-
公开(公告)号:US20240259402A1
公开(公告)日:2024-08-01
申请号:US18591669
申请日:2024-02-29
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L9/40
CPC classification number: H04L63/1416 , H04L63/104
Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.
-
公开(公告)号:US11949693B2
公开(公告)日:2024-04-02
申请号:US17317707
申请日:2021-05-11
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L9/40
CPC classification number: H04L63/1416 , H04L63/104
Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.
-
公开(公告)号:US20240029061A1
公开(公告)日:2024-01-25
申请号:US17872250
申请日:2022-07-25
Applicant: Avast Software s.r.o.
Inventor: Drummond Reed , Brent Zundel , Martin Mesrsmid , Allan Thomson
CPC classification number: G06Q20/38215 , G06Q20/4014 , H04L9/3247 , H04L9/3218
Abstract: Systems and methods for transacting over a network. A first agent and a second agent are provided. The second agent is operable to transact with a third agent for use of a service, the third agent enabled to communicate with a fourth agent. The first agent is operable to communicate with the second agent to facilitate the transacting by the second agent with the third agent for the use of the service. The first agent is further operable to communicate with the fourth agent to facilitate the transacting by the second agent with the third agent for the use of the service.
-
4.
公开(公告)号:US20250053974A1
公开(公告)日:2025-02-13
申请号:US18446068
申请日:2023-08-08
Applicant: Avast Software s.r.o.
Inventor: Gregory Wolfond , Drummond Reed , Brent Zundel , Allan Thomson
Abstract: Systems and methods for transacting over a network is provided. The system includes a first agent and second agent. The first agent is operable to receive from a third agent a transaction code associated with one or more credential types required to apply the transaction code or with one or more credential claim types required to apply the transaction code, transmit the transaction code to the second agent, and receive from the second agent a digitally signed transaction, a first verifiable proof, and the transaction code. The first agent is further operable to transmit to a fourth agent a second verifiable proof based on the first verifiable proof and the transaction code, receive from the fourth agent an unlock signature for a locked credential including one or more credential claims, and transmit the unlock signature to the second agent.
-
公开(公告)号:US20220368699A1
公开(公告)日:2022-11-17
申请号:US17317707
申请日:2021-05-11
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L29/06
Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.
-
公开(公告)号:US20240205017A1
公开(公告)日:2024-06-20
申请号:US18066213
申请日:2022-12-14
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L9/32
CPC classification number: H04L9/3247
Abstract: Systems and methods for transacting over a network enable transacting on behalf of a first entity at a plurality of first network locations based on one or more first cryptographically verifiable credentials for a plurality of first network-enabled services. One or more assessments of the first entity are determined based on the transacting on behalf of the first entity at the plurality of first network locations based on the one or more first cryptographically verifiable credentials. One or more second cryptographically verifiable credentials are generated as one or more digitally signed credentials based on the one or more assessments of the first entity. The systems and methods further enable transacting on behalf of the first entity at one or more second network locations based on the one or more second cryptographically verifiable credentials for a second network-enabled service.
-
公开(公告)号:US20240193592A1
公开(公告)日:2024-06-13
申请号:US18063284
申请日:2022-12-08
Applicant: Avast Software s.r.o.
Inventor: Drummond Reed , Brent Zundel , Martin Mesrsmid , Allan Thomson
CPC classification number: G06Q20/3825 , G06Q20/3821 , G06Q20/401 , G06Q2220/00
Abstract: Systems and methods for transacting over a network. A first agent and a second agent are provided. The second agent is operable to transact with a third agent for use of a network-enabled service based on a first transaction policy from a fourth agent, the third agent enabled to communicate with a fifth agent. The first agent is operable to communicate with the second agent to facilitate the transacting by the second agent with the third agent for the use of the network-enabled service based on the first transaction policy and communicate with the fifth agent to facilitate the transacting by the second agent with the third agent for the use of the network-enabled service.
-
公开(公告)号:US11895090B2
公开(公告)日:2024-02-06
申请号:US17508414
申请日:2021-10-22
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L9/40
CPC classification number: H04L63/0272 , H04L63/029 , H04L63/0254 , H04L63/0421 , H04L63/1433
Abstract: A method includes accessing a first intelligence feed including a plurality of cybersecurity incidents. A second intelligence feed is generated including a plurality of technical indicators defined on one or more virtual private network internet point of presence (“VPN internet PoP”) that connects a plurality of VPN tunnels to an internet. The first and second intelligence feeds are compared, a particular incident is determined, and a time frame of the particular incident is determined. Use of a particular VPN internet PoP by a plurality of sources including a plurality of clients is monitored to determine a plurality of time-based behaviors. The plurality of time-based behaviors are compared to the particular incident and to the time frame to determine a match. A particular source is blocked at the particular VPN internet PoP based on the determination of the match.
-
公开(公告)号:US20240154815A1
公开(公告)日:2024-05-09
申请号:US18052752
申请日:2022-11-04
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson , Drummond Reed , Jamie Smith
IPC: H04L9/32
CPC classification number: H04L9/3247
Abstract: Systems and methods for transacting over a network. A first agent operating on a first computing system is operable to transact on behalf of a first entity. The first agent transacts with a second agent operating on a second computing system for a first cryptographically verifiable credential, transmits the first cryptographically verifiable credential to a third agent, and transacts with the third agent based on the first cryptographically verifiable credential for a second cryptographically verifiable credential to facilitate transacting with a fourth agent for a service. The second agent is operable to receive telemetry data of the first computing system which is configured to monitor the telemetry data, determine an assessment of the first entity based on the telemetry data, generate the first cryptographically verifiable credential based on the assessment of the first entity by the second agent, and transmit the first cryptographically verifiable credential to the first agent.
-
公开(公告)号:US20230131988A1
公开(公告)日:2023-04-27
申请号:US17508414
申请日:2021-10-22
Applicant: Avast Software s.r.o.
Inventor: Allan Thomson
IPC: H04L29/06
Abstract: A method includes accessing a first intelligence feed including a plurality of cybersecurity incidents. A second intelligence feed is generated including a plurality of technical indicators defined on one or more virtual private network internet point of presence (“VPN internet PoP”) that connects a plurality of VPN tunnels to an internet. The first and second intelligence feeds are compared, a particular incident is determined, and a time frame of the particular incident is determined. Use of a particular VPN internet PoP by a plurality of sources including a plurality of clients is monitored to determine a plurality of time-based behaviors. The plurality of time-based behaviors are compared to the particular incident and to the time frame to determine a match. A particular source is blocked at the particular VPN internet PoP based on the determination of the match.
-
-
-
-
-
-
-
-
-