Patents by Inventor Tero Kivinen

Tero Kivinen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110320623
    Abstract: This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.
    Type: Application
    Filed: September 8, 2011
    Publication date: December 29, 2011
    Applicant: Tectia Oyj
    Inventors: Tero Kivinen, Tatu Ylonen
  • Publication number: 20100318682
    Abstract: This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.
    Type: Application
    Filed: August 24, 2010
    Publication date: December 16, 2010
    Applicant: Tectia Oyj
    Inventors: Tero Kivinen, Tatu Ylonen
  • Publication number: 20100138560
    Abstract: This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.
    Type: Application
    Filed: January 8, 2010
    Publication date: June 3, 2010
    Applicant: SSH COMMUNICATIONS SECURITY LTD.
    Inventors: Tero Kivinen, Tatu Ylonen
  • Publication number: 20100024026
    Abstract: A method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network from a protected domain. A packet processor part intercepts a packet that is in transit between the untrusted packet-switched information network and the protected domain. The packet is examined at the packet processor part in order to determine, whether the packet contains digital data that pertains to a certain protocol. If the packet is not found to contain such digital data, it is processed at the packet processor part. If the packet is found to contain digital data that pertains to said certain protocol, it gets redirected to an application gateway part that processes the packet according to a set of processing rules based on obedience to said certain protocol. The packet processor part is a kernel mode process running in a computer device and the application gateway part is a user mode process running in a computer device.
    Type: Application
    Filed: September 30, 2009
    Publication date: January 28, 2010
    Applicant: SafeNet, Inc.
    Inventors: Tatu Ylonen, Tero Kivinen, Markus Levlin
  • Publication number: 20100011375
    Abstract: In an embodiment of a method of and system for secure communication, a computer system comprises a primary system protocol stack operative in kernel space and interfacing with an external network. A secondary system protocol stack, security software, and at least one application program operate in user space, and may be provided on a portable storage medium by a user who does not have privileges to install programs in kernel space. The application program interfaces with the secondary system protocol stack. The secondary system protocol stack interfaces with the primary system protocol stack. The security software operates on communications through the secondary system protocol stack.
    Type: Application
    Filed: June 11, 2009
    Publication date: January 14, 2010
    Applicant: SafeNet, Inc.
    Inventor: Tero Kivinen
  • Patent number: 7356693
    Abstract: The practical benefit of the inventive idea results from an assumption that typically, the operational subCAs will not get compromised. Assuming this, a a batch of revocation lists manifesting no revocations can be generated and signed. These pregenerated CRLs (root CRLs) can then be stored outside the high-security vault and, in case of no subCA compromises, published periodically one at a time to the directory system where the PKI clients can automatically fetch them.
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: April 8, 2008
    Assignee: SSH Communications Security Corporation
    Inventors: Tero Kivinen, Tomi Kause
  • Patent number: 7302487
    Abstract: A method is presented for setting up communication parameters in a virtual private network node for connecting to at least one other node in the virtual private network. The method may include reading information from a hardware token for determining how to connect to a packet data network; reading information from the hardware token for determining how to obtain configuration information for the virtual private network node; connecting to a packet data network on the basis of information read from the hardware token; obtaining configuration information for the virtual private network node on the basis of information read from the hardware token; and using obtained configuration information for setting up the communication parameters.
    Type: Grant
    Filed: March 22, 2002
    Date of Patent: November 27, 2007
    Assignee: SafeNet, Inc.
    Inventors: Tatu Ylonen, Tero Kivinen, Marko Teiste
  • Publication number: 20060256815
    Abstract: This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 16, 2006
    Applicant: SSH Communications Security Ltd
    Inventors: Tero Kivinen, Tatu Ylonen
  • Patent number: 6957346
    Abstract: This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.
    Type: Grant
    Filed: June 15, 1999
    Date of Patent: October 18, 2005
    Assignee: SSH Communications Security Ltd.
    Inventors: Tero Kivinen, Tatu Ylonen
  • Publication number: 20040128504
    Abstract: The practical benefit of the inventive idea results from an assumption that typically, the operational subCAs will not get compromised. Assuming this, a a batch of revocation lists manifesting no revocations can be generated and signed. These pregenerated CRLs (root CRLs) can then be stored outside the high-security vault and, in case of no subCA compromises, published periodically one at a time to the directory system where the PKI clients can automatically fetch them.
    Type: Application
    Filed: September 30, 2003
    Publication date: July 1, 2004
    Inventors: Tero Kivinen, Tomi Kause
  • Patent number: 6678734
    Abstract: A method is provided for intercepting network packets in a computer system, where a number of functions are used to communicate network packets between a network adapter and a protocols entity. A first network adapter and a first protocols entity installed in the computer system are identified. A set of replacement functions is provided within a packet interceptor module. At least one function used for transmitting network packets from said first protocols entity to said first network adapter is hooked into a first replacement function. At least one function used for transmitting network packets from said first network adapter to said first protocols entity is hooked into a second replacement function. At least one function used for receiving information about the status of the network interface implemented by said first network adapter is hooked into a third replacement function.
    Type: Grant
    Filed: November 13, 1999
    Date of Patent: January 13, 2004
    Assignee: SSH Communications Security Ltd.
    Inventors: Niko Haatainen, Tero Kivinen, Jussi Kukkonen, Tatu Ylönen
  • Publication number: 20030110379
    Abstract: A method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network from a protected domain. A packet processor part intercepts a packet that is in transit between the untrusted packet-switched information network and the protected domain. The packet is examined at the packet processor part in order to determine, whether the packet contains digital data that pertains to a certain protocol. If the packet is not found to contain such digital data, it is processed at the packet processor part. If the packet is found to contain digital data that pertains to said certain protocol, it gets redirected to an application gateway part that processes the packet according to a set of processing rules based on obedience to said certain protocol. The packet processor part is a kernel mode process running in a computer device and the application gateway part is a user mode process running in a computer device.
    Type: Application
    Filed: December 7, 2001
    Publication date: June 12, 2003
    Inventors: Tatu Ylonen, Tero Kivinen, Markus Levlin
  • Publication number: 20020191548
    Abstract: This invention discloses a method for configuring a security-aware networking device in manner which is secure and still easy for users and administrators.
    Type: Application
    Filed: March 22, 2002
    Publication date: December 19, 2002
    Inventors: Tatu Ylonen, Tero Kivinen, Marko Teiste
  • Patent number: 6438612
    Abstract: Data packets are communicated between a transmitting virtual router in a transmitting computer device and a receiving virtual router in a receiving computer device. A security association is established for the secure transmission of data packets between the transmitting computer device and the receiving computer device. The transmitting virtual router and the receiving virtual router are identified within said security association. In the transmitting computer device, the security association for processing a data packet coming from the transmitting virtual router is selected on the basis of the identification of the transmitting virtual router within the security association. In the receiving computer device, the security association for processing a data packet coming from the transmitting computer device is selected on the basis of values contained within the data packet.
    Type: Grant
    Filed: September 11, 1998
    Date of Patent: August 20, 2002
    Assignee: SSH Communications Security, Ltd.
    Inventors: Tatu Ylonen, Tero Kivinen
  • Publication number: 20020062344
    Abstract: Data packets are communicated between a transmitting virtual router in a transmitting computer device and a receiving virtual router in a receiving computer device. A security association is established for the secure transmission of data packets between the transmitting computer device and the receiving computer device. The transmitting virtual router and the receiving virtual router are identified within said security association. In the transmitting computer device, the security association for processing a data packet coming from the transmitting virtual router is selected on the basis of the identification of the transmitting virtual router within the security association. In the receiving computer device, the security association for processing a data packet coming from the transmitting computer device is selected on the basis of values contained within the data packet.
    Type: Application
    Filed: September 11, 1998
    Publication date: May 23, 2002
    Inventors: TATU YLONEN, TERO KIVINEN