loadpatents
name:-0.021037101745605
name:-0.016705989837646
name:-0.00054502487182617
Horn; Gunther Patent Filings

Horn; Gunther

Patent Applications and Registrations

Patent applications and USPTO patent grants for Horn; Gunther.The latest application filed is for "wind turbine tower and method for erecting a wind turbine tower".

Company Profile
0.22.18
  • Horn; Gunther - Aurich DE
  • Horn; Gunther - Munich N/A DE
  • Horn; Gunther - Munchen N/A DE
  • Horn; Gunther - Heidenheim DE
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Wind turbine tower and method for erecting a wind turbine tower
Grant 9,841,007 - Horn December 12, 2
2017-12-12
Device and method for automatically twisting metal wires, in particular for connecting adjacent, preferably mutually intersecting structure elements
Grant 9,808,854 - Horn November 7, 2
2017-11-07
Identity management system
Grant 9,749,309 - Horn , et al. August 29, 2
2017-08-29
Wind Turbine Tower And Method For Erecting A Wind Turbine Tower
App 20170184076 - HORN; Gunther
2017-06-29
Apparatus and method for processing a concrete tower segment of a wind turbine
Grant 9,587,413 - Horn , et al. March 7, 2
2017-03-07
Production of a tower
Grant 9,533,428 - Kapitza , et al. January 3, 2
2017-01-03
Method and system for providing access-specific key
Grant 9,197,615 - Falk , et al. November 24, 2
2015-11-24
Device And Method For Automatically Twisting Metal Wires, In Particular For Connecting Adjacent, Preferably Mutually Intersecting Structure Elements
App 20150266082 - Horn; Gunther
2015-09-24
Blade for a Water Turbine
App 20150204298 - Reh; Ingrid ;   et al.
2015-07-23
Hiding a device identity
Grant 9,032,201 - Mayer , et al. May 12, 2
2015-05-12
Apparatus And Method For Processing A Concrete Tower Segment Of A Wind Turbine
App 20140283478 - Horn; Gunther ;   et al.
2014-09-25
Methods, apparatuses, and computer program products for providing fresh security context during intersystem mobility
Grant 8,798,632 - Forsberg , et al. August 5, 2
2014-08-05
Production Of A Tower
App 20140208665 - Kapitza; Jan ;   et al.
2014-07-31
Method, apparatus, computer program, data storage medium and computer program product for preventing reception of media data from a multicast service by an unauthorized apparatus
Grant 8,745,382 - Franz , et al. June 3, 2
2014-06-03
Telecommunication system and method for controlling switching of user terminal between two networks
Grant 8,644,249 - Bucker , et al. February 4, 2
2014-02-04
Method for providing a symmetric key for protecting a key management protocol
Grant 8,488,795 - Bucker , et al. July 16, 2
2013-07-16
Method for agreeing between at least one first and one second communication subscriber to security key for securing communication link
Grant 8,291,222 - Blommaert , et al. October 16, 2
2012-10-16
Identity Management System
App 20110202986 - Horn; Gunther ;   et al.
2011-08-18
Hiding A Device Identity
App 20110197058 - Mayer; Georg ;   et al.
2011-08-11
Integration Of Pre Rel-8 Home Location Registers In Evolved Packet System
App 20110191576 - Forsberg; Dan ;   et al.
2011-08-04
Methods, Apparatuses, And Computer Program Products For Providing Fresh Security Context During Intersystem Mobility
App 20110092213 - Forsberg; Dan Lars Anders ;   et al.
2011-04-21
Method And System For Providing An Access Specific Key
App 20110010538 - Falk; Rainer ;   et al.
2011-01-13
Method for creating and distributing cryptographic keys in a mobile radio system and corresponding mobile radio system
Grant 7,676,041 - Horn , et al. March 9, 2
2010-03-09
Method for providing a symmetric key for protecting a key management protocol
App 20100034384 - Bucker; Wolfgang ;   et al.
2010-02-11
Universal subscriber identity module provisioning for machine-to-machine communications
App 20090191857 - Horn; Gunther ;   et al.
2009-07-30
Method for agreeing between at least one first and one second communication subscriber to security key for securing communication link
App 20090132806 - Blommaert; Marc ;   et al.
2009-05-21
Telecommunication System and Method for Controlling Switching of User Terminal Between Two Networks
App 20090052396 - Bucker; Wolfgang ;   et al.
2009-02-26
Method for safeguarding data traffic between a first terminal and a first and a second terminal and a second network
App 20070147618 - Horn; Gunther
2007-06-28
Method for creating and distributing cryptographic keys in a mobile radio system and corresponding mobile radio system
App 20060171541 - Horn; Gunther ;   et al.
2006-08-03
Method and apparatus to counter the rogue shell threat by means of local key derivation
App 20040102181 - Horn, Gunther
2004-05-27
Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N
Grant 6,064,741 - Horn , et al. May 16, 2
2000-05-16

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed