1
James A Merkle Jr, Richard B LeVine, Andrew R Lee, Daniel G Howard, Daniel M Goldman, Jeffrey A Pagliarulo, John J Hart III, Jose L Bouza: Systems and methods for the prevention of unauthorized use and manipulation of digital content. ECD Systems, Mills & Onello, February 5, 2008: US07328453 (133 worldwide citation)

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...


2
James A Merkle Jr, Richard B LeVine, Andrew R Lee, Daniel G Howard, Daniel M Goldman, Jeffrey A Pagliarulo, John J Hart III, Jose L Bouza: Systems and methods for the prevention of unauthorized use and manipulation of digital content. SCA IPLA Holdings, Oblon Spivak McClelland Maier & Neustadt L, February 14, 2012: US08117667 (6 worldwide citation)

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...


3
James A Merkle, Richard B LeVine, Andrew R Lee, Daniel G Howard, Daniel M Goldman, Jeff Pagliarulo, John J Hart, Jose L Bouza: Systems and methods for the prevention of unauthorized use and manipulation of digital content. Mills & Onello, February 12, 2004: US20040030912-A1 (1 worldwide citation)

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...


4
James A Merkle Jr, Richard B LeVine, Andrew R Lee, Daniel G Howard, Daniel M Goldman, Jeffrey A Pagliarulo, John J Hart III, Jose L Bouza: Systems and methods for the prevention of unauthorized use and manipulation of digital content. SCA IPLA Holdings, Oblon Spivak McClelland Maier & Neustadt L, September 23, 2014: US08844048

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...


5
Merkle James Albert Jr, Levine Richard B, Lee Andrew R, Howard Daniel G, Goldman Daniel M, Hart John J Iii, Pagliarulo Jeff, Bouza Jose L: Systems and methods for the prevention of unauthorized use and manipulation of digital content. Ecd Systems, March 10, 2004: EP1395890-A2

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...


6
James A Merkle, Richard B LeVine, Andrew R Lee, Daniel G Howard, Daniel M Goldman, Jeffrey A Pagliarulo, John J Hart, Jose L Bouza: Systems and methods for the prevention of unauthorized use and manipulation of digital content. ECD Systems, Mills & Onello, July 24, 2008: US20080178299-A1

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...


7
Merkle James Albert Jr, Levine Richard B, Lee Andrew R, Howard Daniel G, Goldman Daniel M, Hart John J Iii, Pagliarulo Jeff, Bouza Jose L: Systems and methods for the prevention of unauthorized use and manipulation of digital content. Ecd Systems, ONELLO Anthony P Jr, November 14, 2002: WO/2002/091146

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...


8
James A MERKLE JR, Richard B LEVINE, Andrew R LEE, Daniel G HOWARD, Daniel M GOLDMAN, Jeffrey A PAGLIARULO, John J HART III, Jose L BOUZA: Systems and methods for the prevention of unauthorized use and manipulation of digital content. Sca Ipla Holdings, July 19, 2012: US20120185948-A1

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o ...