-
公开(公告)号:US20220012365A1
公开(公告)日:2022-01-13
申请号:US16926645
申请日:2020-07-11
Applicant: Avast Software s.r.o.
Inventor: Deepali Garg , Rajarshi Gupta
Abstract: A method for applying electronic data sharing settings. The method includes determining a first image or a first plurality of images shared by a user to a first network-enabled application. A first plurality of image components are extracted from the first image or the first plurality of images, and access by the first network-enabled application to a second image or a second plurality of images stored on a computing device of the user is enabled based on the first plurality of image components extracted from the first image or the first plurality of images. A method for controlling internet browsing is further provided.
-
公开(公告)号:US11316880B2
公开(公告)日:2022-04-26
申请号:US16571945
申请日:2019-09-16
Applicant: Avast Software s.r.o.
Inventor: Deepali Garg , Armin Wasicek
IPC: H04L29/06
Abstract: A method of identifying cryptocurrency mining on a networked computerized device includes intercepting network traffic between the networked computerized device and a public network, and extracting Internet Protocol (IP) packet data of the intercepted network traffic. The IP packet data of the intercepted network traffic is evaluated such that if the intercepted network traffic is determined to be characteristic of communication with a cryptocurrency mining pool it is determined that the networked computerized device is mining cryptocurrency. One or more remedial actions are taken if it is determined that the networked computerized device is mining cryptocurrency, such as blocking traffic between the networked computerized device and the mining pool or notifying a user.
-
公开(公告)号:US20210084060A1
公开(公告)日:2021-03-18
申请号:US16571945
申请日:2019-09-16
Applicant: Avast Software s.r.o.
Inventor: Deepali Garg , Armin Wasicek
IPC: H04L29/06
Abstract: A method of identifying cryptocurrency mining on a networked computerized device includes intercepting network traffic between the networked computerized device and a public network, and extracting Internet Protocol (IP) packet data of the intercepted network traffic. The IP packet data of the intercepted network traffic is evaluated such that if the intercepted network traffic is determined to be characteristic of communication with a cryptocurrency mining pool it is determined that the networked computerized device is mining cryptocurrency. One or more remedial actions are taken if it is determined that the networked computerized device is mining cryptocurrency, such as blocking traffic between the networked computerized device and the mining pool or notifying a user.
-
公开(公告)号:US20220132208A1
公开(公告)日:2022-04-28
申请号:US17078961
申请日:2020-10-23
Applicant: Avast Software s.r.o.
Inventor: Deepali Garg , John Poothokaran , Juyong Do
IPC: H04N21/45 , H04N21/475 , H04N21/454
Abstract: Permissions in a parental control system are managed by evaluating a set of current permissions settings, current interests, and the age of at least one child subject to the current permissions to derive one or more suggested modifications to the current permissions. The one or more suggested modifications are determined to be age appropriate for the at least one child and to be of interest to the child. The one or more current interests comprise prior usage data of the at least one child.
-
-
-