Patents by Inventor MIKKO HYPPONEN

MIKKO HYPPONEN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9858416
    Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file while providing indications to the executable file that it is being executed within an emulated computer system.
    Type: Grant
    Filed: September 13, 2016
    Date of Patent: January 2, 2018
    Assignee: F-Secure Oyj
    Inventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
  • Publication number: 20160378985
    Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file whilst providing indications to the executable file that it is being executed within an emulated computer system.
    Type: Application
    Filed: September 13, 2016
    Publication date: December 29, 2016
    Inventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
  • Patent number: 9501644
    Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file while providing indications to the executable file that it is being executed within an emulated computer system.
    Type: Grant
    Filed: March 15, 2010
    Date of Patent: November 22, 2016
    Assignee: F-Secure Oyj
    Inventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
  • Patent number: 9021136
    Abstract: The present invention relates to a method for synchronizing files between devices between two devices. The method includes creating a rule to control the synchronization of the file. The rule includes at least one condition for synchronization which is dependent upon a property of a device.
    Type: Grant
    Filed: April 2, 2012
    Date of Patent: April 28, 2015
    Assignee: F-Secure Corporation
    Inventors: Mika Ståhlberg, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
  • Patent number: 8931100
    Abstract: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.
    Type: Grant
    Filed: December 14, 2011
    Date of Patent: January 6, 2015
    Assignee: F-Secure Corporation
    Inventors: Mika Ståhlberg, Mikko Hyppönen, Kimmo Kasslin, Veli-Jussi Kesti, Kai Nyman, Timo Harmonen
  • Patent number: 8745228
    Abstract: A computer-implemented method includes determining if one or more electronic device capabilities represented in one of a group of device profiles is associated with one or more content characteristics represented in one of a group of resource profiles. The method also includes assigning the device profile to the resource profile if the electronic device capabilities are associated with the content characteristics. Furthermore, the method includes, upon receipt of content defined by the resource profile, initiating delivery of the content to at least one electronic device associated with the one device profile based upon the assignment.
    Type: Grant
    Filed: December 28, 2007
    Date of Patent: June 3, 2014
    Assignee: Adobe Systems Incorporated
    Inventors: Joerg Beckert, Mikko Hypponen, Tuomas Dahlgren
  • Publication number: 20140040445
    Abstract: A computer-implemented method includes determining if one or more electronic device capabilities represented in one of a group of device profiles is associated with one or more content characteristics represented in one of a group of resource profiles. The method also includes assigning the device profile to the resource profile if the electronic device capabilities are associated with the content characteristics. Furthermore, the method includes, upon receipt of content defined by the resource profile, initiating delivery of the content to at least one electronic device associated with the one device profile based upon the assignment.
    Type: Application
    Filed: December 28, 2007
    Publication date: February 6, 2014
    Applicant: Adobe Systems Incorporated
    Inventors: Joerg Beckert, Mikko Hypponen, Tuomas Dahlgren
  • Publication number: 20130262706
    Abstract: The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device.
    Type: Application
    Filed: April 2, 2012
    Publication date: October 3, 2013
    Inventors: Mika STAHLBERG, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
  • Publication number: 20130160124
    Abstract: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.
    Type: Application
    Filed: December 14, 2011
    Publication date: June 20, 2013
    Inventors: Mika STÅHLBERG, Mikko Hyppönen, Kimmo Kasslin, Veli-Jussi Kesti, Kai Nyman, Timo Harmonen
  • Publication number: 20110225655
    Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file whilst providing indications to the executable file that it is being executed within an emulated computer system.
    Type: Application
    Filed: March 15, 2010
    Publication date: September 15, 2011
    Inventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
  • Publication number: 20030191957
    Abstract: A method of detecting viruses in a computer network 1 comprising intercepting data at at least one data transit node 4 of the network 1. The transit node 4 identifies which of the data is of a type capable of containing a virus and transfers the identified data to a virus scanning server 7 over the network 1. The identified data is received at the virus scanning server 7 which scans the data to identify viruses present therein. The server 7 subsequently acts in dependence upon the outcome of the virus scan.
    Type: Application
    Filed: February 19, 1999
    Publication date: October 9, 2003
    Inventors: ARI HYPPONEN, MIKKO HYPPONEN, TEEMU SAMULI LEHTONEN
  • Patent number: 6577920
    Abstract: A method of screening a software file for viral infection comprising defining a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures. The file is scanned to determine whether or not the file contains a macro. If the file contains a macro, a signature for the macro is determined and screened against the signatures contained in said databases. A user is alerted in the event that the macro has a signature corresponding to a signature contained in said first database and/or in the event that the macro has a signature which does not correspond to a signature contained in either of the second and third databases.
    Type: Grant
    Filed: October 2, 1998
    Date of Patent: June 10, 2003
    Assignee: Data Fellows Oyj
    Inventors: Mikko Hyppönen, Ari Hyppönen, Mikko Kuisha, Urmas Rahu, Risto Siilasmaa