New patents are issued by the USPTO on Tuesdays. Today's Spotlight Patents concern aspects of watermarking and digital fingerprinting. Assigned to Sharp (JP), the first of today's patents concerns techniques for using watermarks to copy control and image. Assigned to EMC, the second patent concerns techniques for metadata optimization for network replication using representative of metadata batch.
9,237,249, "Image processing apparatus, image forming apparatus, image processing method, and recording medium," assigned to Sharp Kabushiki Kaisha (JP)
An image processing apparatus includes a watermark adding section for adding a watermark for copy control to an image, where the watermark includes a dot pattern which becomes visible when copy, and a pattern adding section for adding a predetermined pattern to an appropriate position of an image, wherein the watermark adding section includes a watermark generating section for generating a watermark for copy control, where the watermark includes a dot pattern which becomes invisible when copy, a determining section for determining whether or not the pattern adding section adds the predetermined pattern to the image, when the generated watermark is added to the image, and a region setting section for setting a region where the predetermined pattern is to be appeared at a different portion where the dot pattern is added, when the determining section determines that the predetermined pattern is to be added to the image.
9,235,475, "Metadata optimization for network replication using representative of metadata batch,"assigned to EMC.
In one embodiment, in response to a list of a plurality of fingerprints representing data chunks to be replicated from a source storage system to a target storage system over a network, one of the fingerprints is selected as a representative fingerprint that matches selection criteria. The source storage system generates a fingerprint representation for each of the fingerprints that is smaller than the corresponding fingerprint. The representative fingerprint and the fingerprint representations are transmitted to the target storage system over the network, without transmitting all full fingerprints of the data chunks, to allow the target storage system identifying which of the data chunks are missing. In response to information received from the target storage system indicating one or more data chunks that are missing at the target storage system, the missing data chunks are then transmitted to the target storage system.