Patents by Inventor Chenghui Luo

Chenghui Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8135648
    Abstract: Credit vouchers from a wagering game machine can be authenticated. This may be accomplished by receiving credit information at a server, the credit information including information indicating a player's balance at the wagering game machine. A security key may be created for the credit voucher. A secured document token may be created by encrypting a document token including the credit information with the security key. This document token may sent to a server which supplies a credit response. A modified security key may be created by combining the credit response with the security key. The credit voucher may be provided, the credit vouchers including the credit information, the credit response and the modified security key.
    Type: Grant
    Filed: November 3, 2008
    Date of Patent: March 13, 2012
    Assignee: GTECH Corporation
    Inventors: Thomas K. Oram, Chenghui Luo, Johan Berg
  • Patent number: 7877613
    Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class.
    Type: Grant
    Filed: September 4, 2003
    Date of Patent: January 25, 2011
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventor: Chenghui Luo
  • Publication number: 20090143128
    Abstract: Some example embodiments of the present invention address growing demand by lottery customers for expanded gaming options and new gaming concepts. Example embodiments may include methods and systems for providing a shared centralized gaming host which implements software as a service concepts for lottery and other wagering games.
    Type: Application
    Filed: December 3, 2008
    Publication date: June 4, 2009
    Applicant: GTECH Corporation
    Inventors: Paul Charles R. Cautley, Paula Connolly, Paul Distefano, Michael Karns, Chenghui Luo, Stephen Lupo, Thomas Oram, Charles E. Ostiguy, Jennifer Seymour, Mark Truman
  • Publication number: 20090117997
    Abstract: Credit vouchers from a wagering game machine can be authenticated. This may be accomplished by receiving credit information at a server, the credit information including information indicating a player's balance at the wagering game machine. A security key may be created for the credit voucher. A secured document token may be created by encrypting a document token including the credit information with the security key. This document token may sent to a server which supplies a credit response. A modified security key may be created by combining the credit response with the security key. The credit voucher may be provided, the credit vouchers including the credit information, the credit response and the modified security key.
    Type: Application
    Filed: November 3, 2008
    Publication date: May 7, 2009
    Inventors: Thomas K. Oram, Chenghui Luo, Johan Berg
  • Patent number: 7421586
    Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class.
    Type: Grant
    Filed: September 4, 2003
    Date of Patent: September 2, 2008
    Assignee: Fraunhofer Gesselschaft
    Inventors: Chenghui Luo, Jian Zhao
  • Patent number: 7263722
    Abstract: Three new obfuscation techniques. Data field obfuscation replaces references to data fields that use an object name and a field name with references that use an object name but do not use a field name. Obfuscation using the reflection mechanism for the executable code works by replacing a construct in the executable code with one or more equivalent constructs made using the reflection mechanism. Obfuscation of externally-defined constructs is done by relating the externally-defined construct to an obfuscation for the construct that is used within the executable code. The relationship is defined in a portion of the executable code, and at least the externally-fined construct is encrypted in the portion. The various obfuscation techniques may be used with each other or with other previously-known obfuscation techniques. The disclosed obfuscation techniques are particularly well-adapted for use with the byte codes produced by Java language compilers from Java language programs.
    Type: Grant
    Filed: May 12, 2000
    Date of Patent: August 28, 2007
    Assignee: Fraunhofer CRCG, Inc.
    Inventors: Chenghui Luo, Jian Zhao
  • Patent number: 7236610
    Abstract: The techniques for authenticating executable code employs keys (609) to modify the code (611). In static watermarking, the code is watermarked by using the key to determine positions in the executable code that will specify digits of a watermark value (607). Instructions are inserted at those positions as required to express the value. The inserted instructions do not affect the outputs from the code when the code is executed. The watermarked code is authenticated by using the key (609) to read the value and determining whether it is the proper value for that code. In dynamic watermarking, the code is watermarked using the key (607) to modify the program to produce execution state for an execution of the code that has properties that are determined by the key. Authentication is done by executing the code and comparing (621) the execution state that would have been produced if the program had been watermarked with the key.
    Type: Grant
    Filed: May 12, 2000
    Date of Patent: June 26, 2007
    Assignee: Fraunhofer Gesellschaft
    Inventors: Chenghui Luo, Jian Zhao
  • Publication number: 20060026430
    Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class.
    Type: Application
    Filed: September 4, 2003
    Publication date: February 2, 2006
    Inventor: Chenghui Luo
  • Publication number: 20040172544
    Abstract: Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified.
    Type: Application
    Filed: September 4, 2003
    Publication date: September 2, 2004
    Applicant: Fraunhofer CRCG, Inc.
    Inventors: Chenghui Luo, Jian Zhao