Patents by Inventor Chenghui Luo
Chenghui Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8135648Abstract: Credit vouchers from a wagering game machine can be authenticated. This may be accomplished by receiving credit information at a server, the credit information including information indicating a player's balance at the wagering game machine. A security key may be created for the credit voucher. A secured document token may be created by encrypting a document token including the credit information with the security key. This document token may sent to a server which supplies a credit response. A modified security key may be created by combining the credit response with the security key. The credit voucher may be provided, the credit vouchers including the credit information, the credit response and the modified security key.Type: GrantFiled: November 3, 2008Date of Patent: March 13, 2012Assignee: GTECH CorporationInventors: Thomas K. Oram, Chenghui Luo, Johan Berg
-
Patent number: 7877613Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class.Type: GrantFiled: September 4, 2003Date of Patent: January 25, 2011Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.Inventor: Chenghui Luo
-
Publication number: 20090143128Abstract: Some example embodiments of the present invention address growing demand by lottery customers for expanded gaming options and new gaming concepts. Example embodiments may include methods and systems for providing a shared centralized gaming host which implements software as a service concepts for lottery and other wagering games.Type: ApplicationFiled: December 3, 2008Publication date: June 4, 2009Applicant: GTECH CorporationInventors: Paul Charles R. Cautley, Paula Connolly, Paul Distefano, Michael Karns, Chenghui Luo, Stephen Lupo, Thomas Oram, Charles E. Ostiguy, Jennifer Seymour, Mark Truman
-
Publication number: 20090117997Abstract: Credit vouchers from a wagering game machine can be authenticated. This may be accomplished by receiving credit information at a server, the credit information including information indicating a player's balance at the wagering game machine. A security key may be created for the credit voucher. A secured document token may be created by encrypting a document token including the credit information with the security key. This document token may sent to a server which supplies a credit response. A modified security key may be created by combining the credit response with the security key. The credit voucher may be provided, the credit vouchers including the credit information, the credit response and the modified security key.Type: ApplicationFiled: November 3, 2008Publication date: May 7, 2009Inventors: Thomas K. Oram, Chenghui Luo, Johan Berg
-
Patent number: 7421586Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class.Type: GrantFiled: September 4, 2003Date of Patent: September 2, 2008Assignee: Fraunhofer GesselschaftInventors: Chenghui Luo, Jian Zhao
-
Patent number: 7263722Abstract: Three new obfuscation techniques. Data field obfuscation replaces references to data fields that use an object name and a field name with references that use an object name but do not use a field name. Obfuscation using the reflection mechanism for the executable code works by replacing a construct in the executable code with one or more equivalent constructs made using the reflection mechanism. Obfuscation of externally-defined constructs is done by relating the externally-defined construct to an obfuscation for the construct that is used within the executable code. The relationship is defined in a portion of the executable code, and at least the externally-fined construct is encrypted in the portion. The various obfuscation techniques may be used with each other or with other previously-known obfuscation techniques. The disclosed obfuscation techniques are particularly well-adapted for use with the byte codes produced by Java language compilers from Java language programs.Type: GrantFiled: May 12, 2000Date of Patent: August 28, 2007Assignee: Fraunhofer CRCG, Inc.Inventors: Chenghui Luo, Jian Zhao
-
Patent number: 7236610Abstract: The techniques for authenticating executable code employs keys (609) to modify the code (611). In static watermarking, the code is watermarked by using the key to determine positions in the executable code that will specify digits of a watermark value (607). Instructions are inserted at those positions as required to express the value. The inserted instructions do not affect the outputs from the code when the code is executed. The watermarked code is authenticated by using the key (609) to read the value and determining whether it is the proper value for that code. In dynamic watermarking, the code is watermarked using the key (607) to modify the program to produce execution state for an execution of the code that has properties that are determined by the key. Authentication is done by executing the code and comparing (621) the execution state that would have been produced if the program had been watermarked with the key.Type: GrantFiled: May 12, 2000Date of Patent: June 26, 2007Assignee: Fraunhofer GesellschaftInventors: Chenghui Luo, Jian Zhao
-
Publication number: 20060026430Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class.Type: ApplicationFiled: September 4, 2003Publication date: February 2, 2006Inventor: Chenghui Luo
-
Publication number: 20040172544Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified.Type: ApplicationFiled: September 4, 2003Publication date: September 2, 2004Applicant: Fraunhofer CRCG, Inc.Inventors: Chenghui Luo, Jian Zhao