Abstract:
Various arrangements for use of biometric data are detailed. For example, a police officer may capture image data from a driver license (e.g., by using a camera cell phone). Facial recognition vectors are derived from the captured image data corresponding to photo on the license, and compared against a watch list. In another arrangement, a watch list of facial image data is compiled from a number of government and private sources. This consolidated database is then made available as a resource against which facial information from various sources can be checked. In still another arrangement, entities that issue photo ID credentials check each newly-captured facial portrait against a consolidated watch list database, to identify persons of interest. In yet another arrangement, existing catalogs of facial images that are maintained by such entities are checked for possible matches between cataloged faces, and faces in the consolidated watch list database.
Abstract:
Methods and systems include, e.g.,: (1) steganographically embedding location information in images, where the location information is obtained from remote sources like a cell phone network or remote GPS receiver; (2) steganographically embedding participant IDs in content to ensure proper billing and royalty tracking; (3) providing fair-use content management based upon digital watermark-tracked usage; (4) providing micro-payments based upon watermarked ID cards for retailers; and/or (5) providing watermarked logon cards, such as watermarked hotel room keys, to better provide internet logon access control. Other systems and methods are provided as well.
Abstract:
This disclosure describes methods and systems for synchronizing broadcast and network content, such as web content. It also describes related technology for facilitating linking from broadcast content to related information and e-commerce on a network. One method detailed in this disclosure synchronizes broadcast content with dynamic network content at a network address. This method embeds an identifier in a broadcast, extracts the identifier embedded in broadcast content, and uses the identifier to identify corresponding network content. The method then posts the corresponding network content on a network device located at the network address (e.g., a web page at the URL of the broadcaster). The network device (e.g., web server) is responsive to requests sent to the network address to provide the network content over a network. Using this method, the broadcast content is synchronized with the corresponding network content. This approach enables the content at the broadcaster's fixed web site URL to change dynamically with the broadcast. This approach is transparent to the user, who simply visits the same URL to get more information about current programming or purchase a product currently advertised in current programming.