Patents by Inventor Yongxin Zhou

Yongxin Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080208560
    Abstract: A method for rendering software resistant to reverse engineering. Replace at least one first constant (mathematical expression, etc.) in a computational expression with a second mixed mathematical and bitwise-Boolean expression, the first constant being simpler than the second expression and the second expression being based on the value or the variables found in the first constant (or expression).
    Type: Application
    Filed: October 31, 2007
    Publication date: August 28, 2008
    Inventors: Harold Joseph Johnson, Yuan Xiang Gu, Yongxin Zhou
  • Publication number: 20050166191
    Abstract: Systems and methods related to concealing mathematical and logical operations in software. Mathematical and logical operations are disguised by replacing them with logically equivalent expressions. Each equivalent expression has at least two expression constants whose values are based on scaling and bias constants assigned to variables in the original mathematical or logical operation. Each of the expression constants may also be based on additive or multiplicative inverses modulo n of the scaling and bias constants. By replacing the original operations with more complex but logically equivalent expressions containing variables that also involve more operations, the true nature of the original operations is disguised.
    Type: Application
    Filed: January 24, 2005
    Publication date: July 28, 2005
    Inventors: Arun Kandanchatha, Yongxin Zhou
  • Publication number: 20050002532
    Abstract: The invention relates to a system and method of hiding cryptographic private keys. While public/private key encryption systems are considered to be secure, the private keys ultimately must be stored in some location—in fact, in some digital commerce systems the private key is sent to the end user as part of an executable file such as an audio player and audio file. Thus, attackers can obtain access to the private key. The broad concept of the invention is to split the private key up into parts which are obfuscated, but still kept in a form that allows the encrypted data to be decrypted. One technique for obfuscating the private key uses modulo arithmetic.
    Type: Application
    Filed: July 27, 2004
    Publication date: January 6, 2005
    Inventors: Yongxin Zhou, Stanley Chow