COUNTERFEIT DETERRENCE SYSTEM
    1.
    发明公开
    COUNTERFEIT DETERRENCE SYSTEM 审中-公开
    DEVICE防御假冒

    公开(公告)号:EP1142190A1

    公开(公告)日:2001-10-10

    申请号:EP99967414.6

    申请日:1999-12-16

    IPC分类号: H04L9/00 H04L9/32 C09D11/00

    摘要: Processing of banknote- or other security document-images in a computer system is sensed, and serves to launch (or direct) a web browser to a web site that educates the user about limitations on use of such imagery, and/or provides substitute imagery that may be utilized for legitimate purposes. Such images may be recognized by a digital watermark encoded therein or by other known techniques. The technology is applicable to a wide class of documents that should not be duplicated, including passports, visas, postal stamps, stock certificates, travelers checks, concert/event tickets, lottery tickets, etc. The technology may also be used for non-security applications, e.g., recognizing images, video, or audio being processed on a user's computer as belonging to a certain class, and presenting the user with a web page relating to that class of object. Commerce opportunities may thereby be made available to the user.

    METHOD AND SOFTWARE FOR EVIDENCING ILLICIT USE OF A COMPUTER SYSTEM
    2.
    发明公开
    METHOD AND SOFTWARE FOR EVIDENCING ILLICIT USE OF A COMPUTER SYSTEM 审中-公开
    VERFAHREN UND SOFTWARE,UM UNERLAUBTEN GEBRAUCH EINES RECHNERSYSTEMS NACHZUWEISEN

    公开(公告)号:EP1137975A1

    公开(公告)日:2001-10-04

    申请号:EP99961538.8

    申请日:1999-10-28

    IPC分类号: G06F1/00 G06K9/00

    摘要: A computer (10) is provided with software that looks for certain activities that may be illicit (e.g. processing of a graphic file corresponding to a banknote). If such an activity is detected, tracer data detailing the activity is generated and secretly stored in the computer (10). If the computer (10) is later searched or seized, the tracer data can be recovered and employed as evidence of the computer's use, e.g. in counterfeiting. To detect whether graphic image data corresponds to a banknote, two analysis techniques may be used. One is based on detection of a visible pattern characteristic of a security document. The other is based on detection of a steganographic digital watermark characteristic of a security document. If either characteristic is found, the image is flagged, and appropriate anti-counterfeiting steps may be taken. Detection of the visible pattern can be performed using a series of successively more rigorous tests. If the image fails the first test, successive tests can be skipped, speeding the process. Hough transform-based pattern recognition techniques are used in some embodiments. Provision of both a visible pattern detector and a watermark detector in a single apparatus enhances reliability, while permetting various implementation efficiencies.

    摘要翻译: 为计算机提供了寻找可能是非法的某些活动的软件(例如处理对应于钞票的图形文件)。 如果检测到这样的活动,则生成描述活动的跟踪数据并秘密地存储。 在电脑里 如果计算机以后被搜索或检获,则可以恢复跟踪器数据并将其用作计算机使用的证据,例如, 在假冒。

    MEDIA PROCESSING METHODS AND ARRANGEMENTS
    5.
    发明公开
    MEDIA PROCESSING METHODS AND ARRANGEMENTS 审中-公开
    中华人民共和国

    公开(公告)号:EP2396731A1

    公开(公告)日:2011-12-21

    申请号:EP10741557.2

    申请日:2010-01-22

    IPC分类号: G06F15/16

    摘要: The present technology concerns cell phones and other portable devices, and more particularly concerns use of such devices in connection with media content (electronic and physical) and with other systems (e.g., televisions, digital video recorders, and electronic program directories). Some aspects of the technology allow users to easily transfer displayed content from cell phone screens onto a television screens for easier viewing, or vice versa for content portability. Others enable users to participate interactively in entertainment content, such as by submitting plot directions, audio input, character names, etc., yielding more engaging, immersive, user experiences. Still other aspects of the technology involve a program directory database, compiled automatically from information reported by network nodes that watch and identify content traffic passing into (and/or out of) networked computers. By identifying content resident at a number of different repositories (e.g., web sites, TV networks, P2P systems, etc.), such a directory allows cell phone users to identify the diversity of sources from which desired content can be obtained—some available on a scheduled basis, others available on demand. Depending on the application, the directory information may be transparent to the user—serving to identify sources for desired content, from which application software can pick for content downloading, based, e.g., on context and stored profile data. A great number of other features and arrangements are also detailed.

    摘要翻译: 本技术涉及蜂窝电话和其他便携式设备,更具体地涉及关于媒体内容(电子和物理)以及与其他系统(例如,电视机,数字视频录像机和电子节目目录)的这种设备的使用。 该技术的一个特定方面涉及补充在一个屏幕上观看的主要内容(例如,电视屏幕),其中辅助内容显示在第二屏幕(例如,手机屏幕)上。 不同的辅助内容可以与主要内容配对,这取决于用户的配置文件(例如年龄,位置等)。 一些实施例利用由主屏幕设备提供的位置信息。 其他实施例利用由主屏幕设备提供的内容识别数据。 还有许多其他功能和安排也很详细。

    METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS AND TRANSACTIONS
    7.
    发明公开
    METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS AND TRANSACTIONS 审中-公开
    智能手机付款和交易的方法和安排

    公开(公告)号:EP2962262A2

    公开(公告)日:2016-01-06

    申请号:EP14709848.7

    申请日:2014-02-26

    IPC分类号: G06Q30/00

    摘要: The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites a portable device comprising: a touch screen display; a microphone for capturing ambient audio; memory for storing an image; and one or more processors. The one or more processors are configured for: generating copies of the stored image; obtaining a payload corresponding to financial information; providing the payload to an erasure code generator, in which the erasure code generator produces a plurality of outputs; embedding one of the plurality of outputs in a copy of the stored image and proceeding with embedding until each of the plurality of outputs is so embedded in a copy of the stored image, in which the embedding utilizes digital watermarking; causing the touch screen display to display embedded image copies so as to cause a static image display effect, the displayed embedded image copies being displayed by the portable device in response to a user input to enable a financial transaction. A great variety of other features, arrangements, combinations and claims are also detailed.

    摘要翻译: 本公开涉及管理对用户可用的支付选项的基于智能电话的虚拟钱包。 一个权利要求提出了一种便携式设备,其包括:触摸屏显示器; 用于捕获环境音频的麦克风; 用于存储图像的存储器; 和一个或多个处理器。 该一个或多个处理器被配置用于:生成所存储的图像的副本; 获得与金融信息对应的有效载荷; 将有效载荷提供给擦除码发生器,其中擦除码发生器产生多个输出; 将所述多个输出中的一个嵌入到所存储的图像的副本中并且继续进行嵌入,直到所述多个输出中的每一个被如此嵌入到所存储的图像的副本中,其中所述嵌入利用数字水印; 使触摸屏显示器显示嵌入图像副本以产生静态图像显示效果,显示的嵌入图像副本由便携式设备响应于用户输入而显示以实现金融交易。 各种其他功能,安排,组合和索赔也是详细的。

    DIGITALLY MARKED OBJECTS AND PROMOTIONAL METHODS
    9.
    发明公开
    DIGITALLY MARKED OBJECTS AND PROMOTIONAL METHODS 审中-公开
    数字标记的对象和广告方式

    公开(公告)号:EP1330698A2

    公开(公告)日:2003-07-30

    申请号:EP01988889.0

    申请日:2001-10-25

    IPC分类号: G06F1/00

    摘要: Physical items can be digitally watermarked, permitting their recognition by webcams or the like to trigger corresponding actions. Coffee cups and coffee cup jackets are exemplary of items that may be so watermarked. The action triggered by recognition of the item can vary, depending on the context in which the recognition occurred (e.g., store or office). The action likewise vary with time (e.g., triggering a first response when presented a first time, and triggering a second, different, response when presented a second time). Some such items may have multiple faces (e.g., tow side to a credit card ; six faces to a product carton) - each encoded with a different watermark and triggering a different response.