-
公开(公告)号:US20230283611A1
公开(公告)日:2023-09-07
申请号:US18315905
申请日:2023-05-11
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Juyong Do , John Poothokaran
IPC: H04L9/40 , G06F21/62 , G06F16/9535
CPC classification number: H04L63/102 , G06F21/6263 , G06F16/9535
Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
-
公开(公告)号:US20230267192A1
公开(公告)日:2023-08-24
申请号:US17651971
申请日:2022-02-22
Applicant: Avast Software s.r.o.
Inventor: Martin Mesrsmid , Armin Wasicek
CPC classification number: G06F21/45 , H04L63/0861 , G06F2221/2115
Abstract: A synthetic biometric signature is generated for a user for each of a plurality of third parties, and the synthetic biometric signatures are used to interact with the respective third parties such that each of the third parties sees a different synthetic biometric signature for the user. The synthetic biometric signatures comprise a user's actual biometric data altered by a change vector, an artificial biometric signature, and/or artificial biometric characteristics, or by other artificial components. The synthetic biometric signature can be changed if the synthetic biometric signature is compromised, or the user wishes to reset their user relationship with a particular third-party.
-
公开(公告)号:US11704423B2
公开(公告)日:2023-07-18
申请号:US17135989
申请日:2020-12-28
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
IPC: G06F21/62 , G06F21/60 , H04L67/1097 , H04L67/06 , G06F21/31
CPC classification number: G06F21/6218 , G06F21/31 , G06F21/604 , G06F21/6227 , H04L67/06 , H04L67/1097
Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.
-
公开(公告)号:US11625494B2
公开(公告)日:2023-04-11
申请号:US16784222
申请日:2020-02-06
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Armin Wasicek
IPC: G06F16/00 , G06F21/62 , G06F16/242 , G06K9/62 , G06N3/08 , G06F16/958 , G06F16/955 , G06F9/445 , G06F16/9535
Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.
-
公开(公告)号:US11568024B2
公开(公告)日:2023-01-31
申请号:US17228064
申请日:2021-04-12
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US20230012394A1
公开(公告)日:2023-01-12
申请号:US17370814
申请日:2021-07-08
Applicant: Avast Software s.r.o.
Inventor: Michal Vaner
IPC: H04L12/835 , H04L12/26
Abstract: A method of managing a fill state of a buffer in an external device includes monitoring the latency of a network connection to an external device having a network buffer via a managing device. A state of fill of the network buffer is determined based on at least the monitored latency of the network connection, and the effective network speed is estimated based on the state of fill of the network buffer. One or more network traffic scheduling parameters are adjusted in response to the estimated effective network speed, such as a maximum currently usable network speed that is lower than a maximum possible speed of the network. The maximum currently usable network speed of the network connection is periodically increased if the monitored latency is in a normal state and the maximum currently usable network speed is lower than the maximum possible speed of the network.
-
127.
公开(公告)号:US20220417262A1
公开(公告)日:2022-12-29
申请号:US17356356
申请日:2021-06-23
Applicant: Avast Software s.r.o.
Inventor: Jakub Kroustek , Lukàs Zobal
IPC: H04L29/06
Abstract: A method includes enabling a messaging server and providing credentials for the messaging server. A computing system is enabled and a malware application is received by the computing system. The malware application is executed by the computing system. The credentials are rendered accessible to the malware application via the computing system, and the malware application is enabled to transmit the credentials via network transmission from the computing system to a computer. An actor is enabled to access the messaging server over a network in response to the actor applying the credentials, and a first electronic message transmitted by the actor is received by the messaging server, the first electronic message including first content.
-
公开(公告)号:US11461360B2
公开(公告)日:2022-10-04
申请号:US16370952
申请日:2019-03-30
Applicant: Avast Software s.r.o.
Inventor: Martin Ŝmarda , Pavel Ŝrámek
Abstract: Systems and methods capable of initializing centroids in large datasets before commencement of clustering operations. The systems and methods can utilize a random sampling window to increase the speed of centroid initialization. The systems and methods can be modified to leverage parallelism and be configured for execution on multi-node compute clusters. Optionally, the initialization systems and methods can include post-initialization centroid discarding and/or re-assignment operations that adaptively control cluster sizes.
-
公开(公告)号:US11438299B2
公开(公告)日:2022-09-06
申请号:US16736492
申请日:2020-01-07
Applicant: Avast Software s.r.o.
Inventor: Wicher Thomas Maarseveen , Lukás Karas
IPC: H04L61/103 , H04L9/40 , H04L61/2514 , H04L61/5014
Abstract: A private network device such as a security device is inserted in a private network using ARP spoofing, which includes sending periodic ARP packets from the private network device to a router and to client devices to ensure the private network device spoofing remains intact. The private network device determines when at least one of the one or more private network devices is inactive, such as by monitoring the network for activity between the devices and a router, and suspends sending the periodic ARP packets to the client devices when they are inactive.
-
公开(公告)号:US11295118B2
公开(公告)日:2022-04-05
申请号:US16022400
申请日:2018-06-28
Applicant: Avast Software s.r.o.
Inventor: Jeroen De Knijf
IPC: G06K9/00 , G06F21/32 , G06F16/583 , H04L29/06
Abstract: Systems and method verify a user based on facial image data, without prior information about the user. A user name and facial image of the user are received. A search query comprising the user name can be issued to one or more search engines. Images returned as a result of the search query can be filtered to determine a set of candidate images. The images in the set of candidate images can be compared to the facial image of the use to determine a probability of a match. If there is a match, the user can be considered verified.
-
-
-
-
-
-
-
-
-