Patents by Inventor Aki Immonen

Aki Immonen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954010
    Abstract: A method for blocking external debugger application from analysing code of software program installed on computing device. The method including initializing software program including an application program and an internal debugger application. The software program, upon initialization thereof, instructs internal debugger application to load application program in internal debugger application. The internal debugger application is configured to utilize kernel resources of an operating system of the computing device.
    Type: Grant
    Filed: February 17, 2023
    Date of Patent: April 9, 2024
    Assignee: Supercell Oy
    Inventor: Aki Immonen
  • Publication number: 20240095406
    Abstract: A method for detection of tampering in an executable code including one or more code blocks. The method includes monitoring execution of the executable code with a call stack data structure associated therewith, the execution involving accessing one or more address spaces; receiving information about the one or more address spaces, as accessed; comparing the received information about one or more accessed address spaces with information about one or more allowed address spaces defined in the call stack data structure of the executable code; raising a flag upon detection that the one or more accessed address spaces are different from the one or more allowed address spaces, based on the comparison; and executing an action based on the raised flag.
    Type: Application
    Filed: September 19, 2023
    Publication date: March 21, 2024
    Applicant: Supercell Oy
    Inventor: Aki Immonen
  • Patent number: 11816250
    Abstract: A method for detection of tampering in an executable code including one or more code blocks. The method includes monitoring execution of the executable code with a call stack data structure associated therewith, the execution involving accessing one or more address spaces; receiving information about the one or more address spaces, as accessed; comparing the received information about one or more accessed address spaces with information about one or more allowed address spaces defined in the call stack data structure of the executable code; raising a flag upon detection that the one or more accessed address spaces are different from the one or more allowed address spaces, based on the comparison; and executing an action based on the raised flag.
    Type: Grant
    Filed: April 22, 2022
    Date of Patent: November 14, 2023
    Assignee: Supercell Oy
    Inventor: Aki Immonen
  • Publication number: 20230281103
    Abstract: A method for blocking external debugger application from analysing code of software program installed on computing device. The method including initializing software program including an application program and an internal debugger application. The software program, upon initialization thereof, instructs internal debugger application to load application program in internal debugger application. The internal debugger application is configured to utilize kernel resources of an operating system of the computing device.
    Type: Application
    Filed: February 17, 2023
    Publication date: September 7, 2023
    Applicant: Supercell Oy
    Inventor: Aki Immonen
  • Patent number: 11586529
    Abstract: A method for blocking external debugger application from analysing code of software program installed on computing device. The method including initializing software program including an application program and an internal debugger application. The software program, upon initialization thereof, instructs internal debugger application to load application program in internal debugger application. The internal debugger application is configured to utilize kernel resources of an operating system of the computing device.
    Type: Grant
    Filed: December 6, 2021
    Date of Patent: February 21, 2023
    Assignee: Supercell Oy
    Inventor: Aki Immonen
  • Publication number: 20220327241
    Abstract: A method for detection of tampering in an executable code including one or more code blocks. The method includes monitoring execution of the executable code with a call stack data structure associated therewith, the execution involving accessing one or more address spaces; receiving information about the one or more address spaces, as accessed; comparing the received information about one or more accessed address spaces with information about one or more allowed address spaces defined in the call stack data structure of the executable code; raising a flag upon detection that the one or more accessed address spaces are different from the one or more allowed address spaces, based on the comparison; and executing an action based on the raised flag.
    Type: Application
    Filed: April 22, 2022
    Publication date: October 13, 2022
    Applicant: Supercell Oy
    Inventor: Aki Immonen
  • Publication number: 20220164275
    Abstract: A method for blocking external debugger application from analysing code of software program installed on computing device. The method including initializing software program including an application program and an internal debugger application. The software program, upon initialization thereof, instructs internal debugger application to load application program in internal debugger application. The internal debugger application is configured to utilize kernel resources of an operating system of the computing device.
    Type: Application
    Filed: December 6, 2021
    Publication date: May 26, 2022
    Applicant: Supercell Oy
    Inventor: Aki Immonen
  • Patent number: 11314899
    Abstract: A method for detection of tampering in an executable code including one or more code blocks. The method includes monitoring execution of the executable code with a call stack data structure associated therewith, the execution involving accessing one or more address spaces; receiving information about the one or more address spaces, as accessed; comparing the received information about one or more accessed address spaces with information about one or more allowed address spaces defined in the call stack data structure of the executable code; raising a flag upon detection that the one or more accessed address spaces are different from the one or more allowed address spaces, based on the comparison; and executing an action based on the raised flag.
    Type: Grant
    Filed: January 7, 2020
    Date of Patent: April 26, 2022
    Assignee: Supercell Oy
    Inventor: Aki Immonen
  • Patent number: 11194695
    Abstract: A method for blocking external debugger application from analysing code of software program installed on computing device. The method including initializing software program including an application program and an internal debugger application. The software program, upon initialization thereof, instructs internal debugger application to load application program in internal debugger application. The internal debugger application is configured to utilize kernel resources of an operating system of the computing device.
    Type: Grant
    Filed: January 7, 2020
    Date of Patent: December 7, 2021
    Assignee: Supercell Oy
    Inventor: Aki Immonen
  • Publication number: 20210209255
    Abstract: A method for detection of tampering in an executable code including one or more code blocks. The method includes monitoring execution of the executable code with a call stack data structure associated therewith, the execution involving accessing one or more address spaces; receiving information about the one or more address spaces, as accessed; comparing the received information about one or more accessed address spaces with information about one or more allowed address spaces defined in the call stack data structure of the executable code; raising a flag upon detection that the one or more accessed address spaces are different from the one or more allowed address spaces, based on the comparison; and executing an action based on the raised flag.
    Type: Application
    Filed: January 7, 2020
    Publication date: July 8, 2021
    Inventor: Aki Immonen
  • Publication number: 20210208997
    Abstract: A method for blocking external debugger application from analysing code of software program installed on computing device. The method including initializing software program including an application program and an internal debugger application. The software program, upon initialization thereof, instructs internal debugger application to load application program in internal debugger application. The internal debugger application is configured to utilize kernel resources of an operating system of the computing device.
    Type: Application
    Filed: January 7, 2020
    Publication date: July 8, 2021
    Inventor: Aki Immonen