Patents by Inventor Sampo Juhani Sovio
Sampo Juhani Sovio has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190052465Abstract: An approach is provided for authenticating services at a device. An authentication request from a services platform is received at a device. Local credentials to authenticate access to a storage are retrieved. The access to the storage is authenticated based, at least in part, on the local credentials. If authenticated, it is determined that account information for the services platform is in the storage. The account information includes authentication credentials associated with the services platform, a security policy associated with the services platform, or a combination thereof. A response to the authentication request is generated based, at least in part, on the account information.Type: ApplicationFiled: October 15, 2018Publication date: February 14, 2019Inventors: Bror Lennart SVARFVAR, Terho Otso Tapio KAIKURANTA, Sampo Juhani SOVIO
-
Patent number: 9960918Abstract: An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.Type: GrantFiled: August 31, 2015Date of Patent: May 1, 2018Assignee: Nokia Technologies OyInventors: Vesa-Veikko Luukkala, Sampo Juhani Sovio, Jari-Jukka Harald Kaaja, Sergey Boldyrev
-
Patent number: 9621542Abstract: It is inter alia disclosed to provide first identity data stored in an apparatus, the first identity data comprising an identifier and a first certificate, and to provide second identity data stored in the apparatus, the second identity data comprising an identifier and a second certificate, wherein the identifier of the first identity data is the same as the identifier of the second identity data.Type: GrantFiled: April 5, 2012Date of Patent: April 11, 2017Assignee: Nokia Technologies OyInventors: Pekka Eerikki Leinonen, Rune Adolf Lindholm, Sampo Juhani Sovio
-
Patent number: 9246914Abstract: An approach is provided for providing biometric information processing using distributed computation. A biometric information processing infrastructure determines to receive an input including, at least in part, biometric information. The biometric information processing infrastructure selects one or more analyses for processing the input. The biometric information processing infrastructure also determines one or more processes associated with the one or more analyses. The biometric information processing infrastructure further determines to derive one or more computation closures from the one or more processes. The biometric information processing infrastructure determines to decompose the one or more computation closures for distribution in one or more computation spaces.Type: GrantFiled: May 16, 2011Date of Patent: January 26, 2016Assignee: Nokia Technologies OyInventors: Sergey Boldyrev, Ian Justin Oliver, Vesa-Veikko Luukkala, Sampo Juhani Sovio
-
Publication number: 20150372819Abstract: An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.Type: ApplicationFiled: August 31, 2015Publication date: December 24, 2015Inventors: Vesa-Veikko Luukkala, Sampo Juhani Sovio, Jari-Jukka Harald Kaaja, Sergey Boldyrev
-
Publication number: 20150312245Abstract: It is inter alia disclosed to provide first identity data stored in an apparatus, the first identity data comprising an identifier and a first certificate, and to provide second identity data stored in the apparatus, the second identity data comprising an identifier and a second certificate, wherein the identifier of the first identity data is the same as the identifier of the second identity data.Type: ApplicationFiled: April 5, 2012Publication date: October 29, 2015Applicant: Nokia CorporationInventors: Pekka Eerikki LEINONEN, Rune Adolf LINDHOLM, Sampo Juhani SOVIO
-
Patent number: 9166953Abstract: An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.Type: GrantFiled: October 31, 2011Date of Patent: October 20, 2015Assignee: Nokia Technologies OyInventors: Vesa-Veikko Luukkala, Sampo Juhani Sovio, Jari-Jukka Harald Kaaja, Sergey Boldyrev
-
Patent number: 9124556Abstract: An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.Type: GrantFiled: October 31, 2011Date of Patent: September 1, 2015Assignee: Nokia Technologies OyInventors: Vesa-Veikko Luukkala, Sampo Juhani Sovio, Jari-Jukka Harald Kaaja, Sergey Boldyrev
-
Publication number: 20150237021Abstract: An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria.Type: ApplicationFiled: May 1, 2015Publication date: August 20, 2015Inventors: Sampo Juhani SOVIO, Vesa-Veikko LUUKKALA
-
Patent number: 9025767Abstract: An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria.Type: GrantFiled: March 24, 2010Date of Patent: May 5, 2015Assignee: Nokia CorporationInventors: Sampo Juhani Sovio, Vesa-Veikko Luukkala
-
Patent number: 8810368Abstract: An approach is provided for performing biometric authentication. A determination is made of biometric data from a user equipment having an associated user. Decomposition of the biometric data is caused into one or more closure primitives that represent computation closures of one or more processes of the user equipment. The user is selectively authenticated based on the decomposition of the biometric data.Type: GrantFiled: March 29, 2011Date of Patent: August 19, 2014Assignee: Nokia CorporationInventors: Sampo Juhani Sovio, Vesa-Veikko Luukkala, Sergey Boldyrev
-
Patent number: 8745121Abstract: An approach is provided for construction and aggregation of distributed computations. A distributed computation construction infrastructure identifies an execution context bound to a user context at a device, the execution context corresponding to one or more processes executing at the device. The distributed computation construction infrastructure further causes, at least in part, decomposition of the execution context into one or more closure primitives and respective process states, wherein the one or more closure primitives represent computation closures of the one or more processes. The distributed computation construction infrastructure also causes, at least in part, serialization of the one or more closure primitives, the process states, or a combination thereof.Type: GrantFiled: June 28, 2010Date of Patent: June 3, 2014Assignee: Nokia CorporationInventors: Sergey Boldyrev, Jukka Honkola, Sampo Juhani Sovio, Hannu Laine, Ian Justin Oliver, Ronald Stephen Brown, Mika Juhani Mannermaa, Vesa-Veikko Luukkala, Samuli Silanto
-
Publication number: 20130108040Abstract: An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.Type: ApplicationFiled: October 31, 2011Publication date: May 2, 2013Applicant: Nokia CorporationInventors: Vesa-Veikko Luukkala, Sampo Juhani Sovio, Jari-Jukka Harald Kaaja, Sergey Boldyrev
-
Patent number: 8332624Abstract: An approach is provided for reducing decision diagram related communication traffic and cost by encoding decision diagrams. A hash identifier application constructs a reduced ordered binary decision diagram from a resource description framework graph, computes a hash identifier corresponding to the decision diagram, and stores the hash identifier with the decision diagram.Type: GrantFiled: August 26, 2009Date of Patent: December 11, 2012Assignee: Nokia CorporationInventors: Sampo Juhani Sovio, Vesa-Veikko Luukkala
-
Publication number: 20120278634Abstract: An approach is provided for providing secure access to execution context. An execution security platform determines an execution context of a device, the execution context including at least in part one or more computation closures. The execution security platform also processes and/or facilitates a processing of the execution context, the one or more computation closures, or a combination thereof to cause, at least in part, decomposition of the execution context, the one or more computation closures, or a combination thereof into, at least in part, one or more context criteria and content information, The execution security platform further determines to encrypt the execution context, the one or more computation closures, the content information, or a combination thereof using the one or more context criteria as a public key of an identity-based encryption.Type: ApplicationFiled: June 9, 2011Publication date: November 1, 2012Applicant: Nokia CorporationInventors: Vesa-Veikko Luukkala, Sampo Juhani Sovio, Sergey Boldyrev
-
Publication number: 20120249298Abstract: An approach is provided for performing biometric authentication. A determination is made of biometric data from a user equipment having an associated user. Decomposition of the biometric data is caused into one or more closure primitives that represent computation closures of one or more processes of the user equipment. The user is selectively authenticated based on the decomposition of the biometric data.Type: ApplicationFiled: March 29, 2011Publication date: October 4, 2012Applicant: Nokia CorporationInventors: Sampo Juhani Sovio, Vesa-Veikko Luukkala, Sergey Boldyrev
-
Patent number: 8266551Abstract: An approach is provided for binding user interface elements and granular reflective processing. An information management infrastructure determines to detect an event, from a first device, for specifying one or more user interface elements for transfer to a second device. The information management infrastructure further identifies one or more processes bound to the user interface elements. The information management infrastructure also determines at least one of a user context, an execution context within the user context, and one or more other execution contexts for the processes, wherein the one or more other execution contexts are from at least one of the user context and one or more other user contexts. The information management infrastructure further causes, at least in part, serialization of at least one of the user context, the execution context, and the one or more other execution contexts.Type: GrantFiled: June 10, 2010Date of Patent: September 11, 2012Assignee: Nokia CorporationInventors: Sergey Boldyrev, Jukka Honkola, Mika Juhani Mannermaa, Hannu Laine, Ian Justin Oliver, Vesa-Veikko Luukkala, Sampo Juhani Sovio
-
Publication number: 20120016662Abstract: An approach is provided for providing biometric information processing using distributed computation. A biometric information processing infrastructure determines to receive an input including, at least in part, biometric information. The biometric information processing infrastructure selects one or more analyses for processing the input. The biometric information processing infrastructure also determines one or more processes associated with the one or more analyses. The biometric information processing infrastructure further determines to derive one or more computation closures from the one or more processes. The biometric information processing infrastructure determines to decompose the one or more computation closures for distribution in one or more computation spaces.Type: ApplicationFiled: May 16, 2011Publication date: January 19, 2012Applicant: Nokia CorporationInventors: Sergey Boldyrev, Ian Justin Oliver, Vesa-Veikko Luukkala, Sampo Juhani Sovio
-
Publication number: 20110320516Abstract: An approach is provided for construction and aggregation of distributed computations. A distributed computation construction infrastructure identifies an execution context bound to a user context at a device, the execution context corresponding to one or more processes executing at the device. The distributed computation construction infrastructure further causes, at least in part, decomposition of the execution context into one or more closure primitives and respective process states, wherein the one or more closure primitives represent computation closures of the one or more processes. The distributed computation construction infrastructure also causes, at least in part, serialization of the one or more closure primitives, the process states, or a combination thereof.Type: ApplicationFiled: June 28, 2010Publication date: December 29, 2011Applicant: Nokia CorporationInventors: Sergey Boldyrev, Jukka Honkola, Sampo Juhani Sovio, Hannu Laine, Ian Justin Oliver, Ronald Stephen Brown, Mika Juhani Mannermaa, Vesa-Veikko Luukkala, Samuli Silanto
-
Publication number: 20110307841Abstract: An approach is provided for binding user interface elements and granular reflective processing. An information management infrastructure determines to detect an event, from a first device, for specifying one or more user interface elements for transfer to a second device. The information management infrastructure further identifies one or more processes bound to the user interface elements. The information management infrastructure also determines at least one of a user context, an execution context within the user context, and one or more other execution contexts for the processes, wherein the one or more other execution contexts are from at least one of the user context and one or more other user contexts. The information management infrastructure further causes, at least in part, serialization of at least one of the user context, the execution context, and the one or more other execution contexts.Type: ApplicationFiled: June 10, 2010Publication date: December 15, 2011Applicant: Nokia CorporationInventors: Sergey Boldyrev, Jukka Honkola, Mika Juhani Mannermaa, Hannu Laine, Ian Justin Oliver, Vesa-Veikko Luukkala, Sampo Juhani Sovio