Patents by Inventor Tatu J Ylonen

Tatu J Ylonen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10091239
    Abstract: SSH sessions and other protocol sessions (e.g., RDP) may be audited using an interceptor embedded within an SSH server or other protocol server. Operations performed over an SSH connection may be controlled, including controlling what files are transferred.
    Type: Grant
    Filed: January 24, 2013
    Date of Patent: October 2, 2018
    Assignee: SSH COMMUNICATIONS SECURITY OYJ
    Inventors: Tatu J. Ylonen, Samuel Douglas Lavitt
  • Publication number: 20180262515
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: May 11, 2018
    Publication date: September 13, 2018
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20180255043
    Abstract: The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is maintained in a user information directory. The apparatus comprises at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to manage information of configurations for attribute based filtering of access requests by the directory users for a plurality of hosts and separately from the user information directory.
    Type: Application
    Filed: March 6, 2017
    Publication date: September 6, 2018
    Inventors: Marko Teiste, Tero Mononen, Tommi Linnakangas, Jussi Pakkanen, Tatu J. Ylönen, Kalle Jääskeläinen, Markku Rossi
  • Patent number: 10009354
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: June 26, 2018
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 10003458
    Abstract: Management of user keys for public key authentication using the SSH in large SSH deployments is automated by deploying a management system in the environment, discovering SSH identity keys and authorized keys, analyzing authorized connections between user accounts, and automatically managing the authorized connections and the key pairs used for authentication.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: June 19, 2018
    Assignee: SSH COMMUNICATIONS SECURITY CORP.
    Inventor: Tatu J. Ylonen
  • Patent number: 9998497
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: June 12, 2018
    Assignee: SSH Communications Security OYJ
    Inventor: Tatu J. Ylonen
  • Publication number: 20170366581
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: August 10, 2017
    Publication date: December 21, 2017
    Inventor: Tatu J. Ylonen
  • Publication number: 20170366580
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSII user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: August 10, 2017
    Publication date: December 21, 2017
    Inventor: Tatu J. Ylonen
  • Patent number: 9832177
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: November 28, 2017
    Assignee: SSH Communication Security OYJ
    Inventor: Tatu J. Ylonen
  • Publication number: 20170279806
    Abstract: An authentication arrangement comprises a first security protocol server configured to manage authenticators for log in to a first set of hosts managed by the first security protocol server and a second security protocol server. The hosts are adapted to accept access requests based on information on authenticators. The first security protocol server is configured to transfer authenticators used to log in to the first set of hosts to the second security protocol server. The hosts in the first set of hosts then use information stored on the second security protocol server for accepting access requests.
    Type: Application
    Filed: March 14, 2017
    Publication date: September 28, 2017
    Inventors: Sami Marttinen, Josh Bregman, Wayne Delisser, Tatu J. Ylonen
  • Publication number: 20170222995
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: March 15, 2017
    Publication date: August 3, 2017
    Inventor: Tatu J. Ylonen
  • Publication number: 20170171175
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: February 24, 2017
    Publication date: June 15, 2017
    Inventor: Tatu J. Ylonen
  • Publication number: 20170163689
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: February 24, 2017
    Publication date: June 8, 2017
    Inventor: Tatu J. Ylonen
  • Publication number: 20170149794
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: February 3, 2017
    Publication date: May 25, 2017
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 9602478
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: March 21, 2017
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20170041349
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: October 18, 2016
    Publication date: February 9, 2017
    Inventor: Tatu J. Ylonen
  • Publication number: 20170019387
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: September 28, 2016
    Publication date: January 19, 2017
    Inventor: Tatu J. Ylonen
  • Publication number: 20170019386
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: September 27, 2016
    Publication date: January 19, 2017
    Inventor: Tatu J. Ylonen
  • Publication number: 20170012953
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSII key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Application
    Filed: August 29, 2016
    Publication date: January 12, 2017
    Inventor: Tatu J. Ylonen
  • Patent number: 9515999
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: December 6, 2016
    Assignee: SSH Communications Security OYJ
    Inventor: Tatu J. Ylonen