G06F21/1063

Watermark and fingerprint systems for media
09843846 · 2017-12-12 · ·

A number of novel watermarking applications, and improvements to watermarking methods, are disclosed. Included are techniques for selectively incorporating promotional messages into rendered video content, monitoring whether promotional messages are rendered or skipped, permitting payment for content upon rendering rather than receipt, controlling rendering of video to include or omit adult-themed sections, confirming a person's age by reference to a watermarked identification document, and watermarking digital cinema projections.

Manipulating Display Content of a Graphical User Interface
20170352172 · 2017-12-07 ·

A method and system of augmenting display content in a graphical user interface environment. Content produced by a graphical user interface is augmented with additional content before the content is displayed. In an example, a security marker may be rendered on top of an existing display content using the method described to protect high-value or sensitive information.

METHODS OF ADDING AND VALIDATING A DIGITAL SIGNATURE IN A VIDEO DATA SEGMENT
20230188732 · 2023-06-15 · ·

A method for verifying a digital signature in a video data segment generated by a video delivery chain comprises: obtaining the video data segment comprising encoded image frames and a plurality of node device datasets associated with respective labels; wherein one or more node device datasets include respective digital signatures; wherein the one or more node device datasets comprises a first node device dataset which includes a first digital signature generated by a first node device based on a first number of node device datasets that have been last added to the video data segment before the first node device dataset; locating the labels; identifying , using the labels, the first number of node device datasets; and verifying the first digital signature. The application also discloses a method of adding a digital signature to a video data segment.

METHODS AND SYSTEMS FOR WATERMARKING DOCUMENTS

Described are methods and system that digitally watermark documents using an encoding scheme that embeds unique identifiers into the files by perturbing the relative heights of words to create patterns that are imperceptible to the human eye but decodable to recover the identifiers. The unique identifiers can be precoded before they are embedded in the documents.

METHOD AND DEVICE FOR ENHANCING THE PROTECTION OF A SIGNAL, IN PARTICULAR A MULTIMEDIA SIGNAL, AGAINST A MALICIOUS ATTACK
20170329941 · 2017-11-16 · ·

A signal is protected against an attack by an enhancement process that checks the conformity of an actual state of the signal with respect to an expected state. A protective action is exercised on the signal if the actual state of the signal is not in conformity with the expected state, so as to neutralize or nullify said attack.

METHOD AND APPARATUS FOR EMBEDDING AND EXTRACTING TEXT WATERMARK
20170329943 · 2017-11-16 · ·

One aspect of the present invention discloses a watermark insertion method. The method includes: segmenting target text into pieces of page content; obtaining a watermark variable comprising a line alternation value indicative of a watermark mode changed for each line of the segmented page content and a watermark mode setting value; and applying a flip-flop component insertion algorithm for inserting a watermark into each of the pieces of segmented page content based on the obtained watermark variable.

TELEMATICS AUTHENTICATION
20220351557 · 2022-11-03 · ·

Systems and methods for determining the authenticity of vehicle operational data provided by telematics or other devices are provided. Vehicle performance and/or operational data may be collected and the authenticity of the data stream may be determined based on the whether the data stream includes a watermark in a predetermined location of the data stream or whether the data stream includes a data key comprising a predetermined false vehicle performance data reading. A second data recording device may also record vehicle performance and/or operational data. Both the first and second data recording devices may provide the respective vehicle performance data to a computing device. The computing device may compare the vehicle performance data from the first and second data recording devices to determine authenticity of the vehicle measurement data.

PERSONALIZED AUDIO CONTENT DEVICE FOR GIFTING AUDIO CONTENT
20170315776 · 2017-11-02 ·

This invention is directed to a computerized audio content gifting device. The ability to send audio content to a recipient as a gift allows the personalization of gifts such as flowers and candy to be made. The invention includes a housing with a circuit board, operational buttons, a communication port, a speaker, an attachment member, and a set of computer readable instructions stored on the computer readable medium that, when executed by the processor, provides for: receiving audio content from a server in electronic communications with the circuit board using the communications port, playing the audio content when an operational button is placed in the “on” position. The invention can also determine if there are copyright restrictions on the audio content and manage the number of authorized copies.

DYNAMIC DATA WATERMARKING FOR LEAKAGE SOURCE DETECTION

In one example an apparatus comprises a memory and a processor to receive, in an edge node of a secure network, a first file, determine that the first file is addressed to a recipient outside the secure network, and in response to a determination that the first file is addressed to a destination outside the secure network, to generate a watermark that identifies a transmitter of the document, a recipient of the document, and comprises a digital signature of the first file, embed the watermark in the first file to generate a watermarked file, and pass the watermarked file to an input/output system for transmission out of the secure network. Other examples may be described.

Methods for activation of an application on a user device

Methods for activating a second application on a user device using a first application already installed and activated on the user device are described. In one embodiment the second application requests activation from the first application. The first application then authenticates a user before providing an activation response. The activation response can be requested from a remote server by the first application on behalf of the second application. The methods improve the ease of activating new software on a user device.