-
公开(公告)号:US11625494B2
公开(公告)日:2023-04-11
申请号:US16784222
申请日:2020-02-06
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Armin Wasicek
IPC: G06F16/00 , G06F21/62 , G06F16/242 , G06K9/62 , G06N3/08 , G06F16/958 , G06F16/955 , G06F9/445 , G06F16/9535
Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.
-
公开(公告)号:US11568024B2
公开(公告)日:2023-01-31
申请号:US17228064
申请日:2021-04-12
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US20230012394A1
公开(公告)日:2023-01-12
申请号:US17370814
申请日:2021-07-08
Applicant: Avast Software s.r.o.
Inventor: Michal Vaner
IPC: H04L12/835 , H04L12/26
Abstract: A method of managing a fill state of a buffer in an external device includes monitoring the latency of a network connection to an external device having a network buffer via a managing device. A state of fill of the network buffer is determined based on at least the monitored latency of the network connection, and the effective network speed is estimated based on the state of fill of the network buffer. One or more network traffic scheduling parameters are adjusted in response to the estimated effective network speed, such as a maximum currently usable network speed that is lower than a maximum possible speed of the network. The maximum currently usable network speed of the network connection is periodically increased if the monitored latency is in a normal state and the maximum currently usable network speed is lower than the maximum possible speed of the network.
-
214.
公开(公告)号:US20220417262A1
公开(公告)日:2022-12-29
申请号:US17356356
申请日:2021-06-23
Applicant: Avast Software s.r.o.
Inventor: Jakub Kroustek , Lukàs Zobal
IPC: H04L29/06
Abstract: A method includes enabling a messaging server and providing credentials for the messaging server. A computing system is enabled and a malware application is received by the computing system. The malware application is executed by the computing system. The credentials are rendered accessible to the malware application via the computing system, and the malware application is enabled to transmit the credentials via network transmission from the computing system to a computer. An actor is enabled to access the messaging server over a network in response to the actor applying the credentials, and a first electronic message transmitted by the actor is received by the messaging server, the first electronic message including first content.
-
公开(公告)号:US11461360B2
公开(公告)日:2022-10-04
申请号:US16370952
申请日:2019-03-30
Applicant: Avast Software s.r.o.
Inventor: Martin Ŝmarda , Pavel Ŝrámek
Abstract: Systems and methods capable of initializing centroids in large datasets before commencement of clustering operations. The systems and methods can utilize a random sampling window to increase the speed of centroid initialization. The systems and methods can be modified to leverage parallelism and be configured for execution on multi-node compute clusters. Optionally, the initialization systems and methods can include post-initialization centroid discarding and/or re-assignment operations that adaptively control cluster sizes.
-
公开(公告)号:US11438299B2
公开(公告)日:2022-09-06
申请号:US16736492
申请日:2020-01-07
Applicant: Avast Software s.r.o.
Inventor: Wicher Thomas Maarseveen , Lukás Karas
IPC: H04L61/103 , H04L9/40 , H04L61/2514 , H04L61/5014
Abstract: A private network device such as a security device is inserted in a private network using ARP spoofing, which includes sending periodic ARP packets from the private network device to a router and to client devices to ensure the private network device spoofing remains intact. The private network device determines when at least one of the one or more private network devices is inactive, such as by monitoring the network for activity between the devices and a router, and suspends sending the periodic ARP packets to the client devices when they are inactive.
-
公开(公告)号:US11295118B2
公开(公告)日:2022-04-05
申请号:US16022400
申请日:2018-06-28
Applicant: Avast Software s.r.o.
Inventor: Jeroen De Knijf
IPC: G06K9/00 , G06F21/32 , G06F16/583 , H04L29/06
Abstract: Systems and method verify a user based on facial image data, without prior information about the user. A user name and facial image of the user are received. A search query comprising the user name can be issued to one or more search engines. Images returned as a result of the search query can be filtered to determine a set of candidate images. The images in the set of candidate images can be compared to the facial image of the use to determine a probability of a match. If there is a match, the user can be considered verified.
-
公开(公告)号:US11256859B2
公开(公告)日:2022-02-22
申请号:US15272961
申请日:2016-09-22
Applicant: Avast Software s.r.o.
Inventor: Pavel Studenÿ
IPC: G06F16/90 , G06F40/174 , G06F16/958
Abstract: Web page items and other requests can be automatically categorized. An interaction with a web page item can be categorized based on previous categorizations of other web page items in which the same or similar data has been entered into a web page. A classification database containing categories of classified web page items is maintained. An interaction database containing interaction records of a user is maintained. The interaction records include a value corresponding to the user and a web page item. A web page item on a web page visited by a user and that is a user-fillable field that has been previously categorized in the classification database may be automatically populated with a value stored in an interaction database and that corresponds to the user and the user-fillable field.
-
公开(公告)号:US11256804B2
公开(公告)日:2022-02-22
申请号:US16184423
申请日:2018-11-08
Inventor: Marek Kr{hacek over (c)}ál , Martin Bálek , Ond{hacek over (r)}ej {hacek over (S)}vec , Martin Vejmelka
IPC: G06F21/56 , G06N3/02 , H04L29/06 , H04W12/12 , H04W12/128
Abstract: A convolutional deep neural network architecture can detect malicious executable files by reading the raw sequence of bytes, that is, without any domain-specific feature extraction or preprocessing.
-
公开(公告)号:US11223625B2
公开(公告)日:2022-01-11
申请号:US15858804
申请日:2017-12-29
Applicant: Avast Software s.r.o.
Inventor: Jeroen De Knijf , Amit Siwal , Shaul Levi
IPC: H04L29/06 , G06F16/20 , H04L29/08 , H04W4/70 , H04W12/122 , G06F21/52 , G06F21/55 , G06F21/56 , H04L12/24 , H04L12/26
Abstract: Malicious behavior of a device on a local network may be detected. A data stream from a device may be collected. A functional group may be created using behavioral data of devices of a known type. A behavior profile for the functional group may be generated and stored in a database. The data stream of the device is compared to the behavior profile of the functional group. A malicious behavior is indicated for the device in response to determining that the device's current behavior is not within a predetermined or configurable threshold of the behavior profile.
-
-
-
-
-
-
-
-
-