Hoselton
Heath J. Hoselton, San Antonio, TX US
Patent application number | Description | Published |
---|---|---|
20120318005 | APPARATUS AND METHOD FOR INSTALLATION BY UNLICENSED PERSONNEL OF A PRE-CHARGED, DUCTLESS HEATING/COOLING SYSTEM - A pre-charged heating/cooling system is shown for installation by unlicensed personnel. An outside unit includes an outside coil, outside fan, compressor and a reversing valve. An inside unit has an inside coil, inside fan for drawing air through the inside coil and discharging the conditioned air into the enclosed space, and a power cord connection. A cable sheath contains all connections from the inside unit to the outside unit with electrical connections being secured in position on the outside unit by a cover and a bracket. An expandable window sill holds and seals the cable sheath in a window opening. | 12-20-2012 |
Helen Y. Hoselton, Arlington Heights, IL US
Patent application number | Description | Published |
---|---|---|
20130227294 | COMMUNICATION PROTOCOL FOR SECURE COMMUNICATIONS SYSTEMS - A method and apparatus for authenticating a key management message within a secure communication system is provided herein. During operation, a digital signature for message authentication of a Project 25 Key Management Message (KMM) is utilized. In particular, the digital signature will be used to authenticate the KMM in scenarios where there is no Message Authentication Code (MAC). The MAC will be utilized to authenticate the KMM when available. Because authentication of KMMs take place, even when no MAC is available, it becomes increasingly more difficult to tamper or spoof the delivery of encryption keys. | 08-29-2013 |
20130236014 | COMMUNICATION PROTOCOL FOR SECURE COMMUNICATIONS SYSTEMS - A method and apparatus for transmitting encryption keys in a secure communication system is provided herein. During rekeying of a device, a key encryption key (KEK) is utilized to wrap (encrypt) the traffic encryption key (TEK) when the KEK is available to the device. If unavailable, the TEK will be wrapped using public key encryption with the recipient device's public key. The receiving device will then be able to unwrap the TEK using public key decryption with its own private key. Because TEKs are always transmitted in a secure manner, secure and efficient rekeying of devices on foreign networks can occur. | 09-12-2013 |
Steven Hoselton, Lexington, IL US
Patent application number | Description | Published |
---|---|---|
20110186309 | Animal Shoe and Methods for Securing with Animal Foot - A horseshoe for securing to an animal foot and methods for forming and securing the horseshoe to an animal foot are disclosed. A body portion contains at least one channel having a cross-sectional shape that is wider at a level below a top surface than at an upper level. The channel retains a rigid material forming a bonding lug which is substantially co-planar with the top surface of the horseshoe body. The bonding lug interacts with a bonding agent to increase the strength of the bond between the horseshoe and the animal foot. | 08-04-2011 |