Mequon, WI, United States of America

Yongxin Zhou

USPTO Granted Patents = 9 


 

Average Co-Inventor Count = 2.8

ph-index = 5

Forward Citations = 149(Granted Patents)


Location History:

  • Ottawa, CA (2009 - 2011)
  • Mequon, WI (US) (2012 - 2019)

Company Filing History:


Years Active: 2009-2019

Loading Chart...
Loading Chart...
Loading Chart...
9 patents (USPTO):Explore Patents

Title: Innovations of Yongxin Zhou

Introduction

Yongxin Zhou is a notable inventor based in Mequon, Wisconsin, with a remarkable portfolio of nine patents. His work primarily focuses on enhancing software security and protecting program behaviors from reverse engineering.

Latest Patents

Among his latest patents is a system and method of interlocking to protect software-mediated program and device behaviors. This innovative method renders software programs resistant to reverse engineering analysis by replacing simpler expressions in computational statements with more complex ones. The second expression, based on values or variables from the first, preserves the original value while complicating the analysis. Another significant patent involves securing accessible systems using base function encoding. This technique generates and blends base functions with existing program code, making it challenging for potential attackers to distinguish between them. Various protection techniques, such as fractures and dynamic data mangling, are also employed to enhance security.

Career Highlights

Yongxin Zhou has contributed his expertise to several companies, including Irdeto B.V. and Irdeto Canada Corporation. His work in these organizations has significantly advanced the field of software security.

Collaborations

He has collaborated with notable coworkers, including Yuan Xiang Gu and Harold J. Johnson, further enriching his professional experience and contributions to the industry.

Conclusion

Yongxin Zhou's innovative patents and career achievements highlight his significant impact on software security. His work continues to influence the field and protect software systems from potential threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…