Patents by Inventor Andrew Kongs

Andrew Kongs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240083954
    Abstract: The present invention provides HIV-1 vaccine immunogens. Some of the immunogens contain a soluble gp140-derived protein that harbors a modified N-terminus of the HR1 region in gp41. Some of the immunogens contain an HIV-1 Env-derived trimer protein that is presented on a nanoparticle platform. The invention also provides methods of using the HIV-1 vaccine immunogens for eliciting an immune response or treating HIV infections.
    Type: Application
    Filed: August 15, 2023
    Publication date: March 14, 2024
    Inventors: Leopold Kong, Ian A. Wilson, Natalia de Val, Andrew B. Ward, Dennis Burton, Linling He, Jiang Zhu
  • Patent number: 11784812
    Abstract: A method for creating devices facilitating secure data transmission, storage and key management. At least two devices are each comprised of at least part of a physically unclonable function unit originally shared by the at least two devices on a single, monolithic original integrated circuit. The process includes physically segmenting the shared physically unclonable function unit between the at least two devices. The at least two devices which share the single, monolithic integrated circuit are physically separated into individual device units.
    Type: Grant
    Filed: December 14, 2020
    Date of Patent: October 10, 2023
    Assignee: The University of Tulsa
    Inventors: Andrew Kongs, Gavin Bauer, Kyle Cook
  • Patent number: 10880085
    Abstract: A method for creating devices facilitating secure data transmission, storage and key management. At least two devices are each comprised of at least part of a physically unclonable function unit originally shared by the at least two devices on a single, monolithic original integrated circuit. The process includes physically segmenting the shared physically unclonable function unit between the at least two devices. The at least two devices which share the single, monolithic integrated circuit are physically separated into individual device units.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: December 29, 2020
    Assignee: The University of Tulsa
    Inventors: Andrew Kongs, Gavin Bauer, Kyle Cook
  • Patent number: 10403058
    Abstract: A system and method to preserve the integrity of data being extracted from an electronic data recorder (“EDR”) of an electronic control module (“ECM”) makes use of a forensic link adapter (20) and, optionally, a sensor simulator (10) (when the ECM is out of the vehicle). The forensic link adapter (20) has one or more first microprocessors (23) and associated first software which prevent any message being sent by an external network from corrupting the previously recorded data measurements. The data measurements are then extracted, verified, and stored in a separate file. The sensor simulator (10) has one or more second microprocessors (23), associated second software, and a bank of resistors (21) that mimic sensors normally in communication with the ECM. The simulator “tricks” the ECM into thinking it is still in the vehicle by using the replicating vehicle system values the ECM normally sees when in the vehicle.
    Type: Grant
    Filed: August 11, 2017
    Date of Patent: September 3, 2019
    Assignee: The University of Tulsa
    Inventors: Jeremy Daily, James Johnson, Andrew Kongs, Jose Corcega
  • Patent number: 9865102
    Abstract: A system and method to preserve the integrity of data being extracted from an electronic data recorder (“EDR”) of an electronic control module (“ECM”) makes use of a forensic link adapter and, optionally, a sensor simulator (when ECM is out of the vehicle). The forensic link adapter has one or more first microprocessors and a first software means which prevent any message being sent by an external network from corrupting the previously recorded data measurements. The data measurements are then extracted, verified, and stored in a separate file. The sensor simulator has one or more second microprocessors, a second software means, and a bank of resistors that mimic sensors normally in communication with the ECM. The simulator “tricks” the ECM into thinking it is still in the vehicle by using the replicating vehicle system values the ECM normally sees when in the vehicle.
    Type: Grant
    Filed: April 10, 2014
    Date of Patent: January 9, 2018
    Assignee: The University of Tulsa
    Inventors: Jeremy Daily, James Johnson, Andrew Kongs, Jose Corcega
  • Publication number: 20170365112
    Abstract: A system and method to preserve the integrity of data being extracted from an electronic data recorder (“EDR”) of an electronic control module (“ECM”) makes use of a forensic link adapter (20) and, optionally, a sensor simulator (10) (when the ECM is out of the vehicle). The forensic link adapter (20) has one or more first microprocessors (23) and a first software means which prevent any message being sent by an external network from corrupting the previously recorded data measurements. The data measurements are then extracted, verified, and stored in a separate file. The sensor simulator (10) has one or more second microprocessors (23), a second software means, and a bank of resistors (21) that mimic sensors normally in communication with the ECM. The simulator “tricks” the ECM into thinking it is still in the vehicle by using the replicating vehicle system values the ECM normally sees when in the vehicle.
    Type: Application
    Filed: August 11, 2017
    Publication date: December 21, 2017
    Inventors: Jeremy Daily, James Johnson, Andrew Kongs, Jose Corcega
  • Publication number: 20160247335
    Abstract: A system and method to preserve the integrity of data being extracted from an electronic data recorder (“EDR”) of an electronic control module (“ECM”) makes use of a forensic link adapter (20) and, optionally, a sensor simulator (10) (when ECM is out of the vehicle). The forensic link adapter (20) has one or more first microprocessors (23) and a first software means which prevent any message being sent by an external network from corrupting the previously recorded data measurements. The data measurements are then extracted, verified, and stored in a separate file. The sensor simulator (10) has one or more second microprocessors (23), a second software means, and a bank of resistors (21) that mimic sensors normally in communication with the ECM. The simulator “tricks” the ECM into thinking it is still in the vehicle by using the replicating vehicle system values the ECM normally sees when in the vehicle.
    Type: Application
    Filed: April 10, 2014
    Publication date: August 25, 2016
    Inventors: Jeremy Daily, James Johnson, Andrew Kongs, Jose Corcega