New pending patent applications are published by the USPTO on Thursdays. This week's Spotlight Applications concern aspects of digital fingerprinting and both are assigned to Google. The first application discloses techniques for detecting and suppressing voice queries. The second application discloses techniques for transforming fingerprints to detect unauthorized media content items.
20180330728, "Detecting and suppressing voice queries," assigned to Google.
A computing system receives requests from client devices to process voice queries that have been detected in local environments of the client devices. The system identifies that a value that is based on a number of requests to process voice queries received by the system during a specified time interval satisfies one or more criteria. In response, the system triggers analysis of at least some of the requests received during the specified time interval to trigger analysis of at least some received requests to determine a set of requests that each identify a common voice query. The system can generate an electronic fingerprint that indicates a distinctive model of the common voice query. The fingerprint can then be used to detect an illegitimate voice query identified in a request from a client device at a later time.
20180332319, "Methods, systems, and media for transforming fingerprints to detect unauthorized media content items," assigned to Google.
Methods, systems, and media for transforming fingerprints to detect unauthorized media content items are provided. The method comprises: receiving criteria relating to an application of a circumvention technique to one or more video content items, wherein the criteria includes abuse criteria that describes the circumvention technique and a transform for use with the one or more video content items in which the circumvention technique was applied; generating an abuse query that includes at least a portion of the abuse criteria that describes the circumvention technique; determining from a plurality of video content items, a subset of video content items responsive to the abuse query; applying, for each video content item in the subset of video content items, the transform to each video content item to obtain a transformed video content item; generating, for each transformed video content item, a fingerprint that represents the transformed video content item; and comparing the fingerprint of the transformed video content item to a plurality of fingerprints associated with reference video content items to determine whether the video content item corresponding to the transformed video content item matches one of the reference video content items.