Patents by Inventor Antti Huima

Antti Huima has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11277414
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: March 3, 2020
    Date of Patent: March 15, 2022
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 10880314
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: December 29, 2020
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20200204564
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: March 3, 2020
    Publication date: June 25, 2020
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 10681023
    Abstract: Methods and apparatuses for managing access to hosts in a computerized system are disclosed. A request for an authenticator for enabling access to at least one host in the computerized system is communicated from an user to a portal. The portal verifies the right of the user to make the request, and in response to positive verification authorizes the user to make the request and sends the request to an authenticator manager to trigger providing of an authenticator for enabling access to at least one host in accordance with the request. The authenticator manager provides the authenticator for enabling access to the at least one host in accordance with the request. Acceptance of the request by an administration process according a predefined rule is required before said providing of the authenticator.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: June 9, 2020
    Assignee: SSH Communications Security OYJ
    Inventors: Roman Hernandez, Tomi Salo, Antti Huima, Tatu J. Ylonen
  • Patent number: 10616237
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: April 7, 2020
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20190281067
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: May 29, 2019
    Publication date: September 12, 2019
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20180262515
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: May 11, 2018
    Publication date: September 13, 2018
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 10009354
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: June 26, 2018
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20170149794
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: February 3, 2017
    Publication date: May 25, 2017
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 9602478
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: March 21, 2017
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 9531536
    Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.
    Type: Grant
    Filed: March 4, 2015
    Date of Patent: December 27, 2016
    Assignee: SSH COMMUNICATIONS OYJ
    Inventors: Roman Hernandez, Marko Teiste, Antti Huima, Tommi Linnakangas
  • Publication number: 20160261407
    Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.
    Type: Application
    Filed: March 4, 2015
    Publication date: September 8, 2016
    Inventors: Roman HERNANDEZ, Marko TEISTE, Antti HUIMA, Tommi LINNAKANGAS
  • Publication number: 20160226841
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: March 17, 2016
    Publication date: August 4, 2016
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 9319396
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: July 7, 2014
    Date of Patent: April 19, 2016
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20150013000
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: July 7, 2014
    Publication date: January 8, 2015
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20150006882
    Abstract: Methods and apparatuses for managing access to hosts in a computerized system are disclosed. A request for an authenticator for enabling access to at least one host in the computerized system is communicated from an user to a portal. The portal verifies the right of the user to make the request, and in response to positive verification authorizes the user to make the request and sends the request to an authenticator manager to trigger providing of an authenticator for enabling access to at least one host in accordance with the request. The authenticator manager provides the authenticator for enabling access to the at least one host in accordance with the request. Acceptance of the request by an administration process according a predefined rule is required before said providing of the authenticator.
    Type: Application
    Filed: June 30, 2014
    Publication date: January 1, 2015
    Inventors: Roman Hernandez, Tomi Salo, Antti Huima, Tatu J. Ylonen
  • Publication number: 20040015905
    Abstract: According to the invention, the compiled packet filter code is managed in a plurality of pieces, not as a single unit as according to prior art. Preferably, the compiled packet filter code is managed in equally sized pages. When a filter rule is changed, added or removed, only the affected page or pages are changed, added or deleted. This allows for fast updates of the filter code.
    Type: Application
    Filed: October 26, 2001
    Publication date: January 22, 2004
    Inventor: Antti Huima
  • Publication number: 20020164026
    Abstract: An authentication method for authenticating communication between a first and a second party using a third party which is trusted by said first and second parties comprising the steps of calculating by the trusted third party the value of a first authentication output using a parameter of the first party and a second authentication output using the first authentication output and sending the second authentication output to the second party; calculating by the first party the first authentication output and sending the first authentication output to the second party; and calculating by the second party the second authentication output based on the first authentication output received from the first party and comparing the calculated second authentication output with the second authentication output received from the trusted third party whereby if the two second authentication outputs are the same, the first party is authenticated.
    Type: Application
    Filed: August 9, 2001
    Publication date: November 7, 2002
    Inventor: Antti Huima