-
公开(公告)号:US12113798B2
公开(公告)日:2024-10-08
申请号:US18316023
申请日:2023-05-11
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Juyong Do , John Poothokaran
IPC: H04L9/40 , G06F16/9535 , G06F21/62
CPC classification number: H04L63/102 , G06F16/9535 , G06F21/6263
Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
-
公开(公告)号:US20240259393A1
公开(公告)日:2024-08-01
申请号:US18159821
申请日:2023-01-26
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Vibhor Sehgal
IPC: H04L9/40 , G06F18/241
CPC classification number: H04L63/123 , G06F18/241
Abstract: A method and system detects at a plurality of network locations a plurality of accuracy ratings of a plurality of media instances and detects the plurality of media instances. A particular accuracy rating of one or more particular media instances is detected at a particular network location, and the one or more particular media instances are detected. A bias of the particular accuracy rating is determined based on the particular accuracy rating, the one or more particular media instances, the plurality of accuracy ratings, and the plurality of media instances. An indication is transmitted to a user based on the bias of the particular accuracy rating.
-
公开(公告)号:US11882171B2
公开(公告)日:2024-01-23
申请号:US16147659
申请日:2018-09-29
Applicant: Avast Software s.r.o.
Inventor: Danny Bolick , Stewart Thomas
IPC: H04L67/02 , G06F16/951 , G06F16/958 , G06F16/955 , G06F21/64 , G06F21/44 , H04L9/40 , H04L67/563
CPC classification number: H04L67/02 , G06F16/951 , G06F16/958 , G06F16/9566 , G06F21/44 , G06F21/64 , H04L63/164 , H04L67/563 , H04L2463/081
Abstract: Systems and methods receiving an indication that a domain has been blocked. A temporary web server is created that has network address that is different from the network address associated with the blocked domain. Content is created that indicates the blocked domain, and optionally, a reason for the blocking. The network address of the temporary web server is returned to a requesting browser application, which can display the content without providing a security warning.
-
公开(公告)号:US11861006B2
公开(公告)日:2024-01-02
申请号:US17151462
申请日:2021-01-18
Applicant: Avast Software s.r.o.
Inventor: Martin Bálek , Fabrizio Biondi , Dmitry Kuznetsov , Olga Petrova
CPC classification number: G06F21/566 , G06F18/217 , G06F21/54 , G06F21/568 , G06N20/00
Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.
-
公开(公告)号:US11831672B2
公开(公告)日:2023-11-28
申请号:US17512015
申请日:2021-10-27
Applicant: Avast Software s.r.o.
Inventor: B{hacek over (r)}etislav {hacek over (S)}opík , Fabrizio Biondi , Jakub K{hacek over (r)}oustek , Olga Petrova
IPC: H04L9/40
CPC classification number: H04L63/145 , H04L63/1408 , H04L63/205
Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.
-
公开(公告)号:US20230214367A1
公开(公告)日:2023-07-06
申请号:US17569071
申请日:2022-01-05
Applicant: Avast Software s.r.o.
Inventor: Peter Kubov , Peter Matula
CPC classification number: G06F16/211 , H03M7/30
Abstract: A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed. Each of the plurality of integers is split to generate a first plurality of numbers respectively paired with a second plurality of numbers. A first tuple is generated based on the first plurality of numbers. A second tuple is generated based on the second plurality of numbers and the first plurality of numbers. The first tuple and the second tuple are stored. A system and computer readable medium enabling the data processing method are further provided.
-
公开(公告)号:US11689388B2
公开(公告)日:2023-06-27
申请号:US17034719
申请日:2020-09-28
Applicant: Avast Software s.r.o.
Inventor: Bin Hu , Rajarshi Gupta
CPC classification number: H04L12/4641 , H04L12/4633 , H04L63/1408 , H04L63/1441
Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.
-
158.
公开(公告)号:US11550910B2
公开(公告)日:2023-01-10
申请号:US16588704
申请日:2019-09-30
Applicant: Avast Software s.r.o.
Inventor: Peter Kovác
Abstract: Systems and methods use negative feedback to create generic rules for a high dimensional sparse feature space. A system receives a set of fingerprints, where a fingerprint can be a set of features of a file. The fingerprints can be clustered according to similarity. For each cluster, a proto-rule is created that has a condition for each feature. The proto-rule is simplified using negative feedback to create a well-formed rule having a comparatively small subset of the conditions in the proto-rule that are useful in determining malware. The well-formed rule can be added to a set of rules used in a malware detection system.
-
公开(公告)号:US20220368699A1
公开(公告)日:2022-11-17
申请号:US17317707
申请日:2021-05-11
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L29/06
Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.
-
公开(公告)号:US11496479B2
公开(公告)日:2022-11-08
申请号:US16714318
申请日:2019-12-13
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A method for controlling application enabling includes receiving from a user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the user to enable an application via a computing device is detected. Data permission requirements of the application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the application. The multidimensional zone is compared to the multidimensional coordinate, and the user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the user via the computing device, and the application is enabled responsive to the affirmation of the request.
-
-
-
-
-
-
-
-
-