Patents by Inventor Daniel G. Howard
Daniel G. Howard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8844048Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.Type: GrantFiled: January 12, 2012Date of Patent: September 23, 2014Assignee: SCA IPLA Holdings Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
-
Patent number: 8726027Abstract: Methods and apparatus for processing title data watermarked with a code. At least a portion of the title data may be watermarked at a plurality of locations within the title data with customer information data, so that the title data provided to a customer includes the watermark information. To obtain the code from the watermarked title data, watermarking information associated with the watermarked title data is first received. The watermarking information identifies a plurality of locations and a number to frequency modulation relationship at each of the locations. A different modulation scheme may be used at each location. The watermarked title data is demodulated at each of the plurality of placement locations based on the number to frequency modulation relationship. The code is then generated from the demodulated watermarked title data. A verification indication is output based in part on the generated code.Type: GrantFiled: September 26, 2008Date of Patent: May 13, 2014Assignee: SCA IPLA Holdings Inc.Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Patent number: 8261359Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: GrantFiled: June 1, 2010Date of Patent: September 4, 2012Assignee: SCA IPLA Holdings Inc.Inventors: Richard B. Levine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart, III
-
Publication number: 20120185948Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.Type: ApplicationFiled: January 12, 2012Publication date: July 19, 2012Applicant: SCA IPLA HOLDINGS INC.Inventors: James A. MERKLE, JR., Richard B. LEVINE, Andrew R. LEE, Daniel G. HOWARD, Daniel M. GOLDMAN, Jeffrey A. PAGLIARULO, John J. HART, III, Jose L. BOUZA
-
Patent number: 8117667Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.Type: GrantFiled: January 10, 2008Date of Patent: February 14, 2012Assignee: SCA IPLA Holdings Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
-
Patent number: 8095992Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: July 13, 2009Date of Patent: January 10, 2012Assignee: SCA IPLA Holdings Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
-
Patent number: 8095798Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: March 15, 2010Date of Patent: January 10, 2012Assignee: SCA IPLA Holdings Inc.Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. Levine
-
Patent number: 8015608Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: GrantFiled: July 20, 2009Date of Patent: September 6, 2011Assignee: SCA IPLA Holdings Inc.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
-
Patent number: 7944806Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause—the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, deter or prevent an unauthorized individual from making copies. This is accomplished by modifying the optical path of an optical medium to include regions of selective distortion. This, in turn, modifies the read operation of the data in the regions, which can be used to identify and authenticate the medium.Type: GrantFiled: April 17, 2008Date of Patent: May 17, 2011Assignee: SCA IPLA Holdings Inc.Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Publication number: 20100306552Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: ApplicationFiled: June 1, 2010Publication date: December 2, 2010Applicant: SCA IPLA HOLDINGS INC.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart, III
-
Publication number: 20100165812Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: ApplicationFiled: March 15, 2010Publication date: July 1, 2010Applicant: SCA IPLA HOLDINGS INC.Inventors: Daniel G. HOWARD, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, JR., Richard B. LeVine
-
Publication number: 20100125910Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: ApplicationFiled: July 13, 2009Publication date: May 20, 2010Applicant: ECD Systems Inc.Inventors: James A. Merkle, JR., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
-
Publication number: 20100122349Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: ApplicationFiled: July 20, 2009Publication date: May 13, 2010Applicant: ECD Systems Inc.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
-
Patent number: 7716485Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: February 5, 2004Date of Patent: May 11, 2010Assignee: SCA IPLA Holdings Inc.Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. LeVine
-
Patent number: 7643393Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, may deter or prevent an unauthorized individual from making copies. In addition, methods which generate an intended slow-down in the read process of the media can be used to authenticate the media at run time. This offers significant advantages to content creators who wish to protect their products.Type: GrantFiled: February 5, 2004Date of Patent: January 5, 2010Assignee: ECD Systems, Inc.Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Patent number: 7565697Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: GrantFiled: September 21, 2001Date of Patent: July 21, 2009Assignee: ECD Systems, Inc.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
-
Patent number: 7562396Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: February 1, 2002Date of Patent: July 14, 2009Assignee: ECD Systems, Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
-
Publication number: 20090049303Abstract: Methods and apparatus for processing title data watermarked with a code. At least a portion of the title data may be watermarked at a plurality of locations within the title data with customer information data, so that the title data provided to a customer includes the watermark information. To obtain the code from the watermarked title data, watermarking information associated with the watermarked title data is first received. The watermarking information identifies a plurality of locations and a number to frequency modulation relationship at each of the locations. A different modulation scheme may be used at each location. The watermarked title data is demodulated at each of the plurality of placement locations based on the number to frequency modulation relationship. The code is then generated from the demodulated watermarked title data. A verification indication is output based in part on the generated code.Type: ApplicationFiled: September 26, 2008Publication date: February 19, 2009Applicant: ECD Sysems, Inc.Inventors: JOHN J. HART, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Patent number: 7447907Abstract: A system and method for distributing title data, such as songs, videos or computer games. The title data is provided from a central location to a customer who may purchase or rent a copy of the title data. The title data is made available on a computer readable media, which may be physical media, such as a CD or DVD, or virtual media, such as a computer network. Before distribution, the title data is watermarked with information to identify the customer to whom the title data was distributed. The watermark may be created using identifying information to modulate the title data using a randomly selected modulation scheme at multiple randomly selected locations. The system stores an indication of the locations and frequency modulation scheme, allowing the identifying information to be recovered from the watermarked copy of the title data.Type: GrantFiled: April 4, 2001Date of Patent: November 4, 2008Assignee: ECD Systems, Inc.Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Publication number: 20080212450Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause—the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, deter or prevent an unauthorized individual from making copies. This is accomplished by modifying the optical path of an optical medium to include regions of selective distortion. This, in turn, modifies the read operation of the data in the regions, which can be used to identify and authenticate the medium.Type: ApplicationFiled: April 17, 2008Publication date: September 4, 2008Applicant: ECD SYSTEMS, INC.Inventors: John J. Hart III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard