Patents by Inventor Richard B. LeVine
Richard B. LeVine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9123024Abstract: A system for analyzing security compliance requirements analyzes a linked database that includes data from the Unified Compliance Framework™. The system generates a tiered question structure to obtain information about a particular business offering, wherein questions of a particular tier are based on answers to questions of a preceding tier. Based on the information, the system generates a query and submits the query to the linked database. The query results provide a list of security compliance requirements, leading practices, and/or regulations applicable to the business offering.Type: GrantFiled: February 24, 2012Date of Patent: September 1, 2015Assignee: Accenture Global Services LimitedInventors: Richard B. LeVine, Patrick J. Joyce, Stirling T. Goetz, Paul M. Barsamian
-
Patent number: 8844048Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.Type: GrantFiled: January 12, 2012Date of Patent: September 23, 2014Assignee: SCA IPLA Holdings Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
-
Patent number: 8726027Abstract: Methods and apparatus for processing title data watermarked with a code. At least a portion of the title data may be watermarked at a plurality of locations within the title data with customer information data, so that the title data provided to a customer includes the watermark information. To obtain the code from the watermarked title data, watermarking information associated with the watermarked title data is first received. The watermarking information identifies a plurality of locations and a number to frequency modulation relationship at each of the locations. A different modulation scheme may be used at each location. The watermarked title data is demodulated at each of the plurality of placement locations based on the number to frequency modulation relationship. The code is then generated from the demodulated watermarked title data. A verification indication is output based in part on the generated code.Type: GrantFiled: September 26, 2008Date of Patent: May 13, 2014Assignee: SCA IPLA Holdings Inc.Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Publication number: 20130226662Abstract: A system for analyzing security compliance requirements analyzes a linked database that includes data from the Unified Compliance Framework™. The system generates a tiered question structure to obtain information about a particular business offering, wherein questions of a particular tier are based on answers to questions of a preceding tier. Based on the information, the system generates a query and submits the query to the linked database. The query results provide a list of security compliance requirements, leading practices, and/or regulations applicable to the business offering.Type: ApplicationFiled: February 24, 2012Publication date: August 29, 2013Inventors: Richard B. LeVine, Patrick J. Joyce, Stirling T. Goetz, Paul M. Barsamian
-
Patent number: 8261359Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: GrantFiled: June 1, 2010Date of Patent: September 4, 2012Assignee: SCA IPLA Holdings Inc.Inventors: Richard B. Levine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart, III
-
Publication number: 20120185948Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.Type: ApplicationFiled: January 12, 2012Publication date: July 19, 2012Applicant: SCA IPLA HOLDINGS INC.Inventors: James A. MERKLE, JR., Richard B. LEVINE, Andrew R. LEE, Daniel G. HOWARD, Daniel M. GOLDMAN, Jeffrey A. PAGLIARULO, John J. HART, III, Jose L. BOUZA
-
Patent number: 8117667Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.Type: GrantFiled: January 10, 2008Date of Patent: February 14, 2012Assignee: SCA IPLA Holdings Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
-
Patent number: 8095992Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: July 13, 2009Date of Patent: January 10, 2012Assignee: SCA IPLA Holdings Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
-
Patent number: 8095798Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: March 15, 2010Date of Patent: January 10, 2012Assignee: SCA IPLA Holdings Inc.Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. Levine
-
Patent number: 8015608Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: GrantFiled: July 20, 2009Date of Patent: September 6, 2011Assignee: SCA IPLA Holdings Inc.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
-
Patent number: 7944806Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause—the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, deter or prevent an unauthorized individual from making copies. This is accomplished by modifying the optical path of an optical medium to include regions of selective distortion. This, in turn, modifies the read operation of the data in the regions, which can be used to identify and authenticate the medium.Type: GrantFiled: April 17, 2008Date of Patent: May 17, 2011Assignee: SCA IPLA Holdings Inc.Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Publication number: 20100306552Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: ApplicationFiled: June 1, 2010Publication date: December 2, 2010Applicant: SCA IPLA HOLDINGS INC.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart, III
-
Publication number: 20100165812Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: ApplicationFiled: March 15, 2010Publication date: July 1, 2010Applicant: SCA IPLA HOLDINGS INC.Inventors: Daniel G. HOWARD, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, JR., Richard B. LeVine
-
Publication number: 20100125910Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: ApplicationFiled: July 13, 2009Publication date: May 20, 2010Applicant: ECD Systems Inc.Inventors: James A. Merkle, JR., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
-
Publication number: 20100122349Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: ApplicationFiled: July 20, 2009Publication date: May 13, 2010Applicant: ECD Systems Inc.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
-
Patent number: 7716485Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: February 5, 2004Date of Patent: May 11, 2010Assignee: SCA IPLA Holdings Inc.Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. LeVine
-
Patent number: 7643393Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, may deter or prevent an unauthorized individual from making copies. In addition, methods which generate an intended slow-down in the read process of the media can be used to authenticate the media at run time. This offers significant advantages to content creators who wish to protect their products.Type: GrantFiled: February 5, 2004Date of Patent: January 5, 2010Assignee: ECD Systems, Inc.Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
-
Patent number: 7565697Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.Type: GrantFiled: September 21, 2001Date of Patent: July 21, 2009Assignee: ECD Systems, Inc.Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart, III
-
Patent number: 7562396Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: February 1, 2002Date of Patent: July 14, 2009Assignee: ECD Systems, Inc.Inventors: James A. Merkle, Jr., Richard B. LeVine, Daniel G. Howard, Andrew R. Lee
-
Publication number: 20090049303Abstract: Methods and apparatus for processing title data watermarked with a code. At least a portion of the title data may be watermarked at a plurality of locations within the title data with customer information data, so that the title data provided to a customer includes the watermark information. To obtain the code from the watermarked title data, watermarking information associated with the watermarked title data is first received. The watermarking information identifies a plurality of locations and a number to frequency modulation relationship at each of the locations. A different modulation scheme may be used at each location. The watermarked title data is demodulated at each of the plurality of placement locations based on the number to frequency modulation relationship. The code is then generated from the demodulated watermarked title data. A verification indication is output based in part on the generated code.Type: ApplicationFiled: September 26, 2008Publication date: February 19, 2009Applicant: ECD Sysems, Inc.Inventors: JOHN J. HART, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard