Patents by Inventor Richard B. LeVine

Richard B. LeVine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7447907
    Abstract: A system and method for distributing title data, such as songs, videos or computer games. The title data is provided from a central location to a customer who may purchase or rent a copy of the title data. The title data is made available on a computer readable media, which may be physical media, such as a CD or DVD, or virtual media, such as a computer network. Before distribution, the title data is watermarked with information to identify the customer to whom the title data was distributed. The watermark may be created using identifying information to modulate the title data using a randomly selected modulation scheme at multiple randomly selected locations. The system stores an indication of the locations and frequency modulation scheme, allowing the identifying information to be recovered from the watermarked copy of the title data.
    Type: Grant
    Filed: April 4, 2001
    Date of Patent: November 4, 2008
    Assignee: ECD Systems, Inc.
    Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Publication number: 20080243696
    Abstract: Systems and methods for managing digital rights are provided. Remote authentication of a user's identity and the user's right to receive digital content may be performed in an incontrovertible manner such that the user may not repudiate the transaction. User authentication may be performed in a manner that safeguards the user's privacy and may be distributed across multiple communication channels or systems to provide additional assurance that remote users are in fact who they claim to be.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventor: Richard B. LeVine
  • Publication number: 20080212450
    Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause—the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, deter or prevent an unauthorized individual from making copies. This is accomplished by modifying the optical path of an optical medium to include regions of selective distortion. This, in turn, modifies the read operation of the data in the regions, which can be used to identify and authenticate the medium.
    Type: Application
    Filed: April 17, 2008
    Publication date: September 4, 2008
    Applicant: ECD SYSTEMS, INC.
    Inventors: John J. Hart III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Publication number: 20080178299
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Application
    Filed: January 10, 2008
    Publication date: July 24, 2008
    Applicant: ECD Systems, Inc.
    Inventors: James A. Merkle, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, Jose L. Bouza
  • Patent number: 7376073
    Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, deter or prevent an unauthorized individual from making copies. This is accomplished by modifying the optical path of an optical medium to include regions of selective distortion. This, in turn, modifies the read operation of the data in the regions, which can be used to identify and authenticate the medium.
    Type: Grant
    Filed: December 12, 2001
    Date of Patent: May 20, 2008
    Assignee: ECD Systems, Inc.
    Inventors: John J. Hart, III, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Patent number: 7328453
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Grant
    Filed: May 9, 2002
    Date of Patent: February 5, 2008
    Assignee: ECD Systems, Inc.
    Inventors: James A. Merkle, Jr., Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeffrey A. Pagliarulo, John J. Hart, III, Jose L. Bouza
  • Patent number: 7237123
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Grant
    Filed: November 20, 2001
    Date of Patent: June 26, 2007
    Assignee: ECD Systems, Inc.
    Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart, III
  • Publication number: 20040223428
    Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, may deter or prevent an unauthorized individual from making copies. In addition, methods which generate an intended slow-down in the read process of the media can be used to authenticate the media at run time. This offers significant advantages to content creators who wish to protect their products.
    Type: Application
    Filed: February 5, 2004
    Publication date: November 11, 2004
    Inventors: John J. Hart, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Publication number: 20040030912
    Abstract: A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified.
    Type: Application
    Filed: May 9, 2002
    Publication date: February 12, 2004
    Inventors: James A. Merkle, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, Jeff Pagliarulo, John J. Hart, Jose L. Bouza
  • Publication number: 20030046545
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Application
    Filed: February 1, 2002
    Publication date: March 6, 2003
    Inventors: James A. Merkle, Richard B. LeVine, Daniel G. Howard
  • Publication number: 20020144153
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Application
    Filed: November 20, 2001
    Publication date: October 3, 2002
    Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, Daniel M. Goldman, John J. Hart
  • Publication number: 20020120854
    Abstract: Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
    Type: Application
    Filed: September 21, 2001
    Publication date: August 29, 2002
    Inventors: Richard B. LeVine, Andrew R. Lee, Daniel G. Howard, John J. Hart
  • Publication number: 20020114265
    Abstract: Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, may deter or prevent an unauthorized individual from making copies. This offers significant advantages to content creators who wish to protect their products.
    Type: Application
    Filed: December 12, 2001
    Publication date: August 22, 2002
    Inventors: John J. Hart, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard
  • Publication number: 20010037465
    Abstract: This application relates to a system and method for distributing title data on demand. An embodiment of the system comprises a service bureau that captures a plurality of title data. The service bureau may include an encryption device that encrypts the title data and that provides encrypted title data and a corresponding decryption key. The system may also include an entry portal. The entry portal and the service bureau may be coupled to a communications network. The entry portal allows the customer to select and order the title data and provides information to the customer that will allow selection of the title data. The system also may include a storage facility that may also be coupled to the communication network, and that stores the encrypted title data and decryption key.
    Type: Application
    Filed: April 4, 2001
    Publication date: November 1, 2001
    Inventors: John J. Hart, Richard B. LeVine, Andrew R. Lee, Daniel G. Howard