Patents by Inventor Miguel Martin Lopez

Miguel Martin Lopez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8756703
    Abstract: A method for protecting a user's privacy, wherein the user operates a communication device capable of processing context and wherein the user provides context information—real context—related to one or more reference context variables to a third party, is characterized in the steps of faking at least one of the one or more reference context variables, on the basis of the faked reference context variable, gathering real context information—decoy context—related to reference context variables other than the faked reference context variable, publishing the thus generated decoy context instead of the user's real context. In addition, a corresponding communication device is disclosed.
    Type: Grant
    Filed: March 5, 2008
    Date of Patent: June 17, 2014
    Assignee: NEC Europe Ltd.
    Inventors: Ernoe Kovacs, Miguel Martin Lopez, Martin Bauer
  • Patent number: 8407174
    Abstract: A method for optimizing the scanning process of a mobile terminal, the scanning process being performed by the mobile terminal in order to discover an available network to which a connection is possible, wherein at least a part of existing networks is registered to a server, wherein the server provides its information regarding the registered networks to the mobile terminal, is characterized in that the scanning period of the mobile terminal is dynamically adjusted on the basis of information provided by the server.
    Type: Grant
    Filed: June 26, 2007
    Date of Patent: March 26, 2013
    Assignee: NEC Europe Ltd.
    Inventors: Miguel Martin Lopez, Albert Vidal, Claudia Villalonga
  • Publication number: 20110061106
    Abstract: A method for protecting a user's privacy, wherein the user operates a communication device capable of processing context and wherein the user provides context information—real context—related to one or more reference context variables to a third party, is characterized in the steps of faking at least one of the one or more reference context variables, on the basis of the faked reference context variable, gathering real context information—decoy context—related to reference context variables other than the faked reference context variable, publishing the thus generated decoy context instead of the user's real context. In addition, a corresponding communication device is disclosed.
    Type: Application
    Filed: March 5, 2008
    Publication date: March 10, 2011
    Applicant: NEC EUROPE LTD.
    Inventors: Ernoe Kovacs, Miguel Martin Lopez, Martin Bauer
  • Publication number: 20100185575
    Abstract: A method for optimizing the scanning process of a mobile terminal, the scanning process being performed by the mobile terminal in order to discover an available network to which a connection is possible, wherein at least a part of existing networks is registered to a server, wherein the server provides its information regarding the registered networks to the mobile terminal, is characterized in that the scanning period of the mobile terminal is dynamically adjusted on the basis of information provided by the server.
    Type: Application
    Filed: June 26, 2007
    Publication date: July 22, 2010
    Applicant: NEC EUROPE LTD.
    Inventors: Miguel Martin Lopez, Albert Vidal, Claudia Villalonga
  • Publication number: 20090268909
    Abstract: A method for operating a wireless sensor network, wherein the sensor network includes a multitude of distributed sensor nodes for sensing data within a pre-definable environment, and wherein the sensor nodes can exchange information via encrypted data transmissions over a radio Channel is—regarding the fact that during the operational phase of the network the Performance of changes in the network, in particular the composition of the sensor nodes that are integrated in the network, is allowed in a flexible way—characterized in that a subset of sensor nodes of the network is manipulated in order to establish a shared secret (x) by transferring a defined information to the sensor nodes of the subset over a secure out of band (OOB) Channel.
    Type: Application
    Filed: June 6, 2007
    Publication date: October 29, 2009
    Applicant: NEC EUROPE LTD.
    Inventors: Joao Girao, Miguel Martin Lopez