-
公开(公告)号:US11222377B2
公开(公告)日:2022-01-11
申请号:US16146863
申请日:2018-09-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A recommendation engine can provide recommendations with respect to an application and can provide insights to a user of a computing device. The recommendation engine can receive a prediction based on user engagement with the application during an initial period of time (e.g., a trial period) as to whether the user will convert use of the application to a paid basis (e.g., a subscription or license to the application). An action can be recommended based on the prediction. The recommendation engine can provide insights to a user based on a score associated with the insight. The score can be determined by measuring previous user interactions with the insight over a period of time.
-
公开(公告)号:US11170101B2
公开(公告)日:2021-11-09
申请号:US16694123
申请日:2019-11-25
Applicant: Avast Software s.r.o.
Inventor: Hiram Lew , Filip Havlí{hacek over (c)}ek , Pablo Sole , Tomá{hacek over (s)} Pop
Abstract: Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware.
-
公开(公告)号:US20210288965A1
公开(公告)日:2021-09-16
申请号:US16820005
申请日:2020-03-16
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Juyong Do , John Poothokaran
IPC: H04L29/06 , G06F16/9535 , G06F21/62
Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
-
公开(公告)号:US20210185046A1
公开(公告)日:2021-06-17
申请号:US16714318
申请日:2019-12-13
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
IPC: H04L29/06 , G06F3/0482 , H04L29/08 , G06F17/16
Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.
-
公开(公告)号:US11030151B2
公开(公告)日:2021-06-08
申请号:US15940302
申请日:2018-03-29
Applicant: Avast Software s.r.o.
IPC: G06F16/13 , G06F16/951 , G06F16/31
Abstract: Systems and methods create an inverted index for a set of documents utilizing a heap data structure. The documents can be divided into a series of n-grams. The n-grams can be hashed, producing hashed n-gram values. A first hashed n-gram value can be placed into the heap data structure. Operations performed using the heap data structure obtain document identifiers that are associated with documents that include a hashed n-gram value that matches the top n-gram value in the heap.
-
116.
公开(公告)号:US11005871B2
公开(公告)日:2021-05-11
申请号:US16245042
申请日:2019-01-10
Applicant: Avast Software s.r.o.
Inventor: Joe Anakata , Rajarshi Gupta
Abstract: A central platform remote from a local network can detect anomalies on the local network. The central platform can assign a unique pair of DNS server IP addresses to the local network. The central platform can receive configuration data from the local network and use the configuration data and the assigned pair of DNS server IP addresses to uniquely identify devices on the local network. In the case that current network flow statistics do not match expected network flow statistics for the local network, a device causing the anomalous behavior can be identified using the assigned pair of DNS server IP addresses and configuration data.
-
公开(公告)号:US20210136106A1
公开(公告)日:2021-05-06
申请号:US16730868
申请日:2019-12-30
Applicant: Avast Software s.r.o.
Inventor: Gandhi Balasubramaniam
Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example, the endpoint DNS agent receives an HTTP message from a client browser including a Server Name Identifier tag, and generates a signed certificate spoofing the domain identified in the Server Name Identifier tag to insert itself as a man-in-the-middle between the identified domain and the client browser.
-
公开(公告)号:US10997278B2
公开(公告)日:2021-05-04
申请号:US16235427
申请日:2018-12-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US20210097201A1
公开(公告)日:2021-04-01
申请号:US16586734
申请日:2019-09-27
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: Systems and methods receive a form having one or more fields for receiving personally identifying information (PII). Input data that includes PII is received for the form. The system and methods model the characteristics of true PII to generate a model associated with the form. Synthetic PII is generated based, at least in part, the true provided to the one or more fields of the form.
-
公开(公告)号:US10909243B2
公开(公告)日:2021-02-02
申请号:US16022587
申请日:2018-06-28
Applicant: Avast Software s.r.o.
Inventor: Zden{hacek over (e)}k Breitenbacher
Abstract: Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each instruction in the scope of instructions, a determination is made if the instruction performs an ineffective operation or if the instruction, in combination with another instruction, renders either or both instructions ineffective. Ineffective instructions are filtered such that they do not appear in an output buffer.
-
-
-
-
-
-
-
-
-