-
公开(公告)号:US11256859B2
公开(公告)日:2022-02-22
申请号:US15272961
申请日:2016-09-22
Applicant: Avast Software s.r.o.
Inventor: Pavel Studenÿ
IPC: G06F16/90 , G06F40/174 , G06F16/958
Abstract: Web page items and other requests can be automatically categorized. An interaction with a web page item can be categorized based on previous categorizations of other web page items in which the same or similar data has been entered into a web page. A classification database containing categories of classified web page items is maintained. An interaction database containing interaction records of a user is maintained. The interaction records include a value corresponding to the user and a web page item. A web page item on a web page visited by a user and that is a user-fillable field that has been previously categorized in the classification database may be automatically populated with a value stored in an interaction database and that corresponds to the user and the user-fillable field.
-
公开(公告)号:US11256804B2
公开(公告)日:2022-02-22
申请号:US16184423
申请日:2018-11-08
Inventor: Marek Kr{hacek over (c)}ál , Martin Bálek , Ond{hacek over (r)}ej {hacek over (S)}vec , Martin Vejmelka
IPC: G06F21/56 , G06N3/02 , H04L29/06 , H04W12/12 , H04W12/128
Abstract: A convolutional deep neural network architecture can detect malicious executable files by reading the raw sequence of bytes, that is, without any domain-specific feature extraction or preprocessing.
-
公开(公告)号:US11223625B2
公开(公告)日:2022-01-11
申请号:US15858804
申请日:2017-12-29
Applicant: Avast Software s.r.o.
Inventor: Jeroen De Knijf , Amit Siwal , Shaul Levi
IPC: H04L29/06 , G06F16/20 , H04L29/08 , H04W4/70 , H04W12/122 , G06F21/52 , G06F21/55 , G06F21/56 , H04L12/24 , H04L12/26
Abstract: Malicious behavior of a device on a local network may be detected. A data stream from a device may be collected. A functional group may be created using behavioral data of devices of a known type. A behavior profile for the functional group may be generated and stored in a database. The data stream of the device is compared to the behavior profile of the functional group. A malicious behavior is indicated for the device in response to determining that the device's current behavior is not within a predetermined or configurable threshold of the behavior profile.
-
公开(公告)号:US11170053B2
公开(公告)日:2021-11-09
申请号:US15178235
申请日:2016-06-09
Applicant: Avast Software s.r.o.
IPC: G06F16/903
Abstract: Systems and methods perform various optimizations of an LLCS algorithm for use in determining if a set of input sequences are similar to a query sequence. The optimizations include filtering out sequence from the set of input sequences where the estimated similarity of the sequence with the query sequence is below a threshold value. The remaining sequences can then be provided to an LLCS algorithm where the output of the LLCS algorithm is used in a similarity function to determine an actual similarity of an input sequence with a query sequence.
-
公开(公告)号:US20210211402A1
公开(公告)日:2021-07-08
申请号:US16736492
申请日:2020-01-07
Applicant: Avast Software s.r.o.
Inventor: Wicher Thomas Maarseveen , Lukás Karas
Abstract: A private network device such as a security device is inserted in a private network using ARP spoofing, which includes sending periodic ARP packets from the private network device to a router and to client devices to ensure the private network device spoofing remains intact. The private network device determines when at least one of the one or more private network devices is inactive, such as by monitoring the network for activity between the devices and a router, and suspends sending the periodic ARP packets to the client devices when they are inactive.
-
公开(公告)号:US20210136037A1
公开(公告)日:2021-05-06
申请号:US16668861
申请日:2019-10-30
Applicant: Avast Software s.r.o.
Inventor: Gandhi Balasubramaniam
Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example processing the received DNS request comprises identifying the client device, end user, and the DNS request to a cloud-based DNS server, and processing a response received from the cloud-based DNS server received in response to the DNS request. The endpoint DNS agent is further operable to distinguish between DNS requests for local domains and remote domains, and to redirect DNS requests for local domains to a local network DNS server.
-
公开(公告)号:US20210099431A1
公开(公告)日:2021-04-01
申请号:US16918851
申请日:2020-07-01
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: A method of generating a synthetic user profile to protect the user's privacy includes generating a synthetic profile comprising a plurality of profile elements and selecting a network egress point for use with the synthetic profile. The synthetic profile elements and egress point have a consistent geographic location, or the synthetic profile elements are consistent with other external information.
-
公开(公告)号:US20210097029A1
公开(公告)日:2021-04-01
申请号:US16586400
申请日:2019-09-27
Applicant: Avast Software s.r.o.
Inventor: Pavel Cimbál
IPC: G06F16/174 , G06F21/56
Abstract: A method of compressing a string array comprising strings with similarity includes selecting a string compression method from among a plurality of available compression methods based on at least which of the available compression method yields the shortest compressed string. The string is then compressed using the selected string compression method. The array of strings to be compressed comprises text characters represented by a first range of values within a word, and compressed string comprises one or more words in a second range of values dedicated to compression and not overlapping with the first range of values. This process is repeated for additional strings in the string array, such that the compression method used for each of a plurality of strings is independently selected.
-
公开(公告)号:US10915657B2
公开(公告)日:2021-02-09
申请号:US16037997
申请日:2018-07-17
Applicant: Avast Software s.r.o.
IPC: G06F21/62 , G06F16/951
Abstract: Systems and methods obtain personal identity information, identify a user's personal documents containing sensitive information, and can optionally protect the sensitive documents. A user's personal identity information can be obtained from various sources such as operating system, email clients, web browsers, Active Directory or from user's documents. The user's documents on hard drives, cloud storage etc. can be searched. Sensitive documents with personal identities are identified and optionally protected against misuse and theft.
-
公开(公告)号:US20200210549A1
公开(公告)日:2020-07-02
申请号:US16235427
申请日:2018-12-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
-
-
-
-
-
-
-
-