Patents by Inventor Mikko SUOMINEN

Mikko SUOMINEN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11451584
    Abstract: A method of protecting a computer system against remote exploitation attacks performed over a network to which the computer system is connected. The method includes: a) identifying a network connection that is not associated with a successful authentication and which carries a traffic level in excess of a predefined threshold; b) reporting the identified network connection as a real or potential remote exploitation attack; and c) taking an action or actions to mitigate against the real or potential remote exploitation attack.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: September 20, 2022
    Assignee: Withsecure Corporation
    Inventor: Mikko Suominen
  • Patent number: 11449610
    Abstract: There is provided a method of detecting a threat against a computer system. The method includes monitoring installation and operation of multiple different versions of the same application in a computer system; analysing evolutionary changes between the behaviours of the different versions of the same application; detecting and monitoring a new version of the same application in a computer system; monitoring the behavior of the computer system to detect one or more procedures of the monitored application that do not match expected behaviors of the monitored application on the basis of the analysis; and upon detection of one or more procedures not matching the expected behaviors of the monitored application, identifying the monitored application as malicious or suspicious.
    Type: Grant
    Filed: March 18, 2019
    Date of Patent: September 20, 2022
    Assignee: Withsecure Corporation
    Inventors: Mikko Suominen, Dmitriy Komashinskiy, Fredrik Kock
  • Publication number: 20190379693
    Abstract: A method of protecting a computer system against remote exploitation attacks performed over a network to which the computer system is connected. The method includes: a) identifying a network connection that is not associated with a successful authentication and which carries a traffic level in excess of a predefined threshold; b) reporting the identified network connection as a real or potential remote exploitation attack; and c) taking an action or actions to mitigate against the real or potential remote exploitation attack.
    Type: Application
    Filed: May 31, 2019
    Publication date: December 12, 2019
    Inventor: Mikko SUOMINEN
  • Publication number: 20190294795
    Abstract: There is provided a method of detecting a threat against a computer system. The method includes monitoring installation and operation of multiple different versions of the same application in a computer system; analysing evolutionary changes between the behaviours of the different versions of the same application; detecting and monitoring a new version of the same application in a computer system; monitoring the behavior of the computer system to detect one or more procedures of the monitored application that do not match expected behaviors of the monitored application on the basis of the analysis; and upon detection of one or more procedures not matching the expected behaviors of the monitored application, identifying the monitored application as malicious or suspicious.
    Type: Application
    Filed: March 18, 2019
    Publication date: September 26, 2019
    Inventors: Mikko Suominen, Dmitriy Komashinskiy, Fredrik Kock
  • Patent number: 10006709
    Abstract: A nozzle (10) for contact-free treatment of a running web, having a main frame (11) forming an outer part of the nozzle, and two side chambers (14, 15) on each of the longitudinal sides of the nozzle (10). The side chambers having openings (17A, 17B, 16A, 16B) for the air to blow toward a fiber web. A U-shaped air channel (20), through which the air is lead to the side chambers (14, 15), located between the side chambers (14, 15), having at least one opening (19, 18) on each side wall for leading the air into the side chambers (14, 15). A U-shaped inner part (13) which is movable by a mechanism (12) comprising a screw (21) and bushings (22) to at least partially open and close the opening (18, 19).
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: June 26, 2018
    Assignee: VALMET TECHNOLOGIES OY
    Inventor: Mikko Suominen
  • Patent number: 9910983
    Abstract: A method of detecting suspicious code that has been injected into a process. The method includes identifying suspicious executable memory areas assigned to the process and, for each thread in the process, inspecting a stack associated with the thread to identify a potential return address; determining whether or not the potential return address is located within a suspicious memory area; and, if the potential return address is located within a suspicious memory area, determining whether or not the instruction at the address preceding the potential return address is a function call and, if yes, determining that the potential return address is a true return address and identifying the thread and associated code as suspicious.
    Type: Grant
    Filed: January 28, 2014
    Date of Patent: March 6, 2018
    Assignee: F-Secure Corporation
    Inventor: Mikko Suominen
  • Publication number: 20170370644
    Abstract: A nozzle (10) for contact-free treatment of a running web, having a main frame (11) forming an outer part of the nozzle, and two side chambers (14, 15) on each of the longitudinal sides of the nozzle (10). The side chambers having openings (17A, 17B, 16A, 16B) for the air to blow toward a fiber web. A U-shaped air channel (20), through which the air is lead to the side chambers (14, 15), located between the side chambers (14, 15), having at least one opening (19, 18) on each side wall for leading the air into the side chambers (14, 15). A U-shaped inner part (13) which is movable by a mechanism (12) comprising a screw (21) and bushings (22) to at least partially open and close the opening (18, 19).
    Type: Application
    Filed: June 22, 2017
    Publication date: December 28, 2017
    Applicant: Valmet Technologies Oy
    Inventor: Mikko Suominen
  • Patent number: 9787699
    Abstract: There is provided a malware analysis method including at a computer device having an operating system and a memory: collecting Dynamic Link Library (DLL) data under a system folder, the data including at least the DLL name and all pairs of exported function names and function addresses relative to the starting address of the DLL once it has been loaded into memory; comparing the two least significant bytes of the collected function addresses with the two least significant bytes of absolute virtual addresses in a memory dump; deducing a list of potential targets for API function calls when there is a match between the compared two least significant bytes of the collected function addresses and the absolute virtual addresses; and quarantining or deleting malware from which the suspicious API function calls originated.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: October 10, 2017
    Assignee: F-SECURE CORPORATION
    Inventor: Mikko Suominen
  • Publication number: 20170126716
    Abstract: There is provided a malware analysis method including at a computer device having an operating system and a memory: collecting Dynamic Link Library (DLL) data under a system folder, the data including at least the DLL name and all pairs of exported function names and function addresses relative to the starting address of the DLL once it has been loaded into memory; comparing the two least significant bytes of the collected function addresses with the two least significant bytes of absolute virtual addresses in a memory dump; deducing a list of potential targets for API function calls when there is a match between the compared two least significant bytes of the collected function addresses and the absolute virtual addresses; and quarantining or deleting malware from which the suspicious API function calls originated.
    Type: Application
    Filed: October 26, 2016
    Publication date: May 4, 2017
    Inventor: Mikko Suominen
  • Patent number: 9626676
    Abstract: A method, apparatus, and computer program for improving security in connection with online transactions are provided. A security application configured to monitor received text messages of a short message service is executed in an apparatus. The security application is arranged to have prioritized access to process the received text messages before other applications executed in the apparatus, to identify from contents of a received text message whether or not the received text message includes a transaction authentication message and, upon detecting that the received text message includes the transaction authentication message, prevent the processing of the transaction authentication message by the other applications and carry out user interfacing related to the transaction authentication message within a secured environment provided by the security application.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: April 18, 2017
    Assignee: F-Secure Corporation
    Inventor: Mikko Suominen
  • Patent number: 9292687
    Abstract: A method in a computer for detecting a file encryption attack. The computer detects an attempt to overwrite current file data of a file with new file data. The computer then compares the new file data to the current file data to obtain a measure of the difference between the current and the new file data, and if the difference exceeds a threshold, the computer considers this to identify a file encryption attack.
    Type: Grant
    Filed: August 19, 2014
    Date of Patent: March 22, 2016
    Assignee: F-Secure Corporation
    Inventors: Marko Thure, Mikko Suominen
  • Publication number: 20150371039
    Abstract: A method of detecting suspicious code that has been injected into a process. The method includes identifying suspicious executable memory areas assigned to the process and, for each thread in the process, inspecting a stack associated with the thread to identify a potential return address; determining whether or not the potential return address is located within a suspicious memory area; and, if the potential return address is located within a suspicious memory area, determining whether or not the instruction at the address preceding the potential return address is a function call and, if yes, determining that the potential return address is a true return address and identifying the thread and associated code as suspicious.
    Type: Application
    Filed: January 28, 2014
    Publication date: December 24, 2015
    Inventor: Mikko SUOMINEN
  • Publication number: 20150058987
    Abstract: A method in a computer for detecting a file encryption attack. The computer detects an attempt to overwrite current file data of a file with new file data. The computer then compares the new file data to the current file data to obtain a measure of the difference between the current and the new file data, and if the difference exceeds a threshold, the computer considers this to identify a file encryption attack.
    Type: Application
    Filed: August 19, 2014
    Publication date: February 26, 2015
    Inventors: Marko THURE, Mikko SUOMINEN
  • Publication number: 20140289127
    Abstract: A method, apparatus, and computer program for improving security in connection with online transactions are provided. A security application configured to monitor received text messages of a short message service is executed in an apparatus. The security application is arranged to have prioritized access to process the received text messages before other applications executed in the apparatus, to identify from contents of a received text message whether or not the received text message includes a transaction authentication message and, upon detecting that the received text message includes the transaction authentication message, prevent the processing of the transaction authentication message by the other applications and carry out user interfacing related to the transaction authentication message within a secured environment provided by the security application.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 25, 2014
    Applicant: F-Secure Corporation
    Inventor: Mikko SUOMINEN