Patents by Inventor Patrik Lahti
Patrik Lahti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10225801Abstract: An electronic device has a communication subsystem with a power saving mode and an active mode. The communication subsystem is set to switch between the power saving mode and the active mode depending on thresholds of communication traffic. The settings for the thresholds depend on the activity detected on the electronic device.Type: GrantFiled: October 11, 2016Date of Patent: March 5, 2019Assignees: 2236008 Ontario Inc., BlackBerry LimitedInventors: Manpreet Kaur Gosal, Nils Patrik Lahti
-
Publication number: 20170099637Abstract: An electronic device has a communication subsystem with a power saving mode and an active mode. The communication subsystem is set to switch between the power saving mode and the active mode depending on thresholds of communication traffic. The settings for the thresholds depend on the activity detected on the electronic device.Type: ApplicationFiled: October 11, 2016Publication date: April 6, 2017Applicants: BlackBerry Limited, 2236008 Ontario Inc.Inventors: Manpreet Kaur GOSAL, Nils Patrik LAHTI
-
Patent number: 9521063Abstract: The present invention advantageously provides a method, system and apparatus for aggregating multiple site-specific routes, by determining a first aggregate-aware route that includes a prefix of a site-specific address and a prefix length of an aggregate route address of a first service provider. The method and system can be implemented as an enhancement to existing IP protocols such as BGP and other inter-domain routing protocols. The method and apparatus may further include applying a routing protocol policy in which an aggregate route may serve as a proxy for an aggregate-aware route when the address of the aggregate route matches the address of the aggregate-aware route. The method and system may yet further include determining a second aggregate-aware route that includes the prefix of the aggregate route address of the first service provider and a prefix length of a second aggregate route address of a second service provider.Type: GrantFiled: August 23, 2006Date of Patent: December 13, 2016Assignee: Avaya Inc.Inventors: Dwight Jameson, Michael Aalders, Patrik Lahti
-
Patent number: 9491704Abstract: An electronic device has a communication subsystem with a power saving mode and an active mode. The communication subsystem is set to switch between the power saving mode and the active mode depending on thresholds of communication traffic. The settings for the thresholds depend on the activity detected on the electronic device.Type: GrantFiled: March 23, 2012Date of Patent: November 8, 2016Assignees: BlackBerry Limited, 2236008 Ontario Inc.Inventors: Manpreet Kaur Gosal, Nils Patrik Lahti
-
Patent number: 9094830Abstract: Described are systems and methods for managing data transfer from a communication device to a communication network over a wireless connection comprising determining that a requesting process on the communication device is authorized to establish a protected connection to the communication network; and, configuring a network interface on the communication device to allow data packets to be transmitted from the requesting process to the communication network over the protected connection, wherein the network interface is associated with the protected connection.Type: GrantFiled: July 5, 2012Date of Patent: July 28, 2015Assignees: BLACKBERRY LIMITED, 2236008 ONTARIO INC.Inventors: Barry Fraser Yerxa, Nils Patrik Lahti, Jean Dolbec
-
Patent number: 9014174Abstract: In some implementations, a method for routing a communication includes receiving, from an application running on a user equipment (UE), a request to access a forwarding information base (FIB). The UE includes a plurality of FIBs and a plurality of communication interfaces. Each of the plurality of FIBs includes communication interface information. An assigned FIB from the plurality of FIBs is determined. The assigned FIB has been assigned to the application. An appropriate communication interface for communication is determined based on a destination of the communication and the communication interface information of the assigned FIB. The communication is transmitted to the destination using the communication interface.Type: GrantFiled: September 27, 2012Date of Patent: April 21, 2015Assignees: BlackBerry Limited, 2236008 Ontario Inc.Inventors: Kerry Gordon Peter Williams, Nils Patrik Lahti, Chi Chiu Tse
-
Publication number: 20150058989Abstract: A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries currently stored in the neighbor cache and then determining whether the number of entries exceeds a neighbor cache threshold that is less than a neighbor cache limit defining a maximum capacity of the neighbor cache. When the number of entries in the neighbor cache exceeds the neighbor cache threshold, stateless neighbor resolution is triggered. Stateless neighbor resolution entails sending a neighbor solicitation to resolve an address for an incoming packet without logging a corresponding entry in the neighbor cache. Additional techniques that complement the above method involve purging of neighbor cache entries designated as incomplete, prioritization of the entries based on trustworthiness, shortening the incomplete-status timer to less than 3 seconds, and curtailing the number of retransmissions of the neighbor solicitations.Type: ApplicationFiled: October 2, 2014Publication date: February 26, 2015Inventors: Patrik LAHTI, Michael AALDERS
-
Patent number: 8869278Abstract: A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries currently stored in the neighbor cache and then determining whether the number of entries exceeds a neighbor cache threshold that is less than a neighbor cache limit defining a maximum capacity of the neighbor cache. When the number of entries in the neighbor cache exceeds the neighbor cache threshold, stateless neighbor resolution is triggered. Stateless neighbor resolution entails sending a neighbor solicitation to resolve an address for an incoming packet without logging a corresponding entry in the neighbor cache. Additional techniques that complement the above method involve purging of neighbor cache entries designated as incomplete, prioritization of the entries based on trustworthiness, shortening the incomplete-status timer to less than 3 seconds, and curtailing the number of retransmissions of the neighbor solicitations.Type: GrantFiled: March 15, 2012Date of Patent: October 21, 2014Assignee: Bockstar Technologies LLCInventors: Patrik Lahti, Michael Aalders
-
Publication number: 20140280698Abstract: Systems, methods, and software can be used to process a link on a device. In some aspects, a link is received on a device. The link can be a link to content stored external to the device. The link can be selected by a user and associated with a first perimeter on the device.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicants: QNX SOFTWARE SYSTEMS LIMITED, RESEARCH IN MOTION LIMITEDInventors: Nils Patrik Lahti, Geordon Thomas Ferguson, George Ross Staikos, Khalid El Mously
-
Publication number: 20140013395Abstract: Described are systems and methods for managing data transfer from a communication device to a communication network over a wireless connection comprising determining that a requesting process on the communication device is authorized to establish a protected connection to the communication network; and, configuring a network interface on the communication device to allow data packets to be transmitted from the requesting process to the communication network over the protected connection, wherein the network interface is associated with the protected connection.Type: ApplicationFiled: July 5, 2012Publication date: January 9, 2014Applicants: QNX SOFTWARE SYSTEMS LIMITED, RESEARCH IN MOTION LIMITEDInventors: Barry Fraser YERXA, Nils Patrik LAHTI, Jean DOLBEC
-
Publication number: 20140003359Abstract: In some implementations, a method for routing a communication includes receiving, from an application running on a user equipment (UE), a request to access a forwarding information base (FIB). The UE includes a plurality of FIBs and a plurality of communication interfaces. Each of the plurality of FIBs includes communication interface information. An assigned FIB from the plurality of FIBs is determined. The assigned FIB has been assigned to the application. An appropriate communication interface for communication is determined based on a destination of the communication and the communication interface information of the assigned FIB. The communication is transmitted to the destination using the communication interface.Type: ApplicationFiled: September 27, 2012Publication date: January 2, 2014Applicants: QNX SOFTWARE SYSTEMS LIMITED, RESEARCH IN MOTION LIMITEDInventors: Kerry Gordon Peter Williams, Nils Patrik Lahti, Chi Chiu Tse
-
Publication number: 20130250825Abstract: An electronic device has a communication subsystem with a power saving mode and an active mode. The communication subsystem is set to switch between the power saving mode and the active mode depending on thresholds of communication traffic. The settings for the thresholds depend on the activity detected on the electronic device.Type: ApplicationFiled: March 23, 2012Publication date: September 26, 2013Applicants: QNX SOFTWARE SYSTEMS LIMITED, RESEARCH IN MOTION LIMITEDInventors: Manpreet Kaur Gosal, Nils Patrik Lahti
-
Publication number: 20120180130Abstract: A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries currently stored in the neighbor cache and then determining whether the number of entries exceeds a neighbor cache threshold that is less than a neighbor cache limit defining a maximum capacity of the neighbor cache. When the number of entries in the neighbor cache exceeds the neighbor cache threshold, stateless neighbor resolution is triggered. Stateless neighbor resolution entails sending a neighbor solicitation to resolve an address for an incoming packet without logging a corresponding entry in the neighbor cache. Additional techniques that complement the above method involve purging of neighbor cache entries designated as incomplete, prioritization of the entries based on trustworthiness, shortening the incomplete-status timer to less than 3 seconds, and curtailing the number of retransmissions of the neighbor solicitations.Type: ApplicationFiled: March 15, 2012Publication date: July 12, 2012Applicant: NORTEL NETWORKS LIMITEDInventors: Patrik LAHTI, Michael AALDERS
-
Patent number: 8161549Abstract: A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries currently stored in the neighbor cache and then determining whether the number of entries exceeds a neighbor cache threshold that is less than a neighbor cache limit defining a maximum capacity of the neighbor cache. When the number of entries in the neighbor cache exceeds the neighbor cache threshold, stateless neighbor resolution is triggered. Stateless neighbor resolution entails sending a neighbor solicitation to resolve an address for an incoming packet without logging a corresponding entry in the neighbor cache. Additional techniques that complement the above method involve purging of neighbor cache entries designated as incomplete, prioritization of the entries based on trustworthiness, shortening the incomplete-status timer to less than 3 seconds, and curtailing the number of retransmissions of the neighbor solicitations.Type: GrantFiled: November 17, 2005Date of Patent: April 17, 2012Inventors: Patrik Lahti, Michael Aalders
-
Publication number: 20080049717Abstract: The present invention advantageously provides a method, system and apparatus for aggregating multiple site-specific routes, by determining a first aggregate-aware route that includes a prefix of a site-specific address and a prefix length of an aggregate route address of a first service provider. The method and system can be implemented as an enhancement to existing IP protocols such as BGP and other inter-domain routing protocols. The method and apparatus may further include applying a routing protocol policy in which an aggregate route may serve as a proxy for an aggregate-aware route when the address of the aggregate route matches the address of the aggregate-aware route. The method and system may yet further include determining a second aggregate-aware route that includes the prefix of the aggregate route address of the first service provider and a prefix length of a second aggregate route address of a second service provider.Type: ApplicationFiled: August 23, 2006Publication date: February 28, 2008Inventors: Dwight Jamieson, Michael Aalders, Patrik Lahti
-
Publication number: 20070130427Abstract: A method of defending against a denial-of-service (DoS) attack on an IPv6 neighbor cache includes steps of determining a number of neighbor cache entries currently stored in the neighbor cache and then determining whether the number of entries exceeds a neighbor cache threshold that is less than a neighbor cache limit defining a maximum capacity of the neighbor cache. When the number of entries in the neighbor cache exceeds the neighbor cache threshold, stateless neighbor resolution is triggered. Stateless neighbor resolution entails sending a neighbor solicitation to resolve an address for an incoming packet without logging a corresponding entry in the neighbor cache. Additional techniques that complement the above method involve purging of neighbor cache entries designated as incomplete, prioritization of the entries based on trustworthiness, shortening the incomplete-status timer to less than 3 seconds, and curtailing the number of retransmissions of the neighbor solicitations.Type: ApplicationFiled: November 17, 2005Publication date: June 7, 2007Applicant: Nortel Networks LimitedInventors: Patrik Lahti, Michael Aalders