New pending patent applications are published by the USPTO on Thursdays. Today's Spotlight Applications concern aspects of digital fingerprinting and digital watermarking. Assigned to Gracenote, the first of today's applications addresses techniques for media source identification. Assigned to Tautachrome, the second application addresses techniques for authentication and validation of smartphone imagery.
20170142472, "Media source identification," assigned to Gracenote.
A server machine and a first device (e.g., a television) are configured to access a stream of media (e.g., a broadcast channel) from a media source (e.g., a broadcaster). The server machine generates a representation (e.g., a fingerprint) of the stream of media and stores the representation. The first device plays the stream of media (e.g., for a user) and generates an analog signal based on the stream of media. A second device a mobile device of the user) is configured to receive the analog signal and generate a representation of the analog signal. The second device provides the representation of the analog signal to the server machine, which may compare the representation of the stream of media to the representation of the analog signal. Based on the comparison, the server machine may provide an identifier of the media source to the second device.
20170140492, "Authentication and Validation of Smartphone Imagery," assigned to Tautachrome, Inc.
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.