Patents by Inventor MIKKO HYPPONEN
MIKKO HYPPONEN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9858416Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file while providing indications to the executable file that it is being executed within an emulated computer system.Type: GrantFiled: September 13, 2016Date of Patent: January 2, 2018Assignee: F-Secure OyjInventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
-
Publication number: 20160378985Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file whilst providing indications to the executable file that it is being executed within an emulated computer system.Type: ApplicationFiled: September 13, 2016Publication date: December 29, 2016Inventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
-
Patent number: 9501644Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file while providing indications to the executable file that it is being executed within an emulated computer system.Type: GrantFiled: March 15, 2010Date of Patent: November 22, 2016Assignee: F-Secure OyjInventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
-
Patent number: 9021136Abstract: The present invention relates to a method for synchronizing files between devices between two devices. The method includes creating a rule to control the synchronization of the file. The rule includes at least one condition for synchronization which is dependent upon a property of a device.Type: GrantFiled: April 2, 2012Date of Patent: April 28, 2015Assignee: F-Secure CorporationInventors: Mika Ståhlberg, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
-
Patent number: 8931100Abstract: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.Type: GrantFiled: December 14, 2011Date of Patent: January 6, 2015Assignee: F-Secure CorporationInventors: Mika Ståhlberg, Mikko Hyppönen, Kimmo Kasslin, Veli-Jussi Kesti, Kai Nyman, Timo Harmonen
-
Patent number: 8745228Abstract: A computer-implemented method includes determining if one or more electronic device capabilities represented in one of a group of device profiles is associated with one or more content characteristics represented in one of a group of resource profiles. The method also includes assigning the device profile to the resource profile if the electronic device capabilities are associated with the content characteristics. Furthermore, the method includes, upon receipt of content defined by the resource profile, initiating delivery of the content to at least one electronic device associated with the one device profile based upon the assignment.Type: GrantFiled: December 28, 2007Date of Patent: June 3, 2014Assignee: Adobe Systems IncorporatedInventors: Joerg Beckert, Mikko Hypponen, Tuomas Dahlgren
-
Publication number: 20140040445Abstract: A computer-implemented method includes determining if one or more electronic device capabilities represented in one of a group of device profiles is associated with one or more content characteristics represented in one of a group of resource profiles. The method also includes assigning the device profile to the resource profile if the electronic device capabilities are associated with the content characteristics. Furthermore, the method includes, upon receipt of content defined by the resource profile, initiating delivery of the content to at least one electronic device associated with the one device profile based upon the assignment.Type: ApplicationFiled: December 28, 2007Publication date: February 6, 2014Applicant: Adobe Systems IncorporatedInventors: Joerg Beckert, Mikko Hypponen, Tuomas Dahlgren
-
Publication number: 20130262706Abstract: The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device.Type: ApplicationFiled: April 2, 2012Publication date: October 3, 2013Inventors: Mika STAHLBERG, Mikko Hyppönen, Kimmo Kasslin, Antti Tikkanen, Jarno Niemelä, Jarkko Konola
-
Publication number: 20130160124Abstract: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.Type: ApplicationFiled: December 14, 2011Publication date: June 20, 2013Inventors: Mika STÅHLBERG, Mikko Hyppönen, Kimmo Kasslin, Veli-Jussi Kesti, Kai Nyman, Timo Harmonen
-
Publication number: 20110225655Abstract: According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file whilst providing indications to the executable file that it is being executed within an emulated computer system.Type: ApplicationFiled: March 15, 2010Publication date: September 15, 2011Inventors: Jarno Niemelä, Mikko Hyppönen, Santeri Kangas
-
Publication number: 20030191957Abstract: A method of detecting viruses in a computer network 1 comprising intercepting data at at least one data transit node 4 of the network 1. The transit node 4 identifies which of the data is of a type capable of containing a virus and transfers the identified data to a virus scanning server 7 over the network 1. The identified data is received at the virus scanning server 7 which scans the data to identify viruses present therein. The server 7 subsequently acts in dependence upon the outcome of the virus scan.Type: ApplicationFiled: February 19, 1999Publication date: October 9, 2003Inventors: ARI HYPPONEN, MIKKO HYPPONEN, TEEMU SAMULI LEHTONEN
-
Patent number: 6577920Abstract: A method of screening a software file for viral infection comprising defining a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures. The file is scanned to determine whether or not the file contains a macro. If the file contains a macro, a signature for the macro is determined and screened against the signatures contained in said databases. A user is alerted in the event that the macro has a signature corresponding to a signature contained in said first database and/or in the event that the macro has a signature which does not correspond to a signature contained in either of the second and third databases.Type: GrantFiled: October 2, 1998Date of Patent: June 10, 2003Assignee: Data Fellows OyjInventors: Mikko Hyppönen, Ari Hyppönen, Mikko Kuisha, Urmas Rahu, Risto Siilasmaa