Patents by Inventor Kevin M. Henson

Kevin M. Henson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10604706
    Abstract: A reactor containing one or more spiral paths adapted to facilitate the reaction of feed stock, syn-gas with a catalyst or catalysts, for the purpose of synthesizing multiple longer chains of hydrocarbons where there the reactor is further adapted to manage the inflow of syn-gas feed stock, the outflow of hydrocarbon products the recycling of catalysts to ensure minimal maintenance interruptions, where the solid catalyst nodules are of a geometry and size contusive to fluid like movement through the reactor and through a regenerative catalysts management operation. The unit operates with minimal support infrastructure.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: March 31, 2020
    Assignee: PORTABLE GTL SYSTEMS, LLC
    Inventors: Roy A. Bynum, Kevin M. Henson
  • Publication number: 20190040322
    Abstract: A reactor containing one or more spiral paths adapted to facilitate the reaction of feed stock, syn-gas with a catalyst or catalysts, for the purpose of synthesizing multiple longer chains of hydrocarbons where there the reactor is further adapted to manage the inflow of syn-gas feed stock, the outflow of hydrocarbon products the recycling of catalysts to ensure minimal maintenance interruptions, where the solid catalyst nodules are of a geometry and size contusive to fluid like movement through the reactor and through a regenerative catalysts management operation. The unit operates with minimal support infrastructure.
    Type: Application
    Filed: October 10, 2018
    Publication date: February 7, 2019
    Inventors: Roy A. BYNUM, Kevin M. HENSON
  • Publication number: 20160237355
    Abstract: A reactor containing one or more spiral paths adapted to facilitate the reaction of feed stock, syn-gas with a catalyst or catalysts, for the purpose of synthesizing multiple longer chains of hydrocarbons where there the reactor is further adapted to manage the inflow of syn-gas feed stock, the outflow of hydrocarbon products the recycling of catalysts to ensure minimal maintenance interruptions, where the solid catalyst nodules are of a geometry and size contusive to fluid like movement through the reactor and through a regenerative catalysts management operation. The unit operates with minimal support infrastructure.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 18, 2016
    Inventors: Roy A. Bynum, Kevin M. Henson
  • Publication number: 20160101304
    Abstract: A container ignition and fire suppression system, comprising means for removing volatile gases present prior to and produced during and after loading the container with a volatile liquid based on a weight capacity of the container; filling a headspace above a level of the volatile liquid with a blanket composition of inert gas(es); pressurizing the volatile liquid and the predetermined composition of inert gas(es) to a predetermined pressure to retard outgassing of the volatile liquid into the head space occupied by the inert gas(es); discharging a fire retardant foam at onset of a rupturing of the predetermined blanket composition, the discharge adapted to smother, extinguish and prevent a fire from igniting via a spark, a rupture and other combustible processes; and a monitor and control apparatus adapted to determine and adjust a plurality of conditions regarding the inert gas(es) and the volatile liquid in the container via telemetry.
    Type: Application
    Filed: June 23, 2015
    Publication date: April 14, 2016
    Inventors: Keith A. Langenbeck, Kevin M. Henson
  • Patent number: 7844813
    Abstract: A system, process and method for data encryption and transmission are disclosed. By adopting the paradigm of a pre-paid self addressed express envelope end-users will interact with this invention in much the same way they interact with traditional delivery systems. They simply provide the content, and delivery takes place without any further user intervention. The encryption is a “software appliance”. This software already knows the identity of the sender and the receiver and the encryption key that is to be used; all it needs from the user is the information which is to be securely transported.
    Type: Grant
    Filed: July 15, 2002
    Date of Patent: November 30, 2010
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Patent number: 7016493
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Grant
    Filed: March 1, 2001
    Date of Patent: March 21, 2006
    Assignee: Asier Technology Corporation
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Patent number: 7016497
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Grant
    Filed: March 1, 2001
    Date of Patent: March 21, 2006
    Assignee: Asier Technology Corporation
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Patent number: 7003108
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Grant
    Filed: March 1, 2001
    Date of Patent: February 21, 2006
    Assignee: Asier Technology Corporation
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Patent number: 6996234
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Grant
    Filed: March 1, 2001
    Date of Patent: February 7, 2006
    Assignee: Asier Technology Corporation
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Patent number: 6950518
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Grant
    Filed: March 1, 2001
    Date of Patent: September 27, 2005
    Assignee: Asier Technology Corporation
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20040120521
    Abstract: A method and system for data encryption and decryption utilizing relative vector offsets, concealed within poly-alphabetic substitutions, and a multi-distance cipher chaining scheme. The encryption and decryption algorithm includes integer based offsets, XOR's, and Variable-Exchange-Tables (VETs). Crypto-Variables necessary to accomplish the encryption and decryption are randomly selected and placed in an Initialization-vector which is encrypted with a block cipher. The present invention achieves superior encryption security and processing speed, and generates a different encryption for a same character. The use of the VETs alone achieves a key in excess of 40,000 bits, and the process of XOR'ing characters with a trailing cipher chain produces an extremely large key.
    Type: Application
    Filed: October 10, 2003
    Publication date: June 24, 2004
    Inventors: Kevin M. Henson, Eric M. Smith
  • Publication number: 20040059945
    Abstract: A method and system of selectively encrypting data at a server side, and selectively downloading the encrypted information to a remote user as a function of the key a requesting remote user has. The present invention is particularly advantageous to allow a server to download HTML or other type of documents to requesting remote user, and then allowing sensitive information to only be downloaded to a remote user depending on the type of key the user holds. Within the documents at the server side are tags which indicate the presence of sensitive information encrypted at the server and which may be processed by a remote user to download and decrypt the sensitive information as a function of the key level the remote user holds. Different levels of sensitive information are downloadable to a remote user, whereby when general non-sensitive information is downloadable to a user without the key.
    Type: Application
    Filed: September 25, 2002
    Publication date: March 25, 2004
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20030014671
    Abstract: A system, process and method for data encryption and transition are disclosed. By adopting the paradigm of a pre-paid self addressed express envelope end-users will interact with this invention in much the same way they interact with traditional delivery systems. They simply provide the content, and delivery takes place without any further user intervention. The encryption is a “software appliance”. This software already knows the identity of the sender and the receiver and the encryption key that is to be used; all it needs from the user is the information which is to be securely transported.
    Type: Application
    Filed: July 15, 2002
    Publication date: January 16, 2003
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20020150240
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Application
    Filed: March 1, 2001
    Publication date: October 17, 2002
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20020141574
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Application
    Filed: March 1, 2001
    Publication date: October 3, 2002
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20020141573
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Application
    Filed: March 1, 2001
    Publication date: October 3, 2002
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20020136403
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Application
    Filed: March 1, 2001
    Publication date: September 26, 2002
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20020131591
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Application
    Filed: March 1, 2001
    Publication date: September 19, 2002
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20020131590
    Abstract: A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
    Type: Application
    Filed: March 1, 2001
    Publication date: September 19, 2002
    Inventors: Kevin M. Henson, Eric Myron Smith