-
公开(公告)号:US20210026978A1
公开(公告)日:2021-01-28
申请号:US16519556
申请日:2019-07-23
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
-
公开(公告)号:US20200374277A1
公开(公告)日:2020-11-26
申请号:US16422591
申请日:2019-05-24
Applicant: Avast Software s.r.o.
Inventor: Karel Fuka , Vojtech Tuma
IPC: H04L29/06
Abstract: A method of authenticating a user to a computer in an adverse environment includes receiving the user's password in a trusted user device, such as by the user typing the password, and encoding a keyword with a hash of the entered password to create an encoded keyword. The encoded keyword is sent from the trusted user device to the computer using a physical communication channel perceivable by the user; and the encoded keyword is compared in the computer with a keyword encoded with a known hash of the user's password in the computer to authenticate the user.
-
公开(公告)号:US10834609B2
公开(公告)日:2020-11-10
申请号:US16020891
申请日:2018-06-27
Applicant: Avast Software s.r.o.
Abstract: Systems and methods provide real-time feedback of the effect of changes in router placement and physical configuration on the overall quality of device connections. This feedback assists a user to improve placement and physical configuration, until an optimal positioning or configuration is found.
-
公开(公告)号:US10708416B2
公开(公告)日:2020-07-07
申请号:US15937369
申请日:2018-03-27
Applicant: Avast Software s.r.o.
Inventor: Ji{hacek over (r)}í Dutkevi{hacek over (c)} , Martin Horváth , Juraj Chrappa , Vojtech Tůma
Abstract: Phone numbers can be identified as being associated with spam callers. Data associated with previously identified spammer phone numbers is analyzed to obtain one or more input parameters for a classification engine. The classification engine uses the input parameters to identify one or more phone numbers in data associated with currently active phone numbers as being associated with spam callers. The one or more phone numbers identified as being associated with spam callers can be provided to call blockers of end-user telephone devices.
-
公开(公告)号:US10678921B2
公开(公告)日:2020-06-09
申请号:US15721244
申请日:2017-09-29
Applicant: Avast Software s.r.o.
Inventor: Libor Mo{hacek over (r)}kovský
Abstract: Detecting malware includes monitoring an event stream for an executable program, where the event stream includes a plurality of events such as API call events. A first plurality of hash values is determined for the event stream. In response to an occurrence of a trigger event in the event stream, the first plurality of hash values for the event stream can be compared with a second plurality of hash values that represents an event stream for a known malware executable. A determination can be made if a behavior represented by the first plurality of hash values is a permitted behavior based on the comparison.
-
公开(公告)号:US10582336B2
公开(公告)日:2020-03-03
申请号:US16451943
申请日:2019-06-25
Applicant: Avast Software s.r.o.
Inventor: Juyong Do
Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.
-
公开(公告)号:US10574665B2
公开(公告)日:2020-02-25
申请号:US15716389
申请日:2017-09-26
Applicant: Avast Software s.r.o.
Inventor: Ond{hacek over (r)}ej Planý
IPC: H04L29/06 , H04W4/02 , H04W12/08 , H04W12/06 , G06K9/32 , G06K9/18 , G06K9/22 , H04W12/00 , H04W4/80
Abstract: A computing device can initiate a pairing operation with mobile computing device. The computing device encodes a pairing secret into a displayable code for presentation. The size of the displayable code can be determined in accordance with a threshold distance and display parameters. The mobile computing device is positioned such that an image of the displayable code substantially fills a boundary whose size is determined according to a desired threshold distance, a focal length, and parameters of a sensor chip. The displayable code is decoded to reveal the pairing secret to the mobile computing device. The pairing secret is used to complete the pairing process with the computing device. Once pairing has been completed, the computing device can measure a signal strength between the computing device and the mobile computing device. The signal strength can be stored to be used for later authorization purposes.
-
公开(公告)号:US20190325134A1
公开(公告)日:2019-10-24
申请号:US16389710
申请日:2019-04-19
Applicant: Avast Software s.r.o.
Inventor: Petr Gronát
Abstract: A method of identifying malicious activity in a sequence of computer instructions includes providing the sequence of computer instructions into a recurrent neural network configured to provide an output based on both the current instruction being input and at least one prior instruction in the sequence, and evaluating the provided sequence of computer instructions in the recurrent neural network at multiple points within the sequence. An output is provided indicating whether the network has determined the code sequence to that point is likely malicious.
-
公开(公告)号:US10448356B1
公开(公告)日:2019-10-15
申请号:US16370958
申请日:2019-03-30
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta , Leo H. Kwong
IPC: H04W8/24 , H04W64/00 , H04W4/029 , H04B17/318
Abstract: A location anomaly for a mobile device can be detected using non-location information from the mobile device. The non-location information does not include data from a location based device, such as a GPS. A probabilistic model is created using historical non-location information accumulated from the mobile device. Current non-location data is compared with the probabilistic model to determine a probability associated with the current non-location information. If the probability is less than a predetermined or configurable threshold, a location anomaly is detected. A notification of the location anomaly may be displayed and/or transmitted in response to detecting the location anomaly.
-
公开(公告)号:US10437995B2
公开(公告)日:2019-10-08
申请号:US15474007
申请日:2017-03-30
Applicant: Avast Software s.r.o.
Inventor: Libor Mo{hacek over (r)}kovský
Abstract: Systems and methods are described which integrate file properties that in conventional systems has been considered weaker evidence of malware and analyzes the information to produce reliable results. Properties such as file paths, file names, source domains, IP protocol ASNs, section checksums, digital signatures that are not always present and not always reliable can be integrated into the classification process using a graph. A 1-neighborhood of object values in the graph may be created and analyzed to suggest a malware family label based on files having similar properties.
-
-
-
-
-
-
-
-
-