US8670600B2 - Methods and systems for image fingerprinting - Google Patents
Methods and systems for image fingerprinting Download PDFInfo
- Publication number
- US8670600B2 US8670600B2 US13/659,793 US201213659793A US8670600B2 US 8670600 B2 US8670600 B2 US 8670600B2 US 201213659793 A US201213659793 A US 201213659793A US 8670600 B2 US8670600 B2 US 8670600B2
- Authority
- US
- United States
- Prior art keywords
- feature point
- point
- image data
- neighborhood
- feature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/40—Extraction of image or video features
- G06V10/46—Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]; Salient regional features
- G06V10/462—Salient features, e.g. scale invariant feature transforms [SIFT]
Definitions
- the present invention relates to information security and more specifically it relates to systems and methods for detecting and preventing unauthorized disclosure of secure information. Furthermore, the present invention pertains to fingerprinting image data.
- the organizations face the challenge of categorizing and maintaining the large corpus of digital information across potentially thousands of data stores, content management systems, end-user desktops, etc. It is therefore important to the organization to be able to store concise and lightweight versions of fingerprints corresponding to the vast amounts of image data.
- Image data is susceptible to being transformed from its original form to a derivate form.
- derivative image data include image file format conversion (e.g., changing a BMP image format to a JPEG image format, etc.), cropping the original image, altering dimensions of the original image, change in scale and/or orientation of the original image, rotation of the image by an angle, etc.
- One method to detect derivative image data is to sample features across the entire original image, record the values of the sampled features, and perform a nearest neighbor search of the sampled features.
- the nearest neighbors on the original image are compared against the nearest neighbors of the image being inspected to detect similarities.
- a histogram of RGB pixel values is generated for the entire original image, and compared against a histogram of RGB pixel values generated for the entire image to be inspected. If the histograms of the original image and the image being inspected are approximately similar, a similarity is detected.
- this entire image approach is not suitable for partial image matches (e.g., when the image to be inspected is only a portion of the original image), and does not handle several types of transformations in a derivate image. For example, cropping the image to be inspected in half drastically changes its global characteristics, and will therefore escape detection when compared against the original image.
- feature points are identified within the image.
- the feature points are identified by locating edges or corners within the image.
- Other algorithmic approaches may also be employed to identify feature points. Examples of such algorithmic approaches include Harris detection, Moravec detection, Shi and Tomasi detection, Harris-Laplace detection, FAST, SIFT, etc.
- descriptors are computed by examining the regions surrounding the feature points.
- the descriptors are recorded and searched to correlate derived regions within the image. Examples of the descriptor methods include creating a histogram, employing SIFT, using steerable filters, or using moment invariants.
- the first disadvantage is that the descriptors are large, and therefore occupy a large space.
- the cost and efficiency associated with storing and maintaining these large descriptors compound and increase with an increase in the amount of digital information an organization intends to protect.
- comparing feature points involves searching through a highly dimensional space, making this approach computationally slow.
- the present invention provides methods and systems to fingerprint image data.
- the image data is normalized to a canonical format.
- Feature points are identified in the normalized image data.
- a plurality of closest neighbors is determined for each feature point.
- an anchor point is identified among the plurality of closest neighbors of each feature point.
- the distance between the feature point and each of its closest neighbors is calculated relative to the distance between the feature point and the anchor point.
- the angle between the feature point and its closest neighbors is computed relative to the angle between the feature point and the anchor point.
- the angle and distance information is used to generate a point vector.
- a hash function is then applied over the point vectors to generate a fingerprint for the corresponding feature point.
- a fingerprint server maintains image fingerprints corresponding to secure image data that an organization desires to protect.
- client systems e.g., a user's personal computer
- fingerprints are generated for any image data that the user desires to transmit outside of the organization.
- the client fingerprints are compared and matched against the fingerprints in the fingerprint server. If any of the fingerprints from the client systems match any of the fingerprints in the fingerprint server, an appropriate security event is initiated (e.g., blocking the user's access to an image data file, etc.).
- the angles and distances are computed relative to the anchor point.
- the angles and distances are computed using a predetermined direction of rotation about the feature point. This ensures that similar fingerprints are generated for the original image data and derivate versions where the image data is rotated or skewed by an angle. Additionally, since the fingerprints capture the features of their neighborhood (for example, by calculating point vectors of closest feature points), the fingerprints are robust against variations in a derivate image data (e.g., when the original image is cropped). Additionally, a single fingerprint is computed for all point vectors corresponding to a feature point's neighborhood. This allows for efficient and lower cost establishment and maintenance of an organization's secure fingerprint database.
- FIG. 1 illustrates an exemplary embodiment of an image fingerprinting and derivative image data detection system
- FIG. 2 is a flowchart depicting one embodiment of an overall method to generate image fingerprints
- FIG. 3 is a flowchart illustrating a method to generate a P-neighborhood for each feature point
- FIG. 4 is a flowchart depicting a method to generate point vectors for a particular feature point.
- FIG. 5 is a flowchart illustrating a method for generating fingerprints from point vectors.
- FIG. 1 illustrates an overall embodiment of a setup to protect an organization's secure image information from unauthorized disclosure.
- the setup has several clients (e.g., Client 1 110 , Client 2 120 , etc.). Each of these clients represents an egress point through which a user may transmit secure image information outside of the organization.
- An egress point is a location or device through which a user may, for example, transmit information outside of the organization.
- client 1 110 accepts image data (e.g., 102 , 103 , 104 , etc.) that a first user desires to transmit through client 1 110 .
- client 2 120 also accepts image data (e.g., 112 , 113 , 114 ) that a second user desires to transmit through client 2 120 .
- fingerprinting software is available in each of the clients to generate one or more fingerprints for each image data.
- the clients contain at least one processor to execute the fingerprinting software.
- the processor is coupled to a memory that stores the instructions corresponding to the fingerprinting software. Examples of the memory include read-only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, etc.
- the clients e.g., 110 , 120
- these fingerprints are then compared against a repository of secure or registered fingerprints (e.g., 140 ).
- the setup illustrated in FIG. 1 employs a fingerprint server 135 .
- the fingerprint server 135 stores a fingerprint database 140 .
- the fingerprint database 140 contains a repository of fingerprints corresponding to secure image information that the organization intends to protect. Fingerprints are generated from the secure image information (e.g., 151 , 152 , 153 , 154 , 155 , etc.) that the organization intends to protect.
- Fingerprints for the secure image information are generated, in some instances, using a registered fingerprint generator 145 .
- the registered fingerprint generator comprises a host computer to perform the operations of a fingerprinting software to generate secure fingerprints.
- the host computer contains at least one processor to execute the fingerprinting software.
- the processor is coupled to a host memory that stores the instructions corresponding to the fingerprinting software. Examples of the memory include read-only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, etc.
- the secure fingerprints generated using the registered fingerprint software are stored, in some instances, in the fingerprint database 140 .
- the fingerprint server 135 utilizes the fingerprint database 140 to compare client fingerprints (e.g., 115 , 125 , etc.) against the secure fingerprints corresponding to the secure image information of the organization.
- the client fingerprints (e.g., 115 , 125 , etc.) are transmitted to the fingerprint server 135 utilizing a network 130 .
- the network 130 may be a local network specific to the organization, or in other instances, may be the public internet, or in some other instances, may be combination of a local network and the public internet.
- the client fingerprints are transmitted to the fingerprint server 135 .
- the fingerprint server 135 compares the client fingerprints against the secure fingerprints contained in the fingerprint database 140 .
- a suitable security action is initiated.
- security actions include preventing the information from being transmitted out through the associated client, sending out a security alert to a system administrator, revoking the user's access to the particular information, alerting the user of the security violation, etc.
- the security actions may also include integration with third party software to offer security solutions (e.g., integration with Microsoft Windows® RMS to apply rights management to the information being disclosed). It is understood that these examples of security actions are used for illustrative purposes only, and that other security actions known to people skilled in the art may suitably be employed.
- the fingerprinting of the image data can occur at locations other than the egress point through which the image is transmitted.
- the image data may be transmitted across a network to a remote server, where the fingerprinting operations may be done. Matching of the client fingerprints against a repository of secure fingerprints may also be done at the remote server.
- the fingerprints may be locally generated at the site of the egress points, and the client fingerprints may be matched against a lightweight secure fingerprint database locally available at the site of the egress point.
- U.S. patent application Ser. No. 12/209,082 titled “Methods and Systems for Protect Agents Using Distributed Lightweight Fingerprints”
- U.S. patent application Ser. No. 12/209,096 titled “Methods and Systems to Implement Fingerprint Lookups Across Remote Agents” for detailed information on the implementation of these examples.
- FIG. 2 is a flowchart depicting a method for generating image fingerprints.
- image data to be fingerprinted is first received 205 for further processing.
- This image data in some instances, is first normalized to a canonical format 210 .
- the received image may be in one of several digital image formats. Examples of digital image formats include BMP, JPEG, GIF, PNG, etc.
- the format of the received image data also includes any other digital image format known to people skilled in the art.
- the received image data regardless of the format in which it is received, is converted to a common format. In some instances, the image data is represented as a two-dimensional array, with the elements of the array defining attributes or intensity values of the image data (e.g., RGB values, etc.) at each pixel location.
- feature points are identified or received from the image data.
- the feature points are identified by locating edges or corners within the image.
- other algorithmic approaches may also be employed to identify feature points. Examples of such algorithmic approaches include Harris detection, Moravec detection, Shi and Tomasi detection, Harris-Laplace detection, FAST, SIFT, etc. It is noted that, in some instances, the feature points are determined and selected at step 215 . In other instances, the technique described with reference to FIG. 2 may start at step 215 , where a previously determined set of feature points may be received for further processing.
- edges, corners, specific contrast regions, centers of polygons, etc. appearing in the image data may be employed as feature points.
- edges, corners, specific contrast regions, centers of polygons, etc. appearing in the image data may be employed as feature points.
- a P-neighborhood list of feature points is established for each feature point identified/received using step 215 .
- the P-neighborhood is determined, in some instances, by identifying a “P” number of closest feature points to each feature point “C” (hereinafter, “C-Point”).
- C-Point a “P” number of closest feature points to each feature point “C”
- the P-neighborhood is then processed in later stages (as discussed in steps 223 - 345 below) to generate a fingerprint associated with the C-Point.
- the number of feature points in the P-neighborhood of each C-Point influences the accuracy of detection when, for example, the fingerprint server ( 135 of FIG. 1 ) compares a client fingerprint against a registered fingerprint.
- a small number of feature points in the P-neighborhood will, in some instances, increase the probability of false positives (e.g., reporting that a client fingerprint matches against a registered fingerprint when the client fingerprint and registered fingerprint are not associated with the same image data). Therefore, depending on the amount of detection accuracy desired by an organization, the number of feature points in the P-neighborhood can be increased such that small local changes in the image data will be captured in the resulting fingerprint.
- C-Point there may be more than one equally distant closest point to the C-Point, making the overall number of feature points in the P-neighborhood greater than the required “P” value.
- ties can be resolved by, for example, placing a limit on the overall number of equidistant points to consider or record in the P-neighborhood.
- the C-Point may be discarded from the feature point list. The justification for discarding such C-Points is that the particular feature point is uninteresting and would not result in a robust fingerprint. This approach of discarding uninteresting C-Points ensures that the overall fingerprint database is efficiently maintained.
- the distance between the C-Point and its associated P-neighborhood feature points are computed and recorded.
- the distance between two feature points in some instances, is determined by computing the Euclidean distance between the two feature points. Therefore, if the first feature point is at location (x,y) and the second feature point is at location (x′, y′), the distance between the two points can be calculated using the Euclidean distance formula, given by ⁇ square root over ((x ⁇ x′) 2 +(y ⁇ y′) 2 ) ⁇ square root over ((x ⁇ x′) 2 +(y ⁇ y′) 2 ) ⁇ .
- the techniques described herein use a modified Euclidean distance formula to determine the distance between two feature points for the purpose of establishing the P-neighborhood of each C-Point.
- the expensive square-root operation is excluded. Even without the square-root operation, the square of the distance values, as determined by (x ⁇ x′) 2 +(y ⁇ y′) 2 preserves the comparative distance between the two feature points, and therefore is adequate to identify the P-neighborhood feature points.
- the distance between each C-Point and its associated P-neighborhood feature points is computed, and therefore a large number of distance computation steps are involved in image fingerprinting. It is therefore beneficial to exclude the expensive square-root operation of the Euclidean distance formula to considerably reduce the overall computation time.
- the distance between the C-Point and the P-neighborhood feature points is not sufficient to produce a sufficiently unique description of the feature region. It is therefore desirable to incorporate information about the angle between the C-Point and the P-neighborhood feature points, as indicated in step 230 .
- the distance and angle information between the C-Point and each P-neighborhood point is combined, in some instances, to obtain a vector value (a “point vector”), as indicated in step 235 .
- each point vector may be computed using the distance and angle between the actual locations of the feature points in the image data.
- derivate image formats even a small change in the angle of the image may result in the generation of completely different angle values between the feature points, thus resulting in different point vectors. It is therefore beneficial to use “relative” angle and distance information for computation of the point vectors, to maintain consistency in point vectors even in derivate formats of the image data.
- “relative” angle and distance information for computation of the point vectors, to maintain consistency in point vectors even in derivate formats of the image data.
- a single hash value is generated for each C-Point by taking in to account all point vectors associated with the P-neighborhood feature points. Therefore, regardless of the number of feature-points included in the P-neighborhood, a single hash value is generated, and this hash value is designated as a fingerprint for the C-Point. Additional details on normalization of the relative distance and angle between the C-Point and all P-neighborhood point vectors and final generation of the hash values is described in greater detail with reference to FIG. 5 below.
- the process continues to generate fingerprints for all other feature points identified/received for the image data, as indicated in step 245 .
- FIG. 3 is a flow chart illustrating approaches to determine the P-neighborhood feature points for each C-Point.
- a first C-Point is chosen 305 for determining an associated P-neighborhood.
- the P-neighborhood in some instances, involves the determination of P number of closest feature points to the selected C-Point 310 .
- the feature points in the P-neighborhood are determined by computing the distance from the C-Point to every other feature point identified in the image data 320 . Based on the resulting distance values, the first P-number of closest feature points are identified to form the P-neighborhood for the C-Point. Because this approach computes the distance from the C-Point to every feature point of the image data, it is computationally expensive, especially because the entire set of computations has to be repeated for every feature point of the image data. For example, if there are n number of feature points in the image data, this approach would require a total of O(n 2 ) computations.
- the feature points of an image data are recorded in row and column order.
- the feature points are recorded, for example, in a table based on their location in the original or normalized image.
- the search for the nearest feature points for a particular feature point ends after identifying the row and/or column of the maximum point state based on the required number of feature points in the P-neighborhood.
- This approach is preferable over the approach explained in step 320 due to the considerable reduction in the number of required computations.
- the effective number of computations in this approach is 2O(n). Using this approach also contributes to improving the overall computational efficiency of image fingerprint generation.
- FIG. 4 is a flow chart depicting techniques for computation of point vectors for each C-Point.
- a C-Point for which point vectors are to be computed is first selected 405 .
- a P-neighborhood as discussed in detail above, is established for the C-Point by selecting P closest feature points.
- the “closest” of the P closest feature points is identified as an anchor point 415 .
- the anchor point in other words, is the closest feature point to a C-Point.
- One of the two comparative distance approaches discussed above may be used in determining the anchor point.
- one of the closest feature points is chosen as the anchor point by using several approaches 425 .
- the closest feature point that has the smallest angle with the farthest point in the P-neighborhood is designated as the anchor point 428 .
- the average angle of all feature points in the P-neighborhood is computed, and the anchor point is chosen based on which closest feature point has a smaller angle to the average angle value. It is understood that other approaches known to people skilled in the art may also be implemented to determine one closest point among several closest points here.
- one least minimally distant feature point is designated as the anchor point 430 .
- the angle between the C-Point and the anchor point is calculated (hereinafter the “anchor vector angle”).
- the anchor vector angle is used to determine the relative angle between the C-Point and the remaining feature points of the P-neighborhood, as indicated in step 440 .
- the anchor vector angle is assigned, for example, a zero value, and relative angle values are determined for all other feature points in relation to the anchor vector angle.
- the relative angles are computed in a predetermined direction of rotation.
- the direction of rotation is fixed (e.g., the angles are always computed in a clockwise direction relative to the location of the anchor point).
- the direction of rotation is determined independently for each P-neighborhood.
- the direction of rotation of a particular P-neighborhood is determined based on features local to that particular P-neighborhood.
- the direction is chosen by rotating from the anchor point to another feature point with the smallest angle to the anchor point.
- the direction is chosen by rotating from the anchor point to a most-distant feature point in the P-neighborhood.
- the use of the localized direction of rotation at the registration and matching stages ensures that the fingerprints are robust against certain changes in derivate image data. For example, flipping or mirror transforms in the derivate image data will cause the relative angles to also flip or mirror correspondingly, resulting in a fingerprint matching the same feature in the original image.
- FIG. 5 is a flow chart that illustrates techniques for generating fingerprints for each feature point using their corresponding point vectors.
- a feature point (C-Point) for which the fingerprint is to be generated is first chosen 505 .
- the angle and distance between the C-Point and a collection of neighboring feature points is computed to determine point vectors corresponding to the C-Point 510 .
- an anchor point is determined, as explained above, to compute the distance and angle of the point vectors relative to this anchor point.
- the distances and angles of each point vector is normalized in relation to the anchor point 515 .
- the value of the distance between the C-Point and each feature point of the P-neighborhood is divided by the distance between the C-Point and the anchor point.
- the angle values are also, in some instances, normalized in a similar fashion.
- a hash function is then run over all the point vectors of the P-neighborhood 520 .
- the hash function in some instances, is applied in a predetermined direction. For example, one of the directions explained in step 440 of FIG. 4 may be employed to apply the hash function. Any hash function known to people skilled in the art may be applied to compute one final hash value that corresponds to the point vectors of the P-neighborhood of a particular C-Point. In some instances, the point vector corresponding to the anchor point may be excluded from the hash generation, further improving the overall computational efficiency.
- the single hash value is an integer calculated based on the point vectors of a particular P-neighborhood. The single hash value is designated as the fingerprint corresponding to the C-Point 525 .
- angles and distance values are rounded to their nearest floor or ceil values before applying the hash function. This ensures that similar fingerprints are generated for related features of the image data.
- the normalized point vector data and direction of rotation may also be used as a descriptor of the C-Point instead of generating the fingerprint using the hash generator.
- an ordered list of the point vector data based on the direction of orientation may be considered in a (P ⁇ 1)*2 dimensional space.
- nearest neighbor techniques for example, may be employed to match client P-neighborhood vector descriptors to registered descriptors.
- this approach increases the overall complexity of the detection and registration processes. Generation of a single fingerprint, as described in FIG. 5 , on the other hand, considerably reduces the amount of data stored, and the lookup becomes, for example, a single integer match.
- This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer.
- a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, each coupled to a computer system.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Image Processing (AREA)
Abstract
Description
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/659,793 US8670600B2 (en) | 2008-11-20 | 2012-10-24 | Methods and systems for image fingerprinting |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/275,185 US8406456B2 (en) | 2008-11-20 | 2008-11-20 | Methods and systems for image fingerprinting |
US13/659,793 US8670600B2 (en) | 2008-11-20 | 2012-10-24 | Methods and systems for image fingerprinting |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/275,185 Continuation US8406456B2 (en) | 2008-11-20 | 2008-11-20 | Methods and systems for image fingerprinting |
Publications (2)
Publication Number | Publication Date |
---|---|
US20130064418A1 US20130064418A1 (en) | 2013-03-14 |
US8670600B2 true US8670600B2 (en) | 2014-03-11 |
Family
ID=42172105
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/275,185 Active 2031-08-13 US8406456B2 (en) | 2008-11-20 | 2008-11-20 | Methods and systems for image fingerprinting |
US13/659,817 Active US8620020B2 (en) | 2008-11-20 | 2012-10-24 | Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting |
US13/659,793 Active US8670600B2 (en) | 2008-11-20 | 2012-10-24 | Methods and systems for image fingerprinting |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/275,185 Active 2031-08-13 US8406456B2 (en) | 2008-11-20 | 2008-11-20 | Methods and systems for image fingerprinting |
US13/659,817 Active US8620020B2 (en) | 2008-11-20 | 2012-10-24 | Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting |
Country Status (2)
Country | Link |
---|---|
US (3) | US8406456B2 (en) |
WO (1) | WO2010059675A2 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9473512B2 (en) | 2008-07-21 | 2016-10-18 | Workshare Technology, Inc. | Methods and systems to implement fingerprint lookups across remote agents |
US9613340B2 (en) | 2011-06-14 | 2017-04-04 | Workshare Ltd. | Method and system for shared document approval |
US9948676B2 (en) | 2013-07-25 | 2018-04-17 | Workshare, Ltd. | System and method for securing documents prior to transmission |
US10025759B2 (en) | 2010-11-29 | 2018-07-17 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US20190266482A1 (en) * | 2018-02-26 | 2019-08-29 | Gsi Technology Inc. | Distance based deep learning |
US10783326B2 (en) | 2013-03-14 | 2020-09-22 | Workshare, Ltd. | System for tracking changes in a collaborative document editing environment |
US10963584B2 (en) | 2011-06-08 | 2021-03-30 | Workshare Ltd. | Method and system for collaborative editing of a remotely stored document |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8555080B2 (en) * | 2008-09-11 | 2013-10-08 | Workshare Technology, Inc. | Methods and systems for protect agents using distributed lightweight fingerprints |
US9092636B2 (en) * | 2008-11-18 | 2015-07-28 | Workshare Technology, Inc. | Methods and systems for exact data match filtering |
US8406456B2 (en) | 2008-11-20 | 2013-03-26 | Workshare Technology, Inc. | Methods and systems for image fingerprinting |
US11030163B2 (en) | 2011-11-29 | 2021-06-08 | Workshare, Ltd. | System for tracking and displaying changes in a set of related electronic documents |
US9047492B2 (en) * | 2011-03-22 | 2015-06-02 | Echostar Uk Holdings Limited | Apparatus, systems and methods for securely storing media content events on a flash memory device |
US10880359B2 (en) | 2011-12-21 | 2020-12-29 | Workshare, Ltd. | System and method for cross platform document sharing |
US10574729B2 (en) | 2011-06-08 | 2020-02-25 | Workshare Ltd. | System and method for cross platform document sharing |
US9170990B2 (en) | 2013-03-14 | 2015-10-27 | Workshare Limited | Method and system for document retrieval with selective document comparison |
US8588525B1 (en) * | 2011-11-17 | 2013-11-19 | Google Inc. | Transformation invariant media matching |
US8880899B1 (en) * | 2012-04-26 | 2014-11-04 | Google Inc. | Systems and methods for facilitating flip-resistant media fingerprinting |
US9135712B2 (en) * | 2012-08-01 | 2015-09-15 | Augmented Reality Lab LLC | Image recognition system in a cloud environment |
CN103150495B (en) * | 2013-02-05 | 2015-11-25 | 浙江工业大学 | Based on the digital finger-print detection and tracking method of Agent |
CN103226671B (en) * | 2013-02-05 | 2015-10-07 | 浙江工业大学 | The long-range embedding of digital finger-print based on Agent and dissemination method |
IL226219A (en) | 2013-05-07 | 2016-10-31 | Picscout (Israel) Ltd | Efficient image matching for large sets of images |
US10911492B2 (en) | 2013-07-25 | 2021-02-02 | Workshare Ltd. | System and method for securing documents prior to transmission |
WO2015041833A1 (en) * | 2013-09-17 | 2015-03-26 | William Brian Kinard | Animal/pet identification system and method based on biometrics |
CN104199842B (en) * | 2014-08-07 | 2017-10-24 | 同济大学 | A kind of similar pictures search method based on local feature neighborhood information |
US10133723B2 (en) | 2014-12-29 | 2018-11-20 | Workshare Ltd. | System and method for determining document version geneology |
US11182551B2 (en) | 2014-12-29 | 2021-11-23 | Workshare Ltd. | System and method for determining document version geneology |
US11763013B2 (en) | 2015-08-07 | 2023-09-19 | Workshare, Ltd. | Transaction document management system and method |
US10468065B2 (en) | 2015-10-28 | 2019-11-05 | Ustudio, Inc. | Video frame difference engine |
CN107315935B (en) * | 2016-04-27 | 2022-03-25 | 中兴通讯股份有限公司 | Multi-fingerprint identification method and device |
CN106056087A (en) * | 2016-06-03 | 2016-10-26 | 济源维恩科技开发有限公司 | Sign-in method based on multi-mode recognition |
GB201708767D0 (en) * | 2017-06-01 | 2017-07-19 | Microsoft Technology Licensing Llc | Managing electronic documents |
US10957445B2 (en) | 2017-10-05 | 2021-03-23 | Hill-Rom Services, Inc. | Caregiver and staff information system |
CN108805034B (en) * | 2018-05-22 | 2021-09-28 | 公安部物证鉴定中心 | Fingerprint feature similarity evaluation method based on probability geometric features |
US10754998B2 (en) | 2018-10-17 | 2020-08-25 | Bank Of America Corporation | Data loss prevention using machine learning |
CN109919022A (en) * | 2019-01-29 | 2019-06-21 | 浙江工业大学 | An Adaptive Method for Extracting Internal and External Fingerprints of OCT |
CN111241979B (en) * | 2020-01-07 | 2023-06-23 | 浙江科技学院 | Real-time obstacle detection method based on image feature calibration |
CN113869414B (en) * | 2021-09-28 | 2022-11-08 | 埃洛克航空科技(北京)有限公司 | Matching method and device for sparse reconstruction |
CN113963179A (en) * | 2021-12-21 | 2022-01-21 | 深圳视觉航空科技有限公司 | Image feature texture tracking and identifying algorithm based on SIFT |
Citations (137)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4479195A (en) | 1982-09-07 | 1984-10-23 | At&T Bell Laboratories | Data conference system |
US4949300A (en) | 1988-01-07 | 1990-08-14 | International Business Machines Corporation | Sharing word-processing functions among multiple processors |
US5008853A (en) | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5072412A (en) | 1987-03-25 | 1991-12-10 | Xerox Corporation | User interface with multiple workspaces for sharing display system objects |
US5220657A (en) | 1987-12-02 | 1993-06-15 | Xerox Corporation | Updating local copy of shared data in a collaborative system |
US5245553A (en) | 1989-12-14 | 1993-09-14 | Options Unlimited Research | Full-duplex video communication and document generation system |
US5247615A (en) | 1989-12-21 | 1993-09-21 | Hitachi, Ltd. | Control method and system for establishing a connection among terminals forming a joint project information processing system |
US5293619A (en) | 1991-05-30 | 1994-03-08 | Sandia Corporation | Method and apparatus for collaborative use of application program |
US5379374A (en) | 1990-11-21 | 1995-01-03 | Hitachi, Ltd. | Collaborative information processing system and workstation |
US5446842A (en) | 1993-02-26 | 1995-08-29 | Taligent, Inc. | Object-oriented collaboration system |
US5608872A (en) | 1993-03-19 | 1997-03-04 | Ncr Corporation | System for allowing all remote computers to perform annotation on an image and replicating the annotated image on the respective displays of other comuters |
US5617539A (en) | 1993-10-01 | 1997-04-01 | Vicor, Inc. | Multimedia collaboration system with separate data network and A/V network controlled by information transmitting on the data network |
US5634062A (en) | 1993-10-27 | 1997-05-27 | Fuji Xerox Co., Ltd. | System for managing hypertext node information and link information |
US5671428A (en) | 1991-08-28 | 1997-09-23 | Kabushiki Kaisha Toshiba | Collaborative document processing system with version and comment management |
US5699427A (en) * | 1995-06-23 | 1997-12-16 | International Business Machines Corporation | Method to deter document and intellectual property piracy through individualization |
US5787175A (en) | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
USRE35861E (en) | 1986-03-12 | 1998-07-28 | Advanced Software, Inc. | Apparatus and method for comparing data groups |
US5801702A (en) | 1995-03-09 | 1998-09-01 | Terrabyte Technology | System and method for adding network links in a displayed hierarchy |
US5806078A (en) | 1994-06-09 | 1998-09-08 | Softool Corporation | Version management system |
US5819300A (en) | 1993-12-28 | 1998-10-06 | Canon Kabushiki Kaisha | Document processing apparatus and method therefor |
US5832494A (en) | 1993-06-14 | 1998-11-03 | Libertech, Inc. | Method and apparatus for indexing, searching and displaying data |
US5890177A (en) | 1996-04-24 | 1999-03-30 | International Business Machines Corporation | Method and apparatus for consolidating edits made by multiple editors working on multiple document copies |
US5898836A (en) | 1997-01-14 | 1999-04-27 | Netmind Services, Inc. | Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures |
US6003060A (en) | 1996-12-20 | 1999-12-14 | International Business Machines Corporation | Method and apparatus to share resources while processing multiple priority data flows |
US6012087A (en) | 1997-01-14 | 2000-01-04 | Netmind Technologies, Inc. | Unique-change detection of dynamic web pages using history tables of signatures |
US6049804A (en) | 1995-11-01 | 2000-04-11 | Filetek, Inc. | Method and apparatus for segmenting a database |
US6067551A (en) | 1997-11-14 | 2000-05-23 | Microsoft Corporation | Computer implemented method for simultaneous multi-user editing of a document |
US6088702A (en) | 1998-02-25 | 2000-07-11 | Plantz; Scott H. | Group publishing system |
US6145084A (en) | 1998-10-08 | 2000-11-07 | Net I Trust | Adaptive communication system enabling dissimilar devices to exchange information over a network |
US6189019B1 (en) | 1996-08-14 | 2001-02-13 | Microsoft Corporation | Computer system and computer-implemented process for presenting document connectivity |
US6212534B1 (en) | 1999-05-13 | 2001-04-03 | X-Collaboration Software Corp. | System and method for facilitating collaboration in connection with generating documents among a plurality of operators using networked computer systems |
US6243091B1 (en) | 1997-11-21 | 2001-06-05 | International Business Machines Corporation | Global history view |
US6263364B1 (en) | 1999-11-02 | 2001-07-17 | Alta Vista Company | Web crawler system using plurality of parallel priority level queues having distinct associated download priority levels for prioritizing document downloading and maintaining document freshness |
US6263350B1 (en) | 1996-10-11 | 2001-07-17 | Sun Microsystems, Inc. | Method and system for leasing storage |
US6285999B1 (en) | 1997-01-10 | 2001-09-04 | The Board Of Trustees Of The Leland Stanford Junior University | Method for node ranking in a linked database |
US6301368B1 (en) | 1999-01-29 | 2001-10-09 | International Business Machines Corporation | System and method for data hiding in compressed fingerprint images |
US6321265B1 (en) | 1999-11-02 | 2001-11-20 | Altavista Company | System and method for enforcing politeness while scheduling downloads in a web crawler |
US6336123B2 (en) | 1996-10-02 | 2002-01-01 | Matsushita Electric Industrial Co., Ltd. | Hierarchical based hyper-text document preparing and management apparatus |
US20020010682A1 (en) | 2000-07-20 | 2002-01-24 | Johnson Rodney D. | Information archival and retrieval system for internetworked computers |
US20020019827A1 (en) | 2000-06-05 | 2002-02-14 | Shiman Leon G. | Method and apparatus for managing documents in a centralized document repository system |
US20020023158A1 (en) | 2000-04-27 | 2002-02-21 | Polizzi Kathleen Riddell | Method and apparatus for implementing search and channel features in an enterprise-wide computer system |
US6351755B1 (en) | 1999-11-02 | 2002-02-26 | Alta Vista Company | System and method for associating an extensible set of data with documents downloaded by a web crawler |
US6377984B1 (en) | 1999-11-02 | 2002-04-23 | Alta Vista Company | Web crawler system using parallel queues for queing data sets having common address and concurrently downloading data associated with data set in each queue |
US20020052928A1 (en) | 2000-07-31 | 2002-05-02 | Eliyon Technologies Corporation | Computer method and apparatus for collecting people and organization information from Web sites |
US20020065827A1 (en) | 1995-05-31 | 2002-05-30 | David Christie | Method and apparatus for workgroup information replication |
US20020065848A1 (en) | 2000-08-21 | 2002-05-30 | Richard Walker | Simultaneous multi-user document editing system |
US20020063154A1 (en) | 2000-05-26 | 2002-05-30 | Hector Hoyos | Security system database management |
US6404446B1 (en) | 1997-08-15 | 2002-06-11 | International Business Machines Corporation | Multi-node user interface component and method thereof for use in displaying visual indication of search results |
US20020087515A1 (en) | 2000-11-03 | 2002-07-04 | Swannack Christopher Martyn | Data acquisition system |
US6418433B1 (en) | 1999-01-28 | 2002-07-09 | International Business Machines Corporation | System and method for focussed web crawling |
US6418453B1 (en) | 1999-11-03 | 2002-07-09 | International Business Machines Corporation | Network repository service for efficient web crawling |
US6424966B1 (en) | 1998-06-30 | 2002-07-23 | Microsoft Corporation | Synchronizing crawler with notification source |
US20020099602A1 (en) | 2000-12-04 | 2002-07-25 | Paul Moskowitz | Method and system to provide web site schedules |
US6449624B1 (en) | 1999-10-18 | 2002-09-10 | Fisher-Rosemount Systems, Inc. | Version control and audit trail in a process control system |
US20020129062A1 (en) | 2001-03-08 | 2002-09-12 | Wood River Technologies, Inc. | Apparatus and method for cataloging data |
US20020138744A1 (en) | 2001-03-21 | 2002-09-26 | Schleicher Jorg Gregor | Method and system for providing a secure peer-to peer file delivery network |
US20020136222A1 (en) | 2001-03-20 | 2002-09-26 | Kurt W. Robohm | Systems and methods for updating IP communication service attributes using an LDAP |
US20020159239A1 (en) | 2001-04-27 | 2002-10-31 | Matsushita Electric Industrial Co., Ltd. | PC card |
US20020164058A1 (en) | 2001-05-04 | 2002-11-07 | International Business Machines Corporation | Remote authentication of fingerprints over an insecure network |
US6513050B1 (en) | 1998-08-17 | 2003-01-28 | Connected Place Limited | Method of producing a checkpoint which describes a box file and a method of generating a difference file defining differences between an updated file and a base file |
US20030037010A1 (en) | 2001-04-05 | 2003-02-20 | Audible Magic, Inc. | Copyright detection and protection system and method |
US6547829B1 (en) | 1999-06-30 | 2003-04-15 | Microsoft Corporation | Method and system for detecting duplicate documents in web crawls |
US6560620B1 (en) | 1999-08-03 | 2003-05-06 | Aplix Research, Inc. | Hierarchical document comparison system and method |
US6584466B1 (en) | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
US20030131005A1 (en) | 2002-01-10 | 2003-07-10 | International Business Machines Corporation | Method and apparatus for automatic pruning of search engine indices |
US6594662B1 (en) | 1998-07-01 | 2003-07-15 | Netshadow, Inc. | Method and system for gathering information resident on global computer networks |
US6596030B2 (en) | 1995-10-27 | 2003-07-22 | At&T Corp. | Identifying changes in on-line data repositories |
US20030158839A1 (en) | 2001-05-04 | 2003-08-21 | Yaroslav Faybishenko | System and method for determining relevancy of query responses in a distributed network search mechanism |
US6614789B1 (en) | 1999-12-29 | 2003-09-02 | Nasser Yazdani | Method of and apparatus for matching strings of different lengths |
US6658626B1 (en) | 1998-07-31 | 2003-12-02 | The Regents Of The University Of California | User interface for displaying document comparison information |
US20030223624A1 (en) | 2002-05-30 | 2003-12-04 | Laurence Hamid | Method and apparatus for hashing data |
US20040002049A1 (en) | 2002-07-01 | 2004-01-01 | Jay Beavers | Computer network-based, interactive, multimedia learning system and process |
US6738762B1 (en) | 2001-11-26 | 2004-05-18 | At&T Corp. | Multidimensional substring selectivity estimation using set hashing of cross-counts |
KR20040047413A (en) | 2002-11-30 | 2004-06-05 | 삼성에스디에스 주식회사 | Comparing method of 2d cad file using graphic type |
JP2004265267A (en) | 2003-03-04 | 2004-09-24 | Sharp Corp | Face authentication method and face authentication device |
US20050138540A1 (en) | 2003-12-22 | 2005-06-23 | Xerox Corporation | Systems and methods for user-specific document change highlighting |
US20050251748A1 (en) | 2003-03-24 | 2005-11-10 | Microsoft Corporation | System and method for viewing and editing multi-value properties |
US20060005247A1 (en) | 2004-06-30 | 2006-01-05 | Microsoft Corporation | Method and system for detecting when an outgoing communication contains certain content |
US20060021031A1 (en) | 2004-06-30 | 2006-01-26 | Scott Leahy | Method and system for preventing fraudulent activities |
US20060050937A1 (en) * | 2001-07-25 | 2006-03-09 | Activard Ireland Limited | Method of hash string extraction |
US20060059196A1 (en) | 2002-10-03 | 2006-03-16 | In4S Inc. | Bit string check method and device |
US20060064717A1 (en) | 2004-09-14 | 2006-03-23 | Sony Corporation | Information processing device, information processing method and program therefor |
US20060067578A1 (en) | 2004-09-30 | 2006-03-30 | Fuji Xerox Co., Ltd. | Slide contents processor, slide contents processing method, and storage medium storing program |
US7035427B2 (en) | 1993-11-18 | 2006-04-25 | Digimarc Corporation | Method and system for managing, accessing and paying for the use of copyrighted electronic media |
US20060112120A1 (en) * | 2004-11-22 | 2006-05-25 | International Business Machines Corporation | Method, system, and computer program product for threading documents using body text analysis |
US20060171588A1 (en) * | 2005-01-28 | 2006-08-03 | Microsoft Corporation | Scalable hash-based character recognition |
US7107518B2 (en) | 2001-04-03 | 2006-09-12 | Microsoft Corporation | Automating a document review cycle |
US20060218004A1 (en) | 2005-03-23 | 2006-09-28 | Dworkin Ross E | On-line slide kit creation and collaboration system |
US20060224589A1 (en) | 2005-02-14 | 2006-10-05 | Rowney Kevin T | Method and apparatus for handling messages containing pre-selected data |
US20060236246A1 (en) | 2005-03-23 | 2006-10-19 | Bono Charles A | On-line slide kit creation and collaboration system |
US20060261112A1 (en) | 2005-04-20 | 2006-11-23 | Gates George D | ATV mounting bracket and associated methods |
US20060271947A1 (en) | 2005-05-23 | 2006-11-30 | Lienhart Rainer W | Creating fingerprints |
US7152019B2 (en) | 2004-11-30 | 2006-12-19 | Oracle International Corporation | Systems and methods for sensor-based computing |
US20060294468A1 (en) | 2005-06-24 | 2006-12-28 | Microsoft Corporation | Storage and utilization of slide presentation slides |
US20070005589A1 (en) | 2005-07-01 | 2007-01-04 | Sreenivas Gollapudi | Method and apparatus for document clustering and document sketching |
US20070025265A1 (en) | 2005-07-22 | 2007-02-01 | Porras Phillip A | Method and apparatus for wireless network security |
US7212955B2 (en) | 2001-08-16 | 2007-05-01 | Hewlett-Packard Development Company, L.P. | Consumer product status monitoring |
US20070101413A1 (en) | 2005-10-31 | 2007-05-03 | Sbc Knowledge Ventures, L.P. | System and method of using personal data |
US20070101154A1 (en) | 2005-10-31 | 2007-05-03 | Bardsley Jeffrey S | Methods, systems, and computer program products for associating an originator of a network packet with the network packet using biometric information |
US7240207B2 (en) | 2000-08-11 | 2007-07-03 | Microsoft Corporation | Fingerprinting media entities employing fingerprint algorithms and bit-to-bit comparisons |
US20070192728A1 (en) | 2006-01-26 | 2007-08-16 | Finley William D | Method for dynamic document navigation |
US20070253608A1 (en) * | 2006-03-03 | 2007-11-01 | The Research Foundation Of State University Of New York Stor Intellectual Property Division | Secure fingerprint matching by hashing localized information |
US20070261112A1 (en) | 2006-05-08 | 2007-11-08 | Electro Guard Corp. | Network Security Device |
JP2007299364A (en) | 2006-04-04 | 2007-11-15 | Nippon Telegr & Teleph Corp <Ntt> | Pattern recognition device, pattern recognition method, and storage medium storing program attaining the method |
US7299504B1 (en) | 2002-03-08 | 2007-11-20 | Lucent Technologies Inc. | System and method for implementing security management using a database-modeled security policy |
US20070294612A1 (en) | 2006-06-20 | 2007-12-20 | Microsoft Corporation | Comparing and Managing Multiple Presentations |
US20070294318A1 (en) | 2006-06-20 | 2007-12-20 | Arora Amrinder S | Method, System, and Apparatus for Auditing, Tracking, or Inspection of Data, Objects, or Their Corresponding Modifications |
US20080033913A1 (en) | 2006-05-26 | 2008-02-07 | Winburn Michael L | Techniques for Preventing Insider Theft of Electronic Documents |
US20080082529A1 (en) | 2006-09-29 | 2008-04-03 | Morgan Stanley | Comparing Taxonomies |
US20080080515A1 (en) | 2006-10-02 | 2008-04-03 | Alcatel Lucent | Marker for communication systems consisting of multiple sip servers |
US7356704B2 (en) | 2000-12-07 | 2008-04-08 | International Business Machines Corporation | Aggregated authenticated identity apparatus for and method therefor |
US20080219495A1 (en) * | 2007-03-09 | 2008-09-11 | Microsoft Corporation | Image Comparison |
US7434164B2 (en) | 2001-01-16 | 2008-10-07 | Microsoft Corp. | User interface for adaptive document layout via manifold content |
US7454778B2 (en) | 2004-09-30 | 2008-11-18 | Microsoft Corporation | Enforcing rights management through edge email servers |
US20080320316A1 (en) | 2001-04-26 | 2008-12-25 | Vmware, Inc. | Selective Encryption System and Method for I/O Operations |
US20090034804A1 (en) | 2007-08-02 | 2009-02-05 | Samsung Electronics Co., Ltd | Security method and system using touch screen |
US7496841B2 (en) | 2001-12-17 | 2009-02-24 | Workshare Technology, Ltd. | Method and system for document collaboration |
US20090064326A1 (en) | 2007-09-05 | 2009-03-05 | Gtb Technologies | Method and a system for advanced content security in computer networks |
US20090129002A1 (en) | 2007-11-20 | 2009-05-21 | Hon Hai Precision Industry Co., Ltd. | Computer enclosure adapted for mounting different types of transfer cards |
US20090241187A1 (en) | 2008-03-19 | 2009-09-24 | Websense, Inc. | Method and system for protection against information stealing software |
US7624447B1 (en) | 2005-09-08 | 2009-11-24 | Cisco Technology, Inc. | Using threshold lists for worm detection |
US7627613B1 (en) | 2003-07-03 | 2009-12-01 | Google Inc. | Duplicate document detection in a web crawler system |
US20100017850A1 (en) * | 2008-07-21 | 2010-01-21 | Workshare Technology, Inc. | Methods and systems to fingerprint textual information using word runs |
US7673324B2 (en) | 2005-06-21 | 2010-03-02 | Mcafee, Inc. | Method and system for tracking an operating performed on an information asset with metadata associated therewith |
US7680785B2 (en) | 2005-03-25 | 2010-03-16 | Microsoft Corporation | Systems and methods for inferring uniform resource locator (URL) normalization rules |
US20100070448A1 (en) | 2002-06-24 | 2010-03-18 | Nosa Omoigui | System and method for knowledge retrieval, management, delivery and presentation |
US20100114991A1 (en) | 2008-11-05 | 2010-05-06 | Oracle International Corporation | Managing the content of shared slide presentations |
US7720256B2 (en) | 2002-06-26 | 2010-05-18 | Solystic | Idenitfication tag for postal objects by image signature and associated mail handling |
US7730175B1 (en) | 2003-05-12 | 2010-06-01 | Sourcefire, Inc. | Systems and methods for identifying the services of a network |
US20100299727A1 (en) | 2008-11-18 | 2010-11-25 | Workshare Technology, Inc. | Methods and systems for exact data match filtering |
US7844116B2 (en) | 2007-04-30 | 2010-11-30 | Xerox Corporation | Method for identifying images after cropping |
US7857201B2 (en) | 1999-05-25 | 2010-12-28 | Silverbrook Research Pty Ltd | Method and system for selection |
US8042112B1 (en) | 2003-07-03 | 2011-10-18 | Google Inc. | Scheduler for search engine crawler |
US8181036B1 (en) | 2006-09-29 | 2012-05-15 | Symantec Corporation | Extrusion detection of obfuscated content |
US8406456B2 (en) | 2008-11-20 | 2013-03-26 | Workshare Technology, Inc. | Methods and systems for image fingerprinting |
US8473847B2 (en) | 2009-07-27 | 2013-06-25 | Workshare Technology, Inc. | Methods and systems for comparing presentation slide decks |
US8555080B2 (en) | 2008-09-11 | 2013-10-08 | Workshare Technology, Inc. | Methods and systems for protect agents using distributed lightweight fingerprints |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2815045B2 (en) | 1996-12-16 | 1998-10-27 | 日本電気株式会社 | Image feature extraction device, image feature analysis device, and image matching system |
US6209028B1 (en) * | 1997-03-21 | 2001-03-27 | Walker Digital, Llc | System and method for supplying supplemental audio information for broadcast television programs |
DE69838473T2 (en) * | 1997-12-25 | 2008-01-17 | Nihon Kohden Corp. | Device for transmitting biological signals |
US6301668B1 (en) * | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
KR20010078840A (en) | 2001-04-17 | 2001-08-22 | 유성경 | Security System detecting the leak of information using computer storage device |
KR100751691B1 (en) | 2005-11-08 | 2007-08-23 | 삼성에스디에스 주식회사 | How to edit multiple PowerPoint documents |
KR100882349B1 (en) | 2006-09-29 | 2009-02-12 | 한국전자통신연구원 | Method and device for preventing the leakage of confidential documents |
-
2008
- 2008-11-20 US US12/275,185 patent/US8406456B2/en active Active
-
2009
- 2009-11-18 WO PCT/US2009/064919 patent/WO2010059675A2/en active Application Filing
-
2012
- 2012-10-24 US US13/659,817 patent/US8620020B2/en active Active
- 2012-10-24 US US13/659,793 patent/US8670600B2/en active Active
Patent Citations (148)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4479195A (en) | 1982-09-07 | 1984-10-23 | At&T Bell Laboratories | Data conference system |
USRE35861E (en) | 1986-03-12 | 1998-07-28 | Advanced Software, Inc. | Apparatus and method for comparing data groups |
US5072412A (en) | 1987-03-25 | 1991-12-10 | Xerox Corporation | User interface with multiple workspaces for sharing display system objects |
US5008853A (en) | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5220657A (en) | 1987-12-02 | 1993-06-15 | Xerox Corporation | Updating local copy of shared data in a collaborative system |
US4949300A (en) | 1988-01-07 | 1990-08-14 | International Business Machines Corporation | Sharing word-processing functions among multiple processors |
US5245553A (en) | 1989-12-14 | 1993-09-14 | Options Unlimited Research | Full-duplex video communication and document generation system |
US5247615A (en) | 1989-12-21 | 1993-09-21 | Hitachi, Ltd. | Control method and system for establishing a connection among terminals forming a joint project information processing system |
US5379374A (en) | 1990-11-21 | 1995-01-03 | Hitachi, Ltd. | Collaborative information processing system and workstation |
US5293619A (en) | 1991-05-30 | 1994-03-08 | Sandia Corporation | Method and apparatus for collaborative use of application program |
US5671428A (en) | 1991-08-28 | 1997-09-23 | Kabushiki Kaisha Toshiba | Collaborative document processing system with version and comment management |
US5446842A (en) | 1993-02-26 | 1995-08-29 | Taligent, Inc. | Object-oriented collaboration system |
US5608872A (en) | 1993-03-19 | 1997-03-04 | Ncr Corporation | System for allowing all remote computers to perform annotation on an image and replicating the annotated image on the respective displays of other comuters |
US5832494A (en) | 1993-06-14 | 1998-11-03 | Libertech, Inc. | Method and apparatus for indexing, searching and displaying data |
US5617539A (en) | 1993-10-01 | 1997-04-01 | Vicor, Inc. | Multimedia collaboration system with separate data network and A/V network controlled by information transmitting on the data network |
US5634062A (en) | 1993-10-27 | 1997-05-27 | Fuji Xerox Co., Ltd. | System for managing hypertext node information and link information |
US7035427B2 (en) | 1993-11-18 | 2006-04-25 | Digimarc Corporation | Method and system for managing, accessing and paying for the use of copyrighted electronic media |
US5819300A (en) | 1993-12-28 | 1998-10-06 | Canon Kabushiki Kaisha | Document processing apparatus and method therefor |
US5806078A (en) | 1994-06-09 | 1998-09-08 | Softool Corporation | Version management system |
US5801702A (en) | 1995-03-09 | 1998-09-01 | Terrabyte Technology | System and method for adding network links in a displayed hierarchy |
US20020065827A1 (en) | 1995-05-31 | 2002-05-30 | David Christie | Method and apparatus for workgroup information replication |
US5699427A (en) * | 1995-06-23 | 1997-12-16 | International Business Machines Corporation | Method to deter document and intellectual property piracy through individualization |
US5787175A (en) | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
US6596030B2 (en) | 1995-10-27 | 2003-07-22 | At&T Corp. | Identifying changes in on-line data repositories |
US6049804A (en) | 1995-11-01 | 2000-04-11 | Filetek, Inc. | Method and apparatus for segmenting a database |
US5890177A (en) | 1996-04-24 | 1999-03-30 | International Business Machines Corporation | Method and apparatus for consolidating edits made by multiple editors working on multiple document copies |
US6189019B1 (en) | 1996-08-14 | 2001-02-13 | Microsoft Corporation | Computer system and computer-implemented process for presenting document connectivity |
US6336123B2 (en) | 1996-10-02 | 2002-01-01 | Matsushita Electric Industrial Co., Ltd. | Hierarchical based hyper-text document preparing and management apparatus |
US6263350B1 (en) | 1996-10-11 | 2001-07-17 | Sun Microsystems, Inc. | Method and system for leasing storage |
US6003060A (en) | 1996-12-20 | 1999-12-14 | International Business Machines Corporation | Method and apparatus to share resources while processing multiple priority data flows |
US6285999B1 (en) | 1997-01-10 | 2001-09-04 | The Board Of Trustees Of The Leland Stanford Junior University | Method for node ranking in a linked database |
US6219818B1 (en) | 1997-01-14 | 2001-04-17 | Netmind Technologies, Inc. | Checksum-comparing change-detection tool indicating degree and location of change of internet documents |
US6012087A (en) | 1997-01-14 | 2000-01-04 | Netmind Technologies, Inc. | Unique-change detection of dynamic web pages using history tables of signatures |
US5898836A (en) | 1997-01-14 | 1999-04-27 | Netmind Services, Inc. | Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures |
US6404446B1 (en) | 1997-08-15 | 2002-06-11 | International Business Machines Corporation | Multi-node user interface component and method thereof for use in displaying visual indication of search results |
US6067551A (en) | 1997-11-14 | 2000-05-23 | Microsoft Corporation | Computer implemented method for simultaneous multi-user editing of a document |
US6243091B1 (en) | 1997-11-21 | 2001-06-05 | International Business Machines Corporation | Global history view |
US6088702A (en) | 1998-02-25 | 2000-07-11 | Plantz; Scott H. | Group publishing system |
US6424966B1 (en) | 1998-06-30 | 2002-07-23 | Microsoft Corporation | Synchronizing crawler with notification source |
US6594662B1 (en) | 1998-07-01 | 2003-07-15 | Netshadow, Inc. | Method and system for gathering information resident on global computer networks |
US6658626B1 (en) | 1998-07-31 | 2003-12-02 | The Regents Of The University Of California | User interface for displaying document comparison information |
US6513050B1 (en) | 1998-08-17 | 2003-01-28 | Connected Place Limited | Method of producing a checkpoint which describes a box file and a method of generating a difference file defining differences between an updated file and a base file |
US6145084A (en) | 1998-10-08 | 2000-11-07 | Net I Trust | Adaptive communication system enabling dissimilar devices to exchange information over a network |
US6418433B1 (en) | 1999-01-28 | 2002-07-09 | International Business Machines Corporation | System and method for focussed web crawling |
US6301368B1 (en) | 1999-01-29 | 2001-10-09 | International Business Machines Corporation | System and method for data hiding in compressed fingerprint images |
US6584466B1 (en) | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
US6212534B1 (en) | 1999-05-13 | 2001-04-03 | X-Collaboration Software Corp. | System and method for facilitating collaboration in connection with generating documents among a plurality of operators using networked computer systems |
US7857201B2 (en) | 1999-05-25 | 2010-12-28 | Silverbrook Research Pty Ltd | Method and system for selection |
US6547829B1 (en) | 1999-06-30 | 2003-04-15 | Microsoft Corporation | Method and system for detecting duplicate documents in web crawls |
US6560620B1 (en) | 1999-08-03 | 2003-05-06 | Aplix Research, Inc. | Hierarchical document comparison system and method |
US6449624B1 (en) | 1999-10-18 | 2002-09-10 | Fisher-Rosemount Systems, Inc. | Version control and audit trail in a process control system |
US6377984B1 (en) | 1999-11-02 | 2002-04-23 | Alta Vista Company | Web crawler system using parallel queues for queing data sets having common address and concurrently downloading data associated with data set in each queue |
US6351755B1 (en) | 1999-11-02 | 2002-02-26 | Alta Vista Company | System and method for associating an extensible set of data with documents downloaded by a web crawler |
US6263364B1 (en) | 1999-11-02 | 2001-07-17 | Alta Vista Company | Web crawler system using plurality of parallel priority level queues having distinct associated download priority levels for prioritizing document downloading and maintaining document freshness |
US6321265B1 (en) | 1999-11-02 | 2001-11-20 | Altavista Company | System and method for enforcing politeness while scheduling downloads in a web crawler |
US6418453B1 (en) | 1999-11-03 | 2002-07-09 | International Business Machines Corporation | Network repository service for efficient web crawling |
US6614789B1 (en) | 1999-12-29 | 2003-09-02 | Nasser Yazdani | Method of and apparatus for matching strings of different lengths |
US20020023158A1 (en) | 2000-04-27 | 2002-02-21 | Polizzi Kathleen Riddell | Method and apparatus for implementing search and channel features in an enterprise-wide computer system |
US20020063154A1 (en) | 2000-05-26 | 2002-05-30 | Hector Hoyos | Security system database management |
US20020019827A1 (en) | 2000-06-05 | 2002-02-14 | Shiman Leon G. | Method and apparatus for managing documents in a centralized document repository system |
US20020010682A1 (en) | 2000-07-20 | 2002-01-24 | Johnson Rodney D. | Information archival and retrieval system for internetworked computers |
US20020052928A1 (en) | 2000-07-31 | 2002-05-02 | Eliyon Technologies Corporation | Computer method and apparatus for collecting people and organization information from Web sites |
US7240207B2 (en) | 2000-08-11 | 2007-07-03 | Microsoft Corporation | Fingerprinting media entities employing fingerprint algorithms and bit-to-bit comparisons |
US20020065848A1 (en) | 2000-08-21 | 2002-05-30 | Richard Walker | Simultaneous multi-user document editing system |
US20020087515A1 (en) | 2000-11-03 | 2002-07-04 | Swannack Christopher Martyn | Data acquisition system |
US20020099602A1 (en) | 2000-12-04 | 2002-07-25 | Paul Moskowitz | Method and system to provide web site schedules |
US7356704B2 (en) | 2000-12-07 | 2008-04-08 | International Business Machines Corporation | Aggregated authenticated identity apparatus for and method therefor |
US7694336B2 (en) | 2000-12-07 | 2010-04-06 | International Business Machines Corporation | Aggregated authenticated identity apparatus for and method therefor |
US7434164B2 (en) | 2001-01-16 | 2008-10-07 | Microsoft Corp. | User interface for adaptive document layout via manifold content |
US20020129062A1 (en) | 2001-03-08 | 2002-09-12 | Wood River Technologies, Inc. | Apparatus and method for cataloging data |
US20020136222A1 (en) | 2001-03-20 | 2002-09-26 | Kurt W. Robohm | Systems and methods for updating IP communication service attributes using an LDAP |
US20020138744A1 (en) | 2001-03-21 | 2002-09-26 | Schleicher Jorg Gregor | Method and system for providing a secure peer-to peer file delivery network |
US7107518B2 (en) | 2001-04-03 | 2006-09-12 | Microsoft Corporation | Automating a document review cycle |
US20030037010A1 (en) | 2001-04-05 | 2003-02-20 | Audible Magic, Inc. | Copyright detection and protection system and method |
US20080320316A1 (en) | 2001-04-26 | 2008-12-25 | Vmware, Inc. | Selective Encryption System and Method for I/O Operations |
US20020159239A1 (en) | 2001-04-27 | 2002-10-31 | Matsushita Electric Industrial Co., Ltd. | PC card |
US20030158839A1 (en) | 2001-05-04 | 2003-08-21 | Yaroslav Faybishenko | System and method for determining relevancy of query responses in a distributed network search mechanism |
US20020164058A1 (en) | 2001-05-04 | 2002-11-07 | International Business Machines Corporation | Remote authentication of fingerprints over an insecure network |
US7233686B2 (en) * | 2001-07-25 | 2007-06-19 | Activcard Ireland Limited | Method and system for hash string extraction from biometric data |
US7564997B2 (en) * | 2001-07-25 | 2009-07-21 | Activcard Ireland, Ltd. | System and method of hash string extraction |
US20060050937A1 (en) * | 2001-07-25 | 2006-03-09 | Activard Ireland Limited | Method of hash string extraction |
US20060098850A1 (en) * | 2001-07-25 | 2006-05-11 | Activcard Ireland Limited | Method of hash string extraction |
US7212955B2 (en) | 2001-08-16 | 2007-05-01 | Hewlett-Packard Development Company, L.P. | Consumer product status monitoring |
US6738762B1 (en) | 2001-11-26 | 2004-05-18 | At&T Corp. | Multidimensional substring selectivity estimation using set hashing of cross-counts |
US7496841B2 (en) | 2001-12-17 | 2009-02-24 | Workshare Technology, Ltd. | Method and system for document collaboration |
US20030131005A1 (en) | 2002-01-10 | 2003-07-10 | International Business Machines Corporation | Method and apparatus for automatic pruning of search engine indices |
US7299504B1 (en) | 2002-03-08 | 2007-11-20 | Lucent Technologies Inc. | System and method for implementing security management using a database-modeled security policy |
US20030223624A1 (en) | 2002-05-30 | 2003-12-04 | Laurence Hamid | Method and apparatus for hashing data |
US20100070448A1 (en) | 2002-06-24 | 2010-03-18 | Nosa Omoigui | System and method for knowledge retrieval, management, delivery and presentation |
US7720256B2 (en) | 2002-06-26 | 2010-05-18 | Solystic | Idenitfication tag for postal objects by image signature and associated mail handling |
US20040002049A1 (en) | 2002-07-01 | 2004-01-01 | Jay Beavers | Computer network-based, interactive, multimedia learning system and process |
US20060059196A1 (en) | 2002-10-03 | 2006-03-16 | In4S Inc. | Bit string check method and device |
KR20040047413A (en) | 2002-11-30 | 2004-06-05 | 삼성에스디에스 주식회사 | Comparing method of 2d cad file using graphic type |
JP2004265267A (en) | 2003-03-04 | 2004-09-24 | Sharp Corp | Face authentication method and face authentication device |
US20050251748A1 (en) | 2003-03-24 | 2005-11-10 | Microsoft Corporation | System and method for viewing and editing multi-value properties |
US7730175B1 (en) | 2003-05-12 | 2010-06-01 | Sourcefire, Inc. | Systems and methods for identifying the services of a network |
US8042112B1 (en) | 2003-07-03 | 2011-10-18 | Google Inc. | Scheduler for search engine crawler |
US7627613B1 (en) | 2003-07-03 | 2009-12-01 | Google Inc. | Duplicate document detection in a web crawler system |
US20050138540A1 (en) | 2003-12-22 | 2005-06-23 | Xerox Corporation | Systems and methods for user-specific document change highlighting |
US20060021031A1 (en) | 2004-06-30 | 2006-01-26 | Scott Leahy | Method and system for preventing fraudulent activities |
US20060005247A1 (en) | 2004-06-30 | 2006-01-05 | Microsoft Corporation | Method and system for detecting when an outgoing communication contains certain content |
US20060064717A1 (en) | 2004-09-14 | 2006-03-23 | Sony Corporation | Information processing device, information processing method and program therefor |
US20060067578A1 (en) | 2004-09-30 | 2006-03-30 | Fuji Xerox Co., Ltd. | Slide contents processor, slide contents processing method, and storage medium storing program |
US7454778B2 (en) | 2004-09-30 | 2008-11-18 | Microsoft Corporation | Enforcing rights management through edge email servers |
US20060112120A1 (en) * | 2004-11-22 | 2006-05-25 | International Business Machines Corporation | Method, system, and computer program product for threading documents using body text analysis |
US7152019B2 (en) | 2004-11-30 | 2006-12-19 | Oracle International Corporation | Systems and methods for sensor-based computing |
US20060171588A1 (en) * | 2005-01-28 | 2006-08-03 | Microsoft Corporation | Scalable hash-based character recognition |
US20060224589A1 (en) | 2005-02-14 | 2006-10-05 | Rowney Kevin T | Method and apparatus for handling messages containing pre-selected data |
US20060218004A1 (en) | 2005-03-23 | 2006-09-28 | Dworkin Ross E | On-line slide kit creation and collaboration system |
US20060236246A1 (en) | 2005-03-23 | 2006-10-19 | Bono Charles A | On-line slide kit creation and collaboration system |
US7680785B2 (en) | 2005-03-25 | 2010-03-16 | Microsoft Corporation | Systems and methods for inferring uniform resource locator (URL) normalization rules |
US20060261112A1 (en) | 2005-04-20 | 2006-11-23 | Gates George D | ATV mounting bracket and associated methods |
US20060271947A1 (en) | 2005-05-23 | 2006-11-30 | Lienhart Rainer W | Creating fingerprints |
US7673324B2 (en) | 2005-06-21 | 2010-03-02 | Mcafee, Inc. | Method and system for tracking an operating performed on an information asset with metadata associated therewith |
US20060294468A1 (en) | 2005-06-24 | 2006-12-28 | Microsoft Corporation | Storage and utilization of slide presentation slides |
US20070005589A1 (en) | 2005-07-01 | 2007-01-04 | Sreenivas Gollapudi | Method and apparatus for document clustering and document sketching |
US20070025265A1 (en) | 2005-07-22 | 2007-02-01 | Porras Phillip A | Method and apparatus for wireless network security |
US7624447B1 (en) | 2005-09-08 | 2009-11-24 | Cisco Technology, Inc. | Using threshold lists for worm detection |
US7890752B2 (en) | 2005-10-31 | 2011-02-15 | Scenera Technologies, Llc | Methods, systems, and computer program products for associating an originator of a network packet with the network packet using biometric information |
US20070101413A1 (en) | 2005-10-31 | 2007-05-03 | Sbc Knowledge Ventures, L.P. | System and method of using personal data |
US20070101154A1 (en) | 2005-10-31 | 2007-05-03 | Bardsley Jeffrey S | Methods, systems, and computer program products for associating an originator of a network packet with the network packet using biometric information |
US7877790B2 (en) | 2005-10-31 | 2011-01-25 | At&T Intellectual Property I, L.P. | System and method of using personal data |
US20070192728A1 (en) | 2006-01-26 | 2007-08-16 | Finley William D | Method for dynamic document navigation |
US8005277B2 (en) * | 2006-03-03 | 2011-08-23 | Research Foundation-State University of NY | Secure fingerprint matching by hashing localized information |
US20070253608A1 (en) * | 2006-03-03 | 2007-11-01 | The Research Foundation Of State University Of New York Stor Intellectual Property Division | Secure fingerprint matching by hashing localized information |
JP2007299364A (en) | 2006-04-04 | 2007-11-15 | Nippon Telegr & Teleph Corp <Ntt> | Pattern recognition device, pattern recognition method, and storage medium storing program attaining the method |
US20070261112A1 (en) | 2006-05-08 | 2007-11-08 | Electro Guard Corp. | Network Security Device |
US20080033913A1 (en) | 2006-05-26 | 2008-02-07 | Winburn Michael L | Techniques for Preventing Insider Theft of Electronic Documents |
US20070294318A1 (en) | 2006-06-20 | 2007-12-20 | Arora Amrinder S | Method, System, and Apparatus for Auditing, Tracking, or Inspection of Data, Objects, or Their Corresponding Modifications |
US20070294612A1 (en) | 2006-06-20 | 2007-12-20 | Microsoft Corporation | Comparing and Managing Multiple Presentations |
US8181036B1 (en) | 2006-09-29 | 2012-05-15 | Symantec Corporation | Extrusion detection of obfuscated content |
US20080082529A1 (en) | 2006-09-29 | 2008-04-03 | Morgan Stanley | Comparing Taxonomies |
US20080080515A1 (en) | 2006-10-02 | 2008-04-03 | Alcatel Lucent | Marker for communication systems consisting of multiple sip servers |
US20080219495A1 (en) * | 2007-03-09 | 2008-09-11 | Microsoft Corporation | Image Comparison |
US7844116B2 (en) | 2007-04-30 | 2010-11-30 | Xerox Corporation | Method for identifying images after cropping |
US20090034804A1 (en) | 2007-08-02 | 2009-02-05 | Samsung Electronics Co., Ltd | Security method and system using touch screen |
US20090064326A1 (en) | 2007-09-05 | 2009-03-05 | Gtb Technologies | Method and a system for advanced content security in computer networks |
US20090129002A1 (en) | 2007-11-20 | 2009-05-21 | Hon Hai Precision Industry Co., Ltd. | Computer enclosure adapted for mounting different types of transfer cards |
US20090241187A1 (en) | 2008-03-19 | 2009-09-24 | Websense, Inc. | Method and system for protection against information stealing software |
US20100064372A1 (en) | 2008-07-21 | 2010-03-11 | Workshare Technology, Inc. | Methods and systems to implement fingerprint lookups across remote agents |
US20100017850A1 (en) * | 2008-07-21 | 2010-01-21 | Workshare Technology, Inc. | Methods and systems to fingerprint textual information using word runs |
US8286171B2 (en) | 2008-07-21 | 2012-10-09 | Workshare Technology, Inc. | Methods and systems to fingerprint textual information using word runs |
US8555080B2 (en) | 2008-09-11 | 2013-10-08 | Workshare Technology, Inc. | Methods and systems for protect agents using distributed lightweight fingerprints |
US20100114985A1 (en) | 2008-11-05 | 2010-05-06 | Oracle International Corporation | Managing the content of shared slide presentations |
US20100114991A1 (en) | 2008-11-05 | 2010-05-06 | Oracle International Corporation | Managing the content of shared slide presentations |
US20100299727A1 (en) | 2008-11-18 | 2010-11-25 | Workshare Technology, Inc. | Methods and systems for exact data match filtering |
US8406456B2 (en) | 2008-11-20 | 2013-03-26 | Workshare Technology, Inc. | Methods and systems for image fingerprinting |
US8473847B2 (en) | 2009-07-27 | 2013-06-25 | Workshare Technology, Inc. | Methods and systems for comparing presentation slide decks |
Non-Patent Citations (64)
Title |
---|
Advisory Action mailed Apr. 12, 2013, in Co-Pending U.S. Appl. No. 12/621,429 by More, S., filed Nov. 18, 2009. |
Co-pending U.S. Appl. No. 10/023,010, filed Dec. 17, 2001. |
Co-pending U.S. Appl. No. 10/136,733, filed Apr. 30, 2002. |
Co-pending U.S. Appl. No. 12/177,043, filed Jul. 21, 2008. |
Co-pending U.S. Appl. No. 12/209,082, filed Sep. 11, 2008. |
Co-pending U.S. Appl. No. 12/209,096, filed Sep. 11, 2008. |
Co-pending U.S. Appl. No. 12/275,185, filed Nov. 20, 2008. |
Co-pending U.S. Appl. No. 12/621,429, filed Nov. 18, 2009. |
Co-pending U.S. Appl. No. 12/844,818, filed Jul. 27, 2010. |
Co-pending U.S. Appl. No. 13/620,364, filed Sep. 14, 2012. |
Co-Pending U.S. Appl. No. 13/659,817, filed Oct. 24, 2012. |
Final Office Action Mailed Apr. 16, 2012 in Co-Pending U.S. Appl. No. 12/177,043, filed Jul. 21, 2008. |
Final Office Action Mailed Apr. 17, 2007 in Co-Pending U.S. Appl. No. 10/023,010, filed Dec. 17, 2001, Issued Patent No. 7,496,841. |
Final Office Action Mailed Aug. 12, 2011 in Co-Pending U.S. Appl. No. 12/209,096, filed Sep. 11, 2008. |
Final Office Action Mailed Feb. 1, 2013 in Co-Pending U.S. Appl. No. 12/621,429 by More, S., filed Nov. 18, 2009. |
Final Office Action Mailed Jan. 18, 2013 in Co-Pending U.S. Appl. No. 12/844,818 by Glover, R., filed Jul. 27, 2010. |
Final Office Action Mailed May 10, 2012 in Co-Pending U.S. Appl. No. 12/209,082. |
International Search Report of PCT Application No. PCT/2009/064919, Jul. 1, 2010, 3 pages. |
International Search Report of PCT Application No. PCT/IB2002/005821, Jan. 30, 2004, 6 pages. |
International Search Report of PCT Application No. PCT/US2009/051313, Mar. 3, 2010, 3 pages. |
International Search Report of PCT Application No. PCT/US2009/056651, Dated Apr. 21, 2010, pp. 1-3. |
International Search Report of PCT Application No. PCT/US2009/056668, Apr. 16, 2010, 9 pages. |
International Search Report of PCT Application No. PCT/US2009/065019, Jun. 4, 2010, 6 pages. |
International Search Report PCT/US2010/043345 dated Apr. 28, 2011, 3 pages. |
Mango, "Robust Perceptual Image Hashing Using Feature Points," http://bluecoat-02/?cfru=aHR0cDovL3NpZ25hbC51Y2UudXRIeGFzLmVkdS9+dmIzaGFsL2hhc2gtcGFydEkucHM=, 2003. |
Mango, et al., "Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs," IEEE Transactions on Image Processing, vol. 15, No. 11, Nov. 2006. |
Microsoft, "Microsoft XP, Product Guide", pp. 1-26. |
Non-Final Office Action Mailed Apr. 26, 2013 in Co-Pending U.S. Appl. No. 13/659,817 by More, S., filed Oct. 24, 2012. |
Non-Final Office Action Mailed Apr. 27, 2012 in Co-Pending U.S. Appl. No. 12/275,185 of More, S., filed Nov. 20, 2008. |
Non-Final Office Action Mailed Aug. 1, 2012 in Co-Pending U.S. Appl. No. 12/621,429, filed Nov. 18, 2009. |
Non-Final Office Action Mailed Dec. 22, 2011 in Co-Pending U.S. Appl. No. 12/209,082. |
Non-Final Office Action Mailed Jan. 9, 2012 in Co-Pending U.S. Appl. No. 12/177,043, filed Jul. 21, 2008. |
Non-Final Office Action Mailed Mar. 11, 2011 in Co-Pending U.S. Appl. No. 12/209,096, filed Sep. 11, 2008. |
Non-Final Office Action Mailed Mar. 16, 2006 in Co-Pending U.S. Appl. No. 10/023,010, filed Dec. 17, 2001, Issued Patent No. 7,496,841. |
Non-Final Office Action Mailed Mar. 20, 2006 in U.S. Appl. No. 10/136,733, filed Apr. 30, 2002. |
Non-Final Office Action Mailed May 7, 2008 in Co-Pending U.S. Appl. No. 10/023,010, filed Dec. 17, 2001, Issued Patent No. 7,496,841. |
Non-Final Office Action Mailed Sep. 19, 2011 in Co-Pending U.S. Appl. No. 12/177,043, filed Jul. 21, 2008. |
Non-Final Office Action Mailed Sep. 19, 2012 in Co-Pending U.S. Appl. No. 12/844,818 by Glover, R., filed Jul. 27, 2010. |
Notice of Allowance Mailed Aug. 19, 2012 in Co-Pending U.S. Appl. No. 12/177,043, filed Jul. 21, 2008. |
Notice of Allowance Mailed Jul. 8, 2013 in Co-Pending U.S. Appl. No. 12/209,082 by S. More et al., filed Sep. 11, 2008. |
Notice of Allowance Mailed Jun. 26, 2012 in Co-Pending U.S. Appl. No. 12/275,185 of More, S., filed Nov. 20, 2008. |
Notice of Allowance Mailed Mar. 13, 2013 in Co-Pending U.S. Appl. No. 12/844,818 by Glover, R., filed Jul. 27, 2010. |
Notice of Allowance Mailed Oct. 2, 2012, in Co-Pending U.S. Appl. No. 12/275,185 by More, S., filed Nov. 20, 2008. |
Notice of Allowance Mailed Oct. 24, 2008 in Co-Pending U.S. Appl. No. 10/023,010, filed Dec. 17, 2001, Issued Patent No. 7,496,841. |
Notice of Allowance Mailed Sep. 25, 2013, in Co-Pending U.S. Appl. No. 13/659,817 by More, S., filed Oct. 24, 2012. |
PC Magazine "Pure Intranets: Real-Time Internet Collaboration", http://www.zdnet.com/pcmag/featuresgroupware/gpwst.htm, Aug. 30, 2001, 2 pages. |
PC Magazine "Pure Intranets: Real-Tlme Internet Collaboration", http://www.zdnet.com/pcmag/featuresgroupware/gpwst.htm, Aug. 30, 2001, 2 pages. |
Restriction Requirement Mailed Feb. 14, 2005 in U.S. Appl. No. 10/023,010, filed Dec. 17, 2001, Issued Patent No. 7,496,841. |
Restriction Requirement Mailed Feb. 5, 2008 in Co-Pending U.S. Appl. No. 10/023,010, filed Dec. 17, 2001, Issued Patent No. 7,496,841. |
Restriction Requirement Mailed Jun. 30, 2006 in U.S. Appl. No. 10/136,733, filed Apr. 30, 2002. |
Roussev, et al., "Integrating XML and Object-based Programming for Distributed Collaboration", IEEE, 2000, pp. 254-259. |
Sujoy Roy, et al., "Robust Hash for Detecting and Localizing Image Tampering," Image Processing, 2007, ICIP 2007, IEEE International Conference on, vol. 6, no., pp. V1-117-V1-120, Sep. 16, 2007-Oct. 19, 2007. |
Tsai, et al., "A Document Workspace for Collaboration and Annotation based on XML Technology", IEEE, 2000, pp. 165-172. |
Tulyakov, et al., "Symmetric Hash Functions for Fingerprint Minutiae," International Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance, Bath U.K., Oct. 2, 2005, pp. 30-38. |
Weiss et al., Lightweight document matching for help-desk applications, In: Intelligent Systems and their Applications, IEEE, Vo. 15, Issue:2, pp. 57-61, ISSN 1094-7167, 2000. |
Wells et al., "Groupware & Collaboration Support", www.objs.com/survey/groupwar.htm, Aug. 30, 2001, 10 pages. |
Written Opinion of PCT Application No. PCT/US2009/051313, Mar. 3, 2010, 4 pages. |
Written Opinion PCT Application No. PCT/2009/064919, Jul. 1, 2010, 4 pages. |
Written Opinion PCT Application No. PCT/US2009/056668, Apr. 16, 2010, 4 pages. |
Written Opinion PCT Application No. PCT/US2009/065019, Jun. 4, 2010, 5 pages. |
Written Opinion PCT/US2009/056651 dated Apr. 21, 2010, pp. 1-5. |
XP-002257904, "Workshare Debuts Synergy", 2003, 3 pages. |
Xuefeng Liang; et al., "Fingerprint Matching Using Minutia Polygons," Pattern Recognition, 2006, ICPR 2006, 18th International Conference on, vol. 1, no., pp. 1046-1049. |
Yung, et al., "Generating Robust Digital Signature for Image/Video Authentication," Multimedia and Security Workshop at ACM Multimedia '98, Bristol, U.K., Sep. 1998. |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9473512B2 (en) | 2008-07-21 | 2016-10-18 | Workshare Technology, Inc. | Methods and systems to implement fingerprint lookups across remote agents |
US10025759B2 (en) | 2010-11-29 | 2018-07-17 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US10963584B2 (en) | 2011-06-08 | 2021-03-30 | Workshare Ltd. | Method and system for collaborative editing of a remotely stored document |
US9613340B2 (en) | 2011-06-14 | 2017-04-04 | Workshare Ltd. | Method and system for shared document approval |
US10783326B2 (en) | 2013-03-14 | 2020-09-22 | Workshare, Ltd. | System for tracking changes in a collaborative document editing environment |
US9948676B2 (en) | 2013-07-25 | 2018-04-17 | Workshare, Ltd. | System and method for securing documents prior to transmission |
US20190266482A1 (en) * | 2018-02-26 | 2019-08-29 | Gsi Technology Inc. | Distance based deep learning |
Also Published As
Publication number | Publication date |
---|---|
US20130064418A1 (en) | 2013-03-14 |
US20130051609A1 (en) | 2013-02-28 |
WO2010059675A3 (en) | 2010-08-26 |
US8620020B2 (en) | 2013-12-31 |
US8406456B2 (en) | 2013-03-26 |
WO2010059675A2 (en) | 2010-05-27 |
US20100124354A1 (en) | 2010-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8670600B2 (en) | Methods and systems for image fingerprinting | |
Babu et al. | Efficient detection of copy-move forgery using polar complex exponential transform and gradient direction pattern | |
Zhao et al. | Robust hashing for image authentication using Zernike moments and local features | |
KR101548928B1 (en) | Invariant visual scene and object recognition | |
JP5175854B2 (en) | Image descriptor for image recognition | |
US20080267519A1 (en) | Method for Identifying Images After Cropping | |
JP2011528453A (en) | Method for generating a description of image content using criteria for image retrieval and retrieval | |
Pun et al. | Robust image hashing using progressive feature selection for tampering detection | |
Diwan et al. | Keypoint based comprehensive copy‐move forgery detection | |
Nawaz et al. | Single and multiple regions duplication detections in digital images with applications in image forensic | |
Pavlović et al. | Copy-move forgery detection based on multifractals | |
Kalaiarasi et al. | Clustering of near duplicate images using bundled features | |
Capasso et al. | A comprehensive survey on methods for image integrity | |
Himeur et al. | Robust video copy detection based on ring decomposition based binarized statistical image features and invariant color descriptor (RBSIF-ICD) | |
US8031979B2 (en) | Method and device for verifying multimedia entities and in particular for verifying digital images | |
Steinebach et al. | Towards image hashing robust against cropping and rotation | |
Isaac et al. | Image forgery detection using region–based Rotation Invariant Co-occurrences among adjacent LBPs | |
Tsai et al. | Extent: Inferring image metadata from context and content | |
US8532391B2 (en) | Recognizing a feature of an image independently of the orientation or scale of the image | |
Steinebach et al. | Image hashing robust against cropping and rotation | |
Rajkumar et al. | A robust and forensic transform for copy move digital image forgery detection based on dense depth block matching | |
Sujatha et al. | A study on image hashing techniques for implementing deduplication | |
Kanhangad et al. | Securing palmprint authentication systems using spoof detection approach | |
RAO et al. | Study and Analysis of Copy-move Forgery Detection with Local Binary Pattern Method | |
CN116884058A (en) | Identity recognition method, identity recognition device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: WORKSHARE TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MORE, SCOTT;REEL/FRAME:030164/0157 Effective date: 20130327 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, LONDON BRA Free format text: SECURITY INTEREST;ASSIGNOR:WORKSHARE TECHNOLOGY INC.;REEL/FRAME:032787/0012 Effective date: 20140428 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: WORKSHARE TECHNOLOGY INC., UNITED KINGDOM Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION LONDON BRANCH;REEL/FRAME:049703/0449 Effective date: 20190709 |
|
AS | Assignment |
Owner name: OWL ROCK CAPITAL CORPORATION, AS COLLATERAL AGENT, Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:DOXLY, INC.;WORKSHARE TECHNOLOGY, INC.;REEL/FRAME:050901/0272 Effective date: 20191031 Owner name: OWL ROCK CAPITAL CORPORATION, AS COLLATERAL AGENT, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:DOXLY, INC.;WORKSHARE TECHNOLOGY, INC.;REEL/FRAME:050901/0272 Effective date: 20191031 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: FREEDOM SOLUTIONS GROUP, L.L.C., ILLINOIS Free format text: MERGER;ASSIGNOR:WORKSHARE TECHNOLOGY, INC.;REEL/FRAME:059910/0102 Effective date: 20211228 |