-
公开(公告)号:US11449542B2
公开(公告)日:2022-09-20
申请号:US15042070
申请日:2016-02-11
Applicant: Avast Software s.r.o.
Inventor: Ron Levy , Aviad Ashkenazi
IPC: G06F16/30 , G06F16/583 , G06T7/00 , G06T5/00
Abstract: Systems and methods are presented for identifying unwanted photos and videos on a device. Such systems may contain various modules to do one or more of: (i) review the image quality of photos and videos, (ii) review a user's interaction with photos and videos, (iii) review the properties of photos and videos, (iv) review the user's profile/preferences as to photos, or (v) review information obtained from additional sources regarding the user, his or her photos, and any interaction therewith. With one tap, an exemplary application can identify all of a user's unwanted photos, such as, for example: photos with bad lighting, blurry shots, similar photos, and even photos that the system predicts a user may find boring. Any photos that an exemplary system is unsure about may be left for the user to review and act upon. By analyzing user decisions exemplary systems become progressively more accurate and thus improve their predictions over time.
-
公开(公告)号:US20220229906A1
公开(公告)日:2022-07-21
申请号:US17151462
申请日:2021-01-18
Applicant: Avast Software s.r.o.
Inventor: Martin Bálek , Fabrizio Biondi , Dmitry Kuznetsov , Olga Petrova
Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.
-
公开(公告)号:US20220210197A1
公开(公告)日:2022-06-30
申请号:US17138473
申请日:2020-12-30
Applicant: Avast Software s.r.o.
Inventor: Michal Vaner , Jirí Horký
Abstract: Latency in a cloud security service provided via a network security device is reduced by receiving in the network security device a new network connection request for a connection between a local network device and a remote server. If a locally cached rule is applicable to the new network connection request, the applicable locally cached rule is applied to selectively allow the new network connection based on the rule. If no locally cached rule is applicable to the new network connection request, the new network connection request is forwarded to the remote server and to a cloud security service, and a response from the remote server is selectively forwarded to the local network device only upon receiving a determination by the cloud security device as to whether the new network connection is a security risk.
-
公开(公告)号:US20220182696A1
公开(公告)日:2022-06-09
申请号:US17111086
申请日:2020-12-03
Applicant: Avast Software s.r.o.
Inventor: Bretislav Sopik
IPC: H04N21/24 , H04L29/06 , H04N21/258
Abstract: A method of providing a content feed. The method includes monitoring a plurality of user content streams of a plurality of users on a plurality of computing devices, the plurality of user content streams including a plurality of content instances accessible via a network. A plurality of archetypes are generated based on the plurality of user content streams. A selection of a particular archetype of the plurality of archetypes from a particular user is received on a particular computing device. A particular content stream is determined based on the particular archetype, and the particular content stream is delivered to the particular user via the particular computing device.
-
公开(公告)号:US20220132208A1
公开(公告)日:2022-04-28
申请号:US17078961
申请日:2020-10-23
Applicant: Avast Software s.r.o.
Inventor: Deepali Garg , John Poothokaran , Juyong Do
IPC: H04N21/45 , H04N21/475 , H04N21/454
Abstract: Permissions in a parental control system are managed by evaluating a set of current permissions settings, current interests, and the age of at least one child subject to the current permissions to derive one or more suggested modifications to the current permissions. The one or more suggested modifications are determined to be age appropriate for the at least one child and to be of interest to the child. The one or more current interests comprise prior usage data of the at least one child.
-
公开(公告)号:US11244065B2
公开(公告)日:2022-02-08
申请号:US16519556
申请日:2019-07-23
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
-
公开(公告)号:US11128452B2
公开(公告)日:2021-09-21
申请号:US15933290
申请日:2018-03-22
Applicant: Avast Software s.r.o.
Inventor: Petr Van{hacek over (e)}k , Jan Schwarz , Pavel Studený
Abstract: A data set shared by multiple nodes is encrypted. The data set can be split into independent records. The records can be encrypted and shared independently, without the need to modify and transmit the full data set. Although the records are encrypted with their own encryption key, they are all accessible by a single authentication method.
-
公开(公告)号:US20210232661A1
公开(公告)日:2021-07-29
申请号:US17228064
申请日:2021-04-12
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US20210120022A1
公开(公告)日:2021-04-22
申请号:US16659027
申请日:2019-10-21
Applicant: Avast Software s.r.o.
Inventor: Petr Kaderábek , Vladislav Iliushin
IPC: H04L29/06
Abstract: Data relating to attacks is collected in honeypots, including network address of attacks and time of attacks. The attack data is analyzed to generate a predicted likelihood of future attacks from network addresses in the activity data, and a network address blacklist is constructed including network addresses predicted likely to be a source of a future attack. The process is repeated over time, such that network addresses with no recent honeypot activity are removed from the blacklist.
-
公开(公告)号:US10984105B2
公开(公告)日:2021-04-20
申请号:US16193822
申请日:2018-11-16
Applicant: Avast Software s.r.o.
Inventor: Petr Gronat , Rajarshi Gupta , Filip Havlicek , Michal Wojcik
Abstract: Minimizing the latency of on-device detection of malicious executable files, without sacrificing accuracy, by applying a machine learning model to an executable file in quantized steps. Allowing a threshold confidence level to be set to different values enables controlling the tradeoff between accuracy and latency in generating a confidence level indicative of whether the executable file includes malware.
-
-
-
-
-
-
-
-
-