-
公开(公告)号:US20190104166A1
公开(公告)日:2019-04-04
申请号:US16147659
申请日:2018-09-29
Applicant: Avast Software s.r.o.
Inventor: Danny Bolick , Stewart Thomas
Abstract: Systems and methods receiving an indication that a domain has been blocked. A temporary web server is created that has network address that is different from the network address associated with the blocked domain. Content is created that indicates the blocked domain, and optionally, a reason for the blocking. The network address of the temporary web server is returned to a requesting browser application, which can display the content without providing a security warning.
-
公开(公告)号:US20190102820A1
公开(公告)日:2019-04-04
申请号:US16146863
申请日:2018-09-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A recommendation engine can provide recommendations with respect to an application and can provide insights to a user of a computing device. The recommendation engine can receive a prediction based on user engagement with the application during an initial period of time (e.g., a trial period) as to whether the user will convert use of the application to a paid basis (e.g., a subscription or license to the application). An action can be recommended based on the prediction. The recommendation engine can provide insights to a user based on a score associated with the insight. The score can be determined by measuring previous user interactions with the insight over a period of time.
-
公开(公告)号:US20190005314A1
公开(公告)日:2019-01-03
申请号:US16022400
申请日:2018-06-28
Applicant: Avast Software s.r.o.
Inventor: Jeroen De Knijf
Abstract: Systems and method verify a user based on facial image data, without prior information about the user. A user name and facial image of the user are received. A search query comprising the user name can be issued to one or more search engines. Images returned as a result of the search query can be filtered to determine a set of candidate images. The images in the set of candidate images can be compared to the facial image of the use to determine a probability of a match. If there is a match, the user can be considered verified.
-
公开(公告)号:US20180285845A1
公开(公告)日:2018-10-04
申请号:US15926877
申请日:2018-03-20
Applicant: Avast Software s.r.o.
Inventor: Nir Galili
Abstract: Initiation of a purchase at an online shop or other retailer can be detected. In addition to, or instead of a payment method integrated with the online shop, one or more alternative payment services that are not integrated with the online shop or retailer can be considered for selection. A non-integrated payment service can be selected based on terms offered by the non-integrated payment service. The selected goods or services can be paid for by the non-integrated payment service using a virtual credit card. The user can reimburse the non-integrated payment service under the terms offered by the non-integrated payment service.
-
公开(公告)号:US09971789B2
公开(公告)日:2018-05-15
申请号:US14581494
申请日:2014-12-23
Applicant: AVAST Software s.r.o.
CPC classification number: G06F17/30235 , G06F3/0662 , G06F3/0665 , G06F9/45533 , G06F11/1484
Abstract: Systems and methods create virtual disks for access by a virtual machine. The virtual disk can be created from marked folders such that files and folders containing sensitive data or data not necessary for the purpose of a virtual machine using the virtual disk can be omitted from the virtual disk.
-
公开(公告)号:US20180091523A1
公开(公告)日:2018-03-29
申请号:US15716389
申请日:2017-09-26
Applicant: Avast Software s.r.o.
Inventor: Ondrej Planý
CPC classification number: H04L63/107 , G06K9/183 , G06K9/22 , G06K9/3216 , H04L63/08 , H04W4/023 , H04W4/80 , H04W12/0023 , H04W12/003 , H04W12/00522 , H04W12/06 , H04W12/08
Abstract: A computing device can initiate a pairing operation with mobile computing device. The computing device encodes a pairing secret into a displayable code for presentation. The size of the displayable code can be determined in accordance with a threshold distance and display parameters. The mobile computing device is positioned such that an image of the displayable code substantially fills a boundary whose size is determined according to a desired threshold distance, a focal length, and parameters of a sensor chip. The displayable code is decoded to reveal the pairing secret to the mobile computing device. The pairing secret is used to complete the pairing process with the computing device. Once pairing has been completed, the computing device can measure a signal strength between the computing device and the mobile computing device. The signal strength can be stored to be used for later authorization purposes.
-
公开(公告)号:US20180004546A1
公开(公告)日:2018-01-04
申请号:US15637876
申请日:2017-06-29
Applicant: Avast Software s.r.o.
Inventor: Jose Luis Ferras Pereira , David Chih-Yuan Chen , Serdar Onal
IPC: G06F9/44 , G06F3/0488
CPC classification number: G06F9/452 , G06F3/0227 , G06F3/023 , G06F3/0236 , G06F3/038 , G06F3/04886
Abstract: A keyboard for a remote device on a client device is provided. In a method of the present invention, an indication is received that a keyboard is needed for the remote device by a client device communicably coupled to the remote device. In response to receiving the indication, the client device opens a soft keyboard. Text received on the soft keyboard is transmitted text received via the soft keyboard on the client device to the remote device. Thus, a user can utilize a preferred keyboard on their own device while accessing applications on a remote device.
-
公开(公告)号:US20170373856A1
公开(公告)日:2017-12-28
申请号:US15624544
申请日:2017-06-15
Applicant: Avast Software s.r.o.
Inventor: Antonín Kriz
IPC: H04L9/32
CPC classification number: H04L9/3242 , H04L9/0643 , H04L9/3247
Abstract: A system and method for prefix fingerprints for a first file or a first data object. A prefix fingerprint comprises a plurality of hash values. The hash values of the prefix fingerprints are typically generated starting at the same offset within the file or data object, but are generated based on different data sizes. Later, a second file or second data object can be compared with the first file or first data object to determine if the second file or data object is a prefix of the first file or data object. A hash value is selected from the previously determined prefix fingerprint of the first file based on the size of the second file. A hash is generated for the second file using the same offset value and size as was used to generate the selected hash value from the prefix fingerprint. The hash values are then compared.
-
公开(公告)号:US20170279841A1
公开(公告)日:2017-09-28
申请号:US15468769
申请日:2017-03-24
Applicant: Avast Software s.r.o.
Inventor: Antonín Kríz , Libor Morkovský
Abstract: A similarity fingerprint for a data object such as a file can be automatically determined using one or more anchor values. The one or more anchor values can be provided or determined. For each anchor value, a set of distances between each instance of the anchor value in the data object is determined. The set of distances for the instance of the anchor value is aggregated into a single value. The single value is added as a component of the similarity fingerprint. Thus, if there are N anchor values, there can be N components of the similarity fingerprint. The similarity fingerprints of different data objects can be compared and the results of the comparison can be used to determine how similar the data objects are.
-
公开(公告)号:US20170192905A1
公开(公告)日:2017-07-06
申请号:US15394043
申请日:2016-12-29
Applicant: Avast Software s.r.o.
Inventor: Jakub Jermár
IPC: G06F12/1009
CPC classification number: G06F12/1009 , G06F2212/1016 , G06F2212/1024 , G06F2212/651 , G06F2212/657
Abstract: Systems and methods enable initializing and accessing page metadata stored in the last level of a multi-level page table, wherein an effort is made to reduce the number of metadata initializations and the number of page table walks for sequential accesses in comparison with a naïve method realized by a sequence of random accesses.
-
-
-
-
-
-
-
-
-