-
公开(公告)号:US11475014B2
公开(公告)日:2022-10-18
申请号:US16721745
申请日:2019-12-19
Applicant: Avast Software s.r.o.
IPC: G06F16/2455 , G06F7/08 , G06F16/22 , G06F16/23
Abstract: Systems and methods maintain a toplist associated with a sliding window having m elements. The toplist can include the top k elements of the sliding window, where k is less than m (typically an order of magnitude or more less than m). As new elements are received from a data stream, a counter associated with the new element is updated and the new element is inserted into the sliding window. If the toplist has less than k elements, the new element is added. Otherwise, if the new element is already in the toplist, its counter value is updated with the new value. Otherwise, if the new element's counter is smaller than the smallest element in toplist, then do nothing. If the new element counter is larger than the smallest counter in the toplist, the smallest element is discarded from the toplist and the new element is inserted.
-
公开(公告)号:US11451841B2
公开(公告)日:2022-09-20
申请号:US17111086
申请日:2020-12-03
Applicant: Avast Software s.r.o.
IPC: H04N21/24 , H04N21/258 , H04L65/612
Abstract: A method of providing a content feed. The method includes monitoring a plurality of user content streams of a plurality of users on a plurality of computing devices, the plurality of user content streams including a plurality of content instances accessible via a network. A plurality of archetypes are generated based on the plurality of user content streams. A selection of a particular archetype of the plurality of archetypes from a particular user is received on a particular computing device. A particular content stream is determined based on the particular archetype, and the particular content stream is delivered to the particular user via the particular computing device.
-
公开(公告)号:US20220239523A1
公开(公告)日:2022-07-28
申请号:US17649027
申请日:2022-01-26
Applicant: Avast Software s.r.o.
Inventor: Thomas Wespel , Yohamnes Hernandez Baez
IPC: H04L12/28 , G06F3/04847 , G06V20/50 , G06F3/0481 , G06F3/0488
Abstract: A universal virtual device remote control is implemented on a computerized device such as a smart phone. The remote control operates by receiving one or more pictures of a target device, and identifying the target device by comparing the one or more pictures to pictures in a data set. The remote control also receives functional data associated with the identified device from the data set, and presents controls for the physical device to a user based on the received functional data. An input is received from the user in association with one or more of the controls, and a command associated with the input is sent to the identified device based on the functional data associated with the identified device.
-
公开(公告)号:US11316861B2
公开(公告)日:2022-04-26
申请号:US16455480
申请日:2019-06-27
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A method of selecting devices on a private network for security protection via a network security device comprises classifying devices on the private network into devices that are sometimes protected and devices that are always either protected or not protected. Threats are monitored, the threats comprising at least one of a macro security event and a local security event, the macro security event detected by one or more external systems and the local security event detected by one or more devices local to the private network. When a threat is detected, it is determined whether the detected threat is a threat to one or more devices on the private network classified as devices that are sometimes protected, and if the detected threat is determined to be a threat to the one or more devices that are sometimes protected the one or more devices are protected.
-
公开(公告)号:US20220103398A1
公开(公告)日:2022-03-31
申请号:US17034719
申请日:2020-09-28
Applicant: Avast Software s.r.o.
Inventor: Bin Hu , Rajarshi Gupta
Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.
-
公开(公告)号:US11222377B2
公开(公告)日:2022-01-11
申请号:US16146863
申请日:2018-09-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A recommendation engine can provide recommendations with respect to an application and can provide insights to a user of a computing device. The recommendation engine can receive a prediction based on user engagement with the application during an initial period of time (e.g., a trial period) as to whether the user will convert use of the application to a paid basis (e.g., a subscription or license to the application). An action can be recommended based on the prediction. The recommendation engine can provide insights to a user based on a score associated with the insight. The score can be determined by measuring previous user interactions with the insight over a period of time.
-
公开(公告)号:US11170101B2
公开(公告)日:2021-11-09
申请号:US16694123
申请日:2019-11-25
Applicant: Avast Software s.r.o.
Inventor: Hiram Lew , Filip Havlí{hacek over (c)}ek , Pablo Sole , Tomá{hacek over (s)} Pop
Abstract: Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware.
-
公开(公告)号:US20210288965A1
公开(公告)日:2021-09-16
申请号:US16820005
申请日:2020-03-16
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Juyong Do , John Poothokaran
IPC: H04L29/06 , G06F16/9535 , G06F21/62
Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
-
公开(公告)号:US20210185046A1
公开(公告)日:2021-06-17
申请号:US16714318
申请日:2019-12-13
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
IPC: H04L29/06 , G06F3/0482 , H04L29/08 , G06F17/16
Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.
-
公开(公告)号:US11030151B2
公开(公告)日:2021-06-08
申请号:US15940302
申请日:2018-03-29
Applicant: Avast Software s.r.o.
IPC: G06F16/13 , G06F16/951 , G06F16/31
Abstract: Systems and methods create an inverted index for a set of documents utilizing a heap data structure. The documents can be divided into a series of n-grams. The n-grams can be hashed, producing hashed n-gram values. A first hashed n-gram value can be placed into the heap data structure. Operations performed using the heap data structure obtain document identifiers that are associated with documents that include a hashed n-gram value that matches the top n-gram value in the heap.
-
-
-
-
-
-
-
-
-