Patents by Inventor Jukka-Pekka Honkanen
Jukka-Pekka Honkanen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8861730Abstract: Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.Type: GrantFiled: August 9, 2012Date of Patent: October 14, 2014Assignee: Intellectual Ventures I LLCInventors: Juha Ala-Laurila, Jukka-Pekka Honkanen, Jyri Rinnemaa
-
Publication number: 20120300934Abstract: Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.Type: ApplicationFiled: August 9, 2012Publication date: November 29, 2012Inventors: Juha Ala-Laurila, Jukka-Pekka Honkanen, Jyri Rinnemaa
-
Patent number: 8259942Abstract: Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.Type: GrantFiled: April 7, 2008Date of Patent: September 4, 2012Assignee: Intellectual Ventures I LLCInventors: Juha Ala-Laurila, Jukka-Pekka Honkanen, Jyri Rinnemaa
-
Patent number: 8161295Abstract: Method for storing data in the memory (1.2) of an electronic device (1), wherein the data to be stored is encrypted with an encryption key (Ks). The electronic device (1) is provided with an identification card (2) equipped with a cryptographic algorithm and an individual identifier (ID). In the electronic device (1), at least one seed value (RAND1, RAND2, RAND3) is generated, and the at least one seed value is transmitted to the identification card (2). The cryptographic algorithm is performed on the identification card (2), with the seed value (RAND1, RAND2, RAND3) being used as the input, wherein at least one derived value (Kc1, Kc2, Kc3) is produced in the algorithm. The at least one derived value (Kc1, Kc2, Kc3) is transmitted to the electronic device (1), wherein the at least one derived value (Kc1, Kc2, Kc3) is used in the formation of the encryption key (Ks). The invention also relates to an electronic device (1), module, and computer software product.Type: GrantFiled: March 17, 2005Date of Patent: April 17, 2012Assignee: Nokia CorporationInventors: Jukka-Pekka Honkanen, Jouni Mikkonen, Henry Haverinen
-
Patent number: 8036637Abstract: A method for billing in a packet data network (WISP1) comprising at least one user's terminal (MN), comprising the steps of: forming a data link between the terminal and the packet data network; requesting a user identity from the terminal; generating billing data based on the user identity; and sending the billing data to an accounting server (HAAA) of an external telecommunications network.Type: GrantFiled: June 17, 2008Date of Patent: October 11, 2011Assignee: Nokia CorporationInventors: Juha Ala-Laurila, Jyri Rinnemaa, Jukka-Pekka Honkanen, Timo Takamaki, Raimo Vuonnala, Jan-Erik Ekberg
-
Publication number: 20110058670Abstract: Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.Type: ApplicationFiled: April 7, 2008Publication date: March 10, 2011Applicant: Spyder Navigations LLCInventors: Juha Ala-Laurila, Jukka-Pekka Honkanen, Jyri Rinnemaa
-
Patent number: 7512796Abstract: Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication centre. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.Type: GrantFiled: July 25, 2006Date of Patent: March 31, 2009Assignee: Nokia CorporationInventors: Henry Haverinen, Jukka-Pekka Honkanen, Antti Kuikka, Nadarajah Asokan, Patrik Flykt, Juha Ala-Laurila, Jyri Rinnemaa, Timo Takamäki, Raimo Vuonnala, Jan-Erik Ekberg, Tommi Mikkonen, Petri Aalto, Seppo Honkanen
-
Publication number: 20080311884Abstract: A method for billing in a packet data network (WISP1) comprising at least one user's terminal (MN), comprising the steps of: forming a data link between the terminal and the packet data network; requesting a user identity from the terminal; generating billing data based on the user identity; and sending the billing data to an accounting server (HAAA) of an external telecommunications network.Type: ApplicationFiled: June 17, 2008Publication date: December 18, 2008Inventors: Juha Ala-Laurila, Jyri Rinnemaa, Jukka-Pekka Honkanen, Timo Takamaki, Raimo Vuonnala, Jan-Erik Ekberg
-
Patent number: 7389105Abstract: A method for billing in a packet data network (WISP1) comprising at least one user's terminal (MN), comprising the steps of: forming a data link between the terminal and the packet data network; requesting a user identity from the terminal; generating billing data based on the user identity; and sending the billing data to an accounting server (HAAA) of an external telecommunications network.Type: GrantFiled: March 23, 2001Date of Patent: June 17, 2008Assignee: Nokia CorporationInventors: Juha Ala-Laurila, Jyri Rinnemaa, Jukka-Pekka Honkanen, Timo Takamaki, Raimo Vuonnala, Jan-Erik Ekberg
-
Patent number: 7359989Abstract: The invention relates to a method of transferring required messages for acquiring a temporary MAC address in a wireless local area network. In a first device in the local area network, a first identifier is determined to identify the first device. A message comprising the first identifier is transmitted from the first device to a second device to arrange a temporary MAC address. A response message relating to the acquisition of the MAC address and comprising the first identifier is transmitted from the second device to the first device. The first device identifies on the basis of the first identifier that the response message is intended for it.Type: GrantFiled: December 5, 2002Date of Patent: April 15, 2008Assignee: Nokia CorporationInventors: Pekko Orava, Jukka-Pekka Honkanen, Henry Haverinen, Jouni Mikkonen, Markku T. Niemi
-
Patent number: 7356145Abstract: Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.Type: GrantFiled: June 29, 2001Date of Patent: April 8, 2008Assignee: Nokia CorporationInventors: Juha Ala-Laurila, Jukka-Pekka Honkanen, Jyri Rinnemaa
-
Publication number: 20070060106Abstract: Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication centre. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.Type: ApplicationFiled: July 25, 2006Publication date: March 15, 2007Inventors: Henry Haverinen, Jukka-Pekka Honkanen, Antti Kuikka, Nadarajah Asokan, Patrik Flykt, Juha Ala-Laurila, Jyri Rinnemaa, Timo Takamaki, Raimo Vuonnala, Jan-Erik Ekberg, Tommi Mikkonen, Petri Aalto, Seppo Honkanen
-
Patent number: 7107620Abstract: Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication center. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.Type: GrantFiled: January 8, 2001Date of Patent: September 12, 2006Assignee: Nokia CorporationInventors: Henry Haverinen, Jukka-Pekka Honkanen, Antti Kuikka, Nadarajah Asokan, Patrik Flykt, Juha Ala-Laurila, Jyri Rinnemaa, Timo Takamäki, Raimo Vuonnala, Jan-Erik Ekberg, Tommi Mikkonen, Petri Aalto, Seppo Honkanen
-
Publication number: 20050223218Abstract: Method for storing data in the memory (1.2) of an electronic device (1), wherein the data to be stored is encrypted with an encryption key (Ks). The electronic device (1) is provided with an identification card (2) equipped with a cryptographic algorithm and an individual identifier (ID). In the electronic device (1), at least one seed value (RAND1, RAND2, RAND3) is generated, and the at least one seed value is transmitted to the identification card (2). The cryptographic algorithm is performed on the identification card (2), with the seed value (RAND1, RAND2, RAND3) being used as the input, wherein at least one derived value (Kc1, Kc2, Kc3) is produced in the algorithm. The at least one derived value (Kc1, Kc2, Kc3) is transmitted to the electronic device (1), wherein the at least one derived value (Kc1, Kc2, Kc3) is used in the formation of the encryption key (Ks). The invention also relates to an electronic device (1), module, and computer software product.Type: ApplicationFiled: March 17, 2005Publication date: October 6, 2005Inventors: Jukka-Pekka Honkanen, Jouni Mikkonen, Henry Haverinen
-
Publication number: 20030177267Abstract: The invention relates to a method of transferring required messages for acquiring a temporary MAC address in a wireless local area network. In a first device in the local area network, a first identifier is determined to identify the first device. A message comprising the first identifier is transmitted from the first device to a second device to arrange a temporary MAC address. A response message relating to the acquisition of the MAC address and comprising the first identifier is transmitted from the second device to the first device. The first device identifies on the basis of the first identifier that the response message is intended for it.Type: ApplicationFiled: December 5, 2002Publication date: September 18, 2003Applicant: Nokia CorporationInventors: Pekko Orava, Jukka-Pekka Honkanen, Henry Haverinen, Jouni Mikkonen, Markku T. Niemi
-
Publication number: 20030157926Abstract: A method for billing in a packet data network (WISP1) comprising at least one user's terminal (MN), comprising the steps of: forming a data link between the terminal and the packet data network; requesting a user identity from the terminal; generating billing data based on the user identity; and sending the billing data to an accounting server (HAAA) of an external telecommunications network.Type: ApplicationFiled: February 20, 2003Publication date: August 21, 2003Inventors: Juha Ala-Laurila, Jyri Rinnemaa, Jukka-Pekka Honkanen, Timo Takamaki, Raimo Vuonnala, Jan-Erik Ekberg
-
Publication number: 20020161905Abstract: The invention discloses a method transferring packets between a mobile host device (100) and a source node via a number of independent data networks while maintaining a secure connection. The independent networks may include, for example, the Internet (120), localized Access Zones (110, 140), a Corporate Intranets, a Home Network (130) etc. Problems may occur, for example, when the mobile node is using a co-located care-of address, in which case both IP-in-IP and IPsec tunneling transformations are performed, and the current IPsec and IP-in-IP implementations cannot perform the required tunneling operations on the mobile host. This is because the IP-in-IP and IPsec tunneling when the IP-in-IP tunnel is not the outermost transformation. In an embodiment of the invention, the security policy operated by the mobile host includes a primary security policy and a dynamic secondary security policy that selectively apply specified transformations to certain packets in the data transfer.Type: ApplicationFiled: April 9, 2002Publication date: October 31, 2002Applicant: Nokia CorporationInventors: Henry Haverinen, Jukka-Pekka Honkanen, Antti J. Kuikka
-
Publication number: 20020012433Abstract: Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication center. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.Type: ApplicationFiled: January 8, 2001Publication date: January 31, 2002Applicant: Nokia CorporationInventors: Henry Haverinen, Jukka-Pekka Honkanen, Antti Kuikka, Nadarajah Asokan, Patrik Flykt, Juha P Ala-Laurila, Jyri Rinnemaa, Timo H Takamaki, Raimo Vuonnala, Jan-Erik G Ekberg, Tommi Mikkonen, Petri J Aalto, Seppo Honkanen
-
Publication number: 20020009199Abstract: Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.Type: ApplicationFiled: June 29, 2001Publication date: January 24, 2002Inventors: Juha Ala-Laurila, Jukka-Pekka Honkanen, Jyri Rinnemaa
-
Patent number: 6092133Abstract: The method according to the invention can be used for conveying low-level SIM card commands from an external apparatus (12) of a mobile station (1) to a SIM card (2) connected to the mobile station. The invention is based on locking the SIM card (2) solely for a particular control element (10) for the duration of the exchange of low-level commands. The mobile station according to the invention advantageously includes two SIM card control elements (4, 10) the first of which (4) is intended for executing commands issued by internal blocks of the mobile station and the second of which (10) is intended for conveying low-level commands from an external apparatus (12) connected to the mobile station. Said first control element (4) receives high-level commands from the various blocks (6) of the mobile station and conveys to the SIM card (2) the corresponding low-level command sequences.Type: GrantFiled: October 28, 1997Date of Patent: July 18, 2000Assignee: Nokia Mobile Phones LtdInventors: Mika Erola, Jukka-Pekka Honkanen, Harri Halminen