-
公开(公告)号:US11170053B2
公开(公告)日:2021-11-09
申请号:US15178235
申请日:2016-06-09
Applicant: Avast Software s.r.o.
IPC: G06F16/903
Abstract: Systems and methods perform various optimizations of an LLCS algorithm for use in determining if a set of input sequences are similar to a query sequence. The optimizations include filtering out sequence from the set of input sequences where the estimated similarity of the sequence with the query sequence is below a threshold value. The remaining sequences can then be provided to an LLCS algorithm where the output of the LLCS algorithm is used in a similarity function to determine an actual similarity of an input sequence with a query sequence.
-
公开(公告)号:US20210211402A1
公开(公告)日:2021-07-08
申请号:US16736492
申请日:2020-01-07
Applicant: Avast Software s.r.o.
Inventor: Wicher Thomas Maarseveen , Lukás Karas
Abstract: A private network device such as a security device is inserted in a private network using ARP spoofing, which includes sending periodic ARP packets from the private network device to a router and to client devices to ensure the private network device spoofing remains intact. The private network device determines when at least one of the one or more private network devices is inactive, such as by monitoring the network for activity between the devices and a router, and suspends sending the periodic ARP packets to the client devices when they are inactive.
-
公开(公告)号:US20210136037A1
公开(公告)日:2021-05-06
申请号:US16668861
申请日:2019-10-30
Applicant: Avast Software s.r.o.
Inventor: Gandhi Balasubramaniam
Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example processing the received DNS request comprises identifying the client device, end user, and the DNS request to a cloud-based DNS server, and processing a response received from the cloud-based DNS server received in response to the DNS request. The endpoint DNS agent is further operable to distinguish between DNS requests for local domains and remote domains, and to redirect DNS requests for local domains to a local network DNS server.
-
公开(公告)号:US20210099431A1
公开(公告)日:2021-04-01
申请号:US16918851
申请日:2020-07-01
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: A method of generating a synthetic user profile to protect the user's privacy includes generating a synthetic profile comprising a plurality of profile elements and selecting a network egress point for use with the synthetic profile. The synthetic profile elements and egress point have a consistent geographic location, or the synthetic profile elements are consistent with other external information.
-
公开(公告)号:US20210097029A1
公开(公告)日:2021-04-01
申请号:US16586400
申请日:2019-09-27
Applicant: Avast Software s.r.o.
Inventor: Pavel Cimbál
IPC: G06F16/174 , G06F21/56
Abstract: A method of compressing a string array comprising strings with similarity includes selecting a string compression method from among a plurality of available compression methods based on at least which of the available compression method yields the shortest compressed string. The string is then compressed using the selected string compression method. The array of strings to be compressed comprises text characters represented by a first range of values within a word, and compressed string comprises one or more words in a second range of values dedicated to compression and not overlapping with the first range of values. This process is repeated for additional strings in the string array, such that the compression method used for each of a plurality of strings is independently selected.
-
公开(公告)号:US10915657B2
公开(公告)日:2021-02-09
申请号:US16037997
申请日:2018-07-17
Applicant: Avast Software s.r.o.
IPC: G06F21/62 , G06F16/951
Abstract: Systems and methods obtain personal identity information, identify a user's personal documents containing sensitive information, and can optionally protect the sensitive documents. A user's personal identity information can be obtained from various sources such as operating system, email clients, web browsers, Active Directory or from user's documents. The user's documents on hard drives, cloud storage etc. can be searched. Sensitive documents with personal identities are identified and optionally protected against misuse and theft.
-
公开(公告)号:US20200274879A1
公开(公告)日:2020-08-27
申请号:US16796802
申请日:2020-02-20
Applicant: Avast Software s.r.o.
Inventor: Karel Fuka , Matús Baniar
Abstract: Systems and methods provide an entity identifier (EID) for use in distributed systems, where the entity identifier includes inherent privacy features and where an estimate of the distinct count of the entity identifiers in a distributed system can be determined. A unique identifier (e.g., a GUID) for an entity is received. A hash value can be generated for the unique identifier using a hash function that is not guaranteed to generate unique values. An EID is created using a portion of the bits of the hash value and stored in a database. An estimated distinct count of entities based on a count of EIDs in the database can be determined based on the count of EIDs in the database and the size of the EID space.
-
公开(公告)号:US20200210549A1
公开(公告)日:2020-07-02
申请号:US16235427
申请日:2018-12-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US10672056B2
公开(公告)日:2020-06-02
申请号:US15472474
申请日:2017-03-29
Applicant: Avast Software s.r.o.
Inventor: Denis Shtyrov , Thomas Salomon
Abstract: Systems and methods for determining software recommendations for a user. A first application list of applications installed on a user's computer is received. A distribution score is determined for each application in the first application list. A set of least distributed applications is determined based on the distribution score. A similarity score is determined for each user in a set of users having one or more applications of the set of least distributed applications installed on their respective systems. A second list of applications is determined based on applications installed by users in the set of users having a similarity score above a threshold. Recommendations for applications in the first list of applications are determined based, at least in part, on typicality scores for the applications.
-
公开(公告)号:US20200099783A1
公开(公告)日:2020-03-26
申请号:US16140035
申请日:2018-09-24
Applicant: Avast Software s.r.o.
Inventor: Jinshan Liu , Richard Kmieclak , Juyong Do , Rajarshi Gupta
Abstract: A content filter setting method includes enabling a user to choose a setting of a filter for a particular application in a user interface of a user device. The setting of the filter is received from the user via the user interface, and a model is applied to determine a plurality of default settings of a plurality of filters of the particular application based on the setting of the filter and the identifying information of the user. The plurality of default settings is displayed in the user interface, and modified settings of the default settings are received via the user interface.
-
-
-
-
-
-
-
-
-