Patents by Inventor Jeroen Laarakkers

Jeroen Laarakkers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11234128
    Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: January 25, 2022
    Assignees: Koninklijke KPN N.V., Nederlandse Organisatie voor Toegepast- Natuurwetenschappelijk Onderzoek TNO
    Inventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
  • Patent number: 9912661
    Abstract: A method of identifying proximate client devices (1, 2) comprises the steps of: providing a sensory identifier, the first device (1) detecting the sensory identifier and sending a first request message (RQ1) comprising a first representation of the sensory identifier to a matching unit which is preferably part of a correlation server (5), the second device (2) detecting the sensory identifier and sending a second request message (RQ2) comprising a second representation of the sensory identifier to the matching unit, and the matching unit comparing the first representation and the second representation and sending an acknowledgement message (AC1, AC2) to each of the first device (1) and the second device (2) if a match is made. Each request message (RQ1, RQ2) contains a pointer to at least one property of the respective device (1, 2). In addition, the matching unit applies matching rules relating to the properties to limit the number of possible matches.
    Type: Grant
    Filed: October 15, 2010
    Date of Patent: March 6, 2018
    Assignee: NEDERLANDSE ORGANISATIE VOOR TOEGEPAST-NATUURWETENSCHAPPELIJK ONDERZOEK TNO
    Inventors: Victor Bastiaan Klos, Mattijs Oskar van Deventer, Jeroen Laarakkers
  • Publication number: 20170150364
    Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.
    Type: Application
    Filed: February 6, 2017
    Publication date: May 25, 2017
    Inventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
  • Patent number: 9603022
    Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.
    Type: Grant
    Filed: April 23, 2010
    Date of Patent: March 21, 2017
    Assignees: Koninklijke KPN N.V., Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNO
    Inventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
  • Patent number: 9602649
    Abstract: A method of identifying at least two proximate devices (1, 2) comprises the steps of:—recording, in each device, an audio signal (AS) so as to produce respective audio samples, —detecting, in each device, a sensory identifier serving as a trigger (TR), —comparing the audio samples during a common interval (I) defined relative to the trigger (TR), and —deciding that the event is common to the devices only if the respective audio samples are sufficiently similar. The common interval (I) starts prior to the trigger (TR) and preferably also ends prior to the trigger.
    Type: Grant
    Filed: July 23, 2010
    Date of Patent: March 21, 2017
    Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNO
    Inventors: Jeroen Laarakkers, Mattijs Oskar van Deventer, Victor Bastiaan Klos
  • Patent number: 9167043
    Abstract: A system (40) for identifying proximate devices (1,2) comprises at least one correlation server (5) for correlating data received from the devices so as to match two or more of the devices and at least one application server (6) for carrying out an application involving matched devices. The at least one correlation server (5) and the at least one application server (6) are distinct servers so as to provide a greater flexibility and scalability. The devices (1,2) may be mobile consumer devices.
    Type: Grant
    Filed: May 25, 2010
    Date of Patent: October 20, 2015
    Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNO
    Inventors: Victor Bastiaan Klos, Mattijs Oskar van Deventer, Jeroen Laarakkers
  • Patent number: 9137630
    Abstract: A system (20) is designed for identifying devices (1, 2, . . . ) which are arranged for detecting a sensory identifier and transmitting request messages comprising representations of the detected sensory identifier. The system comprises at least one correlation relation server (e.g. 5C) for correlating representations received from the devices (1, 2) so as to match two or more of those devices, preferably when the devices (1, 2) are in each other's proximity. The system further comprises at least one proxy server (e.g. 8X) for routing a request message from a device (1, 2) to at least one correlation server (e.g. 5C), the routing being dependent on said representations or other information contained in the request messages.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: September 15, 2015
    Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNO
    Inventors: Mattijs Oskar van Deventer, Victor Bastiaan Klos, Jeroen Laarakkers
  • Patent number: 8763130
    Abstract: A method of protecting a mobile device against malware is described. The mobile device comprises a backup operating system, the backup operating system being stored, preferably in a ROM, in the mobile device separately from the active operating system. The method comprises the steps of: providing a signal indicative of the possible presence of malware in the mobile device; and, replacing in response to the signal the active operating system with the backup operating system.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: June 24, 2014
    Assignee: Koninklijke KPN N.V.
    Inventors: Jeroen Laarakkers, Frank Muller
  • Patent number: 8656457
    Abstract: A method for controlling locking state transitions in a terminal in accordance with one or more state transition rules, the method including the steps of providing at least one writable memory location comprising first state information associated with a first locking state of said terminal, said at least one writable memory being configured for an irreversible transition from said first locking state to a second locking state; receiving a request for a transition to said second locking state, said request comprising second state information associated with said second locking state; on the basis of said first and second state information and said state transition rules, checking whether said requested transition is allowable or not; and storing said second state information in said writable memory if said requested transition is allowable according to said state transition rules.
    Type: Grant
    Filed: November 23, 2010
    Date of Patent: February 18, 2014
    Assignees: Koninklijke KPN N.V., Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNO
    Inventors: Jeroen Laarakkers, Frank Muller
  • Publication number: 20120291091
    Abstract: A method and a control module for controlling locking state transitions in a terminal are described, wherein said terminal is configured for checking said transition in accordance to one or more state transition rules and wherein the method comprises the steps of: providing at least one one-way writable memory location comprising first state information associated with a first locking state of said terminal; receiving a request for a transition to a second locking state, said request comprising second state information associated with said second locking state; on the basis of said first and second state information and said transition rules checking whether said requested transition is allowable or not; and, storing said second state information in said one-way writable memory if said requested transition is allowable according to said state transition rules.
    Type: Application
    Filed: November 23, 2010
    Publication date: November 15, 2012
    Applicants: Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNO, Koninklijke KPN N.V.
    Inventors: Jeroen Laarakkers, Frank Muller
  • Publication number: 20120244810
    Abstract: A method of identifying proximate client devices (1, 2) comprises the steps of: providing a sensory identifier, the first device (1) detecting the sensory identifier and sending a first request message (RQ1) comprising a first representation of the sensory identifier to a matching unit which is preferably part of a correlation server (5), the second device (2) detecting the sensory identifier and sending a second request message (RQ2) comprising a second representation of the sensory identifier to the matching unit, and the matching unit comparing the first representation and the second representation and sending an acknowledgement message (AC1, AC2) to each of the first device (1) and the second device (2) if a match is made. Each request message (RQ1, RQ2) contains a pointer to at least one property of the respective device (1, 2). In addition, the matching unit applies matching rules relating to the properties to limit the number of possible matches.
    Type: Application
    Filed: October 15, 2010
    Publication date: September 27, 2012
    Applicant: Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNO
    Inventors: Victor Bastiaan Klos, Mattijs Oskar van Deventer, Jeroen Laarakkers
  • Publication number: 20120184372
    Abstract: A method of identifying at least two proximate devices (1, 2) comprises the steps of: recording, in each device, an audio signal (AS) so as to produce respective audio samples, detecting, in each device, a sensory identifier serving as a trigger (TR), comparing the audio samples during a common interval (I) defined relative to the trigger (TR), and deciding that the event is common to the devices only if the respective audio samples are sufficiently similar. The common interval (I) starts prior to the trigger (TR) and preferably also ends prior to the trigger.
    Type: Application
    Filed: July 23, 2010
    Publication date: July 19, 2012
    Applicant: NEDERLANDSE ORGANISATIE VOOR TOEGEPASTNATUURWETEN- SCHAPPELIJK ONDERZOEK TNO
    Inventors: Jeroen Laarakkers, Mattijs Oskar van Deventer, Victor Bastiaan Klos
  • Publication number: 20120158898
    Abstract: A system (20) is designed for identifying devices (1, 2, . . . ) which are arranged for detecting a sensory identifier and transmitting request messages comprising representations of the detected sensory identifier. The system comprises at least one correlation relation server (e.g. 5C) for correlating representations received from the devices (1, 2) so as to match two or more of those devices, preferably when the devices (1, 2) are in each other's proximity. The system further comprises at least one proxy server (e.g. 8X) for routing a request message from a device (1, 2) to at least one correlation server (e.g. 5C), the routing being dependent on said representations or other information contained in the request messages.
    Type: Application
    Filed: May 21, 2010
    Publication date: June 21, 2012
    Applicant: Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNO
    Inventors: Mattijs Oskar van Deventer, Victor Bastiaan Klos, Jeroen Laarakkers
  • Publication number: 20120131186
    Abstract: A system (40) for identifying proximate devices (1, 2) comprises at least one correlation server (5) for correlating data received from the devices so as to match two or more of the devices and at least one application server (6) for carrying out an application involving matched devices. The at least one correlation server (5) and the at least one application server (6) are distinct servers so as to provide a greater flexibility and scalability. The devices (1, 2) may be mobile consumer devices.
    Type: Application
    Filed: May 25, 2010
    Publication date: May 24, 2012
    Applicant: Nederlandse Organisatie Voor Toegepastnatuurwetenschappelijk Onderzoek
    Inventors: Victor Bastiaan Klos, Mattijs Oskar Van Deventer, Jeroen Laarakkers
  • Publication number: 20120047262
    Abstract: A Method and a system for managing undesired service requests sent from at least one terminal to a network are described, wherein the network comprises a network node for storing trusted service-information. The method comprises the steps of: the network receiving a service request from a terminal, the request comprising service request information; and, sending, preferably via a secure communication channel, a user verification request for requesting the user to verify the service requested by the terminal if at least part of the service request information is not listed in the trusted service-information.
    Type: Application
    Filed: April 27, 2009
    Publication date: February 23, 2012
    Applicant: KONINKLIJKE KPN N.V.
    Inventors: Jeroen Laarakkers, Frank Muller, Tim Hartog
  • Publication number: 20110093956
    Abstract: A method of protecting a mobile device against malware is described. The mobile device comprises a backup operating system, the backup operating system being stored, preferably in a ROM, in the mobile device separately from the active operating system. The method comprises the steps of: providing a signal indicative of the possible presence of malware in the mobile device; and, replacing in response to the signal the active operating system with the backup operating system.
    Type: Application
    Filed: June 16, 2009
    Publication date: April 21, 2011
    Applicant: KONINKLIJKE KPN N.V.
    Inventors: Jeroen Laarakkers, Frank Muller