-
公开(公告)号:US10574665B2
公开(公告)日:2020-02-25
申请号:US15716389
申请日:2017-09-26
Applicant: Avast Software s.r.o.
Inventor: Ond{hacek over (r)}ej Planý
IPC: H04L29/06 , H04W4/02 , H04W12/08 , H04W12/06 , G06K9/32 , G06K9/18 , G06K9/22 , H04W12/00 , H04W4/80
Abstract: A computing device can initiate a pairing operation with mobile computing device. The computing device encodes a pairing secret into a displayable code for presentation. The size of the displayable code can be determined in accordance with a threshold distance and display parameters. The mobile computing device is positioned such that an image of the displayable code substantially fills a boundary whose size is determined according to a desired threshold distance, a focal length, and parameters of a sensor chip. The displayable code is decoded to reveal the pairing secret to the mobile computing device. The pairing secret is used to complete the pairing process with the computing device. Once pairing has been completed, the computing device can measure a signal strength between the computing device and the mobile computing device. The signal strength can be stored to be used for later authorization purposes.
-
公开(公告)号:US10511602B2
公开(公告)日:2019-12-17
申请号:US15604206
申请日:2017-05-24
Applicant: AVG Netherlands B.V.
Inventor: Amit Siwal , Pavel Mironchyk
Abstract: Methods and systems for securing a network including IoT devices are provided. A networking device system can regulate the ability of IoT devices to communicate with their corresponding cloud servers over the Internet, for example, by allowing a device to connect to its associated cloud servers when a user (e.g., an authorized user) requests to use the device. The system can communicate (e.g., directly) with users outside of the network through an app and/or a software development kit installed on user client device(s), where communications received from the app or kit (e.g., to access one or more IoT devices on the network) can be presumed to originate from authorized users.
-
公开(公告)号:US10448356B1
公开(公告)日:2019-10-15
申请号:US16370958
申请日:2019-03-30
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta , Leo H. Kwong
IPC: H04W8/24 , H04W64/00 , H04W4/029 , H04B17/318
Abstract: A location anomaly for a mobile device can be detected using non-location information from the mobile device. The non-location information does not include data from a location based device, such as a GPS. A probabilistic model is created using historical non-location information accumulated from the mobile device. Current non-location data is compared with the probabilistic model to determine a probability associated with the current non-location information. If the probability is less than a predetermined or configurable threshold, a location anomaly is detected. A notification of the location anomaly may be displayed and/or transmitted in response to detecting the location anomaly.
-
公开(公告)号:US10437995B2
公开(公告)日:2019-10-08
申请号:US15474007
申请日:2017-03-30
Applicant: Avast Software s.r.o.
Inventor: Libor Mo{hacek over (r)}kovský
Abstract: Systems and methods are described which integrate file properties that in conventional systems has been considered weaker evidence of malware and analyzes the information to produce reliable results. Properties such as file paths, file names, source domains, IP protocol ASNs, section checksums, digital signatures that are not always present and not always reliable can be integrated into the classification process using a graph. A 1-neighborhood of object values in the graph may be created and analyzed to suggest a malware family label based on files having similar properties.
-
公开(公告)号:US10200391B2
公开(公告)日:2019-02-05
申请号:US15275039
申请日:2016-09-23
Applicant: Avast Software s.r.o.
Inventor: Libor Mo{hacek over (r)}kovský
IPC: H04L29/06
Abstract: Systems and methods analyze input files to automatically determine malware signatures. A set of input files known to contain a particular type of malware can be provided to a file analyzer. The file analyzer can analyze the file using a sliding window to create vectors from values that are provided by multiple filters that process each window. The vectors created for a file define a response matrix. The response matrices for a set of input files can be analyzed by a classifier to determine useful vector components that can define a signature for the malware.
-
公开(公告)号:US10198576B2
公开(公告)日:2019-02-05
申请号:US15374865
申请日:2016-12-09
Applicant: Avast Software s.r.o.
Inventor: Martin Vejmelka
Abstract: Systems and method identify potentially mislabeled file samples. A graph is created from a plurality of sample files. The graph includes nodes associated with the sample files and behavior nodes associated with behavior signatures. Phantom nodes are created in the graph for those sample files having a known label. During a label propagation operation, a node receives data indicating a label distribution of a neighbor node in the graph. In response to determining that the current label for the node is known, a neighborhood opinion is determined for the associated phantom node, based at least in part on the label distribution of the neighboring nodes. After the label propagation operation has completed, differences between the neighborhood opinion and the current label distribution for nodes are determined. If the difference exceeds a threshold, then the current label may be incorrect.
-
公开(公告)号:US10019533B2
公开(公告)日:2018-07-10
申请号:US14718901
申请日:2015-05-21
Applicant: Avast Software B.V.
Inventor: Shaul Levi , Shareen Racke-Bodha , Jessica Downey , Or Hiltch
IPC: G06F17/30
CPC classification number: G06F16/9577 , G06F16/9535 , G06F16/957 , G06F16/986
Abstract: Methods and systems for administering a browser store for computing device web browser applications, particularly browsers featuring tabbed viewing of web pages. A qualifying trigger event, such as a change in the current active tab of the browser, or a navigation to a URL in the active tab, is detected by an exemplary system. The system, having been monitoring user interaction with the browser's tabs, regulates the browser store such that, upon detecting a trigger event, only data (e.g., cookies) pertaining to the web site whose web page is presently displayed in the browser's active tab is retained. Any other data unrelated to the web site is copied to a virtual memory for future reference and purged from the browser store. Additionally, any data pertaining to the web site that may have been previously transferred to the virtual memory is retrieved therefrom and relocated to the browser store. Moreover, any such data retrieved from the virtual memory that require updating, e.g., upon request or instruction by the site's web server, is updated or replaced as appropriate.
-
公开(公告)号:US09921765B2
公开(公告)日:2018-03-20
申请号:US14868194
申请日:2015-09-28
Applicant: AVAST Software s.r.o.
Inventor: Petr Kurtin
CPC classification number: G06F3/0619 , G06F3/065 , G06F3/0665 , G06F3/0689 , G06F17/30235
Abstract: Systems and methods create partial snapshot for a volume. Files and folders are identified for inclusion in the partial snapshot. In response to writing updated data to the volume, a volume snapshot layer can determine of the updated data is associated with a file or folder in the partial snapshot. If the file or folder is included in the partial snapshot, original data at the volume location is read from the volume and written to the partial snapshot.
-
-
-
-
-
-
-