New pending patent applications are published on Thursdays. This weeks Spotlight Applications concern aspects of digital watermarking and digital fingerprinting. Assigned to AppNexus, the first application discloses techniques for pixel-based watermarking. Assigned to IPextreme, the second application discloses techniques for IP fingerprinting and IP DNA analysis.
20170103492, "Systems and methods for pixel-based watermarking," assigned to AppNexus Inc.
Systems and methods for pixel-based watermarking are disclosed. An online advertising platform, at a first time, receives information identifying a creative that is associated with an advertiser or publisher, and associates a unique identifier with the creative. The color of one or more pixels in the creative image are modified based on the unique identifier by, for example, converting the unique identifier to a corresponding color value and setting the pixels to the color. At a second, later time, the platform receives a second image comprising at least a portion of the creative image. One or more pixels are identified in the second image that correspond to pixels in the first image that were modified in color, and the unique identifier is derived based on the color of the identified pixels in the second image. Information associated with the advertiser or publisher is then retrieved based on the determined identifier.
20170103079, "System and method for IP fingerprinting and IP DNA analysis," assigned to IPextreme, Inc.
Embodiments disclosed include computer implemented systems and methods comprising multiple computer programs that when used together as part of the system enable the detection of one set of computer files within another set of files without having direct access to the files themselves. A computer program generated unique fingerprint for each set of files that is a condensed representation of that file that ensures no reverse engineering is possible from its use. Another computer program serves as a public repository to securely store fingerprints from multiple sources (e.g. companies).Additionally, another computer program is used to analyze the two or more file sets and produces a report that shows whether files in one set are contained in the other.