Patent classifications
H04L2209/608
METHOD AND TOKEN FOR DOCUMENT AUTHENTICATION
A method and token (3) for corroborating a document (25) includes having a registered token (3) with a token identity. The token (3) is able to print visual markings. A document identifier is obtained (18) based on at least the token identity and a timestamp. The document identifier is encoded (19) into a visual marking (24), and the visual marking (24) is applied to the document (25). A copy of the document (25) is obtained (27) with or without the visual marking (24), and copy is stored in association with the document identifier. The token (3) includes storage holding a token identity and a printing unit. The token (3) is configured to receive the visual marking (24) encoding a document identifier associated with the token identity and to print the received visual marking (24). A method also verifies a document (41) having a corresponding visual marking (42).
DIGITAL WATERMARK SYSTEM, DIGITAL WATERMARK METHOD AND PROGRAM
A digital watermark system that realizes digital watermark for a cryptographic function, including a memory and a processor configured to take as input a security parameter and generate a watermark embedding key for embedding information representative of a watermark in a circuit that realizes the cryptographic function, and a watermark extraction key for extracting information representative of the watermark from a circuit in which a watermark is embedded; take as input a master private key used for the cryptographic function, the watermark embedding key, and information representative of a watermark, and generate a circuit in which the watermark is embedded and that realizes the cryptographic function; and take as input the watermark extraction key and the circuit in which the watermark has been embedded, and extract information representative of a watermark from the circuit.
Retrieving data in a storage network
A method for execution by a dispersed storage and task (DST) client module includes issuing a read threshold number of read slice requests are issued to storage units of the set of storage units. One or more encoded slices of a selected read threshold number of encoded slices are received. When a next encoded data slice of a decode threshold number of encoded data slices is received within a response timeframe, outputting of the next encoded data slice is initiated. When the next encoded data slice is not received within the response timeframe, receiving of another decode threshold number of encoded slices of the set of encoded slices is facilitated. The other decode threshold number of encoded slices are decoded to produce recovered encoded data slices, where the recovered encoded data slices includes at least a recovered next encoded data. Outputting of the recovered next encoded data slice is initiated.
Surfaces with embedded information
A surface including: a plurality of visually detectable marks, wherein the visually detectable marks include: a first group of grid marks forming a grid and a second group of information marks encoding information based on positions of information marks of the second group of marks relative to the data page, wherein grid marks are less than 45% of the visually detectable marks on the surface.
Generating Recovered Data in a Storage Network
A storage network operates by: issuing a read threshold number of read slice requests to storage units of a set of storage units, where the read threshold number of read slice requests identifies a read threshold number of encoded slices of a set of encoded slices corresponding to a data segment; when one or more other encoded data slices of the read threshold number of encoded slices is not received within a time threshold, facilitating receiving a decode threshold number of encoded slices of the set of encoded slices; decoding the decode threshold number of encoded slices to produce recovered encoded data slices, wherein a number of the recovered encoded data slices corresponds to the read threshold number minus a number of the encoded slices received within the time threshold; and outputting the recovered encoded data slices and the encoded slices of the read threshold number of encoded slices received within the time threshold.
SYSTEMS AND METHODS FOR MONITORING THE DISPLAY OF CONTENT USING EMBEDDED WATERMARKS
Systems and method are provided for detecting the display of media and/or specialized content using embedded watermarks. For example, a media device may receive video data including a set of video frames. The media device may detect, in at least one video frame of the set of video frames, a watermark embedded into the at least one video frame. The watermark may be usable to identify media to be displayed by the media device. The media device may display the media. The media device may then transmit an indication that the media has been presented by the media device to a destination device.
Data watermarking and fingerprinting system and method
A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.
Manufacture of NFTs from film libraries
Methods and processes for manufacture of an image product from a digital image. An object in the digital image is detected and recognized. Object metadata is assigned to the object, the object metadata linking sound to the object in the digital image which produced the sound. At least one cryptographic hash of the object metadata is generated, and the hash is written to a node of a transaction processing network.
System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.
Systems and methods of preparing multiple video streams for assembly with digital watermarking
Systems and methods for encoding multiple video streams with digital watermarking for adaptive bitrate streaming in accordance with embodiments of the invention are disclosed. In one embodiment, a method for preprocessing multimedia content into streams with watermark information includes receiving a source content media stream, generating at least two variant preprocessed streams for each received source content media stream, where each variant preprocessed stream includes different watermark information in the same locations as the other variant preprocessed streams and where marked locations are spaced apart at least a distance equal to a predetermined maximum segment size, generating a set of embed location information describing marked locations in the variant preprocessed streams, generating at least one variant output stream from each variant preprocessed stream using video compression, partitioning each variant output stream into a set of segments, where each segment is no longer than the predetermined maximum segment size and contains at most one copy of the watermark information, generating a set of segment boundary information describing the boundaries of segments within the variant output streams and the boundaries are the same between variant output streams, and generating a segment selection list using the set of embed location information and the set of segment boundary information, where the segment selection list includes only one variant segment for each segment according to a watermark sequence and the digits of the watermark sequence correspond to the watermark information applied to each variant preprocessed stream.