-
公开(公告)号:US20210084060A1
公开(公告)日:2021-03-18
申请号:US16571945
申请日:2019-09-16
Applicant: Avast Software s.r.o.
Inventor: Deepali Garg , Armin Wasicek
IPC: H04L29/06
Abstract: A method of identifying cryptocurrency mining on a networked computerized device includes intercepting network traffic between the networked computerized device and a public network, and extracting Internet Protocol (IP) packet data of the intercepted network traffic. The IP packet data of the intercepted network traffic is evaluated such that if the intercepted network traffic is determined to be characteristic of communication with a cryptocurrency mining pool it is determined that the networked computerized device is mining cryptocurrency. One or more remedial actions are taken if it is determined that the networked computerized device is mining cryptocurrency, such as blocking traffic between the networked computerized device and the mining pool or notifying a user.
-
公开(公告)号:US10862862B2
公开(公告)日:2020-12-08
申请号:US16205074
申请日:2018-11-29
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Joe Anakata , Richard Kmieciak
Abstract: A device identification module identifies devices on a remote network, where the remote network may use Network Address Translation techniques. The device identification module can receive a list of devices on the remote network. The devices in the remote network can be identified by the device classification module based, at least in part, on the device classification and one or more of Dynamic Host Configuration Protocol (DHCP) information for the remote network, port sequences used in Network Address Translation on the remote network, and a live Uniform Resource Locator (URL) check performed on the remote network.
-
公开(公告)号:US10855836B2
公开(公告)日:2020-12-01
申请号:US16140035
申请日:2018-09-24
Applicant: Avast Software s.r.o.
Inventor: Jinshan Liu , Richard Kmieciak , Juyong Do , Rajarshi Gupta
Abstract: A content filter setting method includes enabling a user to choose a setting of a filter for a particular application in a user interface of a user device. The setting of the filter is received from the user via the user interface, and a model is applied to determine a plurality of default settings of a plurality of filters of the particular application based on the setting of the filter and the identifying information of the user. The plurality of default settings is displayed in the user interface, and modified settings of the default settings are received via the user interface.
-
公开(公告)号:US20200089875A1
公开(公告)日:2020-03-19
申请号:US16694123
申请日:2019-11-25
Applicant: Avast Software s.r.o.
Inventor: Hiram Lew , Filip Havlícek , Pablo Sole , Tomás Pop
Abstract: Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware.
-
公开(公告)号:US10594728B2
公开(公告)日:2020-03-17
申请号:US15638160
申请日:2017-06-29
Applicant: Avast Software s.r.o.
Inventor: Dmitriy Kuznetsov , Martin Smarda , Pavel Sramek
Abstract: Detecting a Domain Name Service (DNS) hijacking includes resolving names in a hijack target group list to their respective Internet Protocol (IP) addresses. In response to determining that two names in the hijack target group list resolved to a common IP address, a determination is made whether a legitimate reason exists for the two names in the hijack target group list to resolve to the common IP address. In response to determining that a legitimate reason does not exist for the two names in the hijack target group list to resolve to a common IP address, a DNS hijacking is indicated.
-
公开(公告)号:US20190302897A1
公开(公告)日:2019-10-03
申请号:US15942360
申请日:2018-03-30
Applicant: Avast Software s.r.o.
Inventor: Thomas Wespel , Rajarshi Gupta
IPC: G06F3/023 , H04W4/14 , G06F17/28 , G06F17/27 , G06F3/0488 , G06F3/0482
Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.
-
177.
公开(公告)号:US10367876B2
公开(公告)日:2019-07-30
申请号:US15385110
申请日:2016-12-20
Applicant: Avast Software s.r.o.
Inventor: David Chih-Yuan Chen , Jose Luis Ferras Pereira , Pablo German Sole
Abstract: Systems and methods monitor a system including a remote desktop, a trusted mobile instance, and a delivery handler. The delivery handler can determine if the system is overloaded and to take the appropriate measures to maintain a negotiated minimal QoS and adapt as necessary when the conditions vary. Additionally, the systems and method can address security issues by separating privileges that are typically bundled together in conventional systems, and by applying isolation mechanisms to exposed areas of the system.
-
公开(公告)号:US10349211B1
公开(公告)日:2019-07-09
申请号:US16024839
申请日:2018-06-30
Applicant: Avast Software s.r.o.
Inventor: Juyong Do
Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.
-
公开(公告)号:US10346518B2
公开(公告)日:2019-07-09
申请号:US14879892
申请日:2015-10-09
Applicant: Avast Software s.r.o.
Inventor: Thomas Wespel , Thomas Salomon
Abstract: A method and apparatus for an automated classification and reset of browser settings is provided. A set of disreputable browser setting values is maintained based on statistics associated with the browser setting values. In response to determining that an attempt is made to set a browser setting to a value in the set of disreputable browser setting values, a notification can be presented to the user. The notification can include options in a set of reputable browser settings.
-
公开(公告)号:US10341316B2
公开(公告)日:2019-07-02
申请号:US15186177
申请日:2016-06-17
Applicant: Avast Software s.r.o.
Inventor: Petr Dvo{hacek over (r)}ák
Abstract: A password manager injects credentials into a web browser request. A user can browse to a form provided by a server that includes a password field. A plug-in requests a password for the field from a password manager. The actual password is not provided to the plug-in or the browser. The password manager provides a proxy password that is not the actual password for the field. A request interceptor in a separate process from the browser intercepts the completed request as it is sent to the server and replaces the proxy password with the actual password.
-
-
-
-
-
-
-
-
-