On Thursdays the USPTO publishes new pending patent applications. Today's Spotlight Applications concern digital watermarking and digital fingerprinting. Assigned to Dolby Laboratories, the first application discloses media fingerprints that reliably correspond to media content with projection of moment invariants. Assigned to Auckland Uniservices (AZ), the second application discloses software watermarking techniques.
20110216937, "Media Fingerprints that Reliably Correspond to Media Content with Projection of Moment Invariants," assigned to Dolby Laboratories.
A portion of media content is accessed. Components from a first and each subsequent spatial regions of the media content are sampled. Each spatial region has an unsegmented area. Each subsequent spatial region includes those within its area as elements thereof or the spatial regions may partially overlap. The regions may overlap independent of a hierarchical relationship between the regions. A media fingerprint is derived from the components of each of the spatial regions, which reliably corresponds to the media content portion, e.g., over geometric attacks such as rotation.
20110214188, "Software watermarking techniques," assigned to Auckland Uniservices Limited (AZ).
A method and system for watermarking software is disclosed. In one aspect, the method and system include providing an input sequence and storing a watermark in the state of a software object as the software object is being run with the input sequence. In another aspect, the method and system verify the integrity or origin of a program by watermarking the program. The watermark is stored as described above. In this aspect, the method and system also include building a recognizer concurrently with the input sequence and the watermark. The recognizer can extract the watermark from other dynamically allocated data and is kept separately from the program. The recognizer is adapted to check for a number. In another aspect, the software is watermarked by embedding a watermark in a static string and applying an obfuscation technique to convert the static string into executable code. In another aspect, the watermark is chosen from a class of graphs having a plurality of members and applied to the software. Each member of the class of graphs has at least one property that is capable of being tested by integrity-testing software.