Gundelfinger
Christine Gundelfinger, Igensdorf DE
Patent application number | Description | Published |
---|---|---|
20160139288 | DEVICE AND METHOD FOR MONITORING ACCESS TO A STORAGE AREA OF A PLURALITY OF STORAGE AREAS FOR GOODS - Embodiments of the present invention provide a device for monitoring access to a storage area of a plurality of storage areas for goods, including a measurement signal generation, detection, and evaluator. The measurement signal generator includes a signal source and a conductor loop arrangement, the detector for detecting the generated magnetic field is configured to provide a measurement signal on the basis of the detected magnetic field, and the evaluator for evaluating the measurement signal is configured to determine an instance of access to one of the storage areas on the basis of the measurement signal, to compare a determined instance of access with a target access instance, and to output a display signal on the basis of the comparison. | 05-19-2016 |
Clinten Edward Gundelfinger, Missoula, MT US
Patent application number | Description | Published |
---|---|---|
20090032517 | Ski integrated solar power system - A system for heating a ski boot or snowboard boot powered by way of photovoltaic (solar) cells banked in a flexible solar panel or flexible solar panels placed within the structure of a ski or snowboard. Electricity produced by the photovoltaic cells is conducted from the solar panel(s) to the ski boot or snowboard boot via a circuit which is run from the solar panel(s) through the structure of the ski or snowboard to a contact point within or at the surface of the ski. The aim of which is to power a temperature controlled, heating element containing boot and/or binding and its circuitry, resulting in solar powered heat for the wearer. | 02-05-2009 |
Jochen Gundelfinger, Grafenberg DE
Patent application number | Description | Published |
---|---|---|
20130275745 | System and Method for Secure Communication - The invention specifies a method and a system for secure communication of a first computing device and a network. A second computing device with a hardened operating system is employed. The second computing device is different from the operating system of the first computing device. An authentication module in the second computing device authenticates a user. An encryption module in the second computing device encrypts the data received from the first computing device, so that an encrypted communication with the network is made possible. A decryption module in the second computing device decrypts the encrypted data received from the network for the first computing device. | 10-17-2013 |