Patents by Inventor Jacco Brok

Jacco Brok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8677125
    Abstract: The present invention provides a method and an apparatus for automating authentication of a user. In one embodiment, a method calls for detecting an authentication event at a wireless communication device to gain access to a first wireless network through an access point associated with the first wireless network, automatically obtaining a credential from a second wireless network in response to the authentication event, and authenticating the user based on the credential to establish a connection between the wireless communication device and the first wireless network. A client-server based communication system includes a client module at a wireless communication device for user authentication of a Wi-Fi device to a Wi-Fi network through an access point associated therewith. For the purposes of authentication, the client-server based communication system further includes a server module with which the client module may automatically exchange short message service messages over a wide area network.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: March 18, 2014
    Assignee: Alcatel Lucent
    Inventors: Jacco Brok, Jeroen Van Bemmel
  • Patent number: 8041339
    Abstract: A method for authenticating a mobile device is provided. The method includes receiving a communication request from the mobile device. The mobile device is operable to exchange data over a primary channel. Authentication data is received from the mobile device over a second channel. The secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity. The authentication data is processed to determine whether the mobile device is a trusted device.
    Type: Grant
    Filed: January 31, 2006
    Date of Patent: October 18, 2011
    Assignee: Alcatel Lucent
    Inventors: Harold Wilhelm Antonie Teunissen, Jacco Brok, Ko Marcus Joannes Louis Lagerberg, Miroslav Zivkovic
  • Patent number: 7907938
    Abstract: Non-urgent data messages of an IP based application hosted by a cellular device are only transmitted when a predetermined condition is met. A data message may be: a presence report; a check for new email sent by an email client to a server; and a keep-alive message sent to a server, but this is not an exhaustive list of the relevant types of data message. The predetermined condition, may, for example, be met when the first of the following occurs: the airlink is open; a maximum delay time has elapsed; a store for non-urgent messages is full; and a maximum number of messages is stored. The invention reduces the number of times when the airlink is open, thus preventing the 3 to 10 seconds additional open time for each occurrence. This saves battery life for the cellular device. The invention is also applicable to other types of messaging in which small data messages are periodically transmitted over an airlink.
    Type: Grant
    Filed: August 31, 2006
    Date of Patent: March 15, 2011
    Assignee: Alcatel-Lucent USA Inc.
    Inventor: Jacco Brok
  • Patent number: 7735118
    Abstract: The invention comprises a method and apparatus for preventing a bridge between a secure network and an insecure network. Specifically, the method comprises monitoring a network device supporting a secure network connection for an attempt to establish an insecure network connection, and terminating the secure network connection in response to detecting the attempt to establish the insecure network connection, where the secure network connection comprises a network layer connection.
    Type: Grant
    Filed: February 7, 2005
    Date of Patent: June 8, 2010
    Assignee: Alcatel-Lucent USA Inc.
    Inventors: Jacco Brok, Willem Adriaan Romijn
  • Patent number: 7647048
    Abstract: The present invention provides a method and an apparatus for identifying at least one of one or more hidden and visible networks associated with an access point. The method comprises detecting whether a Wi-Fi network is hidden behind a first visible network of the at least one of one or more hidden and visible networks associated with the access point, and if so, selecting the Wi-Fi network to connect an authorized user to a wireless local area network while retaining an ability to select a second visible network from the at least one of one or more hidden and visible networks. In a client-server based communication system, the Wi-Fi network information of visible access points in a particular range may be automatically retrieved. In addition, by defining a group of networks belonging to an access point, and combining the groups of other access points in the vicinity of the client, a hidden network may be selected without an additional knowledge or processing by the authorized user.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: January 12, 2010
    Assignee: Alcatel-Lucent USA Inc.
    Inventors: Jacco Brok, Jeroen Van Bemmel
  • Publication number: 20080065600
    Abstract: A user enters a search query at interface 1 for performing a search on a computer network, such as the Internet. The search results are enhanced by adjusting their weightings to take into account previous searches carried out by members of a group, the membership of which is selected by the user. The group may be a user-defined co-user list, for example. Those previous search results that were of interest to members of the group are thus given greater prominence in the search results presented to the user at display 8. The user's behavior in considering the search results is monitored and the information gained used to update a database 5 holding group search information.
    Type: Application
    Filed: September 12, 2006
    Publication date: March 13, 2008
    Inventors: Harold Batteram, Jacco Brok, Ronald van Haalen, Harold Teunissen
  • Publication number: 20080056225
    Abstract: Non-urgent data messages of an IP based application hosted by a cellular device are only transmitted when a predetermined condition is met. A data message may be: a presence report; a check for new email sent by an email client to a server; and a keep-alive message sent to a server, but this is not an exhaustive list of the relevant types of data message. The predetermined condition, may, for example, be met when the first of the following occurs: the airlink is open 4; a maximum delay time has elapsed 7; a store for non-urgent messages is full 9; and a maximum number of messages is stored 10. The invention reduces the number of times when the airlink is open, thus preventing the 3 to 10 seconds additional open time for each occurrence. This saves battery life for the cellular device. The invention is also applicable to other types of messaging in which small data messages are periodically transmitted over an airlink.
    Type: Application
    Filed: August 31, 2006
    Publication date: March 6, 2008
    Inventor: Jacco Brok
  • Publication number: 20080032712
    Abstract: A method is provided of determining the movement context of a mobile user terminal in a wireless telecommunications network by the steps of: determining a time at which transfer to a first cell occurs, determining a time at which transfer from said first cell first subsequently occurs, determining the difference between the two times, and assigning a movement context to the mobile user terminal, said context being dependent upon said difference.
    Type: Application
    Filed: August 3, 2006
    Publication date: February 7, 2008
    Inventors: Jeroen van Bemmel, Jacco Brok
  • Publication number: 20070178881
    Abstract: A method and apparatus for using messaging to remotely control access over a network to a subscriber data associated with a mobile device that may be stolen or lost is provided. The method of wireless communication over a network with a mobile device having access to data associated with a subscriber comprises transmitting at least one message to the mobile device over the network for instructing the mobile device to deny access to the data for an unintended use in response to an indication of connectivity to the network for the subscriber. Instead of blocking connectivity of a mobile device which may be stolen or lost to a network, by denying access to data available on a mobile device which may be stolen or lost, at least a portion such vulnerable data stored on the mobile device also becomes inaccessible for malicious usage.
    Type: Application
    Filed: January 31, 2006
    Publication date: August 2, 2007
    Inventors: Harold Teunissen, Ko Lagerberg, Miroslav Zivkovic, Jacco Brok
  • Publication number: 20070178882
    Abstract: A method for authenticating a mobile device is provided. The method includes receiving a communication request from the mobile device. The mobile device is operable to exchange data over a primary channel. Authentication data is received from the mobile device over a second channel. The secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity. The authentication data is processed to determine whether the mobile device is a trusted device.
    Type: Application
    Filed: January 31, 2006
    Publication date: August 2, 2007
    Inventors: Harold Teunissen, Jacco Brok, Ko Marcus Lagerberg, Miroslav Zivkovic
  • Publication number: 20070147311
    Abstract: A mobile station (20) includes a first portion (24) having wireless fidelity communication capability. A second portion (28) of the mobile station (20) determines when at least one source (26) of wireless fidelity communications is within an acceptable range of the mobile station (20) to facilitate wireless fidelity communications. The second portion (28) provides an indication for automatically activating the first portion (24) whenever the mobile station (20) is appropriately situated for Wi-Fi communications.
    Type: Application
    Filed: December 28, 2005
    Publication date: June 28, 2007
    Inventor: Jacco Brok
  • Publication number: 20070149240
    Abstract: A method of establishing a location group includes using a cellular network cell (22, 24, 26) identifier and at least one other beacon (30, 32) concurrently detected by a mobile station (20). The location group includes an indication of the concurrently detected cell (22, 24, 26) identifier and at least one other beacon (30, 32). In a disclosed example, stored indications of all beacons (30, 32) currently detected are associated with each cell identifier that is added to the location group. Techniques for adding beacons and cell identifiers to established location groups are disclosed.
    Type: Application
    Filed: December 28, 2005
    Publication date: June 28, 2007
    Inventor: Jacco Brok
  • Publication number: 20060236105
    Abstract: The present invention provides a method and an apparatus for automating authentication of a user. In one embodiment, a method calls for detecting an authentication event at a wireless communication device to gain access to a first wireless network through an access point associated with the first wireless network, automatically obtaining a credential from a second wireless network in response to the authentication event, and authenticating the user based on the credential to establish a connection between the wireless communication device and the first wireless network. A client-server based communication system includes a client module at a wireless communication device for user authentication of a Wi-Fi device to a Wi-Fi network through an access point associated therewith.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 19, 2006
    Inventors: Jacco Brok, Jeroen Van Bemmel
  • Publication number: 20060236093
    Abstract: The invention comprises a method and apparatus for preventing a bridge between a secure network and an insecure network. Specifically, the method comprises monitoring a network device supporting a secure network connection for an attempt to establish an insecure network connection, and terminating the secure network connection in response to detecting the attempt to establish the insecure network connection, where the secure network connection comprises a network layer connection.
    Type: Application
    Filed: February 7, 2005
    Publication date: October 19, 2006
    Inventors: Jacco Brok, Willem Romijn
  • Publication number: 20060227972
    Abstract: The present invention provides a method and an apparatus for identifying at least one of one or more hidden and visible networks associated with an access point. The method comprises detecting whether a Wi-Fi network is hidden behind a first visible network of the at least one of one or more hidden and visible networks associated with the access point, and if so, selecting the Wi-Fi network to connect an authorized user to a wireless local area network while retaining an ability to select a second visible network from the at least one of one or more hidden and visible networks. In a client-server based communication system, the Wi-Fi network information of visible access points in a particular range may be automatically retrieved. In addition, by defining a group of networks belonging to an access point, and combining the groups of other access points in the vicinity of the client, a hidden network may be selected without an additional knowledge or processing by the authorized user.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 12, 2006
    Inventors: Jacco Brok, Jeroen Bemmel
  • Patent number: 7089489
    Abstract: The present invention relates to methods and arrangements for browsing documents stored in a database or several databases. At least one of said documents is including references to other documents and/or files in the database or several databases. The browsing comprises steps for retrieving of a desired document from the database(s) as response to a request for that document by browsing means, a dynamic transforming of the references of said retrieved document from a special syntax to a form said browsing means is capable of understanding, and transmitting the referenced documents and/or files to said browsing means.
    Type: Grant
    Filed: November 29, 1999
    Date of Patent: August 8, 2006
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Jacco Brok, Rune Granö, Ulf Vikström, Kenneth Österberg
  • Publication number: 20060090196
    Abstract: A method for enforcing the security policies of a network includes determining if a client requesting access to the network is in compliance with a current version of the security policies required to gain access to the network, and if the requesting client is not in compliance with a current version of the security policies, denying the client access to the network and making accessible to the non-compliant client a current version of the security policies. In various embodiments of the present invention an access gateway is implemented to enforce the security policies of the network, which includes isolating non-compliant clients from the network and the network resources. In a system in accordance with one embodiment of the present invention an access gateway directs a non-compliant client requesting access to the network to a remote server for downloading a current version of the security policies of the network.
    Type: Application
    Filed: October 21, 2004
    Publication date: April 27, 2006
    Inventors: Jeroen van Bemmel, Jacco Brok
  • Publication number: 20050043026
    Abstract: A communication system selection algorithm (SSA) implemented by a mobile station chooses between available systems to select a system to serve the mobile station. During initialization, the SSA causes the mobile station to scan the environment and compare available communication systems to determine the best system to provide service. After an initial system is chosen, the SSA causes the mobile station to continuously, or at discrete time intervals, scan the environment for available systems, thus allowing for a seamless switch to an available system whenever a handoff is desired. The SSA chooses the best available system based on conditions such as bit rate and cost of each available system and applying preference rules defined by a service provider and/or user of the mobile station.
    Type: Application
    Filed: September 15, 2003
    Publication date: February 24, 2005
    Inventors: Jacco Brok, Peretz Feder, Gang Li, Martin Meyers, Ajay Rajkumar