-
公开(公告)号:US20230283612A1
公开(公告)日:2023-09-07
申请号:US18316023
申请日:2023-05-11
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Juyong Do , John Poothokaran
IPC: H04L9/40 , G06F21/62 , G06F16/9535
CPC classification number: H04L63/102 , G06F21/6263 , G06F16/9535
Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
-
公开(公告)号:US20220207170A1
公开(公告)日:2022-06-30
申请号:US17135989
申请日:2020-12-28
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.
-
公开(公告)号:US10965802B2
公开(公告)日:2021-03-30
申请号:US16446105
申请日:2019-06-19
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta
IPC: H04M3/00 , H04M1/72463 , H04L12/58 , G06N3/04 , G10L15/26 , H04L29/08 , G06F40/279
Abstract: A method of controlling use of network-connectable devices is provided. The method includes monitoring by a first computational process, operating at a first processor utilization level, communication on a user device operated by a particular user and determining based on the monitoring by the first computational process a trigger event. The method further includes monitoring by a second computational process, operating at a second processor utilization level higher than the first processor utilization level, the communication on the user device responsive to determining the trigger event. Use of the user device is restricted based at least on the monitoring by the second computational process of the communication.
-
公开(公告)号:US10568017B2
公开(公告)日:2020-02-18
申请号:US16370831
申请日:2019-03-29
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Martin Horváth
Abstract: A processor-implemented method including scanning wirelessly by a plurality of mobile devices and selecting a plurality of wireless access points based on the scanning by the plurality of mobile devices. Particular attributes of the plurality of wireless access points are determined, and the particular attributes of the plurality of wireless access points are compared. A particular set of the plurality of wireless access points are grouped based on the comparing of the particular attributes, and a particular geographic location is assigned to the particular set of the plurality of wireless access points. A particular security protocol is assigned to the particular geographic location based on the particular attributes of the particular set of the plurality of wireless access points. A particular mobile device is determined to be positioned within a particular distance of the particular geographic location, and wireless communication of the particular mobile device is restricted.
-
公开(公告)号:US20190306781A1
公开(公告)日:2019-10-03
申请号:US16370831
申请日:2019-03-29
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Martin Horváth
Abstract: A processor-implemented method including scanning wirelessly by a plurality of mobile devices and selecting a plurality of wireless access points based on the scanning by the plurality of mobile devices. Particular attributes of the plurality of wireless access points are determined, and the particular attributes of the plurality of wireless access points are compared. A particular set of the plurality of wireless access points are grouped based on the comparing of the particular attributes, and a particular geographic location is assigned to the particular set of the plurality of wireless access points. A particular security protocol is assigned to the particular geographic location based on the particular attributes of the particular set of the plurality of wireless access points. A particular mobile device is determined to be positioned within a particular distance of the particular geographic location, and wireless communication of the particular mobile device is restricted.
-
公开(公告)号:US11941052B2
公开(公告)日:2024-03-26
申请号:US17342463
申请日:2021-06-08
Applicant: Avast Software s.r.o.
Inventor: Dan Martinec , Yury Kasimov , Juyong Do
IPC: G06F16/835 , G06F40/295 , G06N20/00 , G06Q30/0201
CPC classification number: G06F16/835 , G06F40/295 , G06N20/00 , G06Q30/0201
Abstract: A method including detecting a webpage accessed by a user on a computing device via a browser. Content on the webpage is determined, and a model is applied to the content to determine a plurality of keyword sets. A network search is performed based on each of the plurality of keyword sets to generate a plurality of search results. The plurality of search results are compared to the content, and the plurality of search results are compared to each other. A factualness of the content is determined based on the comparing of the plurality of search results to the content and based on the comparing of the plurality of the search results to each other, and the user is notified via the browser of the factualness of the content.
-
公开(公告)号:US20230283611A1
公开(公告)日:2023-09-07
申请号:US18315905
申请日:2023-05-11
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Juyong Do , John Poothokaran
IPC: H04L9/40 , G06F21/62 , G06F16/9535
CPC classification number: H04L63/102 , G06F21/6263 , G06F16/9535
Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.
-
公开(公告)号:US11704423B2
公开(公告)日:2023-07-18
申请号:US17135989
申请日:2020-12-28
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
IPC: G06F21/62 , G06F21/60 , H04L67/1097 , H04L67/06 , G06F21/31
CPC classification number: G06F21/6218 , G06F21/31 , G06F21/604 , G06F21/6227 , H04L67/06 , H04L67/1097
Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.
-
公开(公告)号:US11568024B2
公开(公告)日:2023-01-31
申请号:US17228064
申请日:2021-04-12
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US20210099431A1
公开(公告)日:2021-04-01
申请号:US16918851
申请日:2020-07-01
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: A method of generating a synthetic user profile to protect the user's privacy includes generating a synthetic profile comprising a plurality of profile elements and selecting a network egress point for use with the synthetic profile. The synthetic profile elements and egress point have a consistent geographic location, or the synthetic profile elements are consistent with other external information.
-
-
-
-
-
-
-
-
-