Patents by Inventor Jarno Niemelä

Jarno Niemelä has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9407761
    Abstract: A method and apparatus for managing communications in a communication network. A telephony device determines that a software application is attempting to contact an E.164 number. It then determines that the E.164 number matches at least one predetermined criterion, such as the E.164 number being a premium rate number or having a different country code to that of the device. The device then sends a query to a reputation server. The query includes information identifying the software application. The device receives a response from the reputation server, the response including a reputation relating to the software application. On the basis of the received reputation relating to the software application, the device can take further action such as preventing contact from being established.
    Type: Grant
    Filed: January 18, 2011
    Date of Patent: August 2, 2016
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 9225725
    Abstract: A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: December 29, 2015
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 9191392
    Abstract: An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving, from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining executable web site features on the basis of the retrieved reputation data.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: November 17, 2015
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 9055101
    Abstract: In accordance with an example embodiment of the present invention, there is provided a computing device, including at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the device to perform at least the following: receive near field communication device data related to a specific NFC device; generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider; receive reputation data, retrieved from a reputation database of NFC device reputation information, related to the specific NFC device from the service provider; and take further action on the basis of the received reputation relating to the specific NFC device.
    Type: Grant
    Filed: October 12, 2011
    Date of Patent: June 9, 2015
    Assignee: F-Secure Corporation
    Inventors: Kimmo Kasslin, Jarno Niemelä
  • Patent number: 9021136
    Abstract: The present invention relates to a method for synchronizing files between devices between two devices. The method includes creating a rule to control the synchronization of the file. The rule includes at least one condition for synchronization which is dependent upon a property of a device.
    Type: Grant
    Filed: April 2, 2012
    Date of Patent: April 28, 2015
    Assignee: F-Secure Corporation
    Inventors: Mika Ståhlberg, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
  • Patent number: 8981902
    Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: March 17, 2015
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemelä, Veli-Jussi Kesti, Pirkka Palomäki
  • Patent number: 8959626
    Abstract: A method and apparatus for detecting a suspicious entity in a communication network. A receiving device receives a message from a sender. A processor obtains domain information or a user identity, and further contact information from data contained in the message. A reputation query message is sent to a Network Reputation Server (NRS), the reputation query message including the domain information or user identity. A reply is received from the NRS that indicates that the domain information or user identity is related to a suspicious entity. The receiving device then associates the contact information with the suspicious entity. In this way, if a user of the receiving device attempts to use the contact information, they can be prevented from doing this or informed that it relates to a suspicious entity.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: February 17, 2015
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 8918878
    Abstract: In accordance with an example embodiment of the present invention, there is provided a method including: detecting a malware in a computer system and in response to the detection of the malware in the computer system initiating a deactivation of malware; detecting a file altered by the malware in response to a successful deactivation of the malware; and initiating a restoration of the altered file in response to the detection of the file altered by the malware.
    Type: Grant
    Filed: September 13, 2011
    Date of Patent: December 23, 2014
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemelä{umlaut over ( )}
  • Patent number: 8844038
    Abstract: According to a first aspect of the present invention there is provided a method of detecting malware in a mobile telecommunications device 101. In the method, maintaining a database 109 of legitimate applications and their respective expected behaviors, identifying legitimate applications running on the device 101, monitoring the behavior of the device 101, comparing this monitored behavior with that expected according to the database 109 for those legitimate applications identified as running on the device 101, and analyzing deviations from the expected behavior of the device 101 to identify the potential presence of malware.
    Type: Grant
    Filed: July 9, 2009
    Date of Patent: September 23, 2014
    Assignee: F-Secure Oyj
    Inventor: Jarno Niemelä
  • Patent number: 8844039
    Abstract: According to a first aspect of the present invention there is provided a method of detecting malware or other potentially unwanted programs. The method includes, at each of a plurality of client terminals, when it is determined that a program may be malware or a potentially unwanted program, generating image recognition data from displayed image data that includes image elements generated by the program, and sending the image recognition data to a central server. At the central server, storing the received image recognition data, and using the stored image recognition data to detect the presence of a malware or potentially unwanted program at the client terminals.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: September 23, 2014
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemelä, Kimmo Kasslin
  • Publication number: 20140259119
    Abstract: A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.
    Type: Application
    Filed: May 19, 2014
    Publication date: September 11, 2014
    Applicant: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 8788653
    Abstract: A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.
    Type: Grant
    Filed: January 5, 2011
    Date of Patent: July 22, 2014
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 8745733
    Abstract: A method of performing a security check at a user computer on web page content downloaded to the user computer over the Internet. The method includes retrieving rating information for the web page from a web service over the Internet, the rating information including one or more content ratings and a first signature generated from the content, using a specified algorithm, at substantially the same time as the or each content rating was determined. The downloaded web page content is then processed using said specified algorithm to generate a second signature, and said first and second signatures are compared and the differences therebetween quantified. It is then determined if the quantified difference exceeds a threshold value. If not, then the received content rating(s) is(are) trusted. If yes, then the result is reported to said web service.
    Type: Grant
    Filed: February 16, 2011
    Date of Patent: June 3, 2014
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 8726377
    Abstract: A method for determining whether an electronic file stored at a client device is infected with malware. A server receives from the client device a request message that includes signature information of the electronic file. The server queries a database of signature information. If the signature information corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information does not correspond to signature information stored on the database, a determination is made as to whether a number of further request messages for the electronic file are received from additional client devices within a time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.
    Type: Grant
    Filed: April 8, 2010
    Date of Patent: May 13, 2014
    Assignee: E-Secure Corporation
    Inventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
  • Patent number: 8726387
    Abstract: A method and apparatus for detecting a Trojan horse in a suspicious version of a software application in the form of at least one electronic file. A computer device determines a source from which the suspicious version of the software application was obtained. A comparison is then made between the source from which the suspicious version of the software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious version of the software application is more likely to contain a Trojan horse than if the sources were the same.
    Type: Grant
    Filed: February 11, 2011
    Date of Patent: May 13, 2014
    Assignee: F-Secure Corporation
    Inventors: Mika Ståhlberg, Jarno Niemelä, Kimmo Kasslin
  • Publication number: 20140123245
    Abstract: An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving, from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining executable web site features on the basis of the retrieved reputation data.
    Type: Application
    Filed: January 7, 2014
    Publication date: May 1, 2014
    Applicant: F-Secure Corporation
    Inventor: Jarno Niemelä
  • Patent number: 8590045
    Abstract: A method of detecting malware on a computer system. The method comprises monitoring the behavior of trusted applications running on the computer system and, in the event that unexpected behavior of an application is detected, identifying a file or files responsible for the unexpected behavior and tagging the file(s) as malicious or suspicious. The unexpected behavior of the application may comprise, for example, dropping executable files, performing modifications to a registry branch which is not a registry branch of the application, reading a file type class which is not a file type class of the application, writing portable executable (PE) files, and crashing and re-starting of the application.
    Type: Grant
    Filed: October 7, 2009
    Date of Patent: November 19, 2013
    Assignee: F-Secure OYJ
    Inventors: Jarno Niemelä, Pirkka Palomäki
  • Publication number: 20130262706
    Abstract: The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device.
    Type: Application
    Filed: April 2, 2012
    Publication date: October 3, 2013
    Inventors: Mika STAHLBERG, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
  • Patent number: 8499077
    Abstract: A method of controlling internet access on a client computer. The method includes identifying a DNS request generated on the client computer and which is addressed to a specific DNS root server, and sending an information request to a central server identifying said DNS root server. Then, at the central server, reputation information for said DNS root server is determined, and said reputation information is provided from the central server to the client computer. The reputation information is then used at the client computer to handle the DNS request or a response to that request.
    Type: Grant
    Filed: February 7, 2012
    Date of Patent: July 30, 2013
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemelä, Jarkko Konola
  • Publication number: 20130095751
    Abstract: In accordance with an example embodiment of the present invention, there is provided a computing device, including at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the device to perform at least the following: receive near field communication device data related to a specific NFC device; generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider; receive reputation data, retrieved from a reputation database of NFC device reputation information, related to the specific NFC device from the service provider; and take further action on the basis of the received reputation relating to the specific NFC device.
    Type: Application
    Filed: October 12, 2011
    Publication date: April 18, 2013
    Inventors: Kimmo Kasslin, Jarno Niemelä