Patents by Inventor Kenneth Levy

Kenneth Levy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070101147
    Abstract: The present invention generally relates to deriving and/or utilizing content signatures. A content signature includes a representation of a content item, which is derived from the content item itself. According to one embodiment of the invention, a method includes: obtaining a content item; transforming the content item to obtain transform domain coefficients; applying Viterbi decoding to at least a set of the transform domain coefficients; using at least one result of the Viterbi decoding as a content signature for the content item. Other embodiments are provided and claimed as well.
    Type: Application
    Filed: December 20, 2006
    Publication date: May 3, 2007
    Inventors: Hugh Brunk, Kenneth Levy
  • Publication number: 20070053549
    Abstract: The present invention relates to digital watermarking systems and methods. In a first implementation, so-called movie studio rough-cuts are watermarked to provide a forensic tracking clue or to provide security for distributed rough-cuts. In another implementation, a watermark is determined for a compressed video object. The watermark is compressed as an object and the watermarked object is then associated with the compressed video object. The two separate objects are provided to a rendering device, which after decompressing both objects, embeds the watermark in the video prior to rendering.
    Type: Application
    Filed: February 24, 2006
    Publication date: March 8, 2007
    Inventors: Marc Miller, Kenneth Levy, Geoffrey Rhoads
  • Publication number: 20070055689
    Abstract: A method of indexing content for network searching comprises identifying media content signals stored at sites distributed over a distributed computer network; extracting content identifiers from the content signals; using the content identifiers to obtain metadata used to classify the media content signals; and creating a searchable index of the media content signals based on the metadata, wherein users access the searchable index on the distributed computer network to submit a search query for the searchable index to retrieve links to the media content signals.
    Type: Application
    Filed: August 22, 2006
    Publication date: March 8, 2007
    Inventors: Geoffrey Rhoads, Kenneth Levy
  • Publication number: 20070047763
    Abstract: The present invention relates generally to processing audio or video content. In one embodiment, a method is provided including receiving audio or video content, the audio or video content includes a first watermark associated therewith, the first watermark has first data indicating that the audio or video content is rights protected; and associated a second watermark with the audio or video content, the second watermark including second data indicating permissible uses or restrictions associated with the audio or video content, wherein the second watermark is associated with the audio or video content later in time relative to the first watermark. Other embodiments are described and claimed as well.
    Type: Application
    Filed: October 20, 2006
    Publication date: March 1, 2007
    Inventor: Kenneth Levy
  • Publication number: 20070033409
    Abstract: The present invention relates to deriving and/or utilizing content signatures. A content signature includes a representation of a content item, which is derived from the content item itself. According to one embodiment of the invention, a method of generating a content signature for a signal is provided. The method includes: i) dividing the signal into at least one set; ii) transforming the set into a frequency-based domain; iii) determining features of the transformed set; and iv) grouping the features so as to form a content signature of the set. Other embodiments are provided and claimed too.
    Type: Application
    Filed: September 28, 2006
    Publication date: February 8, 2007
    Inventors: Hugh Brunk, Kenneth Levy
  • Publication number: 20060157559
    Abstract: A method for issuing a credential includes scanning in documents (e.g., breeder or ID documents) used to verify the applicant of the credential and creating data records including the image of the documents. As a means to reduce fraud, these data records are linked to the credential and to the issuer location, operator and time and place of issuance. If the document includes machine readable information, the method automatically reads the machine readable information from the document and uses at least part of the machine readable information from the document to pre-populate a form used to create a credential, such as an identification document. The method includes applying a transformation to the image of the document that enables protection against fraudulent use. The transformation secures the image of the document from tampering and/or enables tracking of the use of the document image to deter fraud.
    Type: Application
    Filed: July 7, 2005
    Publication date: July 20, 2006
    Inventors: Kenneth Levy, Leo Kenen, Tony Rodriguez, Victor Andelin
  • Publication number: 20060136399
    Abstract: The present invention provides methods to provide or establish links, web addresses or web content with media (e.g., audio, videos or imagery). In one implementation, we provide a method comprising: upon receipt of a content identifier associated with media, initiating a time-limited auction for a right to associated a link or website with the content identifier; receiving additional bids for the right; and at a conclusion of a predetermined time associated with the time-limited auction, awarding the right to associate a link or website with the content identifier. In another implementation we provide a method including awarding a right to provide or host web content; and monitoring provided or hosted web content to ensure that non-advertising content is maintained at or above a predetermined level.
    Type: Application
    Filed: November 23, 2005
    Publication date: June 22, 2006
    Inventors: William Conwell, Kenneth Levy
  • Publication number: 20060133645
    Abstract: The present invention relates to data hiding and steganographically encoding video with auxiliary information. In one implementation, a method is provided including: receiving video including picture portions and out-of-band information conveyed along with the video, wherein the picture portions of the video including auxiliary data hidden therein, with the auxiliary data being hidden in at least some of the picture portions of the video through alterations manifested by an increase in values associated with certain video picture portions, and a decrease in values associated with certain other video picture portions, and wherein the auxiliary data and the out-of-band information cooperatively convey copy control information associated with the video; obtaining at least some of the copy control information; and controlling copying of the video through reference to the at least some of the copy control information. Additional methods and systems are also provided.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 22, 2006
    Inventors: Geoffrey Rhoads, Kenneth Levy, Tyler McKinley
  • Publication number: 20060120559
    Abstract: A digital watermark embedder reduces a watermark signal as a function of time varying properties of video such that a watermark that would otherwise be static over frames is selectively reduced to make it imperceptible. The method computes a watermark signal corresponding to locations within a frame, where the watermark signal is mapped to locations in the video frame and is computed based upon attributes of the video within the frame. The method varies the strength of the watermark signal over time. The process of varying the strength includes reducing the strength of the watermark signal to make the digital watermark less perceptible in the video in locations where the video has time varying properties. The method embeds the watermark signal into the video at the locations with the varying strength.
    Type: Application
    Filed: November 1, 2005
    Publication date: June 8, 2006
    Inventor: Kenneth Levy
  • Publication number: 20060062426
    Abstract: A digital watermark (DWM) content identifier is steganographically embedded in content. The DWM content identifier provides a link to a rights registry storing usage rights associated with the content. In some implementations the rights registry provides an association between the DWM content identifier and a digital rights management (DRM) content identifier. The DRM content identifier is used to find associated usage rights. The DWM content identifier can also be used to transfer content from a first DRM system to a second DRM system.
    Type: Application
    Filed: August 19, 2005
    Publication date: March 23, 2006
    Inventors: Kenneth Levy, Joel Meyer, Hoyet Andrews,
  • Patent number: 7013815
    Abstract: An adjustable device installed at the inlet of conventional junctions/splitters (116) for on-line control of the distribution of coal among the outlet pipes is herein disclosed. The device includes a plurality of wake inducing airfoils (60) each positioned upstream of a plurality of flow channels in the riffler (50) for directing coal flow to the outlet pipes. Each wake-inducing airfoil has a cross-section defined by a width W that varies along its length H for creating upstream turbulence, and a particle wake that preferentially diverts the coal flow to one of the outlet pipes at the splitter junction without affecting primary air flow. For example, each wake inducing airfoil may comprise a rounded convex edge leading to straight tapered sides. The surfaces of the sides may be roughened or textured (63) for promoting turbulent boundary layers. In addition, conventional fixed or variable orifices may be used in combination with the wake inducing airfoils for balancing primary air flow rates.
    Type: Grant
    Filed: September 8, 2004
    Date of Patent: March 21, 2006
    Inventors: Edward Kenneth Levy, Harun Bilirgen, Ferruhyie Yilmaz, legal representative, Aly Yilmaz, deceased
  • Publication number: 20060028689
    Abstract: This disclosure details systems and methods for embedding and reading auxiliary code signals in documents, and for using the code signals to enable a variety of forensic tracking, monitoring and usage control functions.
    Type: Application
    Filed: August 11, 2003
    Publication date: February 9, 2006
    Inventors: Burt Perry, Sean Calhoon, Alastair Reed, Kenneth Levy, Tim Schoenheit, Geoffrey Rhoads
  • Publication number: 20050271246
    Abstract: The present invention provides a method of securing messages steganographically embedded in media (e.g., printed or electronic objects, audio and video). In one implementation, a message includes a first portion and a second portion. The first portion includes a first message and a first checksum, which are encrypted with a private key. The encrypted first portion is combined with the second portion. The second portion includes a second message and as second checksum. The combined encrypted first portion and the second portion form a signature. The signature is encrypted with a common or universal key, perhaps after error correction coding. The private key is uniquely associated with an entity such as a document issuing jurisdiction. In another implementation, a method appends information to a watermark message received from a remote device. The information preferably corresponds to the remote device or to a user of the remote device.
    Type: Application
    Filed: March 15, 2005
    Publication date: December 8, 2005
    Inventors: Ravi Sharma, Daniel Ramos, Tony Rodriguez, Kenneth Levy
  • Publication number: 20050262351
    Abstract: The present invention provides encryption techniques useful with digital watermarking payloads. In a first implementation, we encrypt one of two different cooperating watermark payloads, but the encryption and payload data structure helps to authenticate both payloads. Another implementation provides a three encryption key pair system for managing messages and watermark embedding. Still another aspect of the invention is a watermark embedding process that uses encryption to whiten, randomize or spread a message, instead of convention spread-spectrum modulation.
    Type: Application
    Filed: March 15, 2005
    Publication date: November 24, 2005
    Inventor: Kenneth Levy
  • Publication number: 20050262162
    Abstract: In many situations, it is desirable to restrict access to digital content. This invention presents an extremely efficient and simple method and apparatus to degrade and recover digital content. The invented process is based upon searching the data for detection criteria and then adjusting neighboring point(s) to degrade the content, or re-adjusting the neighboring point(s) to recover the original content. For example, one could search for threshold crossings, and scale the following point by a number between 0 and 1 for degradation, or re-scale the following point by the inverse scaling value to recover the original data. The apparatus may include a logic processor and storage unit to implement the degradation and recovery process.
    Type: Application
    Filed: March 30, 2005
    Publication date: November 24, 2005
    Inventor: Kenneth Levy
  • Patent number: 6966508
    Abstract: A system for balancing and controlling the distribution of pulverized coal into multiple equal diameter outlet pipes of coal pulverizers for improving boiler performance. The device includes a plurality of flow control elements, one flow control element for each outlet pipe, all positioned a pre-determined distance upstream of the outlet pipes. Each flow control element is mounted on an independent adjustment mechanism and is thereby adjustable in position relative its corresponding outlet pipe to selectively vary the wake of the downstream coal particulate flow relative to primary air flow. The method of the present invention is practiced by monitoring coal particulate flow at the outlet pipes relative to primary air flow or individual flame characteristics, and then compensating for noted imbalances by selectively adjusting the flow control elements, thereby balancing and controlling the distribution of coal and improving combustion efficiency.
    Type: Grant
    Filed: December 23, 2003
    Date of Patent: November 22, 2005
    Inventors: Edward Kenneth Levy, Harun Bilirgen, Elshabasi Ali
  • Publication number: 20050249374
    Abstract: Digital watermarking provides a chain of custody for video in movie studios. Several novel improvements in workflow processes for digital watermarking provide chains of custody. In a first implementation, a digital watermark payload includes an embedder ID and time stamp. The embedder ID is associated with a controlling PC user log, including, e.g., the user log being linked to a biometric of the user. In a second implementation, a video player is forced to run a video digital watermark embedder based upon a rights command, where an ID embedded in a watermark payload is determined solely by the embedder. A third implementation encrypts a conglomerate of watermarked segments of video so that a rendering device can decrypt the segments in a manner to produce different results in each usage dependent upon the key. A fourth implementation embeds digital watermarks in DVD disk images during delivery to a duplication house.
    Type: Application
    Filed: March 17, 2005
    Publication date: November 10, 2005
    Inventor: Kenneth Levy
  • Publication number: 20050251683
    Abstract: The present invention provides an inventive architectural framework for use in audio/video commerce applications. In one embodiment, message types are used in different applications. These applications may be conceptualized as falling into three classes: 1) broadcast monitoring, copyright communication, copy/play control, file verification, and PC connected e-commerce; 2) forensic tracking, content monitoring, and asset management; and 3) set-top box connected e-commerce.
    Type: Application
    Filed: June 14, 2005
    Publication date: November 10, 2005
    Inventors: Kenneth Levy, R. Hiatt, Geoffrey Rhoads
  • Publication number: 20050216513
    Abstract: To stop illegal digital content distribution, IDs will be included in the content. However, current ideas of how to use the IDs are unacceptable. The automatic ID management process and apparatus increases the ease of access to protected content for the consumer, with desired content protection and minimal implementation costs. The process includes tracking the IDs of the previously accessed content of a rendering device, reviewing rules contained within the new content and rendering device, and restricting access if the new content does not meet the rules. For example, devices may be limited to accessing content with N different IDs over a specific time period, where the time period is influenced by the number of times content with a specific ID is accessed. The apparatus includes a logic processor and memory that implements the automatic ID management process.
    Type: Application
    Filed: March 14, 2005
    Publication date: September 29, 2005
    Inventor: Kenneth Levy
  • Publication number: 20050210526
    Abstract: This disclosure describes methods and systems for synchronizing broadcast and network content, such as web content. It also describes related technology for facilitating linking from broadcast content to related information and e-commerce on a network. One method detailed in this disclosure synchronizes broadcast content with dynamic network content at a network address. This method embeds an identifier in a broadcast, extracts the identifier embedded in broadcast content, and uses the identifier to identify corresponding network content. The method then posts the corresponding network content on a network device located at the network address (e.g., a web page at the URL of the broadcaster). The network device (e.g., web server) is responsive to requests sent to the network address to provide the network content over a network. Using this method, the broadcast content is synchronized with the corresponding network content.
    Type: Application
    Filed: March 18, 2004
    Publication date: September 22, 2005
    Inventors: Kenneth Levy, Reed Stager