Patents by Inventor Antti Huima
Antti Huima has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11277414Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: March 3, 2020Date of Patent: March 15, 2022Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10880314Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: May 29, 2019Date of Patent: December 29, 2020Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20200204564Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: March 3, 2020Publication date: June 25, 2020Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10681023Abstract: Methods and apparatuses for managing access to hosts in a computerized system are disclosed. A request for an authenticator for enabling access to at least one host in the computerized system is communicated from an user to a portal. The portal verifies the right of the user to make the request, and in response to positive verification authorizes the user to make the request and sends the request to an authenticator manager to trigger providing of an authenticator for enabling access to at least one host in accordance with the request. The authenticator manager provides the authenticator for enabling access to the at least one host in accordance with the request. Acceptance of the request by an administration process according a predefined rule is required before said providing of the authenticator.Type: GrantFiled: June 30, 2014Date of Patent: June 9, 2020Assignee: SSH Communications Security OYJInventors: Roman Hernandez, Tomi Salo, Antti Huima, Tatu J. Ylonen
-
Patent number: 10616237Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: May 11, 2018Date of Patent: April 7, 2020Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20190281067Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: May 29, 2019Publication date: September 12, 2019Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20180262515Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: May 11, 2018Publication date: September 13, 2018Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10009354Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: February 3, 2017Date of Patent: June 26, 2018Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20170149794Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: February 3, 2017Publication date: May 25, 2017Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9602478Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: March 17, 2016Date of Patent: March 21, 2017Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9531536Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.Type: GrantFiled: March 4, 2015Date of Patent: December 27, 2016Assignee: SSH COMMUNICATIONS OYJInventors: Roman Hernandez, Marko Teiste, Antti Huima, Tommi Linnakangas
-
Publication number: 20160261407Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.Type: ApplicationFiled: March 4, 2015Publication date: September 8, 2016Inventors: Roman HERNANDEZ, Marko TEISTE, Antti HUIMA, Tommi LINNAKANGAS
-
Publication number: 20160226841Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: March 17, 2016Publication date: August 4, 2016Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9319396Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: July 7, 2014Date of Patent: April 19, 2016Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20150013000Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: July 7, 2014Publication date: January 8, 2015Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20150006882Abstract: Methods and apparatuses for managing access to hosts in a computerized system are disclosed. A request for an authenticator for enabling access to at least one host in the computerized system is communicated from an user to a portal. The portal verifies the right of the user to make the request, and in response to positive verification authorizes the user to make the request and sends the request to an authenticator manager to trigger providing of an authenticator for enabling access to at least one host in accordance with the request. The authenticator manager provides the authenticator for enabling access to the at least one host in accordance with the request. Acceptance of the request by an administration process according a predefined rule is required before said providing of the authenticator.Type: ApplicationFiled: June 30, 2014Publication date: January 1, 2015Inventors: Roman Hernandez, Tomi Salo, Antti Huima, Tatu J. Ylonen
-
Publication number: 20040015905Abstract: According to the invention, the compiled packet filter code is managed in a plurality of pieces, not as a single unit as according to prior art. Preferably, the compiled packet filter code is managed in equally sized pages. When a filter rule is changed, added or removed, only the affected page or pages are changed, added or deleted. This allows for fast updates of the filter code.Type: ApplicationFiled: October 26, 2001Publication date: January 22, 2004Inventor: Antti Huima
-
Publication number: 20020164026Abstract: An authentication method for authenticating communication between a first and a second party using a third party which is trusted by said first and second parties comprising the steps of calculating by the trusted third party the value of a first authentication output using a parameter of the first party and a second authentication output using the first authentication output and sending the second authentication output to the second party; calculating by the first party the first authentication output and sending the first authentication output to the second party; and calculating by the second party the second authentication output based on the first authentication output received from the first party and comparing the calculated second authentication output with the second authentication output received from the trusted third party whereby if the two second authentication outputs are the same, the first party is authenticated.Type: ApplicationFiled: August 9, 2001Publication date: November 7, 2002Inventor: Antti Huima