Abstract:
This invention deals with improving recommendation systems. The first embodiment combines rules and recommendations to create automated and intelligent business rules for recommendations. The second embodiment improves recommendations by combining the results of driver products and influencer products, where influencer products only influence the recommendations of the driver products. Influencer products can be related to a specific user. The third embodiment improves recommendations for new items by relating them to original items, such that the sales for the original item is used in the new item when calculating recommendations. The new items may replace the original item, or be a similar item and exist alongside the original item.
Abstract:
A portable device for use with audio or visual content (e.g., an MP3 player-like device, or a camera-enabled device) is equipped with one or more features/capabilities, including: a user interface through which a consumer can instruct that content be delivered to a different consumer's device, the ability to derive identifiers from content and take action(s) based thereon, the ability to count playbacks of content; and/or the ability to interact with remote web services. A variety of other features and arrangements are also detailed.
Abstract:
The disclosure relates generally to methods and systems including, e.g.,: (1) steganographically embedding location information in image or audio content, where the location information is obtained from remote sources like a cell phone network or remote GPS receiver; (2) steganographically embedding participant IDs in content to ensure proper billing and royalty tracking; (3) providing fair-use content management based upon digital watermark-tracked usage; (4) providing micro-payments based upon watermarked objects for retailers; and/or (5) providing watermarked logon cards, such as watermarked hotel room keys, to better provide internet logon access control. Other systems and methods are provided as well.
Abstract:
The disclosure describes a method of connecting multimedia content to a network resource. This method operates in a computer network environment. Operating in a network connected device, the method extracts an identifier from a media signal, such as from a digital watermark, perceptual hash, or other machine extracted signal identifier. It then sends the identifier to a network along with context information indicating device type information. From the network, the method receives related data associated with the media signal via the identifier. The related data is adapted to the network connected device based on the device type information. This device type information may include a display type, so that the related date may be formatted for rendering on the display type of the device. This device type information may also include a connection speed so that the related data may be optimized for the connection speed of the device.
Abstract:
The present application relates generally to content management (e.g., managing audio and video items in portable devices). One claim recites a method comprising: utilizing electronic memory housed in a portable device, maintaining a listing of up to N identifiers associated with previously accessed audio or video items, where N is an integer, and where each previously accessed audio or video item has an identifier associated therewith; utilizing a programmed electronic processor housed in the portable device, i) restricting access to a new audio or video item if an identifier associated with the new audio or video item is one of the N identifiers associated with the previously accessed audio or video items, or ii) limiting a number of content items each with a different user identifier associated therewith that can be accessed in a certain amount of time. Of course, other claims and combinations are provided as well.
Abstract:
The present invention describes methods and apparatus involving embedding data. Data can be embedded steganographically in content or embedded in, e.g., headers associated with the content. In one implementation, a method of embedding auxiliary information in data is provided. The method includes receiving data and correlated data. The correlated data is related to but independent from the received data. The method further includes receiving auxiliary information, the auxiliary information being independent of the received data and the correlated data; changing the auxiliary information based on at least the correlated data; and embedding the changed auxiliary information in the received data. Other implementations are also provided.
Abstract:
A method for controlling watermark embedding in a media object through the use of a watermark embedding command. The use of the embedding command enables watermark embedding to be adapted for the transmission channel at the time of transmission.
Abstract:
A method of indexing content for network searching comprises obtaining media content signals stored on a computer network; deriving content identifiers from the content signals; using the content identifiers to obtain metadata used to classify the media content signals; and creating a searchable index of the media content signals based on the metadata, wherein users access the searchable index on the distributed computer network to submit a search query for the searchable index to retrieve links to the media content signals.
Abstract:
The present invention relates to steganographic systems and methods. One claim recites an apparatus including: electronic memory to buffer a compressed digital watermark object, the digital watermark object is a separate object relative to a compressed video object; and an electronic processor. The electronic processor is programmed for: decompressing the compressed video object to yield a decompressed video object, the decompressed video object comprising data representing video picture elements and data representing audio elements; decompressing the digital watermark object to obtain digital watermark data; steganographically hiding the digital watermark data in the data representing video picture elements or in the data representing audio elements to yield digital watermarked video or audio; and rendering the digital watermarked video or audio. Other claims and combinations are provided too.
Abstract:
Digital watermarking provides a chain of custody for video in movie studios. Several novel improvements in workflow processes for digital watermarking provide chains of custody. In a first implementation, a digital watermark payload includes an embedder ID and time stamp. The embedder ID is associated with a controlling PC user log, including, e.g., the user log being linked to a biometric of the user. In a second implementation, a video player is forced to run a video digital watermark embedder based upon a rights command, where an ID embedded in a watermark payload is determined solely by the embedder. A third implementation encrypts a conglomerate of watermarked segments of video so that a rendering device can decrypt the segments in a manner to produce different results in each usage dependent upon the key. A fourth implementation embeds digital watermarks in DVD disk images during delivery to a duplication house.