Patents by Inventor Jeroen Laarakkers
Jeroen Laarakkers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11234128Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.Type: GrantFiled: February 6, 2017Date of Patent: January 25, 2022Assignees: Koninklijke KPN N.V., Nederlandse Organisatie voor Toegepast- Natuurwetenschappelijk Onderzoek TNOInventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
-
Patent number: 9912661Abstract: A method of identifying proximate client devices (1, 2) comprises the steps of: providing a sensory identifier, the first device (1) detecting the sensory identifier and sending a first request message (RQ1) comprising a first representation of the sensory identifier to a matching unit which is preferably part of a correlation server (5), the second device (2) detecting the sensory identifier and sending a second request message (RQ2) comprising a second representation of the sensory identifier to the matching unit, and the matching unit comparing the first representation and the second representation and sending an acknowledgement message (AC1, AC2) to each of the first device (1) and the second device (2) if a match is made. Each request message (RQ1, RQ2) contains a pointer to at least one property of the respective device (1, 2). In addition, the matching unit applies matching rules relating to the properties to limit the number of possible matches.Type: GrantFiled: October 15, 2010Date of Patent: March 6, 2018Assignee: NEDERLANDSE ORGANISATIE VOOR TOEGEPAST-NATUURWETENSCHAPPELIJK ONDERZOEK TNOInventors: Victor Bastiaan Klos, Mattijs Oskar van Deventer, Jeroen Laarakkers
-
Publication number: 20170150364Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.Type: ApplicationFiled: February 6, 2017Publication date: May 25, 2017Inventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
-
Patent number: 9603022Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.Type: GrantFiled: April 23, 2010Date of Patent: March 21, 2017Assignees: Koninklijke KPN N.V., Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNOInventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
-
Patent number: 9602649Abstract: A method of identifying at least two proximate devices (1, 2) comprises the steps of:—recording, in each device, an audio signal (AS) so as to produce respective audio samples, —detecting, in each device, a sensory identifier serving as a trigger (TR), —comparing the audio samples during a common interval (I) defined relative to the trigger (TR), and —deciding that the event is common to the devices only if the respective audio samples are sufficiently similar. The common interval (I) starts prior to the trigger (TR) and preferably also ends prior to the trigger.Type: GrantFiled: July 23, 2010Date of Patent: March 21, 2017Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNOInventors: Jeroen Laarakkers, Mattijs Oskar van Deventer, Victor Bastiaan Klos
-
Patent number: 9167043Abstract: A system (40) for identifying proximate devices (1,2) comprises at least one correlation server (5) for correlating data received from the devices so as to match two or more of the devices and at least one application server (6) for carrying out an application involving matched devices. The at least one correlation server (5) and the at least one application server (6) are distinct servers so as to provide a greater flexibility and scalability. The devices (1,2) may be mobile consumer devices.Type: GrantFiled: May 25, 2010Date of Patent: October 20, 2015Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNOInventors: Victor Bastiaan Klos, Mattijs Oskar van Deventer, Jeroen Laarakkers
-
Patent number: 9137630Abstract: A system (20) is designed for identifying devices (1, 2, . . . ) which are arranged for detecting a sensory identifier and transmitting request messages comprising representations of the detected sensory identifier. The system comprises at least one correlation relation server (e.g. 5C) for correlating representations received from the devices (1, 2) so as to match two or more of those devices, preferably when the devices (1, 2) are in each other's proximity. The system further comprises at least one proxy server (e.g. 8X) for routing a request message from a device (1, 2) to at least one correlation server (e.g. 5C), the routing being dependent on said representations or other information contained in the request messages.Type: GrantFiled: May 21, 2010Date of Patent: September 15, 2015Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNOInventors: Mattijs Oskar van Deventer, Victor Bastiaan Klos, Jeroen Laarakkers
-
Patent number: 8763130Abstract: A method of protecting a mobile device against malware is described. The mobile device comprises a backup operating system, the backup operating system being stored, preferably in a ROM, in the mobile device separately from the active operating system. The method comprises the steps of: providing a signal indicative of the possible presence of malware in the mobile device; and, replacing in response to the signal the active operating system with the backup operating system.Type: GrantFiled: June 16, 2009Date of Patent: June 24, 2014Assignee: Koninklijke KPN N.V.Inventors: Jeroen Laarakkers, Frank Muller
-
Patent number: 8656457Abstract: A method for controlling locking state transitions in a terminal in accordance with one or more state transition rules, the method including the steps of providing at least one writable memory location comprising first state information associated with a first locking state of said terminal, said at least one writable memory being configured for an irreversible transition from said first locking state to a second locking state; receiving a request for a transition to said second locking state, said request comprising second state information associated with said second locking state; on the basis of said first and second state information and said state transition rules, checking whether said requested transition is allowable or not; and storing said second state information in said writable memory if said requested transition is allowable according to said state transition rules.Type: GrantFiled: November 23, 2010Date of Patent: February 18, 2014Assignees: Koninklijke KPN N.V., Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNOInventors: Jeroen Laarakkers, Frank Muller
-
Publication number: 20120291091Abstract: A method and a control module for controlling locking state transitions in a terminal are described, wherein said terminal is configured for checking said transition in accordance to one or more state transition rules and wherein the method comprises the steps of: providing at least one one-way writable memory location comprising first state information associated with a first locking state of said terminal; receiving a request for a transition to a second locking state, said request comprising second state information associated with said second locking state; on the basis of said first and second state information and said transition rules checking whether said requested transition is allowable or not; and, storing said second state information in said one-way writable memory if said requested transition is allowable according to said state transition rules.Type: ApplicationFiled: November 23, 2010Publication date: November 15, 2012Applicants: Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNO, Koninklijke KPN N.V.Inventors: Jeroen Laarakkers, Frank Muller
-
Publication number: 20120244810Abstract: A method of identifying proximate client devices (1, 2) comprises the steps of: providing a sensory identifier, the first device (1) detecting the sensory identifier and sending a first request message (RQ1) comprising a first representation of the sensory identifier to a matching unit which is preferably part of a correlation server (5), the second device (2) detecting the sensory identifier and sending a second request message (RQ2) comprising a second representation of the sensory identifier to the matching unit, and the matching unit comparing the first representation and the second representation and sending an acknowledgement message (AC1, AC2) to each of the first device (1) and the second device (2) if a match is made. Each request message (RQ1, RQ2) contains a pointer to at least one property of the respective device (1, 2). In addition, the matching unit applies matching rules relating to the properties to limit the number of possible matches.Type: ApplicationFiled: October 15, 2010Publication date: September 27, 2012Applicant: Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNOInventors: Victor Bastiaan Klos, Mattijs Oskar van Deventer, Jeroen Laarakkers
-
Publication number: 20120184372Abstract: A method of identifying at least two proximate devices (1, 2) comprises the steps of: recording, in each device, an audio signal (AS) so as to produce respective audio samples, detecting, in each device, a sensory identifier serving as a trigger (TR), comparing the audio samples during a common interval (I) defined relative to the trigger (TR), and deciding that the event is common to the devices only if the respective audio samples are sufficiently similar. The common interval (I) starts prior to the trigger (TR) and preferably also ends prior to the trigger.Type: ApplicationFiled: July 23, 2010Publication date: July 19, 2012Applicant: NEDERLANDSE ORGANISATIE VOOR TOEGEPASTNATUURWETEN- SCHAPPELIJK ONDERZOEK TNOInventors: Jeroen Laarakkers, Mattijs Oskar van Deventer, Victor Bastiaan Klos
-
Publication number: 20120158898Abstract: A system (20) is designed for identifying devices (1, 2, . . . ) which are arranged for detecting a sensory identifier and transmitting request messages comprising representations of the detected sensory identifier. The system comprises at least one correlation relation server (e.g. 5C) for correlating representations received from the devices (1, 2) so as to match two or more of those devices, preferably when the devices (1, 2) are in each other's proximity. The system further comprises at least one proxy server (e.g. 8X) for routing a request message from a device (1, 2) to at least one correlation server (e.g. 5C), the routing being dependent on said representations or other information contained in the request messages.Type: ApplicationFiled: May 21, 2010Publication date: June 21, 2012Applicant: Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNOInventors: Mattijs Oskar van Deventer, Victor Bastiaan Klos, Jeroen Laarakkers
-
Publication number: 20120131186Abstract: A system (40) for identifying proximate devices (1, 2) comprises at least one correlation server (5) for correlating data received from the devices so as to match two or more of the devices and at least one application server (6) for carrying out an application involving matched devices. The at least one correlation server (5) and the at least one application server (6) are distinct servers so as to provide a greater flexibility and scalability. The devices (1, 2) may be mobile consumer devices.Type: ApplicationFiled: May 25, 2010Publication date: May 24, 2012Applicant: Nederlandse Organisatie Voor Toegepastnatuurwetenschappelijk OnderzoekInventors: Victor Bastiaan Klos, Mattijs Oskar Van Deventer, Jeroen Laarakkers
-
Publication number: 20120047262Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.Type: ApplicationFiled: April 27, 2009Publication date: February 23, 2012Applicant: KONINKLIJKE KPN N.V.Inventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
-
Publication number: 20110093956Abstract: A method of protecting a mobile device against malware is described. The mobile device comprises a backup operating system, the backup operating system being stored, preferably in a ROM, in the mobile device separately from the active operating system. The method comprises the steps of: providing a signal indicative of the possible presence of malware in the mobile device; and, replacing in response to the signal the active operating system with the backup operating system.Type: ApplicationFiled: June 16, 2009Publication date: April 21, 2011Applicant: KONINKLIJKE KPN N.V.Inventors: Jeroen Laarakkers, Frank Muller