Patents by Inventor Jacco Brok
Jacco Brok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8677125Abstract: The present invention provides a method and an apparatus for automating authentication of a user. In one embodiment, a method calls for detecting an authentication event at a wireless communication device to gain access to a first wireless network through an access point associated with the first wireless network, automatically obtaining a credential from a second wireless network in response to the authentication event, and authenticating the user based on the credential to establish a connection between the wireless communication device and the first wireless network. A client-server based communication system includes a client module at a wireless communication device for user authentication of a Wi-Fi device to a Wi-Fi network through an access point associated therewith. For the purposes of authentication, the client-server based communication system further includes a server module with which the client module may automatically exchange short message service messages over a wide area network.Type: GrantFiled: March 31, 2005Date of Patent: March 18, 2014Assignee: Alcatel LucentInventors: Jacco Brok, Jeroen Van Bemmel
-
Patent number: 8041339Abstract: A method for authenticating a mobile device is provided. The method includes receiving a communication request from the mobile device. The mobile device is operable to exchange data over a primary channel. Authentication data is received from the mobile device over a second channel. The secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity. The authentication data is processed to determine whether the mobile device is a trusted device.Type: GrantFiled: January 31, 2006Date of Patent: October 18, 2011Assignee: Alcatel LucentInventors: Harold Wilhelm Antonie Teunissen, Jacco Brok, Ko Marcus Joannes Louis Lagerberg, Miroslav Zivkovic
-
Patent number: 7907938Abstract: Non-urgent data messages of an IP based application hosted by a cellular device are only transmitted when a predetermined condition is met. A data message may be: a presence report; a check for new email sent by an email client to a server; and a keep-alive message sent to a server, but this is not an exhaustive list of the relevant types of data message. The predetermined condition, may, for example, be met when the first of the following occurs: the airlink is open; a maximum delay time has elapsed; a store for non-urgent messages is full; and a maximum number of messages is stored. The invention reduces the number of times when the airlink is open, thus preventing the 3 to 10 seconds additional open time for each occurrence. This saves battery life for the cellular device. The invention is also applicable to other types of messaging in which small data messages are periodically transmitted over an airlink.Type: GrantFiled: August 31, 2006Date of Patent: March 15, 2011Assignee: Alcatel-Lucent USA Inc.Inventor: Jacco Brok
-
Patent number: 7735118Abstract: The invention comprises a method and apparatus for preventing a bridge between a secure network and an insecure network. Specifically, the method comprises monitoring a network device supporting a secure network connection for an attempt to establish an insecure network connection, and terminating the secure network connection in response to detecting the attempt to establish the insecure network connection, where the secure network connection comprises a network layer connection.Type: GrantFiled: February 7, 2005Date of Patent: June 8, 2010Assignee: Alcatel-Lucent USA Inc.Inventors: Jacco Brok, Willem Adriaan Romijn
-
Patent number: 7647048Abstract: The present invention provides a method and an apparatus for identifying at least one of one or more hidden and visible networks associated with an access point. The method comprises detecting whether a Wi-Fi network is hidden behind a first visible network of the at least one of one or more hidden and visible networks associated with the access point, and if so, selecting the Wi-Fi network to connect an authorized user to a wireless local area network while retaining an ability to select a second visible network from the at least one of one or more hidden and visible networks. In a client-server based communication system, the Wi-Fi network information of visible access points in a particular range may be automatically retrieved. In addition, by defining a group of networks belonging to an access point, and combining the groups of other access points in the vicinity of the client, a hidden network may be selected without an additional knowledge or processing by the authorized user.Type: GrantFiled: March 31, 2005Date of Patent: January 12, 2010Assignee: Alcatel-Lucent USA Inc.Inventors: Jacco Brok, Jeroen Van Bemmel
-
Publication number: 20080065600Abstract: A user enters a search query at interface 1 for performing a search on a computer network, such as the Internet. The search results are enhanced by adjusting their weightings to take into account previous searches carried out by members of a group, the membership of which is selected by the user. The group may be a user-defined co-user list, for example. Those previous search results that were of interest to members of the group are thus given greater prominence in the search results presented to the user at display 8. The user's behavior in considering the search results is monitored and the information gained used to update a database 5 holding group search information.Type: ApplicationFiled: September 12, 2006Publication date: March 13, 2008Inventors: Harold Batteram, Jacco Brok, Ronald van Haalen, Harold Teunissen
-
Publication number: 20080056225Abstract: Non-urgent data messages of an IP based application hosted by a cellular device are only transmitted when a predetermined condition is met. A data message may be: a presence report; a check for new email sent by an email client to a server; and a keep-alive message sent to a server, but this is not an exhaustive list of the relevant types of data message. The predetermined condition, may, for example, be met when the first of the following occurs: the airlink is open 4; a maximum delay time has elapsed 7; a store for non-urgent messages is full 9; and a maximum number of messages is stored 10. The invention reduces the number of times when the airlink is open, thus preventing the 3 to 10 seconds additional open time for each occurrence. This saves battery life for the cellular device. The invention is also applicable to other types of messaging in which small data messages are periodically transmitted over an airlink.Type: ApplicationFiled: August 31, 2006Publication date: March 6, 2008Inventor: Jacco Brok
-
Publication number: 20080032712Abstract: A method is provided of determining the movement context of a mobile user terminal in a wireless telecommunications network by the steps of: determining a time at which transfer to a first cell occurs, determining a time at which transfer from said first cell first subsequently occurs, determining the difference between the two times, and assigning a movement context to the mobile user terminal, said context being dependent upon said difference.Type: ApplicationFiled: August 3, 2006Publication date: February 7, 2008Inventors: Jeroen van Bemmel, Jacco Brok
-
Publication number: 20070178881Abstract: A method and apparatus for using messaging to remotely control access over a network to a subscriber data associated with a mobile device that may be stolen or lost is provided. The method of wireless communication over a network with a mobile device having access to data associated with a subscriber comprises transmitting at least one message to the mobile device over the network for instructing the mobile device to deny access to the data for an unintended use in response to an indication of connectivity to the network for the subscriber. Instead of blocking connectivity of a mobile device which may be stolen or lost to a network, by denying access to data available on a mobile device which may be stolen or lost, at least a portion such vulnerable data stored on the mobile device also becomes inaccessible for malicious usage.Type: ApplicationFiled: January 31, 2006Publication date: August 2, 2007Inventors: Harold Teunissen, Ko Lagerberg, Miroslav Zivkovic, Jacco Brok
-
Publication number: 20070178882Abstract: A method for authenticating a mobile device is provided. The method includes receiving a communication request from the mobile device. The mobile device is operable to exchange data over a primary channel. Authentication data is received from the mobile device over a second channel. The secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity. The authentication data is processed to determine whether the mobile device is a trusted device.Type: ApplicationFiled: January 31, 2006Publication date: August 2, 2007Inventors: Harold Teunissen, Jacco Brok, Ko Marcus Lagerberg, Miroslav Zivkovic
-
Publication number: 20070147311Abstract: A mobile station (20) includes a first portion (24) having wireless fidelity communication capability. A second portion (28) of the mobile station (20) determines when at least one source (26) of wireless fidelity communications is within an acceptable range of the mobile station (20) to facilitate wireless fidelity communications. The second portion (28) provides an indication for automatically activating the first portion (24) whenever the mobile station (20) is appropriately situated for Wi-Fi communications.Type: ApplicationFiled: December 28, 2005Publication date: June 28, 2007Inventor: Jacco Brok
-
Publication number: 20070149240Abstract: A method of establishing a location group includes using a cellular network cell (22, 24, 26) identifier and at least one other beacon (30, 32) concurrently detected by a mobile station (20). The location group includes an indication of the concurrently detected cell (22, 24, 26) identifier and at least one other beacon (30, 32). In a disclosed example, stored indications of all beacons (30, 32) currently detected are associated with each cell identifier that is added to the location group. Techniques for adding beacons and cell identifiers to established location groups are disclosed.Type: ApplicationFiled: December 28, 2005Publication date: June 28, 2007Inventor: Jacco Brok
-
Publication number: 20060236105Abstract: The present invention provides a method and an apparatus for automating authentication of a user. In one embodiment, a method calls for detecting an authentication event at a wireless communication device to gain access to a first wireless network through an access point associated with the first wireless network, automatically obtaining a credential from a second wireless network in response to the authentication event, and authenticating the user based on the credential to establish a connection between the wireless communication device and the first wireless network. A client-server based communication system includes a client module at a wireless communication device for user authentication of a Wi-Fi device to a Wi-Fi network through an access point associated therewith.Type: ApplicationFiled: March 31, 2005Publication date: October 19, 2006Inventors: Jacco Brok, Jeroen Van Bemmel
-
Publication number: 20060236093Abstract: The invention comprises a method and apparatus for preventing a bridge between a secure network and an insecure network. Specifically, the method comprises monitoring a network device supporting a secure network connection for an attempt to establish an insecure network connection, and terminating the secure network connection in response to detecting the attempt to establish the insecure network connection, where the secure network connection comprises a network layer connection.Type: ApplicationFiled: February 7, 2005Publication date: October 19, 2006Inventors: Jacco Brok, Willem Romijn
-
Publication number: 20060227972Abstract: The present invention provides a method and an apparatus for identifying at least one of one or more hidden and visible networks associated with an access point. The method comprises detecting whether a Wi-Fi network is hidden behind a first visible network of the at least one of one or more hidden and visible networks associated with the access point, and if so, selecting the Wi-Fi network to connect an authorized user to a wireless local area network while retaining an ability to select a second visible network from the at least one of one or more hidden and visible networks. In a client-server based communication system, the Wi-Fi network information of visible access points in a particular range may be automatically retrieved. In addition, by defining a group of networks belonging to an access point, and combining the groups of other access points in the vicinity of the client, a hidden network may be selected without an additional knowledge or processing by the authorized user.Type: ApplicationFiled: March 31, 2005Publication date: October 12, 2006Inventors: Jacco Brok, Jeroen Bemmel
-
Patent number: 7089489Abstract: The present invention relates to methods and arrangements for browsing documents stored in a database or several databases. At least one of said documents is including references to other documents and/or files in the database or several databases. The browsing comprises steps for retrieving of a desired document from the database(s) as response to a request for that document by browsing means, a dynamic transforming of the references of said retrieved document from a special syntax to a form said browsing means is capable of understanding, and transmitting the referenced documents and/or files to said browsing means.Type: GrantFiled: November 29, 1999Date of Patent: August 8, 2006Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Jacco Brok, Rune Granö, Ulf Vikström, Kenneth Österberg
-
Publication number: 20060090196Abstract: A method for enforcing the security policies of a network includes determining if a client requesting access to the network is in compliance with a current version of the security policies required to gain access to the network, and if the requesting client is not in compliance with a current version of the security policies, denying the client access to the network and making accessible to the non-compliant client a current version of the security policies. In various embodiments of the present invention an access gateway is implemented to enforce the security policies of the network, which includes isolating non-compliant clients from the network and the network resources. In a system in accordance with one embodiment of the present invention an access gateway directs a non-compliant client requesting access to the network to a remote server for downloading a current version of the security policies of the network.Type: ApplicationFiled: October 21, 2004Publication date: April 27, 2006Inventors: Jeroen van Bemmel, Jacco Brok
-
Publication number: 20050043026Abstract: A communication system selection algorithm (SSA) implemented by a mobile station chooses between available systems to select a system to serve the mobile station. During initialization, the SSA causes the mobile station to scan the environment and compare available communication systems to determine the best system to provide service. After an initial system is chosen, the SSA causes the mobile station to continuously, or at discrete time intervals, scan the environment for available systems, thus allowing for a seamless switch to an available system whenever a handoff is desired. The SSA chooses the best available system based on conditions such as bit rate and cost of each available system and applying preference rules defined by a service provider and/or user of the mobile station.Type: ApplicationFiled: September 15, 2003Publication date: February 24, 2005Inventors: Jacco Brok, Peretz Feder, Gang Li, Martin Meyers, Ajay Rajkumar