Patents by Inventor Tommi Linnakangas

Tommi Linnakangas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11277414
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: March 3, 2020
    Date of Patent: March 15, 2022
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 10880295
    Abstract: The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is maintained in a user information directory. The apparatus comprises at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to manage information of configurations for attribute based filtering of access requests by the directory users for a plurality of hosts and separately from the user information directory.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: December 29, 2020
    Assignee: SSH Communications Security OYJ
    Inventors: Marko Teiste, Tero Mononen, Tommi Linnakangas, Jussi Pakkanen, Tatu J. Ylönen, Kalle Jääskeläinen, Markku Rossi
  • Patent number: 10880314
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: December 29, 2020
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20200204564
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: March 3, 2020
    Publication date: June 25, 2020
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 10616237
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: April 7, 2020
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20190281067
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: May 29, 2019
    Publication date: September 12, 2019
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20180262515
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: May 11, 2018
    Publication date: September 13, 2018
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20180255043
    Abstract: The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is maintained in a user information directory. The apparatus comprises at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to manage information of configurations for attribute based filtering of access requests by the directory users for a plurality of hosts and separately from the user information directory.
    Type: Application
    Filed: March 6, 2017
    Publication date: September 6, 2018
    Inventors: Marko Teiste, Tero Mononen, Tommi Linnakangas, Jussi Pakkanen, Tatu J. Ylönen, Kalle Jääskeläinen, Markku Rossi
  • Patent number: 10009354
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: June 26, 2018
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20170149794
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: February 3, 2017
    Publication date: May 25, 2017
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 9602478
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: March 21, 2017
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 9531536
    Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.
    Type: Grant
    Filed: March 4, 2015
    Date of Patent: December 27, 2016
    Assignee: SSH COMMUNICATIONS OYJ
    Inventors: Roman Hernandez, Marko Teiste, Antti Huima, Tommi Linnakangas
  • Publication number: 20160261407
    Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.
    Type: Application
    Filed: March 4, 2015
    Publication date: September 8, 2016
    Inventors: Roman HERNANDEZ, Marko TEISTE, Antti HUIMA, Tommi LINNAKANGAS
  • Publication number: 20160226841
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: March 17, 2016
    Publication date: August 4, 2016
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 9319396
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: July 7, 2014
    Date of Patent: April 19, 2016
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20150013000
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Application
    Filed: July 7, 2014
    Publication date: January 8, 2015
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Publication number: 20050102514
    Abstract: The present invention provides a method, apparatus and system for pre-establishing a secure communication channel by detecting one or more trigger events (302), determining whether the secure communication channel will be needed in the future (304) and establishing the secure communication channel before the secure communication channel is needed (308-316). The secure communication channel is established by sending a SA Query (308) and determining whether the SA Query matches one or more security policies (310). If the SA Query matches the one or more security policies, the present invention determines whether the SA Query matches a SA (314). If the SA Query does not match the SA, a SA is negotiated (318) and a SA Query successful message is returned (316). This method can be implemented as a computer program embodied on a computer readable medium wherein each step is executed by one or more code segments.
    Type: Application
    Filed: November 10, 2003
    Publication date: May 12, 2005
    Applicant: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Thomas Bergenwall, Tapio Vuorinen, Tommi Linnakangas
  • Patent number: 6724752
    Abstract: A telecommunications system comprises a signalling network and a Voice over IP (VoIP) network. The signalling network in turn comprises gateway signalling points 6,7 for converting signalling messages between at least two different signalling protocols. The IP network comprises IP nodes 4 for routing IP datagrams, with at least certain of the IP nodes 4 being co-located with respective gateway signalling points 6,7, and with the co-located signalling points 6,7 being arranged in use to pass routing information to the respective IP nodes 4 to enable those nodes to prioritise and route incoming IP datagrams.
    Type: Grant
    Filed: July 6, 2000
    Date of Patent: April 20, 2004
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Esa Turtiainen, Tommi Linnakangas, Harri Toivanen
  • Publication number: 20020059516
    Abstract: A method of sending streamed data over an IP network from a first node 1 to a second node 4, the method comprising using Internet Key Exchange (IKE) to establish an IKE security association (SA) between the first and second nodes 1,4. A shared secret is established between the first and second nodes using the IKE SA, and the streamed data encrypted at the first node 1 with a cipher using the shared secret or a key derived using the shared secret. IP datagrams are constructed containing in their payload, segments of the encrypted streamed data, the datagrams not including an IPSec header or headers. The IP datagrams are then sent from the first node 1 to the second node 4.
    Type: Application
    Filed: November 15, 2001
    Publication date: May 16, 2002
    Inventors: Esa Turtiainen, Tommi Linnakangas, Juha-Petri Karna, Goran Schultz, Seppo Lindborg
  • Publication number: 20010047487
    Abstract: A network device for implementing IPSec and comprising at least one IP forwarder (IPFW) arranged to receive IP packets each of which is associated with a Security Association (SA). The IP forwarder(s) determines the destinations of the packets, and forwards the packets to their destinations. A plurality of security procedure modules (SecProcs) are coupled to the IP forwarder(s) and are arranged to implement security procedures for received IP packets in parallel. A security controller (SC) is arranged to allocate negotiated SAs amongst the security procedure modules and to notify the security procedure modules and the IP forwarder(s) of the allocation, whereby the IP forwarder(s) can send IP packets to the security procedure module implementing the associated SA.
    Type: Application
    Filed: May 24, 2001
    Publication date: November 29, 2001
    Inventors: Tommi Linnakangas, Esa Turtiainen, Juha-Petri Karna, Goran Schultz, Seppo Lindborg