Patents by Inventor Jarno Niemelä
Jarno Niemelä has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9407761Abstract: A method and apparatus for managing communications in a communication network. A telephony device determines that a software application is attempting to contact an E.164 number. It then determines that the E.164 number matches at least one predetermined criterion, such as the E.164 number being a premium rate number or having a different country code to that of the device. The device then sends a query to a reputation server. The query includes information identifying the software application. The device receives a response from the reputation server, the response including a reputation relating to the software application. On the basis of the received reputation relating to the software application, the device can take further action such as preventing contact from being established.Type: GrantFiled: January 18, 2011Date of Patent: August 2, 2016Assignee: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 9225725Abstract: A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.Type: GrantFiled: May 19, 2014Date of Patent: December 29, 2015Assignee: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 9191392Abstract: An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving, from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining executable web site features on the basis of the retrieved reputation data.Type: GrantFiled: January 7, 2014Date of Patent: November 17, 2015Assignee: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 9055101Abstract: In accordance with an example embodiment of the present invention, there is provided a computing device, including at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the device to perform at least the following: receive near field communication device data related to a specific NFC device; generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider; receive reputation data, retrieved from a reputation database of NFC device reputation information, related to the specific NFC device from the service provider; and take further action on the basis of the received reputation relating to the specific NFC device.Type: GrantFiled: October 12, 2011Date of Patent: June 9, 2015Assignee: F-Secure CorporationInventors: Kimmo Kasslin, Jarno Niemelä
-
Patent number: 9021136Abstract: The present invention relates to a method for synchronizing files between devices between two devices. The method includes creating a rule to control the synchronization of the file. The rule includes at least one condition for synchronization which is dependent upon a property of a device.Type: GrantFiled: April 2, 2012Date of Patent: April 28, 2015Assignee: F-Secure CorporationInventors: Mika Ståhlberg, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
-
Patent number: 8981902Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.Type: GrantFiled: October 13, 2009Date of Patent: March 17, 2015Assignee: F-Secure CorporationInventors: Jarno Niemelä, Veli-Jussi Kesti, Pirkka Palomäki
-
Patent number: 8959626Abstract: A method and apparatus for detecting a suspicious entity in a communication network. A receiving device receives a message from a sender. A processor obtains domain information or a user identity, and further contact information from data contained in the message. A reputation query message is sent to a Network Reputation Server (NRS), the reputation query message including the domain information or user identity. A reply is received from the NRS that indicates that the domain information or user identity is related to a suspicious entity. The receiving device then associates the contact information with the suspicious entity. In this way, if a user of the receiving device attempts to use the contact information, they can be prevented from doing this or informed that it relates to a suspicious entity.Type: GrantFiled: December 14, 2010Date of Patent: February 17, 2015Assignee: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 8918878Abstract: In accordance with an example embodiment of the present invention, there is provided a method including: detecting a malware in a computer system and in response to the detection of the malware in the computer system initiating a deactivation of malware; detecting a file altered by the malware in response to a successful deactivation of the malware; and initiating a restoration of the altered file in response to the detection of the file altered by the malware.Type: GrantFiled: September 13, 2011Date of Patent: December 23, 2014Assignee: F-Secure CorporationInventor: Jarno Niemelä{umlaut over ( )}
-
Patent number: 8844038Abstract: According to a first aspect of the present invention there is provided a method of detecting malware in a mobile telecommunications device 101. In the method, maintaining a database 109 of legitimate applications and their respective expected behaviors, identifying legitimate applications running on the device 101, monitoring the behavior of the device 101, comparing this monitored behavior with that expected according to the database 109 for those legitimate applications identified as running on the device 101, and analyzing deviations from the expected behavior of the device 101 to identify the potential presence of malware.Type: GrantFiled: July 9, 2009Date of Patent: September 23, 2014Assignee: F-Secure OyjInventor: Jarno Niemelä
-
Patent number: 8844039Abstract: According to a first aspect of the present invention there is provided a method of detecting malware or other potentially unwanted programs. The method includes, at each of a plurality of client terminals, when it is determined that a program may be malware or a potentially unwanted program, generating image recognition data from displayed image data that includes image elements generated by the program, and sending the image recognition data to a central server. At the central server, storing the received image recognition data, and using the stored image recognition data to detect the presence of a malware or potentially unwanted program at the client terminals.Type: GrantFiled: June 30, 2010Date of Patent: September 23, 2014Assignee: F-Secure CorporationInventors: Jarno Niemelä, Kimmo Kasslin
-
Publication number: 20140259119Abstract: A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.Type: ApplicationFiled: May 19, 2014Publication date: September 11, 2014Applicant: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 8788653Abstract: A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.Type: GrantFiled: January 5, 2011Date of Patent: July 22, 2014Assignee: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 8745733Abstract: A method of performing a security check at a user computer on web page content downloaded to the user computer over the Internet. The method includes retrieving rating information for the web page from a web service over the Internet, the rating information including one or more content ratings and a first signature generated from the content, using a specified algorithm, at substantially the same time as the or each content rating was determined. The downloaded web page content is then processed using said specified algorithm to generate a second signature, and said first and second signatures are compared and the differences therebetween quantified. It is then determined if the quantified difference exceeds a threshold value. If not, then the received content rating(s) is(are) trusted. If yes, then the result is reported to said web service.Type: GrantFiled: February 16, 2011Date of Patent: June 3, 2014Assignee: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 8726377Abstract: A method for determining whether an electronic file stored at a client device is infected with malware. A server receives from the client device a request message that includes signature information of the electronic file. The server queries a database of signature information. If the signature information corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information does not correspond to signature information stored on the database, a determination is made as to whether a number of further request messages for the electronic file are received from additional client devices within a time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.Type: GrantFiled: April 8, 2010Date of Patent: May 13, 2014Assignee: E-Secure CorporationInventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
-
Patent number: 8726387Abstract: A method and apparatus for detecting a Trojan horse in a suspicious version of a software application in the form of at least one electronic file. A computer device determines a source from which the suspicious version of the software application was obtained. A comparison is then made between the source from which the suspicious version of the software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious version of the software application is more likely to contain a Trojan horse than if the sources were the same.Type: GrantFiled: February 11, 2011Date of Patent: May 13, 2014Assignee: F-Secure CorporationInventors: Mika Ståhlberg, Jarno Niemelä, Kimmo Kasslin
-
Publication number: 20140123245Abstract: An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving, from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining executable web site features on the basis of the retrieved reputation data.Type: ApplicationFiled: January 7, 2014Publication date: May 1, 2014Applicant: F-Secure CorporationInventor: Jarno Niemelä
-
Patent number: 8590045Abstract: A method of detecting malware on a computer system. The method comprises monitoring the behavior of trusted applications running on the computer system and, in the event that unexpected behavior of an application is detected, identifying a file or files responsible for the unexpected behavior and tagging the file(s) as malicious or suspicious. The unexpected behavior of the application may comprise, for example, dropping executable files, performing modifications to a registry branch which is not a registry branch of the application, reading a file type class which is not a file type class of the application, writing portable executable (PE) files, and crashing and re-starting of the application.Type: GrantFiled: October 7, 2009Date of Patent: November 19, 2013Assignee: F-Secure OYJInventors: Jarno Niemelä, Pirkka Palomäki
-
Publication number: 20130262706Abstract: The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device.Type: ApplicationFiled: April 2, 2012Publication date: October 3, 2013Inventors: Mika STAHLBERG, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
-
Patent number: 8499077Abstract: A method of controlling internet access on a client computer. The method includes identifying a DNS request generated on the client computer and which is addressed to a specific DNS root server, and sending an information request to a central server identifying said DNS root server. Then, at the central server, reputation information for said DNS root server is determined, and said reputation information is provided from the central server to the client computer. The reputation information is then used at the client computer to handle the DNS request or a response to that request.Type: GrantFiled: February 7, 2012Date of Patent: July 30, 2013Assignee: F-Secure CorporationInventors: Jarno Niemelä, Jarkko Konola
-
Publication number: 20130095751Abstract: In accordance with an example embodiment of the present invention, there is provided a computing device, including at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the device to perform at least the following: receive near field communication device data related to a specific NFC device; generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider; receive reputation data, retrieved from a reputation database of NFC device reputation information, related to the specific NFC device from the service provider; and take further action on the basis of the received reputation relating to the specific NFC device.Type: ApplicationFiled: October 12, 2011Publication date: April 18, 2013Inventors: Kimmo Kasslin, Jarno Niemelä