摘要:
Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware, and data hiding techniques—sometimes alone, sometimes in combination. Many of these improvements can be applied to increase the security of computer systems, and networks of which they form part.
摘要:
The present invention provides methods and systems to improve network searching for watermarked content. In some implementations we employ keyword searching to narrow the universe of possible URL candidates. A resulting URL list is searched for digital watermarking. A system is provided to allow customer input. For example, a customer enters keywords or network locations. The keywords or network locations are provided to a watermark-enabled web browser which accesses locations associated with the keywords or network locations. Some implementations of the present invention employ a plurality of distributed watermark-enabled web browsers. Other aspects of the invention provide methods and system to facilitate desktop searching and automated metadata gathering and generating. In one implementation a digital watermark is used to determine whether metadata associated with an image or audio file is current or fresh. The metadata is updated when it is out of date. Watermarks can also be used to link to or facilitate so-called on-line “blogs” (or online conversations).
摘要:
The present invention provides methods and systems to improve network searching for watermarked content. In some implementations we employ keyword searching to narrow the universe of possible URL candidates. A resulting URL list is searched for digital watermarking. A system is provided to allow customer input. For example, a customer enters keywords or network locations. The keywords or network locations are provided to a watermark-enabled web browser which accesses locations associated with the keywords or network locations. Some implementations of the present invention employ a plurality of distributed watermark-enabled web browsers. Other aspects of the invention provide methods and system to facilitate desktop searching and automated metadata gathering and generating. In one implementation a digital watermark is used to determine whether metadata associated with an image or audio file is current or fresh. The metadata is updated when it is out of date. Watermarks can also be used to link to or facilitate so-called on-line “blogs” (or online conversations).
摘要:
The present invention relates to methods and apparatus employing digital watermarking and/or steganography. In one implementation a printer includes watermarking capabilities to facilitate image management. Other implementations are detailed herein as well.
摘要:
Systems and methods are provided for associating traceability codes on clamshells with unique identifiers on containers in which the empty clamshells are packed for later use. In various methods, the clamshells are marked with traceability codes and stacked together, one traceability code is read from one of the clamshells in each stack, a unique identifier is read from a container, and the stack is placed in the container. The traceability code is stored in association with the unique identifier for later retrieval. An exemplary table for making clamshell-to-container associations comprises a scanner for reading traceability codes and rails for positioning stacks of clamshells proximate to the scanner. The table can also comprise a second scanner positioned to read unique identifiers from containers placed proximate thereto. The table can further comprise a computing system to make and store the associations.
摘要:
This disclosure details systems and methods for embedding and reading auxiliary code signals in documents, and for using the code signals to enable a variety of forensic tracking, monitoring and usage control functions.
摘要:
Systems and methods are provided for associating traceability codes on clamshells with unique identifiers on containers in which the empty clamshells are packed for later use. In various methods, the clamshells are marked with traceability codes and stacked together, one traceability code is read from one of the clamshells in each stack, a unique identifier is read from a container, and the stack is placed in the container. The traceability code is stored in association with the unique identifier for later retrieval. An exemplary table for making clamshell-to-container associations comprises a scanner for reading traceability codes and rails for positioning stacks of clamshells proximate to the scanner. The table can also comprise a second scanner positioned to read unique identifiers from containers placed proximate thereto. The table can further comprise a computing system to make and store the associations.
摘要:
Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware, and data hiding techniques—sometimes alone, sometimes in combination. Many of these improvements can be applied to increase the security of computer systems, and networks of which they form part.
摘要:
Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware, and data hiding techniques—sometimes alone, sometimes in combination. Many of these improvements can be applied to increase the security of computer systems, and networks of which they form part.
摘要:
The present disclosure relates to signal processing. One claim recites a method comprising: receiving an imagery or audio file; utilizing a configured multi-purpose electronic processor, identifying perceptual features in the imagery or audio file; and based on the perceptual features or data representing the perceptual features automatically creating metadata for the imagery or audio file. The act of automatically creating metadata utilizes at least some data obtained from a process in a portable computing device, the process comprises communication with a device that is separate from an apparatus that is performing the method. Of course, other claims and are provided too.