New pending patent applications are published by the USPTO on Thursdays. Today's Spotlight Applications concern aspects of digital fingerprinting and digital watermarking. Assigned to Acxiom, the first application discloses techniques for applying fingerprinting/watermarking of consumer data, and analyzing "wild files" of consumer data to assign a guilt score for a particular party who may have leaked the data. Assigned to Lex Persona, the second application discloses techniques for an open, secure electronic signature system.
20190095595, "Data watermarking and fingerprinting system and method," assigned to Acxiom Corporation
A system for applying fingerprinting/watermarking of consumer data, and analyzing "wild files" of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources ("Data Owners") to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations ("Trusted Third Parties" or "TTPs") to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a "Leaked Subset") into the hands of others ("Bad Actors") who either knowingly or unknowingly use the data illegally.
20190097811, "Open, secure electronic signature system and associated method," assigned to Lex Persona (FR)
Open and secure electronic signature system comprising a business application (10), said business application having a programming interface (42) configured to request a signature of a document (20) with a signature manager (40) for a user (30), the system is characterized in that said business application (10) is able to define a content to be signed, to identify criteria and to select a signatory user (30), to define the use of a type of digital identity, to collect signature properties, and to require a signature format. The signature manager (40) is able to coordinate said signature request by performing the following steps: --verification of the identity and the authorization of the business application (10), --verification of the identity of the user signatory (30), --recovery of the document (20) to be signed, --preparation of the signature request with fingerprint calculations of the data to be signed, --sending a notification of the signature request to signature services (60) of the user (30). The user (30), by means of said signature services (60), is able to control the execution of the signature process by activating the private key corresponding to a certificate (61) of the user (30) meeting the criteria selection keys sent to said signature manager (40) by the business application (10) for encrypting the fingerprint of the data to be signed. The invention further relates to the method of preparing and processing a signature request implemented in the above system.