Thursdays the USPTO publishes new pending patent applications. Today's Spotlight Applications concern aspects of digital fingerprinting and digital watermarking. Assigned to Microsoft, the first application discloses techniques for dynamic rule reordering for message classification. Assigned to Verance, the second application discloses techniques for efficient and secure forensic marking in the compressed domain.
20120303624, "Dynamic rule reordering for message classification," assigned to Microsoft.
Embodiments are directed to generating a customized classification rule execution order and to identifying optimal ordering rules for previously processed data. In an embodiment, a computer system fingerprints a message received via a computer network. The fingerprinting identifies specific characteristics of the message. The computer system compares the message's fingerprint to various stored message fingerprints generated from previously received messages. The comparison determines that the fingerprint does not match the stored fingerprints. The computer system applies classification rules to the message according to a predetermined rule execution order to determine a classification for the message. The computer system then generates a customized classification rule execution order to order those classification rules that optimally identified the message's class at the top of the customized classification rule execution order.
20120300977, "Efficient and secure forensic marking in compressed domain," assigned to Verance Corporation.
Methods, devices, and computer program products enable the embedding of forensic marks in a host content that is in compressed domain. These and other features are achieved by preprocessing of a host content to provide a plurality of host content versions with different embedded watermarks that are subsequently compressed. A host content may then be efficiently marked with forensic marks in response to a request for such content. The marking process is conducted in compressed domain, thus reducing the computational burden of decompressing and re-compressing the content, and avoiding further perceptual degradation of the host content. In addition, methods, devices and computer program products are disclosed that obstruct differential analysis of such forensically marked content.