Patents by Inventor Pirkka Palomaki
Pirkka Palomaki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10347097Abstract: A plug for detecting tampering of a container is configured to close an opening of the container. The plug includes an attachment device for attaching the plug to the opening of the container, a motion sensor for sensing rotation of the plug with respect to the container, a communication device for communicating with a server, a microcontroller unit and a memory unit. The microcontroller unit is configured to compare a sensed rotation of the plug to a service schedule stored in the memory and detect the tampering of the container based on the comparison.Type: GrantFiled: October 31, 2018Date of Patent: July 9, 2019Assignee: ENEVO OYInventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
-
Publication number: 20190066465Abstract: A plug for detecting tampering of a container is configured to close an opening of the container. The plug includes an attachment device for attaching the plug to the opening of the container, a motion sensor for sensing rotation of the plug with respect to the container, a communication device for communicating with a server, a microcontroller unit and a memory unit. The microcontroller unit is configured to compare a sensed rotation of the plug to a service schedule stored in the memory and detect the tampering of the container based on the comparison.Type: ApplicationFiled: October 31, 2018Publication date: February 28, 2019Inventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
-
Patent number: 10147285Abstract: A plug for detecting tampering of a container the plug being used to close an opening in a lid of the container. The plug includes an attachment for attaching the plug to the opening in the lid of the container by rotating the plug with respect to the container, a motion sensor for sensing rotation of the plug with respect to the container and a communication device for communicating with a server.Type: GrantFiled: August 15, 2016Date of Patent: December 4, 2018Assignee: ENEVO OYInventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
-
Publication number: 20180047262Abstract: A plug for detecting tampering of a container is configured to close an opening of the container. The plug includes an attachment means for attaching the plug to the opening of the container by rotating the plug with respect to the container, a motion sensor for sensing rotation of the plug with respect to the container and communication means for communicating with a server.Type: ApplicationFiled: August 15, 2016Publication date: February 15, 2018Inventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
-
Patent number: 9730178Abstract: Disclosed is a method for identifying location of a first container within a group of containers. Each container has an identification code and includes a sensor unit. The sensor unit includes communication means and a movement detector. The method includes at least a first sensor unit of the first container transmitting a first message including a first identification code of the first container, and at least one communication module receiving the first message. The at least one communication module analyzes the received first message, compares the received first identification code to a list of stored identification codes, updates the list of stored identification codes by addition of the first identification code when the first identification code is absent from the list, and transmits a second message to a server, the second message including the first identification code for the server to update the location of the first container.Type: GrantFiled: August 15, 2016Date of Patent: August 8, 2017Assignee: Enevo OyInventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
-
Patent number: 9602499Abstract: A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an authentication request. The authentication request includes a first certificate that has previously been presented to the second node by a node purporting to be the first node. The authentication node retrieves a second certificate belonging to the first node from the first node, and compares the first certificate with the second certificate. If the certificates match, then the first node's identity can be authenticated but if the certificates do not match, then the first node's identity cannot be authenticated. The results of the comparison are then sent to the second node.Type: GrantFiled: April 23, 2014Date of Patent: March 21, 2017Assignee: F-Secure CorporationInventors: Jarno Niemela, Pirkka Palomaki
-
Patent number: 9424433Abstract: A method of data storage management. A server receives a data upload request from a remote client, the upload request including information identifying the data to be uploaded. The server determines that a duplicate of the data is stored at a data storage device. The server receives proof of possession information derived by the client from the data using additional information known to the server. On the basis of the received information, the server determines whether to allow the client or a user associated with the client to subsequently access the duplicate data stored at the data storage device.Type: GrantFiled: February 13, 2012Date of Patent: August 23, 2016Assignee: Synchronoss Technologies, Inc.Inventors: Jussi Kuosa, Hannu Valtonen, Hannu Maaranen, Janne Pänkälä, Kuan Eeik Tan, Jarkko Konola, Sami Tikka, Jari Sukanen, Pirkka Palomäki, James Cooper
-
Patent number: 8981902Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.Type: GrantFiled: October 13, 2009Date of Patent: March 17, 2015Assignee: F-Secure CorporationInventors: Jarno Niemelä, Veli-Jussi Kesti, Pirkka Palomäki
-
Patent number: 8918888Abstract: A method for implementing a security agent on behalf of a device, the method comprising: obtaining a list of applications installed on the device from a remote repository; for each respective application on the list, comparing reputation attributes obtained from a reputation database against attributes of the application installed on the device; and for any of the respective applications for which it is determined from the comparing that the application installed on the device is malicious, taking action to limit malicious activity by the respective application installed on the device.Type: GrantFiled: January 16, 2014Date of Patent: December 23, 2014Assignee: F-Secure CorporationInventor: Pirkka Palomaki
-
Publication number: 20140208425Abstract: A method for implementing a security agent on behalf of a device, the method comprising: obtaining a list of applications installed on the device from a remote repository; for each respective application on the list, comparing reputation attributes obtained from a reputation database against attributes of the application installed on the device; and for any of the respective applications for which it is determined from the comparing that the application installed on the device is malicious, taking action to limit malicious activity by the respective application installed on the device.Type: ApplicationFiled: January 16, 2014Publication date: July 24, 2014Applicant: F-Secure CorporationInventor: Pirkka Palomaki
-
Patent number: 8726377Abstract: A method for determining whether an electronic file stored at a client device is infected with malware. A server receives from the client device a request message that includes signature information of the electronic file. The server queries a database of signature information. If the signature information corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information does not correspond to signature information stored on the database, a determination is made as to whether a number of further request messages for the electronic file are received from additional client devices within a time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.Type: GrantFiled: April 8, 2010Date of Patent: May 13, 2014Assignee: E-Secure CorporationInventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
-
Patent number: 8590045Abstract: A method of detecting malware on a computer system. The method comprises monitoring the behavior of trusted applications running on the computer system and, in the event that unexpected behavior of an application is detected, identifying a file or files responsible for the unexpected behavior and tagging the file(s) as malicious or suspicious. The unexpected behavior of the application may comprise, for example, dropping executable files, performing modifications to a registry branch which is not a registry branch of the application, reading a file type class which is not a file type class of the application, writing portable executable (PE) files, and crashing and re-starting of the application.Type: GrantFiled: October 7, 2009Date of Patent: November 19, 2013Assignee: F-Secure OYJInventors: Jarno Niemelä, Pirkka Palomäki
-
Publication number: 20130212269Abstract: A method of data storage management. A server receives a data upload request from a remote client, the upload request including information identifying the data to be uploaded. The server determines that a duplicate of the data is stored at a data storage device. The server receives proof of possession information derived by the client from the data using additional information known to the server. On the basis of the received information, the server determines whether to allow the client or a user associated with the client to subsequently access the duplicate data stored at the data storage device.Type: ApplicationFiled: February 13, 2012Publication date: August 15, 2013Inventors: Jussi KUOSA, Hannu VALTONEN, Hannu MAARANEN, Janne PÄNKÄLÄ, Kuan Eeik TAN, Jarkko KONOLA, Sami TIKKA, Jari SUKANEN, Pirkka PALOMÄKI, James COOPER
-
Publication number: 20120117648Abstract: A method and apparatus for a determining whether an electronic file stored at a client device is malware. A server receives from the client device a request message that signature information of the electronic file. The server queries a database of signature information of a multiplicity of electronic files. If the signature information of the electronic file corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information of the electronic file does not correspond to signature information stored on the database, a determination is made as to whether a predetermined number of further request messages for the electronic file are received from further client devices within a predetermined time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.Type: ApplicationFiled: April 8, 2010Publication date: May 10, 2012Applicant: F-SECURE CORPORATIONInventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
-
Publication number: 20110084803Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.Type: ApplicationFiled: October 13, 2009Publication date: April 14, 2011Inventors: Jarno Niemela, Veli-Jussi Kesti, Pirkka Palomaki
-
Publication number: 20110083186Abstract: A method of detecting malware on a computer system. The method comprises monitoring the behaviour of trusted applications running on the computer system and, in the event that unexpected behaviour of an application is detected, identifying a file or files responsible for the unexpected behaviour and tagging the file(s) as malicious or suspicious. The unexpected behaviour of the application may comprise, for example, dropping executable files, performing modifications to a registry branch which is not a registry branch of the application, reading a file type class which is not a file type class of the application, writing portable executable (PE) files, and crashing and re-starting of the application.Type: ApplicationFiled: October 7, 2009Publication date: April 7, 2011Inventors: Jarno Niemela, Pirkka Palomaki