Patents by Inventor Ville Ollikainen
Ville Ollikainen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8555088Abstract: The invention concerns a method for writing data to a memory device arrangement comprising a first and a second memory device in which the first memory device comprises data blocks numbered with block numbers and the second memory device comprises at least one reference calculated from a data block digest and its physical block number. The invention is characterized in that it comprises the following steps: calculating the digest from at least part of the data block content, receiving at least one physical block number, to which the data block contents in the first memory device is stored, encrypting the data block content, storing the data block content to the first memory device to the position pointed by the physical block number, and storing or issuing a command to save the digest, or a number derived from it, and at least one said physical block number to the second memory device. Also a system, a computer program and server computer in accordance to the invention are presented.Type: GrantFiled: March 16, 2009Date of Patent: October 8, 2013Assignee: Envault Corporation OyInventors: Markku-Juhani Saarinen, Ville Ollikainen
-
Publication number: 20120300931Abstract: A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the terminal, the method divides original data resulting in a first portion and a second portion. The method stores the first portion in the local memory device and sends the second portion for storage in a remote memory device. Upon obtaining an authorized read request targeted to the original data the method retrieves the second portion and combines the two portions. The method provides high data security if the data, is encrypted prior to the step of dividing. Another aspect of the invention comprises a terminal capable of at least combing the first and second data portions to reconstruct the original data, and preferably to perform the step required for dividing the data. The data may or may not be encrypted.Type: ApplicationFiled: June 28, 2012Publication date: November 29, 2012Applicant: SPLITSTREEM OYInventors: Ville OLLIKAINEN, Harri RAUTIO, Juuso PESOLA, Juhani LATVAKOSKI
-
Patent number: 8233624Abstract: A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the terminal, the method comprises the following steps. The method divides 801 original data included in the information to be secured, a division of the original data resulting in a first portion and a second portion. The method stores 802 the first portion in the local memory device and sends 803 the second portion via the data link interface for storage in a remote memory device. The method includes obtaining 804 an authorized read request targeted to the original data and responsive to the authorized read request reconstructs the original data. In more detail, the method retrieves 805 via the data link interface the second portion and combines 806 the second portion and the first portion which was stored in the local memory device.Type: GrantFiled: May 22, 2008Date of Patent: July 31, 2012Assignee: Splitstreem OyInventors: Ville Ollikainen, Harri Rautio, Juuso Pesola, Juhani Latvakoski
-
Publication number: 20120087490Abstract: The invention represents a method for creating a ciphertext block from a plaintext block consisting of more than one consecutive plaintext character strings (M1, M2, . . . Mn), which are encrypted with an encryption block operating on counter mode. When encrypting a plaintext character string (M3, for example) a hash is formed from the preceding plaintext character string (M2). Preferably the hash is message authentication code MAC or CMAC, the generation algorithm of which uses as a key (Key2) the hash value formed from the plaintext character string (M1) preceding string M2. The hash formed from the plaintext character string (M2) is Counter input to encryption block (Ek) that outputs a key stream (Keystream 3). It is combined in XOR operation with the plaintext character string (M3) wherein the result is a cipher text character string (C3). The invention makes it possible to truncate a file size without losing information stored in the rest of the file.Type: ApplicationFiled: June 29, 2010Publication date: April 12, 2012Applicants: ENVAULT CORPORATION OY, ENVAULT CORPORATION OYInventors: Ville Ollikainen, Juuso Pesola
-
Patent number: 8074875Abstract: The invention is especially intended for visually impaired persons who are not able to read text printed on products or product containers. With the invented method at least a part of a product description, which corresponds to a bar code read and which is fetched from a product information database, is stored in at least one memory accessible to the terminal. After this, in response to a command ordered by a user of the terminal, the RFID identifier attached to the terminal is read and the product description is presented in speech format so that the information readable in the memory and the RFID identifier is utilized in the presentation. The terminal is preferably a mobile station equipped with a speech synthesizer. A visually impaired person can point with the terminal to one or more products and listen via an audio system of the terminal to the product descriptions related to them. When RFID identifiers are attached to the product, the products need to be pointed to as precisely when reading bar codes.Type: GrantFiled: October 26, 2005Date of Patent: December 13, 2011Assignee: Valtion Teknillinen TutkimuskeskusInventors: Ville Ollikainen, Christer Bäckström, Pekka Pursula
-
Publication number: 20110208979Abstract: The invention concerns a method for writing data to a memory device arrangement comprising a first and a second memory device in which the first memory device comprises data blocks numbered with block numbers and the second memory device comprises at least one reference calculated from a data block digest and its physical block number. The invention is characterized in that it comprises the following steps: calculating the digest from at least part of the data block content, receiving at least one physical block number, to which the data block contents in the first memory device is stored, encrypting the data block content, storing the data block content to the first memory device to the position pointed by the physical block number, and storing or issuing a command to save the digest, or a number derived from it, and at least one said physical block number to the second memory device. Also a system, a computer program and server computer in accordance to the invention are presented.Type: ApplicationFiled: March 16, 2009Publication date: August 25, 2011Applicant: ENVAULT CORPORATION OYInventors: Markku-Juhani Saarinehn, Ville Ollikainen
-
Publication number: 20080301775Abstract: A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the terminal, the method comprises the following steps. The method divides 801 original data included in the information to be secured, a division of the original data resulting in a first portion and a second portion. The method stores 802 the first portion in the local memory device and sends 803 the second portion via the data link interface for storage in a remote memory device. The method includes obtaining 804 an authorized read request targeted to the original data and responsive to the authorized read request reconstructs the original data. In more detail, the method retrieves 805 via the data link interface the second portion and combines 806 the second portion and the first portion which was stored in the local memory device.Type: ApplicationFiled: May 22, 2008Publication date: December 4, 2008Applicant: SPLITSTREEM OYInventors: Ville OLLIKAINEN, Harri RAUTIO, Juuso PESOLA, Juhani LATVAKOSKI
-
Publication number: 20080283584Abstract: The invention is especially intended for visually impaired persons who are not able to read text printed on products or product containers. With the invented method at least a part of a product description, which corresponds to a bar code read and which is fetched from a product information database, is stored in at least one memory accessible to the terminal. After this, in response to a command ordered by a user of the terminal, the RFID identifier attached to the terminal is read and the product description is presented in speech format so that the information readable in the memory and the RFID identifier is utilized in the presentation. The terminal is preferably a mobile station equipped with a speech synthesizer. A visually impaired person can point with the terminal to one or more products and listen via an audio system of the terminal to the product descriptions related to them. When RFID identifiers are attached to the product, the products need to be pointed to as precisely when reading bar codes.Type: ApplicationFiled: October 26, 2005Publication date: November 20, 2008Applicant: VALTION TEKNILLINEN TUTKIMUSKESKUSInventors: Ville Ollikainen, Christer Backstrom, Pekka Pursula
-
Publication number: 20080010653Abstract: A drawback of applying DRM to a mass-distributed digital media object resides in that it is difficult to find out a user who has stored the media object and then distributed illegal copies thereof. This can be prevented by extracting selected portions of data from a stream of an original digital media object and then mass distributing the remaining incomplete media object. Responsive to a user's request for the extracted portions, the extracted portions are first watermarked with user-specific watermarks and then transmitted via a bidirectional communication channel to a user terminal. The terminal then inserts the watermarked portions into their original positions in the incomplete media object so reproducing the original digital media object.Type: ApplicationFiled: June 26, 2007Publication date: January 10, 2008Applicant: VALTION TEKNILLINEN TUTKIMUSKESKUSInventors: Ville OLLIKAINEN, Juhani Latvakoski
-
Publication number: 20030154246Abstract: The file server, especially the video or game file server, is composed of several hard disks These hard disks each contain at least one ring buffer as well as an storage are. When archiving a file, the file is split into file stripes, which are then distributed among several of the hard disk's storage areas. When the user requests a file, the file stripes are complied on an available ring buffer. Then isochronal real-time transmission from the ring buffer to the subscriber's terminal unit can begin right away. Once the file is transferred, a copy remains in the ring buffer. The hard disks may be grouped into nodes. The file server may be decentralised by positioning a portion of the nodes as remote nodes, which are geographically separated from other nodes. The file server can also be decentralised by making each fixed disk a part of a subscriber's terminal unit.Type: ApplicationFiled: December 18, 2002Publication date: August 14, 2003Inventor: Ville Ollikainen
-
Publication number: 20020034179Abstract: The problem with transferring an IP packets to another network environment without a return connection, is addressed, by transforming the IP data packets into an alternative addressing form such as Conditional Access (CA). Another aspect of the invention allows for extending an IP network by tunneling or forwarding of IP packets, and preferably multicast service packets within a CA transport mechanism. The disclosure further discloses a method and apparatus for utilizing the method as means of providing IP multicast service data via unidirectional television broadcast system.Type: ApplicationFiled: August 14, 2001Publication date: March 21, 2002Inventors: Ville Ollikainen, Caj Sodergard
-
Publication number: 20020035730Abstract: The problem with transferring a multicast service to a television environment, or other environment without a return connection, is how the service provider receives the information about receivers willing to receive the service and how the multicast router can query the receiver sets as to whether they want to receive. The problem is solved by choosing one of the servers within the scope of influence of the querying multicast router to be an order server. The receiver sets, without return connections, notify the server of the services they want to receive, and likewise notify when they no longer want to receive the service. The notifications to the server can be made via a modem connection through a fixed network, for instance using a Web form. The next time the server makes the query about receivers willing to receive the service, the order server will reply on behalf of the receiver set.Type: ApplicationFiled: August 14, 2001Publication date: March 21, 2002Inventors: Ville Ollikainen, Caj Sodergard