| 12363091 |
Method for authentication with identity providers |
Martin Smolny, Thomas Dürr, Michael Beck |
2025-07-15 |
| 11184444 |
Network traffic reduction by server-controlled cookie selection |
Thomas Dürr, Martin Smolny, Gregor Möhler, Klaus Rindtorff |
2021-11-23 |
| 11121864 |
Secure private key distribution between endpoint instances |
Michael Beck, Martin Smolny, Thomas Dürr, Gerald Francis McBrearty, Stephen SooHoo |
2021-09-14 |
| 9094457 |
Automated network deployment of cloud services into a network |
Klaus Julisch, Matthias Schunter |
2015-07-28 |
| 8286194 |
Coupling state aware systems |
Christoph Bachhuber-Haller, Martin Henke, Monika Illgner-Kurz, Bernhard Schmid, Thomas Spatzier +1 more |
2012-10-09 |
| 8265980 |
Workflow model for coordinating the recovery of IT outages based on integrated recovery plans |
Juergen Schneider, Thomas Starz, Jeremias Werner |
2012-09-11 |
| 8200749 |
Data processing method for generating service interface descriptions |
Michael Behrendt, Gerd Breiter, Harald Daur |
2012-06-12 |
| 8171122 |
Visualization of web services distributed management (WSDM) resources |
John E. Arwe, Michael J. Branson, David A. Elko, Anthony Wayne Erwin, Jeffrey A. Frey +1 more |
2012-05-01 |
| 8140573 |
Exporting and importing business objects based on metadata |
Michael McKay, Jeremias Werner |
2012-03-20 |
| 8127271 |
Method and system for accessing a resource implemented in a computer network |
Michael Behrendt, Martin Henke, Dietmar Kuebler |
2012-02-28 |
| 8082548 |
System and method for performing systems management on IT-resources using web services |
Boas Betzler, Dietmar Kuebler |
2011-12-20 |