Patents by Inventor Veli-Jussi Kesti

Veli-Jussi Kesti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230351993
    Abstract: A computer-implemented method includes: providing backing track audio data, wherein each backing track includes information of at least: song tempo, tonal content that is synchronized with the backing track audio, selecting a song, receiving a real-time audio signal of the user's performance, estimating parameters, based on the audio signal, including at least: playing activity of the user, wherein detecting whether the user is producing any sounding notes with a musical instrument, tempo of the user's playing, and playing position of the user within the selected song, estimating the reliability of the estimated tempo and play position of the user, wherein a value of the reliability represents the probability that the amount of error in the estimated user tempo and play position is sufficiently small, and when the estimated reliability of the user position and tempo is sufficiently high, start playing the backing track at the user position and tempo.
    Type: Application
    Filed: April 28, 2023
    Publication date: November 2, 2023
    Inventors: Juho KINNUNEN, Sakari BERGEN, Anssi KLAPURI, Veli-Jussi KESTI, Jarmo HIIPAKKA, Katarina TALLBERG, Christoph THÜR
  • Publication number: 20230351988
    Abstract: A computer-implemented method for identifying a song includes: providing audio data including musical notation information for songs, receiving a real-time audio signal of a user performing on an instrument, detecting playing activity in successive segments, detecting notes and/or chords from the audio signal, storing user play history information including of information of songs a user has played before and number of plays, based on the play history information calculating a first probability for a song, based on first probabilities for a number of songs and based on the detected playing activity and the detected notes and/or chords, estimating the song being performed. The estimation includes calculating a second probability for different songs. The second probabilities are defined by the audio signal corresponding with a particular song of the play history combined with first probability associated with the song, and providing the song the user is performing or related information.
    Type: Application
    Filed: April 28, 2023
    Publication date: November 2, 2023
    Inventors: Christoph THÜR, Anssi KLAPURI, Veli-Jussi KESTI
  • Patent number: 10033746
    Abstract: Methods, apparatus, systems are provided for use in detecting unauthorized changes to websites of web operators. Authorized content policy sets for each of a multiplicity of websites from web operators are collected and stored. In addition, content information obtained in respect web content downloaded from said websites by a multiplicity of client devices, client proxy devices, and/or client gateway devices is used to identify websites that do not conform to respective policy sets. Alerts are sent to the web operator of any non-conforming website. Optionally, alerts may be sent to client devices, client gateway devices, and/or client proxy devices for use in scanning or blocking the web content from non-conforming websites.
    Type: Grant
    Filed: April 15, 2014
    Date of Patent: July 24, 2018
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemela, Veli-Jussi Kesti
  • Patent number: 9275228
    Abstract: Methods are detailed for online fraud prevention. In one approach state information of a first and a second device is monitored, both of which are associated with one user. During a multi-factor authentication procedure which utilizes at least one of the first and the second devices for authorizing a transaction by an Internet domain, a security server participates in a supplemental security procedure which is conditional on the monitored state information. In another approach the second device receives a message that is ostensibly related to multi-factor authorization by an Internet domain, and in response sends a query about state information of the first device. Based on the response to the query that indicates the state information, the second device performs a supplemental security procedure.
    Type: Grant
    Filed: February 20, 2014
    Date of Patent: March 1, 2016
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemela, Veli-Jussi Kesti
  • Patent number: 9231971
    Abstract: According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.
    Type: Grant
    Filed: November 4, 2013
    Date of Patent: January 5, 2016
    Assignee: F-Secure Corporation
    Inventors: Andrew Patel, Igor Afanasiev, Veli-Jussi Kesti, Urmas Rahu, Yury Yakovlev, Jarkko Konola, Janne Pirttilahti
  • Publication number: 20150178499
    Abstract: Methods are detailed for online fraud prevention. In one approach state information of a first and a second device is monitored, both of which are associated with one user. During a multi-factor authentication procedure which utilizes at least one of the first and the second devices for authorizing a transaction by an Internet domain, a security server participates in a supplemental security procedure which is conditional on the monitored state information. In another approach the second device receives a message that is ostensibly related to multi-factor authorization by an Internet domain, and in response sends a query about state information of the first device. Based on the response to the query that indicates the state information, the second device performs a supplemental security procedure.
    Type: Application
    Filed: February 20, 2014
    Publication date: June 25, 2015
    Inventors: Jarno NIEMELA, Veli-Jussi KESTI
  • Patent number: 8981902
    Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: March 17, 2015
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemelä, Veli-Jussi Kesti, Pirkka Palomäki
  • Patent number: 8931100
    Abstract: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.
    Type: Grant
    Filed: December 14, 2011
    Date of Patent: January 6, 2015
    Assignee: F-Secure Corporation
    Inventors: Mika Ståhlberg, Mikko Hyppönen, Kimmo Kasslin, Veli-Jussi Kesti, Kai Nyman, Timo Harmonen
  • Publication number: 20140317754
    Abstract: Methods, apparatus, systems are provided for use in detecting unauthorised changes to websites of web operators. Authorised content policy sets for each of a multiplicity of websites from web operators are collected and stored. In addition, content information obtained in respect web content downloaded from said websites by a multiplicity of client devices, client proxy devices, and/or client gateway devices is used to identify websites that do not conform to respective policy sets. Alerts are sent to the web operator of any non-conforming website. Optionally, alerts may be sent to client devices, client gateway devices, and/or client proxy devices for use in scanning or blocking the web content from non-conforming websites.
    Type: Application
    Filed: April 15, 2014
    Publication date: October 23, 2014
    Applicant: F-Secure Corporation
    Inventors: Jarno NIEMELA, Veli-Jussi KESTI
  • Publication number: 20140237591
    Abstract: Methods are detailed for online fraud prevention. In one approach state information of a first and a second device is monitored, both of which are associated with one user. During a multi-factor authentication procedure which utilizes at least one of the first and the second devices for authorizing a transaction by an Internet domain, a security server participates in a supplemental security procedure which is conditional on the monitored state information. In another approach the second device receives a message that is ostensibly related to multi-factor authorization by an Internet domain, and in response sends a query about state information of the first device. Based on the response to the query that indicates the state information, the second device performs a supplemental security procedure.
    Type: Application
    Filed: February 20, 2014
    Publication date: August 21, 2014
    Applicant: F-Secure Corporation
    Inventors: Jarno NIEMELA, Veli-Jussi KESTI
  • Patent number: 8726377
    Abstract: A method for determining whether an electronic file stored at a client device is infected with malware. A server receives from the client device a request message that includes signature information of the electronic file. The server queries a database of signature information. If the signature information corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information does not correspond to signature information stored on the database, a determination is made as to whether a number of further request messages for the electronic file are received from additional client devices within a time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.
    Type: Grant
    Filed: April 8, 2010
    Date of Patent: May 13, 2014
    Assignee: E-Secure Corporation
    Inventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
  • Publication number: 20140130165
    Abstract: According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.
    Type: Application
    Filed: November 4, 2013
    Publication date: May 8, 2014
    Applicant: F-Secure Corporation
    Inventors: Andrew PATEL, Igor Afanasiev, Veli-Jussi Kesti, Urmas Rahu, Yury Yakovlev, Jarkko Konola, Janne Pirttilahti
  • Publication number: 20130160124
    Abstract: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.
    Type: Application
    Filed: December 14, 2011
    Publication date: June 20, 2013
    Inventors: Mika STÅHLBERG, Mikko Hyppönen, Kimmo Kasslin, Veli-Jussi Kesti, Kai Nyman, Timo Harmonen
  • Publication number: 20120117648
    Abstract: A method and apparatus for a determining whether an electronic file stored at a client device is malware. A server receives from the client device a request message that signature information of the electronic file. The server queries a database of signature information of a multiplicity of electronic files. If the signature information of the electronic file corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information of the electronic file does not correspond to signature information stored on the database, a determination is made as to whether a predetermined number of further request messages for the electronic file are received from further client devices within a predetermined time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.
    Type: Application
    Filed: April 8, 2010
    Publication date: May 10, 2012
    Applicant: F-SECURE CORPORATION
    Inventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
  • Publication number: 20110084803
    Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.
    Type: Application
    Filed: October 13, 2009
    Publication date: April 14, 2011
    Inventors: Jarno Niemela, Veli-Jussi Kesti, Pirkka Palomaki