Patents by Inventor John Line

John Line has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11985255
    Abstract: Systems and methods for developing a novel public/private key pair having unique properties are disclosed, whereby standard data security operations in existing data security infrastructures return a data integrity validation result—but do not provide the intended data security of such infrastructures. These novel keys are referred to as degenerate keys and may be used to replace the public and private keys in existing public/private key cryptosystems. Because degenerate key data integrity validation may leverage existing data security infrastructures that are already widely-implemented, such examples may be applied immediately and configured to seamlessly transition from integrity only modes back to secure modes. In some instances, the degenerate key examples described herein may be employed during a software testing and/or factory validation stage of product development to allow for data integrity validation before burning in a developer's active (i.e.
    Type: Grant
    Filed: May 25, 2022
    Date of Patent: May 14, 2024
    Assignee: Texas Instruments Incorporated
    Inventor: Michael John Line
  • Publication number: 20220286298
    Abstract: Systems and methods for developing a novel public/private key pair having unique properties are disclosed, whereby standard data security operations in existing data security infrastructures return a data integrity validation result—but do not provide the intended data security of such infrastructures. These novel keys are referred to as degenerate keys and may be used to replace the public and private keys in existing public/private key cryptosystems. Because degenerate key data integrity validation may leverage existing data security infrastructures that are already widely-implemented, such examples may be applied immediately and configured to seamlessly transition from integrity only modes back to secure modes. In some instances, the degenerate key examples described herein may be employed during a software testing and/or factory validation stage of product development to allow for data integrity validation before burning in a developer's active (i.e.
    Type: Application
    Filed: May 25, 2022
    Publication date: September 8, 2022
    Inventor: Michael John LINE
  • Patent number: 11374770
    Abstract: Systems and methods for developing a novel public/private key pair having unique properties are disclosed, whereby standard data security operations in existing data security infrastructures return a data integrity validation result—but do not provide the intended data security of such infrastructures. These novel keys are referred to as degenerate keys and may be used to replace the public and private keys in existing public/private key cryptosystems. Because degenerate key data integrity validation may leverage existing data security infrastructures that are already widely-implemented, such examples may be applied immediately and configured to seamlessly transition from integrity only modes back to secure modes. In some instances, the degenerate key examples described herein may be employed during a software testing and/or factory validation stage of product development to allow for data integrity validation before burning in a developer's active (i.e.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: June 28, 2022
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Michael John Line
  • Publication number: 20210160085
    Abstract: Systems and methods for developing a novel public/private key pair having unique properties are disclosed, whereby standard data security operations in existing data security infrastructures return a data integrity validation result—but do not provide the intended data security of such infrastructures. These novel keys are referred to as degenerate keys and may be used to replace the public and private keys in existing public/private key cryptosystems. Because degenerate key data integrity validation may leverage existing data security infrastructures that are already widely-implemented, such examples may be applied immediately and configured to seamlessly transition from integrity only modes back to secure modes. In some instances, the degenerate key examples described herein may be employed during a software testing and/or factory validation stage of product development to allow for data integrity validation before burning in a developer's active (i.e.
    Type: Application
    Filed: November 25, 2019
    Publication date: May 27, 2021
    Inventor: Michael John LINE
  • Publication number: 20060223161
    Abstract: Novel Enterococcus and Streptococcus bacteriocins produced by novel Enterococcus and Streptococcus strains are used for at least reducing the levels of colonization by at least one target bacteria in animals, especially poultry.
    Type: Application
    Filed: April 5, 2005
    Publication date: October 5, 2006
    Inventors: Norman Stern, John Line, Edward Svetoch, Boris Eruslanov, Vladimir Perelygin, Eugeni Mitsevich, Irina Mitsevich, Vladimir Levchuk
  • Publication number: 20060156560
    Abstract: An improved laser sight apparatus that is capable of identifying and impinging several different targets at varying ranges from the shooter. In the preferred embodiment, the laser sight according to the present invention includes three lasers, each of which is pre-calibrated to impinge targets within a range that is distinct from the other two lasers. In an alternative embodiment, the laser sight can utilize a single laser that is capable of an automated adjustment to identify and impinge targets at various ranges.
    Type: Application
    Filed: March 21, 2005
    Publication date: July 20, 2006
    Inventors: Joseph Lines, John Lines