Thursdays the USPTO publishes new pending patent applications. Both of today's Spotlight Applications address aspects of digital fingerprinting. Assigned to Akamai, the first application discloses techniques for generating fingerprints based on information extracted by a content delivery network server. Assigned to Microsoft, the second application discloses techniques for cloud-based content inspection for mobile devices.
20120324227, "System For Generating Fingerprints Based On Information Extracted By A Content Delivery Network Server," assigned to Akamai Technologies.
A dynamic multimedia fingerprinting system is provided. A user requests multimedia content from a Web cache server that verifies that the user is authorized to download the content. A custom fingerprint specific to the user is generated and dynamically inserted into the content as the content is delivered to the user. The custom fingerprint can be generated on the Web cache server or at the content provider's server. The system allows a content provider to specify where the custom fingerprint is inserted into the content or where the fingerprint is to replace a placeholder within the content.
20120324581, "System, Method and Device for Cloud-Based Content Inspection for Mobile Devices," assigned to Microsoft.
A content inspection system provides cloud-based content inspection for mobile devices. The content inspection system includes a content inspection server for receiving a request providing a digital fingerprint of content for evaluation for threats and a data reputation services server for maintaining a threat database. The content inspection system communicates with the mobile device using a service oriented architecture web services based on exchanges of messages between agents of the content inspection system and the mobile device. The content inspection server authenticates the received request belongs to a subscriber, and once the request is authenticated, the data reputation services server operates on the request to determine whether content identified by the digital fingerprint matches pre-existing claims in the threat database. The content inspection system generates a threat evaluation response for the mobile device based on reviewing the threat database for pre-existing claims.