Patents by Inventor Marko Teiste
Marko Teiste has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11277414Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: March 3, 2020Date of Patent: March 15, 2022Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10880295Abstract: The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is maintained in a user information directory. The apparatus comprises at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to manage information of configurations for attribute based filtering of access requests by the directory users for a plurality of hosts and separately from the user information directory.Type: GrantFiled: March 6, 2017Date of Patent: December 29, 2020Assignee: SSH Communications Security OYJInventors: Marko Teiste, Tero Mononen, Tommi Linnakangas, Jussi Pakkanen, Tatu J. Ylönen, Kalle Jääskeläinen, Markku Rossi
-
Patent number: 10880314Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: May 29, 2019Date of Patent: December 29, 2020Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20200204564Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: March 3, 2020Publication date: June 25, 2020Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10616237Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: May 11, 2018Date of Patent: April 7, 2020Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10574634Abstract: The disclosure relates to apparatuses and methods for managing authenticator information in a computerized system. An access request to a host comprising an authenticator is processed to cause searching in an authenticator management host for information corresponding to the authenticator and searching in a directory internal to the host for information corresponding to the authenticator. Modification of information corresponding to the authenticator can then be provided based on the searching.Type: GrantFiled: February 10, 2017Date of Patent: February 25, 2020Assignee: SSH Communications Security OYJInventors: Tero Mononen, Markku Rossi, Marko Teiste
-
Publication number: 20190281067Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: May 29, 2019Publication date: September 12, 2019Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10257176Abstract: A first private key used by a device is replaced by a second private key, the first private key having an associated public key. The second private key is secured based on the associated public key and communicated to replace the first private key at the device. The device receives the second private key. The first private key is secured by a secret, and the device uses the secret to decrypt the first private key. The second private key is then encrypted using the decrypt first private key.Type: GrantFiled: March 4, 2015Date of Patent: April 9, 2019Assignee: SSH COMMUNICATIONS SECURITY OYJInventors: Kimmo Parviainen-Jalanko, Marko Teiste
-
Publication number: 20180262515Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: May 11, 2018Publication date: September 13, 2018Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20180255043Abstract: The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is maintained in a user information directory. The apparatus comprises at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to manage information of configurations for attribute based filtering of access requests by the directory users for a plurality of hosts and separately from the user information directory.Type: ApplicationFiled: March 6, 2017Publication date: September 6, 2018Inventors: Marko Teiste, Tero Mononen, Tommi Linnakangas, Jussi Pakkanen, Tatu J. Ylönen, Kalle Jääskeläinen, Markku Rossi
-
Publication number: 20180234400Abstract: The disclosure relates to apparatuses and methods for managing authenticator information in a computerized system. An access request to a host comprising an authenticator is processed to cause searching in an authenticator management host for information corresponding to the authenticator and searching in a directory internal to the host for information corresponding to the authenticator. Modification of information corresponding to the authenticator can then be provided based on the searching.Type: ApplicationFiled: February 10, 2017Publication date: August 16, 2018Inventors: Tero Mononen, Markku Rossi, Marko Teiste
-
Patent number: 10009354Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: February 3, 2017Date of Patent: June 26, 2018Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20170149794Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: February 3, 2017Publication date: May 25, 2017Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9602478Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: March 17, 2016Date of Patent: March 21, 2017Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9531536Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.Type: GrantFiled: March 4, 2015Date of Patent: December 27, 2016Assignee: SSH COMMUNICATIONS OYJInventors: Roman Hernandez, Marko Teiste, Antti Huima, Tommi Linnakangas
-
Publication number: 20160261566Abstract: A first private key used by a device is replaced by a second private key, the first private key having an associated public key. The second private key is secured based on the associated public key and communicated to replace the first private key at the device. The device receives the second private key. The first private key is secured by a secret, and the device uses the secret to decrypt the first private key. The second private key is then encrypted using the decrypt first private key.Type: ApplicationFiled: March 4, 2015Publication date: September 8, 2016Inventors: Kimmo PARVIAINEN-JALANKO, Marko TEISTE
-
Publication number: 20160261407Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.Type: ApplicationFiled: March 4, 2015Publication date: September 8, 2016Inventors: Roman HERNANDEZ, Marko TEISTE, Antti HUIMA, Tommi LINNAKANGAS
-
Publication number: 20160226841Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: March 17, 2016Publication date: August 4, 2016Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9319396Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: July 7, 2014Date of Patent: April 19, 2016Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20150013000Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: July 7, 2014Publication date: January 8, 2015Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen