Patents by Inventor Pirkka Palomaki

Pirkka Palomaki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10347097
    Abstract: A plug for detecting tampering of a container is configured to close an opening of the container. The plug includes an attachment device for attaching the plug to the opening of the container, a motion sensor for sensing rotation of the plug with respect to the container, a communication device for communicating with a server, a microcontroller unit and a memory unit. The microcontroller unit is configured to compare a sensed rotation of the plug to a service schedule stored in the memory and detect the tampering of the container based on the comparison.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: July 9, 2019
    Assignee: ENEVO OY
    Inventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
  • Publication number: 20190066465
    Abstract: A plug for detecting tampering of a container is configured to close an opening of the container. The plug includes an attachment device for attaching the plug to the opening of the container, a motion sensor for sensing rotation of the plug with respect to the container, a communication device for communicating with a server, a microcontroller unit and a memory unit. The microcontroller unit is configured to compare a sensed rotation of the plug to a service schedule stored in the memory and detect the tampering of the container based on the comparison.
    Type: Application
    Filed: October 31, 2018
    Publication date: February 28, 2019
    Inventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
  • Patent number: 10147285
    Abstract: A plug for detecting tampering of a container the plug being used to close an opening in a lid of the container. The plug includes an attachment for attaching the plug to the opening in the lid of the container by rotating the plug with respect to the container, a motion sensor for sensing rotation of the plug with respect to the container and a communication device for communicating with a server.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: December 4, 2018
    Assignee: ENEVO OY
    Inventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
  • Publication number: 20180047262
    Abstract: A plug for detecting tampering of a container is configured to close an opening of the container. The plug includes an attachment means for attaching the plug to the opening of the container by rotating the plug with respect to the container, a motion sensor for sensing rotation of the plug with respect to the container and communication means for communicating with a server.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Inventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
  • Patent number: 9730178
    Abstract: Disclosed is a method for identifying location of a first container within a group of containers. Each container has an identification code and includes a sensor unit. The sensor unit includes communication means and a movement detector. The method includes at least a first sensor unit of the first container transmitting a first message including a first identification code of the first container, and at least one communication module receiving the first message. The at least one communication module analyzes the received first message, compares the received first identification code to a list of stored identification codes, updates the list of stored identification codes by addition of the first identification code when the first identification code is absent from the list, and transmits a second message to a server, the second message including the first identification code for the server to update the location of the first container.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: August 8, 2017
    Assignee: Enevo Oy
    Inventors: Mikko Syrjälahti, Pirkka Palomaki, Fredrik Kekäläinen
  • Patent number: 9602499
    Abstract: A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an authentication request. The authentication request includes a first certificate that has previously been presented to the second node by a node purporting to be the first node. The authentication node retrieves a second certificate belonging to the first node from the first node, and compares the first certificate with the second certificate. If the certificates match, then the first node's identity can be authenticated but if the certificates do not match, then the first node's identity cannot be authenticated. The results of the comparison are then sent to the second node.
    Type: Grant
    Filed: April 23, 2014
    Date of Patent: March 21, 2017
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemela, Pirkka Palomaki
  • Patent number: 9424433
    Abstract: A method of data storage management. A server receives a data upload request from a remote client, the upload request including information identifying the data to be uploaded. The server determines that a duplicate of the data is stored at a data storage device. The server receives proof of possession information derived by the client from the data using additional information known to the server. On the basis of the received information, the server determines whether to allow the client or a user associated with the client to subsequently access the duplicate data stored at the data storage device.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: August 23, 2016
    Assignee: Synchronoss Technologies, Inc.
    Inventors: Jussi Kuosa, Hannu Valtonen, Hannu Maaranen, Janne Pänkälä, Kuan Eeik Tan, Jarkko Konola, Sami Tikka, Jari Sukanen, Pirkka Palomäki, James Cooper
  • Patent number: 8981902
    Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: March 17, 2015
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemelä, Veli-Jussi Kesti, Pirkka Palomäki
  • Patent number: 8918888
    Abstract: A method for implementing a security agent on behalf of a device, the method comprising: obtaining a list of applications installed on the device from a remote repository; for each respective application on the list, comparing reputation attributes obtained from a reputation database against attributes of the application installed on the device; and for any of the respective applications for which it is determined from the comparing that the application installed on the device is malicious, taking action to limit malicious activity by the respective application installed on the device.
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: December 23, 2014
    Assignee: F-Secure Corporation
    Inventor: Pirkka Palomaki
  • Publication number: 20140208425
    Abstract: A method for implementing a security agent on behalf of a device, the method comprising: obtaining a list of applications installed on the device from a remote repository; for each respective application on the list, comparing reputation attributes obtained from a reputation database against attributes of the application installed on the device; and for any of the respective applications for which it is determined from the comparing that the application installed on the device is malicious, taking action to limit malicious activity by the respective application installed on the device.
    Type: Application
    Filed: January 16, 2014
    Publication date: July 24, 2014
    Applicant: F-Secure Corporation
    Inventor: Pirkka Palomaki
  • Patent number: 8726377
    Abstract: A method for determining whether an electronic file stored at a client device is infected with malware. A server receives from the client device a request message that includes signature information of the electronic file. The server queries a database of signature information. If the signature information corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information does not correspond to signature information stored on the database, a determination is made as to whether a number of further request messages for the electronic file are received from additional client devices within a time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.
    Type: Grant
    Filed: April 8, 2010
    Date of Patent: May 13, 2014
    Assignee: E-Secure Corporation
    Inventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
  • Patent number: 8590045
    Abstract: A method of detecting malware on a computer system. The method comprises monitoring the behavior of trusted applications running on the computer system and, in the event that unexpected behavior of an application is detected, identifying a file or files responsible for the unexpected behavior and tagging the file(s) as malicious or suspicious. The unexpected behavior of the application may comprise, for example, dropping executable files, performing modifications to a registry branch which is not a registry branch of the application, reading a file type class which is not a file type class of the application, writing portable executable (PE) files, and crashing and re-starting of the application.
    Type: Grant
    Filed: October 7, 2009
    Date of Patent: November 19, 2013
    Assignee: F-Secure OYJ
    Inventors: Jarno Niemelä, Pirkka Palomäki
  • Publication number: 20130212269
    Abstract: A method of data storage management. A server receives a data upload request from a remote client, the upload request including information identifying the data to be uploaded. The server determines that a duplicate of the data is stored at a data storage device. The server receives proof of possession information derived by the client from the data using additional information known to the server. On the basis of the received information, the server determines whether to allow the client or a user associated with the client to subsequently access the duplicate data stored at the data storage device.
    Type: Application
    Filed: February 13, 2012
    Publication date: August 15, 2013
    Inventors: Jussi KUOSA, Hannu VALTONEN, Hannu MAARANEN, Janne PÄNKÄLÄ, Kuan Eeik TAN, Jarkko KONOLA, Sami TIKKA, Jari SUKANEN, Pirkka PALOMÄKI, James COOPER
  • Publication number: 20120117648
    Abstract: A method and apparatus for a determining whether an electronic file stored at a client device is malware. A server receives from the client device a request message that signature information of the electronic file. The server queries a database of signature information of a multiplicity of electronic files. If the signature information of the electronic file corresponds to signature information stored on the database, a determination is made as to whether the electronic file is malware. If the signature information of the electronic file does not correspond to signature information stored on the database, a determination is made as to whether a predetermined number of further request messages for the electronic file are received from further client devices within a predetermined time period. If fewer request messages are received within the time period, it is likely that the electronic file is malware.
    Type: Application
    Filed: April 8, 2010
    Publication date: May 10, 2012
    Applicant: F-SECURE CORPORATION
    Inventors: Jussi Kallio, Pirkka Palomäki, Jarno Niemelä, Veli-Jussi Kesti, Ero Carrera
  • Publication number: 20110084803
    Abstract: A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.
    Type: Application
    Filed: October 13, 2009
    Publication date: April 14, 2011
    Inventors: Jarno Niemela, Veli-Jussi Kesti, Pirkka Palomaki
  • Publication number: 20110083186
    Abstract: A method of detecting malware on a computer system. The method comprises monitoring the behaviour of trusted applications running on the computer system and, in the event that unexpected behaviour of an application is detected, identifying a file or files responsible for the unexpected behaviour and tagging the file(s) as malicious or suspicious. The unexpected behaviour of the application may comprise, for example, dropping executable files, performing modifications to a registry branch which is not a registry branch of the application, reading a file type class which is not a file type class of the application, writing portable executable (PE) files, and crashing and re-starting of the application.
    Type: Application
    Filed: October 7, 2009
    Publication date: April 7, 2011
    Inventors: Jarno Niemela, Pirkka Palomaki