-
公开(公告)号:US10672056B2
公开(公告)日:2020-06-02
申请号:US15472474
申请日:2017-03-29
Applicant: Avast Software s.r.o.
Inventor: Denis Shtyrov , Thomas Salomon
Abstract: Systems and methods for determining software recommendations for a user. A first application list of applications installed on a user's computer is received. A distribution score is determined for each application in the first application list. A set of least distributed applications is determined based on the distribution score. A similarity score is determined for each user in a set of users having one or more applications of the set of least distributed applications installed on their respective systems. A second list of applications is determined based on applications installed by users in the set of users having a similarity score above a threshold. Recommendations for applications in the first list of applications are determined based, at least in part, on typicality scores for the applications.
-
公开(公告)号:US20200099783A1
公开(公告)日:2020-03-26
申请号:US16140035
申请日:2018-09-24
Applicant: Avast Software s.r.o.
Inventor: Jinshan Liu , Richard Kmieclak , Juyong Do , Rajarshi Gupta
Abstract: A content filter setting method includes enabling a user to choose a setting of a filter for a particular application in a user interface of a user device. The setting of the filter is received from the user via the user interface, and a model is applied to determine a plurality of default settings of a plurality of filters of the particular application based on the setting of the filter and the identifying information of the user. The plurality of default settings is displayed in the user interface, and modified settings of the default settings are received via the user interface.
-
公开(公告)号:US20200008009A1
公开(公告)日:2020-01-02
申请号:US16451943
申请日:2019-06-25
Applicant: Avast Software s.r.o.
Inventor: Juyong Do
Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.
-
公开(公告)号:US10282539B2
公开(公告)日:2019-05-07
申请号:US15179423
申请日:2016-06-10
Applicant: Avast Software s.r.o.
Inventor: Pavel Studený , Petr Van{hacek over (e)}k , Martin Havelka
Abstract: Systems and methods authenticate with application extensions. An application extension requests a token from a local application. The local application generates a token and either inserts the token into a protected storage accessible only by the application extension being run by the current user or returns the token back to the application extension after being confirmed by the legitimate user. The application extension uses the token to authenticate itself with the local application.
-
公开(公告)号:US10248789B2
公开(公告)日:2019-04-02
申请号:US15349506
申请日:2016-11-11
Applicant: Avast Software s.r.o.
Inventor: Michal Augustýn
Abstract: Systems and method classify a file using filters. A file event can be determined for the file. In response to the file event, metadata is received for the file. In response to receiving the metadata, a filter of a plurality of filters is selected based on the metadata. One or more rules in the selected filter can classify the file to determine an action to be performed with respect to the file.
-
公开(公告)号:US10152255B2
公开(公告)日:2018-12-11
申请号:US15636108
申请日:2017-06-28
Applicant: Avast Software s.r.o.
Abstract: Loading a guest virtual machine from a snapshot includes determining a plurality of executable modules loaded in a guest operating system. Hash values for pages of guest physical memory in the snapshot file are determined. Hash values for pages of the executable modules executing in the guest operating system are determined. Matches to the pages in the guest physical memory and the pages of the executable modules are searched for using the hash values. Context information associated with the matching pages in the guest physical memory and the pages of the executable modules is written to the snapshot. The snapshot is modified to link the guest physical memory to the pages of the executable modules.
-
公开(公告)号:US09792130B2
公开(公告)日:2017-10-17
申请号:US14996788
申请日:2016-01-15
Applicant: Avast Software s.r.o.
Inventor: Aaron McSorely
IPC: G06F15/177 , G06F9/445 , G06F9/44
CPC classification number: G06F9/44505 , G06F9/4401 , G06F9/4406
Abstract: Systems and methods for rebooting a UEFI based system, for example from Microsoft Windows, to any UEFI application, include modifying boot configuration data by inserting a boot entry into the UEFI firmware boot manager to cause execution of a non-Windows UEFI application.
-
公开(公告)号:US09552475B2
公开(公告)日:2017-01-24
申请号:US14737353
申请日:2015-06-11
Applicant: Avast Software s.r.o.
Inventor: Jan {hacek over (S)}ochman , Tomá{hacek over (s)} Sixta
IPC: H04B1/06 , G06F21/36 , G06F3/0488 , H04M1/67 , G06F3/041
CPC classification number: G06F21/36 , G06F3/0416 , G06F3/0488 , G06F2221/2147 , H04M1/67
Abstract: Systems and methods provide a security function for a device or applications running on a device. A lock tap sequence is entered by a user when the device is to be locked. When the user desires to unlock the device, the user enters a unlock tap sequence. If the lock tap sequence matches the unlock tap sequence, the device is unlocked.
Abstract translation: 系统和方法为设备上运行的设备或应用程序提供安全功能。 当设备被锁定时,用户输入锁定抽头顺序。 当用户希望解锁设备时,用户输入解锁抽头序列。 如果锁定抽头顺序与解锁分接序列一致,则设备将被解锁。
-
公开(公告)号:US20250039182A1
公开(公告)日:2025-01-30
申请号:US18909465
申请日:2024-10-08
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Juyong Do , John Poothokaran
IPC: H04L9/40 , G06F16/9535 , G06F21/62
Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
-
公开(公告)号:US20240362335A1
公开(公告)日:2024-10-31
申请号:US18306861
申请日:2023-04-25
Applicant: Avast Software s.r.o.
Inventor: Fabrizio Biondi , Andrew Gardner
CPC classification number: G06F21/577 , G06F21/53 , G06F2221/033
Abstract: Malicious activity is identified in a plurality of sequences of computer instructions by identifying a plurality of sequences of computer instructions of interest, and assigning the plurality of sequences of computer instructions into two or more groups. A virtual machine sandbox is executed for each of the two or more groups, and each of the plurality of sequences of computer instructions is executed in the virtual machine sandbox into which the sequence of computer instructions has been assigned. Behavior of the executing instruction sequences is monitored, and is used to determine whether each of the groups has at least one executed sequence of computer instructions that is likely malicious.
-
-
-
-
-
-
-
-
-