Tuesdays the PTO issues new patents. Both of today's Spotlight Patents concern aspects of digital fingerprinting. Assigned to Workshare Technology, the first patent addresses techniques for preventing unauthorized disclosure of secure information using image fingerprinting. Assigned to Microsoft, the second patent addresses techniques for cloud-based content inspection for mobile devices.
8,620,020, "Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting," assigned to Workshare Technology.
The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment, methods and systems to generate image fingerprints are provided. The fingerprints are generated for each feature point of an image data. Because the fingerprints take into account the neighborhood features around each feature point, the image fingerprints are robust against derivative images where the original image may have been altered. Methods and systems to maintain a fingerprint database for an organization's secure image data is also provided. In one embodiment, client fingerprints are generated for image data that a user intends to transmit outside of the organization. In some embodiments, suitable security actions are initiated if any of the client fingerprints match any of the fingerprints in the fingerprint database.
8,621,630, "System, method and device for cloud-based content inspection for mobile devices," assigned to Microsoft.
A content inspection system provides cloud-based content inspection for mobile devices. The content inspection system includes a content inspection server for receiving a request providing a digital fingerprint of content for evaluation for threats and a data reputation services server for maintaining a threat database. The content inspection system communicates with the mobile device using a service oriented architecture web services based on exchanges of messages between agents of the content inspection system and the mobile device. The content inspection server authenticates the received request belongs to a subscriber, and once the request is authenticated, the data reputation services server operates on the request to determine whether content identified by the digital fingerprint matches pre-existing claims in the threat database. The content inspection system generates a threat evaluation response for the mobile device based on reviewing the threat database for pre-existing claims.