-
公开(公告)号:US11316861B2
公开(公告)日:2022-04-26
申请号:US16455480
申请日:2019-06-27
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A method of selecting devices on a private network for security protection via a network security device comprises classifying devices on the private network into devices that are sometimes protected and devices that are always either protected or not protected. Threats are monitored, the threats comprising at least one of a macro security event and a local security event, the macro security event detected by one or more external systems and the local security event detected by one or more devices local to the private network. When a threat is detected, it is determined whether the detected threat is a threat to one or more devices on the private network classified as devices that are sometimes protected, and if the detected threat is determined to be a threat to the one or more devices that are sometimes protected the one or more devices are protected.
-
公开(公告)号:US20220103398A1
公开(公告)日:2022-03-31
申请号:US17034719
申请日:2020-09-28
Applicant: Avast Software s.r.o.
Inventor: Bin Hu , Rajarshi Gupta
Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.
-
公开(公告)号:US11222377B2
公开(公告)日:2022-01-11
申请号:US16146863
申请日:2018-09-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
Abstract: A recommendation engine can provide recommendations with respect to an application and can provide insights to a user of a computing device. The recommendation engine can receive a prediction based on user engagement with the application during an initial period of time (e.g., a trial period) as to whether the user will convert use of the application to a paid basis (e.g., a subscription or license to the application). An action can be recommended based on the prediction. The recommendation engine can provide insights to a user based on a score associated with the insight. The score can be determined by measuring previous user interactions with the insight over a period of time.
-
公开(公告)号:US20210185046A1
公开(公告)日:2021-06-17
申请号:US16714318
申请日:2019-12-13
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
IPC: H04L29/06 , G06F3/0482 , H04L29/08 , G06F17/16
Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.
-
35.
公开(公告)号:US11005871B2
公开(公告)日:2021-05-11
申请号:US16245042
申请日:2019-01-10
Applicant: Avast Software s.r.o.
Inventor: Joe Anakata , Rajarshi Gupta
Abstract: A central platform remote from a local network can detect anomalies on the local network. The central platform can assign a unique pair of DNS server IP addresses to the local network. The central platform can receive configuration data from the local network and use the configuration data and the assigned pair of DNS server IP addresses to uniquely identify devices on the local network. In the case that current network flow statistics do not match expected network flow statistics for the local network, a device causing the anomalous behavior can be identified using the assigned pair of DNS server IP addresses and configuration data.
-
公开(公告)号:US10997278B2
公开(公告)日:2021-05-04
申请号:US16235427
申请日:2018-12-28
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US20210097201A1
公开(公告)日:2021-04-01
申请号:US16586734
申请日:2019-09-27
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: Systems and methods receive a form having one or more fields for receiving personally identifying information (PII). Input data that includes PII is received for the form. The system and methods model the characteristics of true PII to generate a model associated with the form. Synthetic PII is generated based, at least in part, the true provided to the one or more fields of the form.
-
公开(公告)号:US20210026978A1
公开(公告)日:2021-01-28
申请号:US16519556
申请日:2019-07-23
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
-
公开(公告)号:US10448356B1
公开(公告)日:2019-10-15
申请号:US16370958
申请日:2019-03-30
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta , Leo H. Kwong
IPC: H04W8/24 , H04W64/00 , H04W4/029 , H04B17/318
Abstract: A location anomaly for a mobile device can be detected using non-location information from the mobile device. The non-location information does not include data from a location based device, such as a GPS. A probabilistic model is created using historical non-location information accumulated from the mobile device. Current non-location data is compared with the probabilistic model to determine a probability associated with the current non-location information. If the probability is less than a predetermined or configurable threshold, a location anomaly is detected. A notification of the location anomaly may be displayed and/or transmitted in response to detecting the location anomaly.
-
公开(公告)号:US20190306826A1
公开(公告)日:2019-10-03
申请号:US16370958
申请日:2019-03-30
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta , Leo H. Kwong
IPC: H04W64/00 , H04W8/24 , H04B17/318 , H04W4/029
Abstract: A location anomaly for a mobile device can be detected using non-location information from the mobile device. The non-location information does not include data from a location based device, such as a GPS. A probabilistic model is created using historical non-location information accumulated from the mobile device. Current non-location data is compared with the probabilistic model to determine a probability associated with the current non-location information. If the probability is less than a predetermined or configurable threshold, a location anomaly is detected. A notification of the location anomaly may be displayed and/or transmitted in response to detecting the location anomaly.
-
-
-
-
-
-
-
-
-