Patents by Inventor Tommi Linnakangas
Tommi Linnakangas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11277414Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: March 3, 2020Date of Patent: March 15, 2022Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10880295Abstract: The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is maintained in a user information directory. The apparatus comprises at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to manage information of configurations for attribute based filtering of access requests by the directory users for a plurality of hosts and separately from the user information directory.Type: GrantFiled: March 6, 2017Date of Patent: December 29, 2020Assignee: SSH Communications Security OYJInventors: Marko Teiste, Tero Mononen, Tommi Linnakangas, Jussi Pakkanen, Tatu J. Ylönen, Kalle Jääskeläinen, Markku Rossi
-
Patent number: 10880314Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: May 29, 2019Date of Patent: December 29, 2020Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20200204564Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: March 3, 2020Publication date: June 25, 2020Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 10616237Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: May 11, 2018Date of Patent: April 7, 2020Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20190281067Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: May 29, 2019Publication date: September 12, 2019Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20180262515Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: May 11, 2018Publication date: September 13, 2018Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20180255043Abstract: The disclosure relates to apparatuses and methods for a computer network comprising hosts accessible by directory users whose user identity information is maintained in a user information directory. The apparatus comprises at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to manage information of configurations for attribute based filtering of access requests by the directory users for a plurality of hosts and separately from the user information directory.Type: ApplicationFiled: March 6, 2017Publication date: September 6, 2018Inventors: Marko Teiste, Tero Mononen, Tommi Linnakangas, Jussi Pakkanen, Tatu J. Ylönen, Kalle Jääskeläinen, Markku Rossi
-
Patent number: 10009354Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: February 3, 2017Date of Patent: June 26, 2018Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20170149794Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: February 3, 2017Publication date: May 25, 2017Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9602478Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: March 17, 2016Date of Patent: March 21, 2017Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9531536Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.Type: GrantFiled: March 4, 2015Date of Patent: December 27, 2016Assignee: SSH COMMUNICATIONS OYJInventors: Roman Hernandez, Marko Teiste, Antti Huima, Tommi Linnakangas
-
Publication number: 20160261407Abstract: Methods and apparatuses for managing keys in a computerized system are disclosed. A key is determined as a shared key, a key being a shared key when information of the key can be shared by a plurality of entities or would be shared by a plurality of entities as a result of a requested key management operation. A shared key operation is then performed based on the determining.Type: ApplicationFiled: March 4, 2015Publication date: September 8, 2016Inventors: Roman HERNANDEZ, Marko TEISTE, Antti HUIMA, Tommi LINNAKANGAS
-
Publication number: 20160226841Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: March 17, 2016Publication date: August 4, 2016Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Patent number: 9319396Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: GrantFiled: July 7, 2014Date of Patent: April 19, 2016Assignee: SSH Communications Security OYJInventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20150013000Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.Type: ApplicationFiled: July 7, 2014Publication date: January 8, 2015Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
-
Publication number: 20050102514Abstract: The present invention provides a method, apparatus and system for pre-establishing a secure communication channel by detecting one or more trigger events (302), determining whether the secure communication channel will be needed in the future (304) and establishing the secure communication channel before the secure communication channel is needed (308-316). The secure communication channel is established by sending a SA Query (308) and determining whether the SA Query matches one or more security policies (310). If the SA Query matches the one or more security policies, the present invention determines whether the SA Query matches a SA (314). If the SA Query does not match the SA, a SA is negotiated (318) and a SA Query successful message is returned (316). This method can be implemented as a computer program embodied on a computer readable medium wherein each step is executed by one or more code segments.Type: ApplicationFiled: November 10, 2003Publication date: May 12, 2005Applicant: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Thomas Bergenwall, Tapio Vuorinen, Tommi Linnakangas
-
Patent number: 6724752Abstract: A telecommunications system comprises a signalling network and a Voice over IP (VoIP) network. The signalling network in turn comprises gateway signalling points 6,7 for converting signalling messages between at least two different signalling protocols. The IP network comprises IP nodes 4 for routing IP datagrams, with at least certain of the IP nodes 4 being co-located with respective gateway signalling points 6,7, and with the co-located signalling points 6,7 being arranged in use to pass routing information to the respective IP nodes 4 to enable those nodes to prioritise and route incoming IP datagrams.Type: GrantFiled: July 6, 2000Date of Patent: April 20, 2004Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Esa Turtiainen, Tommi Linnakangas, Harri Toivanen
-
Publication number: 20020059516Abstract: A method of sending streamed data over an IP network from a first node 1 to a second node 4, the method comprising using Internet Key Exchange (IKE) to establish an IKE security association (SA) between the first and second nodes 1,4. A shared secret is established between the first and second nodes using the IKE SA, and the streamed data encrypted at the first node 1 with a cipher using the shared secret or a key derived using the shared secret. IP datagrams are constructed containing in their payload, segments of the encrypted streamed data, the datagrams not including an IPSec header or headers. The IP datagrams are then sent from the first node 1 to the second node 4.Type: ApplicationFiled: November 15, 2001Publication date: May 16, 2002Inventors: Esa Turtiainen, Tommi Linnakangas, Juha-Petri Karna, Goran Schultz, Seppo Lindborg
-
Publication number: 20010047487Abstract: A network device for implementing IPSec and comprising at least one IP forwarder (IPFW) arranged to receive IP packets each of which is associated with a Security Association (SA). The IP forwarder(s) determines the destinations of the packets, and forwards the packets to their destinations. A plurality of security procedure modules (SecProcs) are coupled to the IP forwarder(s) and are arranged to implement security procedures for received IP packets in parallel. A security controller (SC) is arranged to allocate negotiated SAs amongst the security procedure modules and to notify the security procedure modules and the IP forwarder(s) of the allocation, whereby the IP forwarder(s) can send IP packets to the security procedure module implementing the associated SA.Type: ApplicationFiled: May 24, 2001Publication date: November 29, 2001Inventors: Tommi Linnakangas, Esa Turtiainen, Juha-Petri Karna, Goran Schultz, Seppo Lindborg