Thursdays the USPTO publishes new patent applications. Today's Spotlight patent applications concern fingerprinting and watermarking, which continue to be hot topics. Assigned to Philips, the first of today's Spotlight applications discloses techniques for generating and detecting fingerprints for synchronizing audio and video. Assigned to France Telecom, the second application discloses techniques for the protection and monitoring of content diffusion in a telecommunications network.
20080062315, "Method and Device for Generating and Detecting Fingerprints for Synchronizing Audio and Video," assigned to Philips.
This invention relates to a device and a method of generating a first and a second fingerprint (102,104) usable for synchronisation of at least two signals (101,103) and corresponding method and device for synchronising two or more signals. A fingerprint pair is generated on the basis of a segment of a first signal e.g. an audio signal and of a segment of a second signal e.g. a video signal at each synchronisation time point. The generated fingerprint pair(s) are stored in a database (203) and communicated or distributed to a synchronisation device (303). During synchronisation, fingerprint(s) of the audio signal and fingerprint(s) of the video signal to be synchronised are generated and matched against fingerprints in the database. When a match is found, the fingerprints also determine the synchronisation time point, which is used to synchronise the two signals. In this way, a simple, reliable and efficient way of synchronising at least two signals is obtained. Further, this is enabled without modifying either the first and second signal (or subsequent signals). The signals may even be distorted or changed to some extent while still enabling synchronisation.
20080059216, "Protection and Monitoring of Content Diffusion in a Telecommunications Network," assigned to France Telecom.
The invention relates to supervising the distribution of contents in a telecommunications network (R). A content contains data specific to a given acquisition of rights to the content, written in the form of a digital watermark (WM). During its transfer across an access network (RA), the content is analyzed to detect the presence of a digital watermark. The data specific to the acquisition is then extracted from the watermark and sent with data characteristic of the transfer in progress to central supervisory equipment (300) of the telecommunications network (R) in order to determine if the transfer in progress is legitimate.