-
171.
公开(公告)号:US11005871B2
公开(公告)日:2021-05-11
申请号:US16245042
申请日:2019-01-10
Applicant: Avast Software s.r.o.
Inventor: Joe Anakata , Rajarshi Gupta
Abstract: A central platform remote from a local network can detect anomalies on the local network. The central platform can assign a unique pair of DNS server IP addresses to the local network. The central platform can receive configuration data from the local network and use the configuration data and the assigned pair of DNS server IP addresses to uniquely identify devices on the local network. In the case that current network flow statistics do not match expected network flow statistics for the local network, a device causing the anomalous behavior can be identified using the assigned pair of DNS server IP addresses and configuration data.
-
公开(公告)号:US20210136106A1
公开(公告)日:2021-05-06
申请号:US16730868
申请日:2019-12-30
Applicant: Avast Software s.r.o.
Inventor: Gandhi Balasubramaniam
Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example, the endpoint DNS agent receives an HTTP message from a client browser including a Server Name Identifier tag, and generates a signed certificate spoofing the domain identified in the Server Name Identifier tag to insert itself as a man-in-the-middle between the identified domain and the client browser.
-
公开(公告)号:US10997278B2
公开(公告)日:2021-05-04
申请号:US16235427
申请日:2018-12-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US20210097201A1
公开(公告)日:2021-04-01
申请号:US16586734
申请日:2019-09-27
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: Systems and methods receive a form having one or more fields for receiving personally identifying information (PII). Input data that includes PII is received for the form. The system and methods model the characteristics of true PII to generate a model associated with the form. Synthetic PII is generated based, at least in part, the true provided to the one or more fields of the form.
-
公开(公告)号:US10909243B2
公开(公告)日:2021-02-02
申请号:US16022587
申请日:2018-06-28
Applicant: Avast Software s.r.o.
Inventor: Zden{hacek over (e)}k Breitenbacher
Abstract: Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each instruction in the scope of instructions, a determination is made if the instruction performs an ineffective operation or if the instruction, in combination with another instruction, renders either or both instructions ineffective. Ineffective instructions are filtered such that they do not appear in an output buffer.
-
公开(公告)号:US20210026978A1
公开(公告)日:2021-01-28
申请号:US16519556
申请日:2019-07-23
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
-
公开(公告)号:US10834609B2
公开(公告)日:2020-11-10
申请号:US16020891
申请日:2018-06-27
Applicant: Avast Software s.r.o.
Abstract: Systems and methods provide real-time feedback of the effect of changes in router placement and physical configuration on the overall quality of device connections. This feedback assists a user to improve placement and physical configuration, until an optimal positioning or configuration is found.
-
公开(公告)号:US10708416B2
公开(公告)日:2020-07-07
申请号:US15937369
申请日:2018-03-27
Applicant: Avast Software s.r.o.
Inventor: Ji{hacek over (r)}í Dutkevi{hacek over (c)} , Martin Horváth , Juraj Chrappa , Vojtech Tůma
Abstract: Phone numbers can be identified as being associated with spam callers. Data associated with previously identified spammer phone numbers is analyzed to obtain one or more input parameters for a classification engine. The classification engine uses the input parameters to identify one or more phone numbers in data associated with currently active phone numbers as being associated with spam callers. The one or more phone numbers identified as being associated with spam callers can be provided to call blockers of end-user telephone devices.
-
公开(公告)号:US10678921B2
公开(公告)日:2020-06-09
申请号:US15721244
申请日:2017-09-29
Applicant: Avast Software s.r.o.
Inventor: Libor Mo{hacek over (r)}kovský
Abstract: Detecting malware includes monitoring an event stream for an executable program, where the event stream includes a plurality of events such as API call events. A first plurality of hash values is determined for the event stream. In response to an occurrence of a trigger event in the event stream, the first plurality of hash values for the event stream can be compared with a second plurality of hash values that represents an event stream for a known malware executable. A determination can be made if a behavior represented by the first plurality of hash values is a permitted behavior based on the comparison.
-
公开(公告)号:US10582336B2
公开(公告)日:2020-03-03
申请号:US16451943
申请日:2019-06-25
Applicant: Avast Software s.r.o.
Inventor: Juyong Do
Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.
-
-
-
-
-
-
-
-
-