Patents by Inventor Richard B. LeVine

Richard B. LeVine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9123024
    Abstract: A system for analyzing security compliance requirements analyzes a linked database that includes data from the Unified Compliance Framework™. The system generates a tiered question structure to obtain information about a particular business offering, wherein questions of a particular tier are based on answers to questions of a preceding tier. Based on the information, the system generates a query and submits the query to the linked database. The query results provide a list of security compliance requirements, leading practices, and/or regulations applicable to the business offering.
    Type: Grant
    Filed: February 24, 2012
    Date of Patent: September 1, 2015
    Assignee: Accenture Global Services Limited
    Inventors: Richard B. LeVine, Patrick J. Joyce, Stirling T. Goetz, Paul M. Barsamian
  • Patent number: 8844048
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Grant
    Filed: January 12, 2012
    Date of Patent: September 23, 2014
    Assignee: SCA IPLA Holdings Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
  • Patent number: 8726027
    Abstract: Methods and apparatus for processing title data watermarked with a code. At least a portion of the title data may be watermarked at a plurality of locations within the title data with customer information data, so that the title data provided to a customer includes the watermark information. To obtain the code from the watermarked title data, watermarking information associated with the watermarked title data is first received. The watermarking information identifies a plurality of locations and a number to frequency modulation relationship at each of the locations. A different modulation scheme may be used at each location. The watermarked title data is demodulated at each of the plurality of placement locations based on the number to frequency modulation relationship. The code is then generated from the demodulated watermarked title data. A verification indication is output based in part on the generated code.
    Type: Grant
    Filed: September 26, 2008
    Date of Patent: May 13, 2014
    Assignee: SCA IPLA Holdings Inc.
    Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Publication number: 20130226662
    Abstract: A system for analyzing security compliance requirements analyzes a linked database that includes data from the Unified Compliance Framework™. The system generates a tiered question structure to obtain information about a particular business offering, wherein questions of a particular tier are based on answers to questions of a preceding tier. Based on the information, the system generates a query and submits the query to the linked database. The query results provide a list of security compliance requirements, leading practices, and/or regulations applicable to the business offering.
    Type: Application
    Filed: February 24, 2012
    Publication date: August 29, 2013
    Inventors: Richard B. LeVine, Patrick J. Joyce, Stirling T. Goetz, Paul M. Barsamian
  • Patent number: 8261359
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Grant
    Filed: June 1, 2010
    Date of Patent: September 4, 2012
    Assignee: SCA IPLA Holdings Inc.
    Inventors: Richard B. Levine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart, III
  • Publication number: 20120185948
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Application
    Filed: January 12, 2012
    Publication date: July 19, 2012
    Applicant: SCA IPLA HOLDINGS INC.
    Inventors: James A. MERKLE, JR., Richard B. LEVINE, Andrew R. LEE, Daniel G. HOWARD, Daniel M. GOLDMAN, Jeffrey A. PAGLIARULO, John J. HART, III, Jose L. BOUZA
  • Patent number: 8117667
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Grant
    Filed: January 10, 2008
    Date of Patent: February 14, 2012
    Assignee: SCA IPLA Holdings Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
  • Patent number: 8095992
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: July 13, 2009
    Date of Patent: January 10, 2012
    Assignee: SCA IPLA Holdings Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
  • Patent number: 8095798
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: March 15, 2010
    Date of Patent: January 10, 2012
    Assignee: SCA IPLA Holdings Inc.
    Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. Levine
  • Patent number: 8015608
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: September 6, 2011
    Assignee: SCA IPLA Holdings Inc.
    Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
  • Patent number: 7944806
    Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause—the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, deter or prevent an unauthorized individual from making copies. This is accomplished by modifying the optical path of an optical medium to include regions of selective distortion. This, in turn, modifies the read operation of the data in the regions, which can be used to identify and authenticate the medium.
    Type: Grant
    Filed: April 17, 2008
    Date of Patent: May 17, 2011
    Assignee: SCA IPLA Holdings Inc.
    Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Publication number: 20100306552
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Application
    Filed: June 1, 2010
    Publication date: December 2, 2010
    Applicant: SCA IPLA HOLDINGS INC.
    Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart, III
  • Publication number: 20100165812
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Application
    Filed: March 15, 2010
    Publication date: July 1, 2010
    Applicant: SCA IPLA HOLDINGS INC.
    Inventors: Daniel G. HOWARD, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, JR., Richard B. LeVine
  • Publication number: 20100125910
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Application
    Filed: July 13, 2009
    Publication date: May 20, 2010
    Applicant: ECD Systems Inc.
    Inventors: James A. Merkle, JR., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
  • Publication number: 20100122349
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Application
    Filed: July 20, 2009
    Publication date: May 13, 2010
    Applicant: ECD Systems Inc.
    Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
  • Patent number: 7716485
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: May 11, 2010
    Assignee: SCA IPLA Holdings Inc.
    Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. LeVine
  • Patent number: 7643393
    Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, may deter or prevent an unauthorized individual from making copies. In addition, methods which generate an intended slow-down in the read process of the media can be used to authenticate the media at run time. This offers significant advantages to content creators who wish to protect their products.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: January 5, 2010
    Assignee: ECD Systems, Inc.
    Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Patent number: 7565697
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Grant
    Filed: September 21, 2001
    Date of Patent: July 21, 2009
    Assignee: ECD Systems, Inc.
    Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
  • Patent number: 7562396
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: February 1, 2002
    Date of Patent: July 14, 2009
    Assignee: ECD Systems, Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
  • Publication number: 20090049303
    Abstract: Methods and apparatus for processing title data watermarked with a code. At least a portion of the title data may be watermarked at a plurality of locations within the title data with customer information data, so that the title data provided to a customer includes the watermark information. To obtain the code from the watermarked title data, watermarking information associated with the watermarked title data is first received. The watermarking information identifies a plurality of locations and a number to frequency modulation relationship at each of the locations. A different modulation scheme may be used at each location. The watermarked title data is demodulated at each of the plurality of placement locations based on the number to frequency modulation relationship. The code is then generated from the demodulated watermarked title data. A verification indication is output based in part on the generated code.
    Type: Application
    Filed: September 26, 2008
    Publication date: February 19, 2009
    Applicant: ECD Sysems, Inc.
    Inventors: JOHN J. HART, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard