distribution, including content servers or receivers. By applying varying mapping protocols and random gain, the digital watermark uniquely serializes copies. It also has a structure and embedding configuration that minimizes the effectiveness of collusion, averaging and over-embedding attacks. | 01-29-2009 |
20090074241 | Steganographic Systems and Methods - The present invention relates to steganographic systems and methods. Once claim recites a method including: obtaining video content, wherein the video content comprises a steganographic signal embedded in picture elements of the video content, with multiple instances of the steganographic signal embedded in the picture elements of the video content, the steganographic signal comprising a plural-bit identifier that is uniquely associated with an intended recipient of the video content; encrypting—utilizing a processor or electronic processing circuitry—the video content with an encryption key that comprises mathematical relationship to the plural-bit identifier that is uniquely associated with the intended recipient of the video content; obtaining a decryption key that comprises a cryptographic relationship to the encryption key; communicating the encrypted video content and the decryption key to the intended user of the video content; and maintaining an association of the plural-bit identifier with the intended recipient. Other claims and combinations are provided as well. | 03-19-2009 |
20090077604 | Connected Video and Audio - The presently claimed invention relates to connecting video and audio signals to audio-video content. One claim recites a method including: receiving data at a server, the data representing picture elements of a video signal or audible portions of an audio signal, the data having been communicated from a remotely located handheld device; at the server, using a processor to derive an identifier from the data; obtaining a link or an address pointer from a database or registry using at least the identifier, the link or address pointer linking or pointing to audio-visual content which is stored at a location remotely located from the server, the audio-visual content being associated with the video signal or with the audio signal; communicating the link or the address pointer to the remotely located handheld device, whereby the remotely located handheld device is provided access the audio-video content with the link or the address pointer. Of course, other combinations and claims are provided as well. | 03-19-2009 |
20090080694 | Deriving Multiple Identifiers from Multimedia Content - The presently claimed invention relates generally to content identification, such as deriving identifiers from content itself. One claim recites a method including: using a processor, deriving first information from audio elements of an audio signal; using a processor, deriving second information from data representing picture elements of a video signal that is associated with the audio signal; and utilizing the first information or the second information in a content filtering process, said process utilizes a recognition unit or device to sample content being distributed on a network, and controls further distribution of the content in the network based at least in part on the first information or the second information. Of course, other combinations and claims are provided as well. | 03-26-2009 |
20090089586 | Methods, Apparatus and Programs for Generating and Utilizing Content Signatures - The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method of generating a fingerprint associated with a content item including: pseudo-randomly selecting a segment of the content item; and utilizing a processor or electronic processing circuitry, fingerprinting the selected segment of content item as at least an identifier of the content item. Of course, other claims and combination are provided as well. | 04-02-2009 |
20090089587 | Methods, Apparatus and Programs for Generating and Utilizing Content Signatures - The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method comprising: obtaining a sequence of content identifiers, the sequence of content identifiers corresponding to one or more segments of a media signal; and utilizing at least a processor or electronic processing circuitry, carrying out a convolution operation based on the sequence of content identifiers and content signatures housed or stored in a database to identify the media signal. Of course, other claims and combination are provided as well. | 04-02-2009 |
20090129627 | DIGITAL WATERMARKING SYSTEMS AND METHODS - The present invention relates to watermarking of compressed audio or video files. One claim recites a method including: obtaining a copy of a compressed audio or video file; decompressing the compressed audio or video file to yield decompressed audio or video content; determining a first watermarking component for the decompressed audio or video content, the first watermarking component intended to be steganographically hidden in the audio or video content; storing the first digital watermarking component separately from the compressed audio or video file; and then providing the stored first watermarking component, a unique plural-bit watermark identifier, and the compressed audio or video file to a remote location. Other claims and combinations are provided as well. | 05-21-2009 |
20090158318 | Media Methods and Systems - Several novel watermarking and fingerprinting applications—and related improvements—are disclosed. Some relate to advertising. These include techniques for replacing broadcast advertising with other advertising; inserting advertising based on a viewer's ad-viewing history; triggering insertion of advertising based on fingerprint data derived from compressed video content; and discontinuing advertising when a threshold amount of advertising has apparently been viewed. A great number of other features and technologies are also detailed. | 06-18-2009 |
20090177742 | Methods and Systems Employing Digital Content - The presently claimed invention relates to methods and system employing digital content. One claim recites a method including: receiving indentifying data from a remotely located handheld device, the remotely located handheld device utilizing a multi-purpose electronic processor to extract the identifying data from data representing audible portions of an audio signal, the handheld device having captured the audio signal with a microphone; using the identifying data to identify a song corresponding to the audio signal; providing a tag including information pertaining to the song to an online-based music library associated with the remotely located handheld device or a user of the remotely located handheld device. A variety of other claims and combinations are also provided. | 07-09-2009 |
20090187435 | SECURITY METHODS EMPLOYING DRIVERS LICENSES AND OTHER DOCUMENTS - Driver's licenses and other security documents include one or more machine-readable features, each conveying plural bits of information. These features are used in a variety of ways to increase security, and/or to enhance functionality. In one embodiment, data encoded on a driver's license is used at airport check-in, to link to a state DMV database and obtain information by which the document, and its custodian, can be authenticated. In like fashion, a license can be used to authenticate a bearer and/or his/her age prior to the sale of alcohol or tobacco products. In other embodiments, different elements of a driver's license (e.g., the substrate, photo, text data, and machine-readable data) are logically bound together (e.g., interlinked through payloads conveyed by different machine-readable features) as a deterrent against counterfeiting. Driver's licenses can be similarly logically bound to personal checks and other documents. Many other arrangements are also disclosed. | 07-23-2009 |
20090262975 | Deriving or Calculating Identifiers From Video Signals - The present invention relates generally to processing video signals. One claim recites a method including: utilizing a multi-purpose electronic processor programmed for analyzing a video signal to derive or calculate an identifier from data representing picture elements of the video signal or from data representing audio accompanying the video signal; providing the identifier to electronic memory or to a remote repository to obtain advertizing information; receiving advertizing information from the electronic memory or the remote repository; and controlling rendering of the advertizing information such that the advertizing information is synchronized with at least a portion of the video signal when rendered. Of course, other combinations and claims are provided as well. | 10-22-2009 |
20090279735 | Method and Apparatus for Embedding Auxiliary Information within Original Data - This patent application is generally related to watermarking and steganography. One claim recites a method of transmarking a media signal previously embedded with a first digital watermark using a first digital watermark embedding method. The method includes: utilizing a programmed electronic processor, detecting the first digital watermark in the media signal; converting the media signal to a different format; utilizing a programmed electronic processor, embedding detected message information from the first digital watermark into a second digital watermark in the converted media signal such that the second digital watermark is adapted to robustness or perceptibility parameters associated with the new format. Of course, other combinations and claims are provided as well. | 11-12-2009 |
20100009722 | Connected Audio and Other Media Objects - Various signal processing methods and apparatus are provided. One claim recites a method of linking media to a network resource. The method includes: computing, with an electronic processor on a handheld device, attributes of media used to identify the media; providing, from the handheld device, computed attributes of the media to a network resource, wherein the network resource uses the computed attributes of the media to identify the media or metadata associated with the media; receiving, at the handheld device, metadata associated with the identified media in the network resource. Of course, other combinations and claims are provided as well. | 01-14-2010 |
20100027837 | Extracting Multiple Identifiers from Audio and Video Content - The presently claimed invention relates generally to content identification, such as extracting identifying information from content itself. One claim recites a method including: extracting first identifying information from data representing audio elements of an audio signal, said act of extracting first identifying information from data representing audio elements of the audio signal utilizes a programmed electronic processor; extracting second identifying information from data representing picture elements of a video signal that is associated with the audio signal, said act of extracting second identifying information from data representing picture elements of the video signal utilizes a programmed electronic processor; and utilizing the first identifying information or the second identifying information in a synchronization process, said synchronization process controls content synchronization during rendering of the audio signal or the video signal. Of course, other combinations and claims are provided as well. | 02-04-2010 |
20100029380 | Interactive Gaming Objects - A method for operating an electronic gaming system captures an image of a gaming object, extracts identifying information from the image of the gaming object, and uses the extracted identifying information to reference a database to determine a behavior associated with the identifying information. The method returns data to the gaming system to execute or control the behavior of the gaming system in response to the gaming object. Various system configurations for this method as well as unique applications of it are also disclosed. | 02-04-2010 |
20100067737 | Steganographic Systems and Methods - The present invention relates to steganographic systems and methods. One claim recites an apparatus including: electronic memory to buffer a compressed digital watermark object, the digital watermark object is a separate object relative to a compressed video object; and an electronic processor. The electronic processor is programmed for: decompressing the compressed video object to yield a decompressed video object, the decompressed video object comprising data representing video picture elements and data representing audio elements; decompressing the digital watermark object to obtain digital watermark data; steganographically hiding the digital watermark data in the data representing video picture elements or in the data representing audio elements to yield digital watermarked video or audio; and rendering the digital watermarked video or audio. Other claims and combinations are provided too. | 03-18-2010 |
20100161654 | Integrating and Enhancing Searching of Media Content and Biometric Databases - Metadata for a content signal is searched by transforming the content signal into different hash formats, each being used to retrieve identifying information from corresponding databases. The identifying information enables retrieval of metadata from metadata databases. These systems and methods enable devices to access a wide array of dynamic metadata from disparate sources through queries that are derived from intrinsic content attributes. | 06-24-2010 |
20100169984 | METHOD AND APPARATUS FOR CONTENT MANAGEMENT - The present application relates generally to content management (e.g., managing audio and video items in portable devices). One claim recites a method including: utilizing electronic memory housed in a portable device, maintaining a listing of up to N identifiers associated with previously accessed audio or video items, where N is an integer, and where each previously accessed audio or video item has an identifier associated therewith; utilizing a programmed electronic processor housed in the portable device, restricting access to a new audio or video item if: i) an identifier associated with the new content item is one of the N identifiers associated with the previously accessed audio or video items, or ii) less than N audio or video items have been accessed within a predetermined time. Of course, other claims and combinations are provided as well. | 07-01-2010 |
20100202653 | Watermarking Systems and Methods - Various improvements and applications for digital watermarking technology are detailed. One concerns techniques for making watermarks resistant to malicious attacks. Another involves using digital watermarking with ID cards and credentials, such as a watermarked driver's license conveying a user's cryptographic PKI. Still another uses digital watermarks in connection with automated compliance audits for corporate users of electronic content. A variety of other technologies are also detailed. | 08-12-2010 |
20100205445 | WATERMARK SYSTEMS AND METHODS - Various improvements relating to digital watermarking and related technologies are detailed, including methods that enhance security and functionality, and new articles including watermarked puzzles and marked DNA. | 08-12-2010 |
20100208975 | Multi-Channel Digital Watermarking - The present disclosure provides digital watermarks through multiple channels. The channels may include, e.g., visible, ultraviolet and infrared channels, or be based on predetermined materials. The non-visible channels can be selected to fluoresce either in the visible or IR/UV spectrums upon the appropriate illumination in the infrared or ultraviolet spectrums. The watermarks in the various multiple channels can cooperate to facilitate watermark detection or to authenticate an object in which the watermarks are embedded. In other implementations the multiple watermarks include so-called orientation components. A relative relationship between the orientation components is used to convey data. Of course, other combinations are provided too. | 08-19-2010 |
20100226525 | Processing Audio or Video Content with Multiple Watermark Layers - The present invention relates generally to audio and video processing, e.g., with digital watermarking. One claim recites an apparatus including: electronic memory for buffering data representing audio or video, and an electronic processor. The electronic processor is programmed for: (i) controlling receipt of data representing audio or video, the data representing audio or video comprising at least two digital watermark layers, the first watermark layer comprising a content identifier which uniquely identifies the content, and the second watermark layer comprising a distributor identifier which identifies a distributor or distribution channel associated with the content; and (ii) embedding a third watermark layer in the audio or video, in which the third watermark layer is embedded through alterations to data representing audible portions of the audio or through alterations to data representing video picture elements of the video, and in which each of the first watermark layer, the second watermark layer and the third digital watermark layer are embedded in the audio or video content with different watermark protocols or different watermark keys. Of course, other claims are provided as well. | 09-09-2010 |
20100268661 | Recommendation Systems - This invention deals with recommendation systems. The first embodiment is an off-the-shelf recommendation system is described, where it is easy to integrate with the website database and uses a web service for recommendations, as well as easy to integrate with email. The system receives client ID, item ID and user ID, and returns recommended item IDs. The recommendations include similar items, related items, related users, items likely to be acted upon by a given user (labeled likely items), and users likely to act upon an item (labeled likely users). The recommendations include categorical training, where recommended items are based upon similar categories, where the category types include as product type and brand. The recommendations include similar-to-related training, where similar items are used to find related items. These two intelligent methods work for items with no, few or numerous actions. | 10-21-2010 |
20100281545 | Using Embedded Data with File Sharing - Peer-to-peer file sharing is increasing in popularity on the Internet, faster than any product known in history. Although file-sharing can enable massive piracy, it has many advantages for distribution of information including scalability. Alternatively, file-sharing can be sabotaged with falsified files and used to distribute viruses. To this end, a solution that maintains the scalability of file-sharing and promotes reliability is proposed. The solution involves embedding data within the file or content and using the data to identify the content, demonstrate its completeness and lack of viruses, and verify the file can be shared. The embedded data can be checked when the file is registered with the database for sharing, and before or while the file is being uploaded and/or downloaded. Ideally, the embedded data is added at the time of creation for the file. The embedded data may include a watermark and be linked to other copy management systems, such as those proposed in DVD and SDMI. Finally, the embedded data can be used to enable purchases of files that owners do not have rights to share. | 11-04-2010 |
20100303284 | Signal Hiding Employing Feature Modification - Aspects of the present disclosure relate generally to methods and systems for signal hiding using feature modulation. One claim recites a method comprising: obtaining data representing a media signal; analyzing the data to determine features of the media signal; using a programmed electronic processor, modifying determined features to hide a signal in the data; and modifying the data to include a characteristic to facilitate later detection of the signal. In some case the features may include statistical features of the media signal. Of course, other claims and combinations are provided too. | 12-02-2010 |
20100306257 | CONTENT IDENTIFICATION AND MANAGEMENT IN CONTENT DISTRIBUTION NETWORKS - Peer-to-peer file sharing and uploading of content to content server systems is increasing in popularity on the Internet. Content signals can be edited and combined with other content programming, and or altered in ways that make it difficult to identify using conventional techniques. Content identification based on content fingerprints is used to retrieve related metadata, which in turn, is used to manage use of the content signal in content distribution systems. The content signal is uploaded to a computer within a network of computers in the content distribution system. A content fingerprint of the content signal is computed and sent to a database to look up related metadata. The metadata is received and used to manage use of the content signal in the content distribution system based on the metadata. This can include blocking uploading or rendering of audio or video, controlling streaming of audio or video, linking to a licensing server, which provides usage control rules, etc. | 12-02-2010 |
20100313278 | ASSOCIATING FIRST AND SECOND WATERMARKS WITH AUDIO OR VIDEO CONTENT - The present invention relates generally to processing audio or video content. One claim recites an apparatus comprising: electronic memory, and an electronic logic processor. The electronic memory is for storing data representing audio or video content, in which the data includes a protect watermark embedded therein, the protect watermark providing an indication that the data is protected, and in which the data further includes a rights watermark embedded in the data, the right watermark providing an indication of user rights associated with rendering the audio or video content, the protect watermark being more difficult to remove from the data relative to the rights watermark. The electronic logic processor is programmed for analyzing the data to retrieve the protect watermark only when the rights watermark does not exist in the data. Other claims are described and provided as well. | 12-09-2010 |
20110022937 | Assessing Quality of Service Using Digital Watermark Information - The disclosure details methods of measuring the quality of service of received media signals by analyzing digital watermarks embedded in such signals. The quality of a received video or audio signal can thereby be assessed without having the original version of the signal before transmission. Instead, the strength or quality of the embedded digital watermark is analyzed to determine the quality of the received signal. The degradation of a watermark signal is used to assess quality of service of signals, such as audio and video. Several other features and arrangements are also detailed. | 01-27-2011 |
20110176706 | WATERMARK PAYLOAD ENCRYPTION FOR MEDIA INCLUDING MULTIPLE WATERMARKS - A media signal is analyzed for an expected error rate. Data is steganographically encoded in the media signal using an amount of error robustness coding that is determined based in part on the expected error rate. To decode the data from the media signal, the media signal is analyzed to determine an expected error rate. The steganographically encoded data is decoded using an amount of error robustness coding that is determined based in part of the expected error rate. | 07-21-2011 |
20110181036 | Color Laser Engraving - The present disclosure relates generally to color laser engraving. One claim recites a method of color laser exposing a document, the document comprising a multi-layer structure including a surface layer and one or more sub-layers, the one or more sub-layers including coloring, said method comprising: receiving the document; and selectively providing openings in the surface layer with a laser to expose one or more of the sub-layers, wherein the coloring is perceptible through the openings, and in which the coloring comprises a plurality of different colors arranged in a grouping, with the one or more sub-layers comprising repeated instances of the grouping. Of course, other claims are provided too. | 07-28-2011 |
20110182564 | Recoverable Digital Content Degradation - The disclosure relates generally to processing audio and video signals. One claim recites an apparatus comprising: electronic memory for storing a media signal, the media signal comprising degradation introduced through use of a key, in which the key corresponds to detection criteria in the media signal, and in which the degradation comprises human perceptible degradation, the media signal further comprising the key embedded therein; and a processor programmed for: analyzing the media signal to obtain the key; and removing some of the degradation through use of the key, in which said removing utilizes different detection criteria relative to a process that introduced the degradation into the media signal. Of course, other claims and combinations are provided too. | 07-28-2011 |
20110194730 | CONTROL SIGNALS IN STREAMING AUDIO OR VIDEO INDICATING A WATERMARK - Methods and apparatuses for searching for a control signal in streaming video or streaming audio that indicates the presence of a watermark in the streaming video or streaming audio. The streaming video or streaming audio is received and searched for a control signal. The detection of a control signal indicates the presences of a digital watermark in the streaming video or streaming audio. An indicator is triggered based upon detecting the control signal. | 08-11-2011 |
20110282821 | Further Improvements in Recommendation Systems - This invention deals with improving recommendation systems. The first embodiment combines rules and recommendations to create automated and intelligent business rules for recommendations. The second embodiment improves recommendations by combining the results of driver products and influencer products, where influencer products only influence the recommendations of the driver products. Influencer products can be related to a specific user. The third embodiment improves recommendations for new items by relating them to original items, such that the sales for the original item is used in the new item when calculating recommendations. The new items may replace the original item, or be a similar item and exist alongside the original item. | 11-17-2011 |
20120076348 | METHODS, APPARATUS AND PROGRAMS FOR GENERATING AND UTILIZING CONTENT SIGNATURES - The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method of generating a fingerprint associated with a content item including: pseudo-randomly selecting a segment of the content item; and utilizing a processor or electronic processing circuitry, fingerprinting the selected segment of content item as at least an identifier of the content item. Of course, other claims and combination are provided as well. | 03-29-2012 |
20120128198 | Watermarking Systems and Methods - Various improvements and applications for digital watermarking technology are detailed. One concerns techniques for making watermarks resistant to malicious attacks. Another involves using digital watermarking with ID cards and credentials, such as a watermarked driver's license conveying a user's cryptographic PKI. Still another uses digital watermarks in connection with automated compliance audits for corporate users of electronic content. A variety of other technologies are also detailed. | 05-24-2012 |
20120134528 | Method and Apparatus for Embedding Auxiliary Information within Original Data - This patent application is generally related to watermarking and steganography. One claim recites a method of transmarking an audio or video signal previously embedded with a first digital watermark using a first digital watermark embedding method. The method includes: utilizing a programmed electronic processor, decoding the first digital watermark from the audio or video signal; converting the audio or video signal into a different form; and utilizing a programmed electronic processor, embedding decoded message information from the first digital watermark into a second digital watermark in the different form such that the second digital watermark is adapted to robustness or perceptibility parameters associated with the different form. Of course, other combinations and claims are provided as well. | 05-31-2012 |
20120288135 | Multi-Channel Digital Watermarking - The present disclosure relates generally to digital watermarking including watermarking conveyed through multiple channels. One claim recites a method to detect digital watermarks carried in different channels of a physical object. The method comprising: receiving first optically captured image data, the first optically captured image data corresponding to a first channel which is detectable with visible lighting; receiving second optically captured image data, the second optically captured image data corresponding to a second channel with is detectable in a first non-visible spectrum; receiving third optically captured image data, the third optically captured image data corresponding to a third channel with is detectable in a second non-visible spectrum; and using a programmed electronic processor, analyzing the first, second and third optically captured image data to detect watermark components embedded therein. Of course, other claims and combinations are provided too. | 11-15-2012 |
20120310726 | Digital Watermarking Applications - The disclosure relates generally to digital watermarking applications. One claim recites a method comprising: obtaining identifying information for a party seeking attribution for content to be distributed; using a programmed processor, digital watermarking the content with the identifying information; and associating an attribution action with the identifying information in a data repository; in which the attribution action is triggered when a rendering device decodes the digital watermarking and obtains the identifying information during a transaction, in which performing the attribution action does not occur when the content includes limited functionality for initial evaluation but said performing the royalty payment action does occur when the content is purchased or enabled for longer evaluation relative to the initial evaluation. Other claims and combinations are provided as well. | 12-06-2012 |
20120316986 | More Improvements in Recommendation Systems - This invention deals with more improvements in recommendation systems. Retailers want to grow their business and increase sales. One embodiment creates upsell by arranging similar items by price. Another embodiment creates similar items by calculating the number of shared attributes. A final embodiment shows how recently viewed items affect cross-sell, similar and personalized recommendations to make more relevant recommendations | 12-13-2012 |
20120317022 | Digital Watermarking Applications - The disclosure relates generally to methods and systems including, e.g.,: (1) steganographically embedding location information in image or audio content, where the location information is obtained from remote sources like a cell phone network or remote GPS receiver; (2) steganographically embedding participant IDs in content to ensure proper billing and royalty tracking; (3) providing fair-use content management based upon digital watermark-tracked usage; (4) providing micro-payments based upon watermarked objects for retailers; and/or (5) providing watermarked logon cards, such as watermarked hotel room keys, to better provide internet logon access control. Other systems and methods are provided as well. | 12-13-2012 |
20120324590 | Method and Apparatus for Content Management - The present disclosure relates generally to audio and video processing. One claim recites a portable apparatus comprising: electronic memory comprising one or more identifiers, each of the identifiers being associated with previously accessed audio or video items, with each previously accessed audio or video item including an identifier associated therewith; and a logic processor programmed for: a. restricting access to an encountered audio or video item if an identifier associated with the encountered audio or video item is one of the one or more identifiers associated with the previously accessed audio or video items, and b. limiting a number of content items with different user identifiers that can be accessed in a predetermined amount of time. Other claims and combinations are provided as well. | 12-20-2012 |
20130011002 | Methods and Apparatus for Robust Embedded Data - The present invention describes methods and apparatus involving embedding data. Data can be embedded steganographically in content or embedded in, e.g., headers associated with the content. One claim recites an apparatus including: a memory system for storing: i) content data comprising first information embedded therein; ii) second information which is separate from the content data, in which the second information is associated with a first user device and a second user device; and a logic processor. The logic processor is programmed for: decoding the first information from the content data; comparing the first information to the second information for correspondence; and based at least on the correspondence, determining whether to perform an action associated with the content data on either of the first user device or the second user device. Other claims and combinations are also provided. | 01-10-2013 |
20130011003 | Associating First and Second Watermarks with Audio or Video Content - The present invention relates generally to processing audio or video content. One claim recites an apparatus comprising: electronic memory for storing media representing audio or video content; and an electronic logic processor. The electronic processor is programmed for: embedding a protect watermark in the media, the protect watermark providing an indication that the media is protected; embedding a rights watermark in the media, the rights watermark providing an indication of user rights associated with rendering the audio or video content, in which the protect watermark is more difficult to remove from the media relative to the rights watermark; and reproducing the audio or video content after said embedding a protect watermark in the media and embedding a rights watermark in the media. Other claims and combinations are provided as well. | 01-10-2013 |
20130086466 | CONTENT SENSITIVE CONNECTED CONTENT - The disclosure describes a method of connecting multimedia content to a network resource. This method operates in a computer network environment. Operating in a network connected device, the method extracts an identifier from a media signal, such as from a digital watermark, perceptual hash, or other machine extracted signal identifier. It then sends the identifier to a network along with context information indicating device type information. From the network, the method receives related data associated with the media signal via the identifier. The related data is adapted to the network connected device based on the device type information. This device type information may include a display type, so that the related date may be formatted for rendering on the display type of the device. This device type information may also include a connection speed so that the related data may be optimized for the connection speed of the device. | 04-04-2013 |
20130198242 | CONTENT METADATA DIRECTORY SERVICES - A method of associating a content object with metadata uses a combination of a content identifier and a bounding identifier to enable handling of disparate sets of content identifiers for content objects with potentially conflicting content identifiers. The method receives a content identifier for a content object from among a set of content identifiers. It provides a unique bounding identifier for the set of content identifiers. This unique bounding identifier is used in combination with the content identifier to form a globally unique identifier for the content object. This globally unique identifier is associated with a metadata source, which enables routing of a user to the metadata source. | 08-01-2013 |
20130205209 | Content Identification, Personal Domain, Copyright Notification, Metadata and E-Commerce - Piracy of digital content is currently a large problem. Copyright notification and sales of metadata can help counteract the problem. The novel solution shows different methods to identify content, provide metadata, and manage content and metadata within a personal domain. | 08-08-2013 |
20130297727 | SYNCHRONIZING BROADCAST CONTENT WITH CORRESPONDING NETWORK CONTENT - This disclosure describes methods and systems for synchronizing broadcast and network content, such as web content. It also describes related technology for facilitating linking from broadcast content to related information and e-commerce on a network. One method detailed in this disclosure synchronizes broadcast content with dynamic network content at a network address. This method embeds an identifier in a broadcast, extracts the identifier embedded in broadcast content, and uses the identifier to identify corresponding network content. The method then posts the corresponding network content on a network device located at the network address (e.g., a web page at the URL of the broadcaster). The network device (e.g., web server) is responsive to requests sent to the network address to provide the network content over a network. Using this method, the broadcast content is synchronized with the corresponding network content. This approach enables the content at the broadcaster's fixed web site URL to change dynamically with the broadcast. This approach is transparent to the user, who simply visits the same URL to get more information about current programming or purchase a product currently advertised in current programming. | 11-07-2013 |
20140172627 | Next Generation Improvements in Recommendation Systems - This invention deals with the next generation improvements in recommendation systems. Retailers want to grow their business and increase sales. One embodiment displays recommendations for inside sales during calls to prospects via a CRM. Another embodiment improves genomic cross-sell by summing correlations between attributes. A third embodiment improves cross-channel personalization by linking personal information, preferably via a one-way hash, to a unique customer ID. A fourth embodiment enables a common core mobile app for different retailers. A fifth embodiment identifies a shopper before purchase to provide personal recommendations while shopping. A sixth embodiment utilizes a market place with shared customers for customer acquisition. A seventh embodiment utilizes customers' preferences and characteristics and sales data to influence recommendations. The characteristics can be combined into a shopper psychographic persona to generate recommendations. An eight embodiment is a market place for customers to shop, which is used for customer acquisition for participating retailers. A ninth embodiment shows how to improve search results based upon analysis of purchase data, and correlation of clicks on search results and search terms. A tenth embodiment calculates a buy index based upon value of products purchased versus products viewed to segment shoppers to determine discounts and re-marketing. An eleventh embodiment automates the creation of a dynamic website, usually for responsive design. | 06-19-2014 |
20140185861 | METHOD AND APPARATUS FOR EMBEDDING AUXILIARY INFORMATION WITHIN ORIGINAL DATA - This patent application is generally related to watermarking and steganography. One claim recites a method of transmarking an audio or video signal previously embedded with a first digital watermark using a first digital watermark embedding method. The method includes: utilizing a programmed electronic processor, decoding the first digital watermark from the audio or video signal, in which the decoding determines relationships or values associated with local masking opportunities of the media signal; converting the audio or video signal into a different form; and utilizing a programmed electronic processor, embedding decoded message information from the first digital watermark into a second digital watermark in the different form such that the second digital watermark is adapted to robustness or perceptibility parameters associated with the different form. Of course, other combinations and claims are provided as well. | 07-03-2014 |
20140314234 | RECOVERABLE DIGITAL CONTENT DEGRADATION - The disclosure relates generally to processing audio and video signals. One claim recites an apparatus comprising: electronic memory for storing a media signal, the media signal comprising degradation introduced through use of a key, in which the key corresponds to detection criteria in the media signal, and in which the degradation comprises human perceptible degradation, the media signal further comprising the key embedded therein; and a processor programmed for: analyzing the media signal to obtain the key; and removing some of the degradation through use of the key, in which said removing utilizes different detection criteria relative to a process that introduced the degradation into the media signal. Of course, other claims and combinations are provided too. | 10-23-2014 |
20140373164 | ASSOCIATING FIRST AND SECOND WATERMARKS WITH AUDIO OR VIDEO CONTENT - The present invention relates generally to processing audio or video content. One claim recites a system comprising: a portable device comprising storage and an electronic logic processor, the electronic logic processor configured for analyzing first content stored in said storage to detect a first class of watermarking hidden therein, the first class of watermarking comprising a link between the first content and a user, the first content further comprising a second class of watermarking, the second class of watermarking providing an indication that the first content is protected, in which the second class of watermarking is more difficult to remove from content relative to the first class of watermarking; and a software module for interacting with content files, said software module including instructions to cause an electronic logic processor to control transfer of the first content file to said portable device based on detection and interpretation of the second class of watermarking. Other claims and combinations are provided as well. | 12-18-2014 |