-
公开(公告)号:US20210084055A1
公开(公告)日:2021-03-18
申请号:US16569390
申请日:2019-09-12
Applicant: Avast Software s.r.o.
Inventor: Doron Avraham
Abstract: A method of restricting presentation of known or suspected malicious content in a web browser comprises receiving a request for web content, and determining whether the web content contains known or suspected malicious content. If the requested web content contains known or suspected malicious web content, the requested web content is displayed in a restricted browsing mode that restricts or blocks presentation of one or more elements of the known or suspected malicious content in the requested content.
-
公开(公告)号:US10915183B2
公开(公告)日:2021-02-09
申请号:US15942360
申请日:2018-03-30
Applicant: Avast Software s.r.o.
Inventor: Thomas Wespel , Rajarshi Gupta
IPC: G06F3/023 , H04W4/14 , G06F3/0482 , G06F3/0488 , G06F40/58 , G06F40/263
Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.
-
公开(公告)号:US20200288306A1
公开(公告)日:2020-09-10
申请号:US16293152
申请日:2019-03-05
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta , Ondrej Vlcek Resslova
Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.
-
64.
公开(公告)号:US10713146B2
公开(公告)日:2020-07-14
申请号:US15192411
申请日:2016-06-24
Applicant: Avast Software s.r.o.
Inventor: Martin Hron
Abstract: Dynamic binary instrumentation (DBI) or dynamic binary translation (DBT) of an examined process can be postponed until a point of interest is reached. Portions of the examined process can be run in native mode until the point of interest is reached. Upon reaching the point of interest, DBI and/or DBT can be performed.
-
公开(公告)号:US10607010B2
公开(公告)日:2020-03-31
申请号:US15720321
申请日:2017-09-29
Applicant: Avast Software s.r.o.
Inventor: Michal Krejdl
Abstract: A file similarity vector for an executable file or executable object can be determined using function lengths of functions in the executable file or data object. The executable file or data object can be scanned, and lengths of functions can be determined. Various statistics such as number of functions, maximum function length, minimum function length, and average function length can be used to create a file similarity vector. The file similarity vector can be used to compare files.
-
公开(公告)号:US10445501B2
公开(公告)日:2019-10-15
申请号:US15719401
申请日:2017-09-28
Applicant: Avast Software s.r.o.
Inventor: Jiri Sejtko
Abstract: Systems and methods normalize an executable script. A file can be received that potentially contains an executable script. The characters in the file are translated to a single case (either upper case or lower case). Duplicate whitespace can be removed. A script is identified within the file. Tokens in the script are processed to create normalized output. The normalized output can include tokens that are retained keywords, control flow characters or data characters from the script file.
-
公开(公告)号:US10437986B2
公开(公告)日:2019-10-08
申请号:US15374670
申请日:2016-12-09
Applicant: Avast Software s.r.o.
Inventor: Martin Vejmelka
Abstract: Systems and methods index and search log files created after execution of binaries. A plurality of log files each have one or more sequences. An index tree is created for the log files. A first log file is placed into a bucket of the index tree according to the lengths of the one or more sequences of the first log file. Remaining logs files are placed the index tree according to their respective sequence lengths. Each log becomes a representative in the bucket or associated with a representative in the bucket. The index tree can be searched, where an incurred distance and a remaining distance is maintained during the search. Nodes are pruned based, at least in part, on the incurred distance and the remaining distance.
-
公开(公告)号:US09628805B2
公开(公告)日:2017-04-18
申请号:US14716685
申请日:2015-05-19
Applicant: Avast Software s.r.o.
Inventor: Martin Smarda , Pavel Sramek
IPC: G06K9/00 , H04N19/126 , G06F3/0481 , H04N19/625 , G06F21/56 , H04N1/32 , G06F17/30
CPC classification number: H04N19/126 , G06F3/0481 , G06F3/04817 , G06F17/30247 , G06F21/564 , G06F21/565 , H04N1/32283 , H04N19/625
Abstract: Systems and methods generate a perceptual image hash of an image. The perceptual image hash can be generated from multiple features extracted from a DCT transformation of the image. The perceptual image hash can be compared to other perceptual image hash values using a weighted Hamming distance function.
-
公开(公告)号:US12289312B2
公开(公告)日:2025-04-29
申请号:US17687235
申请日:2022-03-04
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
IPC: H04L9/40 , G06F3/0482 , G06F17/16 , G06F21/62 , H04L67/50
Abstract: A data control method includes receiving from a user an indication of data for sharing, receiving from the user an indication of one or more recipients with which to share the data, and receiving from the user one or more allowed actions for the data. A multidimensional zone is determined based on the indication of the data for sharing, the indication of the one or more recipients, and the one or more allowed actions for the data. A plurality of application program interfaces (APIs) for a plurality of applications are accessed. Data sharing permissions are set for the user for each of the plurality of applications based on the multidimensional zone via the plurality of APIs.
-
公开(公告)号:US20240205017A1
公开(公告)日:2024-06-20
申请号:US18066213
申请日:2022-12-14
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L9/32
CPC classification number: H04L9/3247
Abstract: Systems and methods for transacting over a network enable transacting on behalf of a first entity at a plurality of first network locations based on one or more first cryptographically verifiable credentials for a plurality of first network-enabled services. One or more assessments of the first entity are determined based on the transacting on behalf of the first entity at the plurality of first network locations based on the one or more first cryptographically verifiable credentials. One or more second cryptographically verifiable credentials are generated as one or more digitally signed credentials based on the one or more assessments of the first entity. The systems and methods further enable transacting on behalf of the first entity at one or more second network locations based on the one or more second cryptographically verifiable credentials for a second network-enabled service.
-
-
-
-
-
-
-
-
-