-
公开(公告)号:US20250094580A1
公开(公告)日:2025-03-20
申请号:US18467444
申请日:2023-09-14
Applicant: Avast Software s.r.o.
Inventor: Iskander Sanchez-Rola , Venkadesan Marimuthu
IPC: G06F21/56
Abstract: The behavior of browser extensions when installed and operating in a browser environment is monitored, such as by observing changes to a web page with and without the browser extensions installed. Document Object Model (DOM) changes to the web page, such as scripts that only run when an extension is installed, or other web content that changes as a result of differences in a web page with and without the browser extension installed are observed. These differences may be attributed to the browser extension, and the changed or added elements may be inspected for malicious content or behavior. If malicious behavior is found in the different content, the content and/or the browser extension may be flagged as malicious behavior and a signature used to identify the malicious browser extension in future applications.
-
公开(公告)号:US20250028863A1
公开(公告)日:2025-01-23
申请号:US18356439
申请日:2023-07-21
Applicant: Avast Software s.r.o.
Inventor: David Luz Silva , Kevin Roundy , Paul Dunphy
Abstract: A system and method are provided by which an electronic address associated with a user is monitored. Based on the monitoring, an electronic message is detected including a digital document. A cryptographic function is applied to the digital document to generate a hash which is rendered accessible at a network location. An identification of the network location of the hash is transmitted to a first computing system associated with the user.
-
公开(公告)号:US12147396B2
公开(公告)日:2024-11-19
申请号:US17569071
申请日:2022-01-05
Applicant: Avast Software s.r.o.
Inventor: Peter Kubov , Peter Matula
Abstract: A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed. Each of the plurality of integers is split to generate a first plurality of numbers respectively paired with a second plurality of numbers. A first tuple is generated based on the first plurality of numbers. A second tuple is generated based on the second plurality of numbers and the first plurality of numbers. The first tuple and the second tuple are stored. A system and computer readable medium enabling the data processing method are further provided.
-
公开(公告)号:US20240259402A1
公开(公告)日:2024-08-01
申请号:US18591669
申请日:2024-02-29
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L9/40
CPC classification number: H04L63/1416 , H04L63/104
Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.
-
公开(公告)号:US11949693B2
公开(公告)日:2024-04-02
申请号:US17317707
申请日:2021-05-11
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L9/40
CPC classification number: H04L63/1416 , H04L63/104
Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.
-
公开(公告)号:US11941052B2
公开(公告)日:2024-03-26
申请号:US17342463
申请日:2021-06-08
Applicant: Avast Software s.r.o.
Inventor: Dan Martinec , Yury Kasimov , Juyong Do
IPC: G06F16/835 , G06F40/295 , G06N20/00 , G06Q30/0201
CPC classification number: G06F16/835 , G06F40/295 , G06N20/00 , G06Q30/0201
Abstract: A method including detecting a webpage accessed by a user on a computing device via a browser. Content on the webpage is determined, and a model is applied to the content to determine a plurality of keyword sets. A network search is performed based on each of the plurality of keyword sets to generate a plurality of search results. The plurality of search results are compared to the content, and the plurality of search results are compared to each other. A factualness of the content is determined based on the comparing of the plurality of search results to the content and based on the comparing of the plurality of the search results to each other, and the user is notified via the browser of the factualness of the content.
-
公开(公告)号:US20240037103A1
公开(公告)日:2024-02-01
申请号:US17873611
申请日:2022-07-26
Applicant: Avast Software s.r.o.
Inventor: Michal Najman
IPC: G06F16/2455 , G06F16/242
CPC classification number: G06F16/24564 , G06F16/244
Abstract: A computing threat detection rule method and system for performing the method. The method includes determining identifiers for data points. One or more terms for each of the data points are determined to determine terms respectively associated with the identifiers. Collections of identifiers respectively associated with the terms are determined, the number of identifiers in each of the collections of identifiers limited to a threshold number. Conditions of a rule are determined. The conditions of the rule are compared to the terms to determine matching terms respectively associated with corresponding collections of identifiers. An intersection of the corresponding collections of identifiers is determined, and a number of the data points covered by the rule is determined based on the intersection of the corresponding collections of identifiers. A transmission is performed based on the number of the data points covered by the rule.
-
公开(公告)号:US20240029061A1
公开(公告)日:2024-01-25
申请号:US17872250
申请日:2022-07-25
Applicant: Avast Software s.r.o.
Inventor: Drummond Reed , Brent Zundel , Martin Mesrsmid , Allan Thomson
CPC classification number: G06Q20/38215 , G06Q20/4014 , H04L9/3247 , H04L9/3218
Abstract: Systems and methods for transacting over a network. A first agent and a second agent are provided. The second agent is operable to transact with a third agent for use of a service, the third agent enabled to communicate with a fourth agent. The first agent is operable to communicate with the second agent to facilitate the transacting by the second agent with the third agent for the use of the service. The first agent is further operable to communicate with the fourth agent to facilitate the transacting by the second agent with the third agent for the use of the service.
-
公开(公告)号:US11829509B2
公开(公告)日:2023-11-28
申请号:US17377298
申请日:2021-07-15
Applicant: Avast Software s.r.o.
Inventor: Martin Mesrsmid
IPC: G06F21/62 , G06F21/57 , G06Q10/0635 , G06Q10/067
CPC classification number: G06F21/6245 , G06F21/577 , G06F21/6236 , G06Q10/067 , G06Q10/0635
Abstract: A computer-implemented method includes creating an account including an account value on an online service. The account value is modified periodically to activate a plurality of account values respectively associated with a plurality of times at which the plurality of account values were respectively activated on the account. A network-accessible data repository is scanned to detect a first value of the plurality of account values, the first value associated with a first time of the plurality of times at which the first value was activated. Responsive to detecting the first value a notification is provided indicating a data leak from the online service including an indication of when the data leak occurred based on the first time at which the first value was activated on the account and a second time at which a second value was activated on the account to replace the first value.
-
公开(公告)号:US20230289466A1
公开(公告)日:2023-09-14
申请号:US17654166
申请日:2022-03-09
Applicant: Avast Software s.r.o.
Inventor: Martin Mesrsmid
CPC classification number: G06F21/6245 , G06Q30/0203 , G06F2221/2135 , G06F2221/2107
Abstract: A method of collecting user device data includes receiving a probabilistic cardinality estimator data structure in the user device from a server, the probabilistic cardinality estimator data structure associated with a survey question. An answer to the survey question associated with the probabilistic cardinality estimator data structure is determined, and one or more elements are selectively added to the probabilistic cardinality estimator data structure based on the determined answer to the survey question. The probabilistic cardinality estimator data structure is sent back to the server, which calculates the survey result from the probabilistic cardinality estimator data structure.
-
-
-
-
-
-
-
-
-