Thursdays the PTO publishes new pending patent applications. Today's Spotlight Applications concern aspects of digital watermarking and digital fingerprinting. Assigned to Tencent Technology (CN), the first application discloses techniques for enabling an interactive program associated with a live broadcast on a mobile device. Assigned to Xsette Technology, the second application discloses digital watermarking for secure transmission between a source component and a node device.
20140325354, "Enabling an interactive program associated with a live broadcast on a mobile device," assigned to Tencent Technology (CN).
Abstract
A method of providing an interactive content to a prospective user at a mobile device, the mobile device including a non-transitory computer readable medium including a computer executable program code and a processor for executing the computer executable program code is described. The method includes steps for initiating capture of an audio stream by shaking the mobile device; capturing the audio stream via a microphone in the mobile device; converting the captured audio stream into an audio fingerprint; sending the audio fingerprint to a server; receiving the interactive content from the server if there is a match between audio fingerprints stored on the server, and the audio fingerprint sent by the mobile device; and displaying the interactive content on the mobile device.20140325233, "Digital watermarking for secure transmission between a source component and a node device," assigned to Xsette Technology, Inc.
Abstract
A system and method for embedding a watermark into a data file and communicating the data file to a particular node from a source component is described. The system includes a particular node, a source component, a node identifier request, a query, a watermark, a permutation key, an encrypted data file, and a node decryption key. The node identifier request is communicated from the source component to the particular node. The watermark is then embedded into the data file by the source component. The permutation key is configured to permute the watermark and the permutation key is changed so the location of the watermark changes. The encrypted data is decrypted at the particular node with the node decryption key that corresponds to the particular node. The particular node recovers the watermark from the data file with the permutation key.