New patents are issued by the USPTO on Tuesdays. This week's Spotlight Patents concern aspects of digital fingerprinting and digital watermarking. Assigned to Excalibur IP, the first patent addresses techniques for providing contextually relevant information for multimedia content streaming through a rendering device. Assigned to Fortinet, the second patent addresses techniques for data leak protection.
9,866,915, "Context relevant interactive television," assigned to Excalibur IP, LLC.
Methods, systems and computer readable medium with program instructions for providing contextually relevant information for multimedia content streaming through a rendering device, includes detecting a selection of the multimedia content for rendering on the rendering device. An audio signal of the multimedia content is retrieved and analyzed to generate an audio fingerprint. The generated audio fingerprint is used to identify the multimedia content that is selected for rendering. Contextually relevant content for a portion of the multimedia content being rendered on the rendering device is dynamically retrieved from one or more sources and mapped to data associated with the portion of the multimedia content. The mapping results in the rendering of the relevant content during the rendering of the portion of the multimedia content and provides additional information that is contextually relevant to the portion of the multimedia content that is currently being rendered on the rendering device.
9,860,211, "Data leak protection," assigned to Fortinet, Inc.
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a network security device maintains a filter database containing multiple filtering rules. Each filtering rule specifies a watermark hash value, a set of network services for which the filtering rule is active and an action to be taken. Network traffic directed to a destination residing outside of an enterprise network, associated with a particular network service and containing a file is received. A watermark hash value embedded within the file is identified. When there exists a filtering rule specifying a matching watermark hash value and for which the filtering rule is active for the particular network service, the action specified by the filtering rule is performed.