Digimarc Corporation has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
Abstract: To make a payment, a smartphone presents artwork for a payment card (e.g., a Visa card) that has been selected by a user from a virtual wallet of such cards. Encoded in the displayed artwork is payment information that has been encrypted with a context-dependent session key. A cooperating system (e.g., a retailer's point of sale system) uses a camera to capture an image of the artwork, and independently creates the session key from its own context sensor(s), enabling decryption of the payment information. Such technology provides a superior transaction security model at a fraction of the cost of competing chip card payment systems (which require, e.g., expensive physical cards, and single-purpose reader hardware). A great variety of other features and arrangements are also detailed.
Abstract: A location based router system comprises a router in communication with an ad hoc network of devices, including at least one mobile device. The router directs packets from the network to associated agents. The router receives queries from requesting clients, such as the mobile device, and provides location to the requesting client. Additionally, depending on preferences of the client, it also routes market packets for location based services back to the mobile device dependent on its location. A method of providing location based service to a mobile device in a wireless network. The method receives a query for location in the wireless network from the wireless device. The query includes an opt-in level for participating in offers for location based services. Mobile device location computed from packets transmitted between the mobile device and nodes in the wireless network is determined.
Abstract: The present disclosure relates generally to cell phones and cameras, and to shadow analysis in images captured by such cell phones and cameras. One claim recites a smart phone comprising: a camera; and one or more processors programmed for: i) identifying a shadow cast by the smart phone or camera on a subject being imaged by a camera; and ii) determining a proximity of the camera to the subject based on an analysis of the shadow. Of course, other claims and combinations are provided too.
Abstract: Image recognition and augmented reality experiences utilize auxiliary data extracted from an image or video, or image fingerprints, or a combination of both. One claim recites a method comprising: receiving a plurality of imagery frames captured by a device sensor; identifying a plurality of key points in each of the plurality of imagery frames; resolving image pose by utilizing relative relationships of the key points between different frames of the plurality of frames; modifying imagery of at least one of the plurality of frames based on resolved image pose; and deriving a fingerprint from modified imagery. Of course other claims and combinations are provided as well.
Abstract: Audio signal processing enhances audio watermark embedding and detecting processes. Audio signal processes include audio classification and adapting watermark embedding and detecting based on classification. Advances in audio watermark design include adaptive watermark signal structure data protocols, perceptual models, and insertion methods. Perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity. These methods are applied to audio segments in audio embedder and detector configurations to support real time operation. Feature extraction and matching are also used to adapt audio watermark embedding and detecting.
Abstract: Cell phones and other devices are used to complement enjoyment of television or other video media, through use of corresponding software applications (“widgets”). A great variety of related features and arrangements are particularly detailed.
Abstract: In an illustrative embodiment, the free space attenuation of illumination with distance, according to a square law relationship, is used to estimate the distance between a light source and two or more different areas on the surface of a product package. By reference to these distance estimates, the angular pose of the object surface is determined.
Abstract: The invention provides a method of computing positioning of a mobile device in a wireless network. This positioning method receives associated pings exchanged among a network of nodes. The pings include count stamps of ping transmit and receipt, and a count stamp of a message received by the network nodes from the mobile device. The method evaluates count stamps to determine clock differences among clocks of the network nodes. From the clock differences, the method determines pseudo ranges between the network nodes and the mobile device. The method determines location of the mobile device by evaluating the differences between ranges of candidate positions of the mobile device and the pseudo ranges. It minimizing a function of error associated with the position candidates to determine the mobile device's location.
Abstract: In one aspect, a user captures an image of a physical object (e.g., of a grocery item, using a smartphone). The depicted object is identified, such as by extracting fingerprint or watermark data from the imagery. Other imagery depicting that object—or depicting related objects—is identified on the web, and is displayed to the user on the smartphone screen. The user may select one or more of these images and direct that they be posted to a social network account (e.g., Pinterest) associated with the user. In another aspect, the user's location is sensed (e.g., an aisle of a department store), and a collection of images depicting nearby products is presented to the user for selection and posting to a social networking service. A great variety of other features and arrangements are also detailed.
Abstract: A content fingerprint based recognition system employs local caching of portions of a fingerprint database to manage network services for identifying which programs a user's mobile device is exposed to and the timing of events within the program. The system enables background recognition and synchronization of network services in a way that consumes less device power and bandwidth.
Abstract: Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract: Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to data driven imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs.
Abstract: In some arrangements, product packaging is digitally watermarked over most of its extent to facilitate high-throughput item identification at retail checkouts. Imagery captured by conventional or plenoptic cameras can be processed (e.g., by GPUs) to derive several different perspective-transformed views—further minimizing the need to manually reposition items for identification. Crinkles and other deformations in product packaging can be optically sensed, allowing such surfaces to be virtually flattened to aid identification. Piles of items can be 3D-modelled and virtually segmented into geometric primitives to aid identification, and to discover locations of obscured items. Other data (e.g., including data from sensors in aisles, shelves and carts, and gaze tracking for clues about visual saliency) can be used in assessing identification hypotheses about an item. A great variety of other features and arrangements are also detailed.
Abstract: Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality is improved, and new functionality is provided. Some aspects relate to imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs.
Abstract: A method of associating a content object with metadata uses a combination of a content identifier and a bounding identifier to enable handling of disparate sets of content identifiers for content objects with potentially conflicting content identifiers. The method receives a content identifier for a content object from among a set of content identifiers. It provides a unique bounding identifier for the set of content identifiers. This unique bounding identifier is used in combination with the content identifier to form a globally unique identifier for the content object. This globally unique identifier is associated with a metadata source, which enables routing of a user to the metadata source.
Abstract: Digital data is optically broadcast through an environment by controllably switching the brightness or chrominance of LED solid state lamps, or of other illumination sources (e.g., television screens and backlit computer displays). This optical data channel is useful to convey cryptographic key data by which devices within the environment can authenticate themselves to a secure network. In some embodiments, the optical modulation is sensed by the camera of a smartphone. The row data output by the smartphone's camera sensor is processed to extract the modulated data signal. In some monochrome embodiments, data communication speeds far in excess of the camera's frame rate (e.g., 30/second), or even the camera's row rate (e.g., 14,400/second) are achieved. Still greater rates can be achieved by conveying different data in different chrominance channels. A great number of other features and arrangements are also detailed.
Abstract: The present technology concerns cell phones and similar devices, and their use in conjunction with media content (electronic and physical) and other systems (e.g., televisions, digital video recorders, and electronic program directories). Some aspects of the technology particularly concern “second screen” applications that sense a television program being watched by a user, and present menus of complementary content on the phone touchscreen from which the user can select. This complementary content can include other video content, associated web pages, opportunities to buy merchandise related to the program, etc. This complementary content can be identified by a provider of the television program, or can be identified otherwise (e.g., by crowd-sourcing). In some embodiments, the phone instructs a remote DVR to record content of interest for later viewing. The technology also provides features for making TV watching a social experience—involving remote friends.
Abstract: A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera. The image processing tasks applied to the scene can be selected from among various alternatives by reference to resource costs, resource constraints, other stimulus information (e.g., audio), task substitutability, etc. The phone can apply more or less resources to an image processing task depending on how successfully the task is proceeding, or based on the user's apparent interest in the task. In some arrangements, data may be referred to the cloud for analysis, or for gleaning. Cognition, and identification of appropriate device response(s), can be aided by collateral information, such as context. A great number of other features and arrangements are also detailed.
Abstract: The present disclosure relates generally to mobile devices and content recognition. One claim recites a method employing a mobile device having a processor configured to perform one or more acts of the method, the mobile device including at least one sensor. The method includes: obtaining information from the sensor; and selecting a user profile from among a plurality of different user profiles based on the information. Other claims and combinations are provided as well.
Abstract: The disclosed technology generally relates to methods for identifying audio and video entertainment content. Certain shortcomings of fingerprint-based content identification can be redressed through use of human-reviewers.