-
公开(公告)号:US20200008009A1
公开(公告)日:2020-01-02
申请号:US16451943
申请日:2019-06-25
Applicant: Avast Software s.r.o.
Inventor: Juyong Do
Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.
-
公开(公告)号:US20190394220A1
公开(公告)日:2019-12-26
申请号:US16450368
申请日:2019-06-24
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A method of identifying malicious activity in a sequence of computer instructions includes monitoring data flows from a public network to one or more networked devices on a private network and to one or more honeypots that appear to the public network to be devices on the private network, representing each such data flow as a word, and the sequence of data flows as comprising an n-gram of two or more words. The data flows are characterized with a likelihood of being malicious based on their statistical association with the one or more honeypots relative to their statistical association with one or more networked devices. Identified malicious activity is used to train a network device to identify malicious data flows and prevent them from reaching devices on the private network.
-
公开(公告)号:US20190303387A1
公开(公告)日:2019-10-03
申请号:US16370952
申请日:2019-03-30
Applicant: Avast Software s.r.o.
Inventor: Martin Smarda , Pavel Srámek
Abstract: Systems and methods capable of initializing centroids in large datasets before commencement of clustering operations. The systems and methods can utilize a random sampling window to increase the speed of centroid initialization. The systems and methods can be modified to leverage parallelism and be configured for execution on multi-node compute clusters. Optionally, the initialization systems and methods can include post-initialization centroid discarding and/or re-assignment operations that adaptively control cluster sizes.
-
234.
公开(公告)号:US20190215331A1
公开(公告)日:2019-07-11
申请号:US16245042
申请日:2019-01-10
Applicant: Avast Software s.r.o.
Inventor: Joe Anakata , Rajarshi Gupta
CPC classification number: H04L63/1425 , G06N20/00 , H04L41/046 , H04L61/1511 , H04L61/2007 , H04L61/2514 , H04L63/1416 , H04L63/1441 , H04L67/10
Abstract: A central platform remote from a local network can detect anomalies on the local network. The central platform can assign a unique pair of DNS server IP addresses to the local network. The central platform can receive configuration data from the local network and use the configuration data and the assigned pair of DNS server IP addresses to uniquely identify devices on the local network. In the case that current network flow statistics do not match expected network flow statistics for the local network, a device causing the anomalous behavior can be identified using the assigned pair of DNS server IP addresses and configuration data.
-
公开(公告)号:US20190166091A1
公开(公告)日:2019-05-30
申请号:US16205074
申请日:2018-11-29
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Joe Anakata , Richard Kmieciak
Abstract: A device identification module identifies devices on a remote network, where the remote network may use Network Address Translation techniques. The device identification module can receive a list of devices on the remote network. The devices in the remote network can be identified by the device classification module based, at least in part, on the device classification and one or more of Dynamic Host Configuration Protocol (DHCP) information for the remote network, port sequences used in Network Address Translation on the remote network, and a live Uniform Resource Locator (URL) check performed on the remote network.
-
公开(公告)号:US10282539B2
公开(公告)日:2019-05-07
申请号:US15179423
申请日:2016-06-10
Applicant: Avast Software s.r.o.
Inventor: Pavel Studený , Petr Van{hacek over (e)}k , Martin Havelka
Abstract: Systems and methods authenticate with application extensions. An application extension requests a token from a local application. The local application generates a token and either inserts the token into a protected storage accessible only by the application extension being run by the current user or returns the token back to the application extension after being confirmed by the legitimate user. The application extension uses the token to authenticate itself with the local application.
-
公开(公告)号:US10248789B2
公开(公告)日:2019-04-02
申请号:US15349506
申请日:2016-11-11
Applicant: Avast Software s.r.o.
Inventor: Michal Augustýn
Abstract: Systems and method classify a file using filters. A file event can be determined for the file. In response to the file event, metadata is received for the file. In response to receiving the metadata, a filter of a plurality of filters is selected based on the metadata. One or more rules in the selected filter can classify the file to determine an action to be performed with respect to the file.
-
公开(公告)号:US20190007656A1
公开(公告)日:2019-01-03
申请号:US16024635
申请日:2018-06-29
Applicant: Avast Software s.r.o.
Inventor: Shaul Levi , Sushil Kumar Jha , Ana Silvia Medeira Cabrita
Abstract: A camera router application on a router or wireless access point can receive video streams from one more cameras in a home, office, factory or other environment having cameras. The camera router application can receive or detect an event associated with a camera. In response to detecting the event, the camera router application can determine an active screen. The camera router application can router a video stream from the camera to the active screen.
-
公开(公告)号:US10152255B2
公开(公告)日:2018-12-11
申请号:US15636108
申请日:2017-06-28
Applicant: Avast Software s.r.o.
Abstract: Loading a guest virtual machine from a snapshot includes determining a plurality of executable modules loaded in a guest operating system. Hash values for pages of guest physical memory in the snapshot file are determined. Hash values for pages of the executable modules executing in the guest operating system are determined. Matches to the pages in the guest physical memory and the pages of the executable modules are searched for using the hash values. Context information associated with the matching pages in the guest physical memory and the pages of the executable modules is written to the snapshot. The snapshot is modified to link the guest physical memory to the pages of the executable modules.
-
公开(公告)号:US20180191746A1
公开(公告)日:2018-07-05
申请号:US15858804
申请日:2017-12-29
Applicant: Avast Software s.r.o.
Inventor: Jeroen De Knijf , Amit Siwal , Shaul Levi
CPC classification number: H04L63/1408 , G06F16/20 , G06F21/52 , G06F21/554 , G06F21/56 , H04L41/50 , H04L43/0876 , H04L63/102 , H04L63/104 , H04L63/14 , H04L63/1458 , H04L67/12 , H04L67/30 , H04W4/70 , H04W12/12
Abstract: Malicious behavior of a device on a local network may be detected. A data stream from a device may be collected. A functional group may be created using behavioral data of devices of a known type. A behavior profile for the functional group may be generated and stored in a database. The data stream of the device is compared to the behavior profile of the functional group. A malicious behavior is indicated for the device in response to determining that the device's current behavior is not within a predetermined or configurable threshold of the behavior profile.
-
-
-
-
-
-
-
-
-