loadpatents
name:-0.69774103164673
name:-0.095202922821045
name:-0.011187076568604
Horn; Guenther Patent Filings

Horn; Guenther

Patent Applications and Registrations

Patent applications and USPTO patent grants for Horn; Guenther.The latest application filed is for "network authorization assistance".

Company Profile
9.30.32
  • Horn; Guenther - Munich DE
  • Horn; Guenther - Munchen DE
  • - München DE
  • Horn, Guenther - Muenchen DE
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Group communication service enabler security
Grant 11,212,321 - Jerichow , et al. December 28, 2
2021-12-28
Registering user equipment with a visited public land mobile network
Grant 11,202,192 - Horn , et al. December 14, 2
2021-12-14
Network Authorization Assistance
App 20210235269 - HORN; Guenther ;   et al.
2021-07-29
Flexible Selection Of Security Features In Mobile Networks
App 20210092163 - HORN; Guenther
2021-03-25
Registering User Equipment With A Visited Public Land Mobile Network
App 20210037372 - Horn; Guenther ;   et al.
2021-02-04
Flexible selection of security features in mobile networks
Grant 10,893,075 - Horn January 12, 2
2021-01-12
Security in intersystem mobility
Grant 10,512,005 - Horn , et al. Dec
2019-12-17
Secure bootstrapping architecture method based on password-based digest authentication
Grant 10,411,884 - Blommaert , et al. Sept
2019-09-10
Multi-security levels/traffic management across multiple network function instantiations
Grant 10,362,040 - Harris , et al.
2019-07-23
Security In Intersystem Mobility
App 20190104447 - Horn; Guenther ;   et al.
2019-04-04
Security In Isolated Lte Networks
App 20190069170 - JERICHOW; Anja ;   et al.
2019-02-28
Remote verification of attributes in a communication network
Grant 10,218,514 - Horn , et al. Feb
2019-02-26
Flexible Selection Of Security Features In Mobile Networks
App 20190028515 - HORN; Guenther
2019-01-24
Multi-security Levels/traffic Management Across Multiple Network Function Instantiations
App 20180295138 - HARRIS; John ;   et al.
2018-10-11
Security Procedures For The Cellular Internet Of Things
App 20180241757 - HORN; Guenther
2018-08-23
Methods, apparatuses and computer program products enabling to improve handover security in mobile communication networks
Grant 9,817,720 - Horn , et al. November 14, 2
2017-11-14
Security for access to the IP multimedia subsystem (IMS) with web real time communication (WebRTC)
Grant 9,794,259 - Horn , et al. October 17, 2
2017-10-17
Group Communication Service Enabler Security
App 20170264647 - JERICHOW; Anja ;   et al.
2017-09-14
Method And Apparatus For Tracking Idle Devices
App 20170238247 - CHANDRASHEKAR; Subramanya ;   et al.
2017-08-17
Key Separation For Local Evolved Packet Core
App 20170118635 - JERICHOW; Anja ;   et al.
2017-04-27
Secure Bootstrapping Architecture Method based on Password-Based Digest Authentication
App 20170063540 - Blommaert; Marc ;   et al.
2017-03-02
Security handling for multi frequency band
Grant 9,392,447 - Hwang , et al. July 12, 2
2016-07-12
Key handling in communication systems
Grant 9,344,411 - Forsberg , et al. May 17, 2
2016-05-17
Remote Verification Of Attributes In A Communication Network
App 20160112207 - HORN; Guenther ;   et al.
2016-04-21
Remote verification of attributes in a communication network
Grant 9,215,220 - Horn , et al. December 15, 2
2015-12-15
Methods, devices, and computer program products improving the public warning system for mobile communication
App 20150296375 - Horn; Guenther
2015-10-15
Methods, apparatuses, and related computer program product for network security
Grant 9,154,510 - Schneider , et al. October 6, 2
2015-10-06
Methods, Apparatuses And Computer Program Products Enabling To Improve Handover Security In Mobile Communication Networks
App 20150269028 - Horn; Guenther ;   et al.
2015-09-24
SECURITY FOR ACCESS TO THE IP MULTIMEDIA SUBSYSTEM (IMS) WITH WEB REAL TIME COMMUNICATION (WebRTC)
App 20150200946 - HORN; Guenther ;   et al.
2015-07-16
Security for a non-3GPP access to an evolved packet system
Grant 8,990,925 - Horn March 24, 2
2015-03-24
Apparatus, method, system and program for secure communication
Grant 8,924,722 - Horn , et al. December 30, 2
2014-12-30
Apparatus, method, system and program for secure communication
Grant 08924722 -
2014-12-30
Security Handling For Multi Frequency Band
App 20140302821 - HWANG; Woonhee ;   et al.
2014-10-09
Integrity protection towards one CN after handovers involving multiple services to be handled by different CNs
App 20140269613 - Tiwari; Bindhya V. ;   et al.
2014-09-18
Trustworthiness decision making for access authentication
Grant 8,607,309 - Ropolyi , et al. December 10, 2
2013-12-10
Method and system for veryfying the authenticity of a first communication participants in a communications network
Grant 8,565,429 - Cuellar , et al. October 22, 2
2013-10-22
Method For Context Establishment In Telecommunication Networks
App 20130189955 - Horn; Guenther ;   et al.
2013-07-25
Method For Establishing A Secure And Authorized Connection Between A Smart Card And A Device In A Network
App 20130091556 - Horn; Guenther ;   et al.
2013-04-11
Methods, Apparatuses, And Related Computer Program Product For Network Security
App 20120084451 - Schneider; Peter ;   et al.
2012-04-05
Communication Connection Establishment Control for Preventing Unsolicited Communication
App 20120039452 - Horn; Guenther ;   et al.
2012-02-16
Remote Verification Of Attributes In A Communication Network
App 20110314289 - HORN; Guenther ;   et al.
2011-12-22
Trustworthiness Decision Making For Access Authentication
App 20110225632 - Ropolyi; Robert ;   et al.
2011-09-15
Secure Bootstrapping Architecture Method Based on Password-Based Digest Authentication
App 20110145575 - Blommaert; Marc ;   et al.
2011-06-16
Apparatus, Method, System and Program for Secure Communication
App 20110004757 - Horn; Guenther ;   et al.
2011-01-06
Security For A Non-3gpp Access To An Evolved Packet System
App 20110004762 - Horn; Guenther
2011-01-06
Key Handling In Communication Systems
App 20100111308 - Forsberg; Dan ;   et al.
2010-05-06
Method for authentication of a radio communications network with a mobile station, and radio communications network and a mobile station
Grant 7,627,122 - Horn , et al. December 1, 2
2009-12-01
Method and system for verifying the authenticity of a first communication participants in a communications network
Grant RE40,791 - Cuellar , et al. June 23, 2
2009-06-23
Method and apparatus to counter the rogue shell threat by means of local key derivation
Grant 7,526,273 - Horn April 28, 2
2009-04-28
Method and system for verifying the authenticity of a first communication participants in a communications network
Grant 7,139,550 - Cuellar , et al. November 21, 2
2006-11-21
Method and system for verifying the authenticity of a first communication participants in a communications network
Grant 6,980,796 - Cuellar , et al. December 27, 2
2005-12-27
Method and arrangement for the computer-aided exchange of cryptographic keys between a first computer unit and a second computer unit
Grant 6,952,475 - Horn , et al. October 4, 2
2005-10-04
Method and system for veryfying the authenticity of a first communication participants in a communications network
App 20040006714 - Cuellar, Jorge ;   et al.
2004-01-08
Method and system for veryfying the authenticity of a first communication participants in a communications network
App 20030229784 - Cuellar, Jorge ;   et al.
2003-12-11

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed