Patents by Inventor James A. Merkle, Jr.

James A. Merkle, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8844048
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Grant
    Filed: January 12, 2012
    Date of Patent: September 23, 2014
    Assignee: SCA IPLA Holdings Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
  • Publication number: 20120185948
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Application
    Filed: January 12, 2012
    Publication date: July 19, 2012
    Applicant: SCA IPLA HOLDINGS INC.
    Inventors: James A. MERKLE, JR., Richard B. LEVINE, Andrew R. LEE, Daniel G. HOWARD, Daniel M. GOLDMAN, Jeffrey A. PAGLIARULO, John J. HART, III, Jose L. BOUZA
  • Publication number: 20120156790
    Abstract: This disclosure relates to a process for controlling chlorination reactions in manufacturing titanium tetrachloride in a fluidized bed reactor, followed by processing to form a titanium product comprising an amount of silica, the process comprising: (a) feeding carbonaceous material, titanium bearing material comprising an amount of silica, and chlorine to the fluidized bed reactor to form a gaseous stream, and condensing the gaseous stream to form titanium tetrachloride, a non-condensed gas stream and a condensable product stream; (b) processing the titanium tetrachloride to form a titanium product comprising an amount of silica; (c) analyzing the titanium product comprising an amount of silica to determine the analyzed concentration of silica; (d) identifying a set point concentration of silica; (e) calculating the difference between the analyzed concentration of silica and the set point concentration of silica; and (f) generating a signal which corresponds to the difference calculated in step (e) which pro
    Type: Application
    Filed: September 2, 2010
    Publication date: June 21, 2012
    Applicant: E.I. du Pont de Nemours and Company
    Inventors: James Merkle, JR., Raymond Roy Beets
  • Patent number: 8117667
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Grant
    Filed: January 10, 2008
    Date of Patent: February 14, 2012
    Assignee: SCA IPLA Holdings Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
  • Patent number: 8095798
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: March 15, 2010
    Date of Patent: January 10, 2012
    Assignee: SCA IPLA Holdings Inc.
    Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. Levine
  • Patent number: 8095992
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: July 13, 2009
    Date of Patent: January 10, 2012
    Assignee: SCA IPLA Holdings Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
  • Publication number: 20100165812
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Application
    Filed: March 15, 2010
    Publication date: July 1, 2010
    Applicant: SCA IPLA HOLDINGS INC.
    Inventors: Daniel G. HOWARD, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, JR., Richard B. LeVine
  • Publication number: 20100125910
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Application
    Filed: July 13, 2009
    Publication date: May 20, 2010
    Applicant: ECD Systems Inc.
    Inventors: James A. Merkle, JR., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
  • Patent number: 7716485
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: May 11, 2010
    Assignee: SCA IPLA Holdings Inc.
    Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. LeVine
  • Patent number: 7562396
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: February 1, 2002
    Date of Patent: July 14, 2009
    Assignee: ECD Systems, Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
  • Patent number: 7328453
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Grant
    Filed: May 9, 2002
    Date of Patent: February 5, 2008
    Assignee: ECD Systems, Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza