Patent | Date |
---|
Wind turbine tower and method for erecting a wind turbine tower Grant 9,841,007 - Horn December 12, 2 | 2017-12-12 |
Device and method for automatically twisting metal wires, in particular for connecting adjacent, preferably mutually intersecting structure elements Grant 9,808,854 - Horn November 7, 2 | 2017-11-07 |
Identity management system Grant 9,749,309 - Horn , et al. August 29, 2 | 2017-08-29 |
Wind Turbine Tower And Method For Erecting A Wind Turbine Tower App 20170184076 - HORN; Gunther | 2017-06-29 |
Apparatus and method for processing a concrete tower segment of a wind turbine Grant 9,587,413 - Horn , et al. March 7, 2 | 2017-03-07 |
Production of a tower Grant 9,533,428 - Kapitza , et al. January 3, 2 | 2017-01-03 |
Method and system for providing access-specific key Grant 9,197,615 - Falk , et al. November 24, 2 | 2015-11-24 |
Device And Method For Automatically Twisting Metal Wires, In Particular For Connecting Adjacent, Preferably Mutually Intersecting Structure Elements App 20150266082 - Horn; Gunther | 2015-09-24 |
Blade for a Water Turbine App 20150204298 - Reh; Ingrid ;   et al. | 2015-07-23 |
Hiding a device identity Grant 9,032,201 - Mayer , et al. May 12, 2 | 2015-05-12 |
Apparatus And Method For Processing A Concrete Tower Segment Of A Wind Turbine App 20140283478 - Horn; Gunther ;   et al. | 2014-09-25 |
Methods, apparatuses, and computer program products for providing fresh security context during intersystem mobility Grant 8,798,632 - Forsberg , et al. August 5, 2 | 2014-08-05 |
Production Of A Tower App 20140208665 - Kapitza; Jan ;   et al. | 2014-07-31 |
Method, apparatus, computer program, data storage medium and computer program product for preventing reception of media data from a multicast service by an unauthorized apparatus Grant 8,745,382 - Franz , et al. June 3, 2 | 2014-06-03 |
Telecommunication system and method for controlling switching of user terminal between two networks Grant 8,644,249 - Bucker , et al. February 4, 2 | 2014-02-04 |
Method for providing a symmetric key for protecting a key management protocol Grant 8,488,795 - Bucker , et al. July 16, 2 | 2013-07-16 |
Method for agreeing between at least one first and one second communication subscriber to security key for securing communication link Grant 8,291,222 - Blommaert , et al. October 16, 2 | 2012-10-16 |
Identity Management System App 20110202986 - Horn; Gunther ;   et al. | 2011-08-18 |
Hiding A Device Identity App 20110197058 - Mayer; Georg ;   et al. | 2011-08-11 |
Integration Of Pre Rel-8 Home Location Registers In Evolved Packet System App 20110191576 - Forsberg; Dan ;   et al. | 2011-08-04 |
Methods, Apparatuses, And Computer Program Products For Providing Fresh Security Context During Intersystem Mobility App 20110092213 - Forsberg; Dan Lars Anders ;   et al. | 2011-04-21 |
Method And System For Providing An Access Specific Key App 20110010538 - Falk; Rainer ;   et al. | 2011-01-13 |
Method for creating and distributing cryptographic keys in a mobile radio system and corresponding mobile radio system Grant 7,676,041 - Horn , et al. March 9, 2 | 2010-03-09 |
Method for providing a symmetric key for protecting a key management protocol App 20100034384 - Bucker; Wolfgang ;   et al. | 2010-02-11 |
Universal subscriber identity module provisioning for machine-to-machine communications App 20090191857 - Horn; Gunther ;   et al. | 2009-07-30 |
Method for agreeing between at least one first and one second communication subscriber to security key for securing communication link App 20090132806 - Blommaert; Marc ;   et al. | 2009-05-21 |
Telecommunication System and Method for Controlling Switching of User Terminal Between Two Networks App 20090052396 - Bucker; Wolfgang ;   et al. | 2009-02-26 |
Method for safeguarding data traffic between a first terminal and a first and a second terminal and a second network App 20070147618 - Horn; Gunther | 2007-06-28 |
Method for creating and distributing cryptographic keys in a mobile radio system and corresponding mobile radio system App 20060171541 - Horn; Gunther ;   et al. | 2006-08-03 |
Method and apparatus to counter the rogue shell threat by means of local key derivation App 20040102181 - Horn, Gunther | 2004-05-27 |
Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N Grant 6,064,741 - Horn , et al. May 16, 2 | 2000-05-16 |