Patents by Inventor Jeroen Bemmel

Jeroen Bemmel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070253412
    Abstract: The invention includes a method and apparatus for providing SIP message prioritization between network elements along at least a portion of an end-to-end path between a SIP client and a SIP server. The method includes determining a SIP message prioritization policy and distributing the SIP message prioritization policy toward a prioritizing network element adapted to assign message priority levels to respective received SIP messages using the SIP message prioritization policy, process the received SIP messages according to the respective assigned message priority levels, and transmit the prioritized SIP messages toward at least one network element in a manner for propagating the respective assigned message priority levels to the at least one network element. The prioritizing network elements include SIP network elements and non-SIP network elements.
    Type: Application
    Filed: April 27, 2006
    Publication date: November 1, 2007
    Inventors: Harold Batteram, Hendrik Meeuwissen, Jeroen Bemmel
  • Publication number: 20070202876
    Abstract: A method of providing context information regarding a mobile station includes using cell transitions as an input to a context determining algorithm. A disclosed example includes Bloom filter theory that utilizes a key based upon an indication of the cells involved in the transition and a selected number of hash functions. The bit strings resulting from operation of the hash functions are compared to information stored in a database that relates hash function results to context information. In a disclosed example, the entire process for determining the context information is carried out on the mobile station itself.
    Type: Application
    Filed: February 27, 2006
    Publication date: August 30, 2007
    Inventor: Jeroen Bemmel
  • Publication number: 20070149286
    Abstract: The present invention presents a method for providing mobile gaming in a wireless communication network. The method includes provisioning a virtual game space operable for use with a virtual game. The virtual game space includes a plurality of virtual fields that correspond with cells in at least one wireless communication network. At least one notification of a real world event received from a mobile device of a player of the virtual game is processed, wherein state changes in the virtual game are related to the process events.
    Type: Application
    Filed: December 28, 2005
    Publication date: June 28, 2007
    Inventor: Jeroen Bemmel
  • Publication number: 20060227972
    Abstract: The present invention provides a method and an apparatus for identifying at least one of one or more hidden and visible networks associated with an access point. The method comprises detecting whether a Wi-Fi network is hidden behind a first visible network of the at least one of one or more hidden and visible networks associated with the access point, and if so, selecting the Wi-Fi network to connect an authorized user to a wireless local area network while retaining an ability to select a second visible network from the at least one of one or more hidden and visible networks. In a client-server based communication system, the Wi-Fi network information of visible access points in a particular range may be automatically retrieved. In addition, by defining a group of networks belonging to an access point, and combining the groups of other access points in the vicinity of the client, a hidden network may be selected without an additional knowledge or processing by the authorized user.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 12, 2006
    Inventors: Jacco Brok, Jeroen Bemmel
  • Publication number: 20060101409
    Abstract: A method for enforcing security policies required to gain access to a network includes determining if a client desiring a connection to the network is in conformance with a current version of the security policies, and if a client is not in conformance with a current version of the security policies, denying the client access to the network and directing the client to an isolated sub-network for accessing a current version of the security policies. In one embodiment of the present invention an address server isolates non-conforming clients from the network and the network resources by directing non-conforming clients to an isolated sub-network. The isolated sub-network further directs the non-conforming clients to, for example, a local server or web-site for accessing a current version of the security policies.
    Type: Application
    Filed: October 21, 2004
    Publication date: May 11, 2006
    Inventor: Jeroen Bemmel
  • Publication number: 20060092833
    Abstract: When a switch in a switched network detects congestion at one of its inputs, it floods a congestion control message back to the ingress nodes of the network connected to that input, indicating congestion. The ingress nodes of the network restrict access to the network by comparing incoming information rates against customer-specific criteria and sending back pressure warning signals to respective customers when the criteria are exceeded. When an ingress node receives a congestion control message indicating congestion it changes the criteria by which it restricts access to the network to more restrictive criteria. When the switch detects that the congestion has subsided, it floods a further congestion control message to the ingress nodes connected to the input, indicating that the congestion has subsided. An ingress node receiving such a message then changes the criteria back to those which it normally applies.
    Type: Application
    Filed: November 2, 2004
    Publication date: May 4, 2006
    Inventors: Jeroen Bemmel, Arie Heer, Richa Malhotra
  • Publication number: 20060041669
    Abstract: A scalable policy-based Web Services security architecture that incorporates a combination of authentication with service discovery, evaluation of access policies, and capturing the result of this process in a signed, security token, thus, allowing efficient processing for each service request in a secure manner. A method for securing a Web Service comprises discovering the Web Service in response to a service request and determining an access policy for the Web Service separately from the actual service based on the service request.
    Type: Application
    Filed: May 19, 2004
    Publication date: February 23, 2006
    Inventors: Jeroen Bemmel, Maarten Wegdam, Kumar Vemuri, George Murphy, Douglas Varney