Patents by Inventor Pentti Valtteri Niemi
Pentti Valtteri Niemi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9706399Abstract: Systems and techniques for key management in mobile ad hoc networks are described. Pseudonyms are defined for group members of mobile ad hoc networks such that a pseudonym in a message can be deterministically identified with the sending device only by the sending device and the message recipient. Key management for a group is performed by a group manager, and key management may include key renewal and revocation. Key renewal is performed by a group manager, with the group manager using a set of couple pseudonyms, including a couple pseudonym between the manger and each group member. Key renewal employs a renewal key used to encrypt the updated group key, and the group manager updates the group key be transmitting a message to each group member in proximity, with the message being identified using the couple pseudonym of the manager and the group member.Type: GrantFiled: October 25, 2013Date of Patent: July 11, 2017Assignee: Nokia Technologies OyInventors: Kari J. Leppänen, Markku T. Turunen, Philip Ginzboorg, Pentti Valtteri Niemi, Hamza Harkous
-
Patent number: 9210578Abstract: Message authentication in an ad-hoc network. Upon creation of a message, a message authentication code is created using a key shared with members of a group comprising a subset of nodes of the ad-hoc network. The message authentication code may be created using a cryptographic process having the message and a message identifier as inputs. After or in parallel with broadcast of the message, a pointer to the message is broadcast. The message authentication code is publicly broadcast and those members of the group among which the key has been shared are able to authenticate the message as coming from a particular sender.Type: GrantFiled: July 12, 2012Date of Patent: December 8, 2015Assignee: Nokia Technologies OyInventors: Philip Ginzboorg, Kari J. Leppanen, Pentti Valtteri Niemi, Markku T. Turunen
-
Patent number: 9083535Abstract: A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided.Type: GrantFiled: November 5, 2010Date of Patent: July 14, 2015Assignee: Nokia CorporationInventors: Atefeh Mashatan, Imad Aad, Rafik Chaabouni, Pentti Valtteri Niemi, Serge Vaudenay
-
Publication number: 20140122882Abstract: Systems and techniques for key management in mobile ad hoc networks are described. Pseudonyms are defined for group members of mobile ad hoc networks such that a pseudonym in a message can be deterministically identified with the sending device only by the sending device and the message recipient. Key management for a group is performed by a group manager, and key management may include key renewal and revocation. Key renewal is performed by a group manager, with the group manager using a set of couple pseudonyms, including a couple pseudonym between the manger and each group member. Key renewal employs a renewal key used to encrypt the updated group key, and the group manager updates the group key be transmitting a message to each group member in proximity, with the message being identified using the couple pseudonym of the manager and the group member.Type: ApplicationFiled: October 25, 2013Publication date: May 1, 2014Applicant: Nokia CorporationInventors: Kari J. Leppänen, Markku T. Turunen, Philip Ginzboorg, Pentti Valtteri Niemi, Hamza Harkous
-
Patent number: 8667062Abstract: An approach is provided for preserving privacy for appointment scheduling. A scheduling platform receives a request to schedule an appointment among one or more users. The scheduling platform determines availability information for the one or more users from one or more respective devices, wherein the availability information is encrypted using homomorphic encryption. The scheduling platform then processes and/or facilitates a processing of the availability information using, at least in part, one or more homomorphic functions to determine one or more recommended time slots for the appointment.Type: GrantFiled: February 22, 2011Date of Patent: March 4, 2014Assignee: Nokia CorporationInventors: Imad Aad, Pentti Valtteri Niemi, Anthony Durussel, Emiliano De Cristofaro, Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux
-
Publication number: 20140019763Abstract: Message authentication in an ad-hoc network. Upon creation of a message, a message authentication code is created using a key shared with members of a group comprising a subset of nodes of the ad-hoc network. The message authentication code may be created using a cryptographic process having the message and a message identifier as inputs. After or in parallel with broadcast of the message, a pointer to the message is broadcast. The message authentication code is publicly broadcast and those members of the group among which the key has been shared are able to authenticate the message as coming from a particular sender.Type: ApplicationFiled: July 12, 2012Publication date: January 16, 2014Inventors: Philip GINZBOORG, Kari J. Leppanen, Pentti Valtteri Niemi, Markku T. Turunen
-
Publication number: 20130238897Abstract: A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided.Type: ApplicationFiled: November 5, 2010Publication date: September 12, 2013Inventors: Atefeh Mashatan, Imad Aad, Rafik Chaabouni, Pentti Valtteri Niemi, Serge Vaudenay
-
Publication number: 20130097091Abstract: An approach is provided for generating auditing specifications. The compliance platform processes and/or facilitates a processing of one or more data collection policies to determine one or more specifications that specify, at least in part, data to log for determining a compliance with the one or more data collection policies (e.g., based on minimizing an amount of the data to log). Then, the compliance platform causes, at least in part, an installation of the one or more specifications at one or more data stores operating under the one or more data collection policies to cause, at least in part, an initiation of a logging of the data.Type: ApplicationFiled: October 18, 2011Publication date: April 18, 2013Applicant: Nokia CorporationInventors: Debmalya BISWAS, Pentti Valtteri NIEMI
-
Patent number: 8331906Abstract: It is disclosed a method comprising receiving, prior to a handover operation, first key indication information, creating, prior to the handover operation, key information based on the received first key indication information, retaining the created key information, sending, after the handover operation, the received first key indication information associated with the key information created prior to the handover operation, and retrieving, after the handover operation, the retained key information based on the first key indication information; and a method comprising generating, prior to the handover operation, the first key indication information associated with key information intended to be created, sending, prior to the handover operation, the generated first key indication information, and receiving, after the handover operation, second key indication information corresponding to the generated first key indication information.Type: GrantFiled: December 8, 2008Date of Patent: December 11, 2012Assignee: Nokia CorporationInventors: Dan Lars Anders Forsberg, Pentti Valtteri Niemi
-
Publication number: 20120215845Abstract: An approach is provided for preserving privacy for appointment scheduling. A scheduling platform receives a request to schedule an appointment among one or more users. The scheduling platform determines availability information for the one or more users from one or more respective devices, wherein the availability information is encrypted using homomorphic encryption. The scheduling platform then processes and/or facilitates a processing of the availability information using, at least in part, one or more homomorphic functions to determine one or more recommended time slots for the appointment.Type: ApplicationFiled: February 22, 2011Publication date: August 23, 2012Applicant: Nokia CorporationInventors: Imad Aad, Pentti Valtteri Niemi, Anthony Durussel, Emiliano De Cristofaro, Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierrre Hubaux
-
Publication number: 20120172050Abstract: Techniques for determining context based on a spatial trail include determining data that indicates a first trail comprising a plurality of locations of finite spatial granularity at a corresponding plurality of times. The techniques also comprise determining data that indicates at least one criterion for belonging in a group. The criterion indicates a first spatial granularity for at least a first location at a corresponding first time in the first trail. The techniques further comprise determining whether a particular entity belongs in the group based, at least in part, on the criterion and a second trail for the particular entity. A trail for any entity comprises a plurality of locations of finite spatial granularity indicating actual locations of the entity at a corresponding plurality of times.Type: ApplicationFiled: December 29, 2010Publication date: July 5, 2012Applicant: Nokia CorporationInventors: Jonathan Ledlie, Leo Kärkkäinen, Pentti Valtteri Niemi
-
Publication number: 20110201337Abstract: It is disclosed a method comprising receiving, prior to a handover operation, first key indication information, creating, prior to the handover operation, key information based on the received first key indication information, retaining the created key information, sending, after the handover operation, the received first key indication information associated with the key information created prior to the handover operation, and retrieving, after the handover operation, the retained key information based on the first key indication information; and a method comprising generating, prior to the handover operation, the first key indication information associated with key information intended to be created, sending, prior to the handover operation, the generated first key indication information, and receiving, after the handover operation, second key indication information corresponding to the generated first key indication information.Type: ApplicationFiled: December 8, 2008Publication date: August 18, 2011Applicant: NOKIA CORPORATIONInventors: Dan Lars Anders Forsberg, Pentti Valtteri Niemi
-
Publication number: 20110116629Abstract: A method, apparatus and computer program product are provided to provide cryptographical key separation for handovers. A method is provided which includes calculating a key based at least in part upon a previously stored first intermediary value. The method also includes calculating a second intermediary value based at least in part upon the calculated key. The method additionally includes sending a path switch acknowledgement including the second intermediary value to a target access point. The method may further include receiving a path switch message including an indication of a cell identification and calculating the encryption key based upon the indication of the cell identification. The method may further include storing the second intermediary value. The calculation of the key may further comprise calculating the key following a radio link handover. Corresponding apparatuses and computer program products are also provided.Type: ApplicationFiled: March 30, 2009Publication date: May 19, 2011Applicant: NOKIA CORPORATIONInventors: Dan Lars Anders Forsberg, Pentti Valtteri Niemi, Marc Blommaert
-
Publication number: 20090016334Abstract: The present invention relates to a method, tunnel protocol layer, and network device for securing a data packet on a network link. A security layer is provided in the tunneling protocol layer of the wireless network, and a secured data packet is generated by adding to the data packet a header in accordance with said security layer of the tunneling protocol. The secured data packet is then transmitted over the link by using a link layer connection.Type: ApplicationFiled: July 9, 2007Publication date: January 15, 2009Applicant: Nokia CorporationInventors: Dan Lars Anders Forsberg, Seppo Ilmari Vesterinen, Pentti Valtteri Niemi, Sami Kekki