Every Thursday the USPTO publishes new patent applications. Both of today's Spotlight applications address optical disc content security. Assigned to Vobile, the first application discloses techniques for fingerprinting and identifying digital versatile disc (DVDs). Assigned to CRI, the second application discloses a content security layer providing long-term renewable security that includes content watermarking.
20080040807, "Systems And Methods Of Fingerprinting And Identifying Digital Versatile Disc," assigned to Vobile.
Systems and methods are provided for identifying a video object using digital fingerprints. The digital fingerprints are generated from information extracted from the video object including encoded video. The digital fingerprints can be calculated in a manner that permits identification of both the video object and operational characteristics of the video object based on matching calculated digital fingerprints with known fingerprints of known video objects. Systems and methods are described that allow a DVD to be uniquely identified and identify whether the DVD is original, copied or pirated. Systems and methods are described for computing digital fingerprints from strings of bits in which certain additional data is optionally embedded. Systems and methods are described that permit media players to access known signatures of known video objects maintained on one or more databases and to identify video objects presented for playing on the media player.
20080037781, "Content security layer providing long-term renewable security," assigned to Cryptography Research, Inc.
In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player. Features to enable migration from legacy formats are also provided.