-
公开(公告)号:US12197605B2
公开(公告)日:2025-01-14
申请号:US18314034
申请日:2023-05-08
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Armin Wasicek
Abstract: A data sharing control method. The method includes detecting a plurality of images on one or more devices operated by a first user, the one or more devices comprising a particular device. A plurality of tags are determined for the plurality of images, and a plurality of settings are received based on the plurality of tags from a second user. A particular image is detected on the particular device. One or more particular tags of the particular image on the particular device are determined, and a sharing action of the particular image by the particular device is blocked based on the plurality of settings and the one or more particular tags.
-
公开(公告)号:US20220092198A1
公开(公告)日:2022-03-24
申请号:US17028182
申请日:2020-09-22
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Armin Wasicek
Abstract: A data sharing control method. The method includes detecting a plurality of images on one or more devices operated by a first user, the one or more devices comprising a particular device. A plurality of tags are determined for the plurality of images, and a plurality of settings are received based on the plurality of tags from a second user. A particular image is detected on the particular device. One or more particular tags of the particular image on the particular device are determined, and a sharing action of the particular image by the particular device is blocked based on the plurality of settings and the one or more particular tags.
-
公开(公告)号:US20230274012A1
公开(公告)日:2023-08-31
申请号:US18314034
申请日:2023-05-08
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Armin Wasicek
CPC classification number: G06F21/6209 , G06F16/51 , G06F18/24 , G06F21/602 , G06V2201/10
Abstract: A data sharing control method. The method includes detecting a plurality of images on one or more devices operated by a first user, the one or more devices comprising a particular device. A plurality of tags are determined for the plurality of images, and a plurality of settings are received based on the plurality of tags from a second user. A particular image is detected on the particular device. One or more particular tags of the particular image on the particular device are determined, and a sharing action of the particular image by the particular device is blocked based on the plurality of settings and the one or more particular tags.
-
公开(公告)号:US11645403B2
公开(公告)日:2023-05-09
申请号:US17028182
申请日:2020-09-22
Applicant: Avast Software s.r.o.
Inventor: Sadia Afroz , Armin Wasicek
CPC classification number: G06F21/6209 , G06F16/51 , G06F21/602 , G06K9/6267 , G06V2201/10
Abstract: A data sharing control method. The method includes detecting a plurality of images on one or more devices operated by a first user, the one or more devices comprising a particular device. A plurality of tags are determined for the plurality of images, and a plurality of settings are received based on the plurality of tags from a second user. A particular image is detected on the particular device. One or more particular tags of the particular image on the particular device are determined, and a sharing action of the particular image by the particular device is blocked based on the plurality of settings and the one or more particular tags.
-
公开(公告)号:US12008140B2
公开(公告)日:2024-06-11
申请号:US16586734
申请日:2019-09-27
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
CPC classification number: G06F21/6254 , G06F21/6263 , G06N20/00
Abstract: Systems and methods receive a form having one or more fields for receiving personally identifying information (PII). Input data that includes PII is received for the form. The system and methods model the characteristics of true PII to generate a model associated with the form. Synthetic PII is generated based, at least in part, the true PII and the model. The synthetic PII is provided to the one or more fields of the form.
-
公开(公告)号:US20210097201A1
公开(公告)日:2021-04-01
申请号:US16586734
申请日:2019-09-27
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: Systems and methods receive a form having one or more fields for receiving personally identifying information (PII). Input data that includes PII is received for the form. The system and methods model the characteristics of true PII to generate a model associated with the form. Synthetic PII is generated based, at least in part, the true provided to the one or more fields of the form.
-
公开(公告)号:US20230267192A1
公开(公告)日:2023-08-24
申请号:US17651971
申请日:2022-02-22
Applicant: Avast Software s.r.o.
Inventor: Martin Mesrsmid , Armin Wasicek
CPC classification number: G06F21/45 , H04L63/0861 , G06F2221/2115
Abstract: A synthetic biometric signature is generated for a user for each of a plurality of third parties, and the synthetic biometric signatures are used to interact with the respective third parties such that each of the third parties sees a different synthetic biometric signature for the user. The synthetic biometric signatures comprise a user's actual biometric data altered by a change vector, an artificial biometric signature, and/or artificial biometric characteristics, or by other artificial components. The synthetic biometric signature can be changed if the synthetic biometric signature is compromised, or the user wishes to reset their user relationship with a particular third-party.
-
公开(公告)号:US11625494B2
公开(公告)日:2023-04-11
申请号:US16784222
申请日:2020-02-06
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Armin Wasicek
IPC: G06F16/00 , G06F21/62 , G06F16/242 , G06K9/62 , G06N3/08 , G06F16/958 , G06F16/955 , G06F9/445 , G06F16/9535
Abstract: A method for enabling website access is provided. The method includes detecting an attempt to access a particular website by a computing device via a network, the particular website including one or more webpages, and accessing a particular data privacy policy for the particular website. Scores of the particular data privacy policy are determined based on text of the particular data privacy policy, and a particular multidimensional coordinate is determined based on the scores of the particular data privacy policy. A map including the particular multidimensional coordinate is displayed via the computing device. An instruction from a user is received via the computing device to enable accessing of the particular website, and the accessing by the computing device of the particular website is enabled in response to the instruction from the user.
-
公开(公告)号:US20210099431A1
公开(公告)日:2021-04-01
申请号:US16918851
申请日:2020-07-01
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Juyong Do , Rajarshi Gupta
Abstract: A method of generating a synthetic user profile to protect the user's privacy includes generating a synthetic profile comprising a plurality of profile elements and selecting a network egress point for use with the synthetic profile. The synthetic profile elements and egress point have a consistent geographic location, or the synthetic profile elements are consistent with other external information.
-
公开(公告)号:US20230291751A1
公开(公告)日:2023-09-14
申请号:US17691930
申请日:2022-03-10
Applicant: Avast Software s.r.o.
Inventor: Armin Wasicek , Fabrizio Biondi , Thomas Salomon
IPC: H04L9/40 , H04L41/16 , G06F16/955
CPC classification number: H04L63/1408 , G06F16/955 , H04L41/16
Abstract: A system and method for preventing access to potentially malicious network destinations. The method includes determining a plurality of network destinations and indicators of the plurality of network destinations including an indicator of a first network destination. A plurality of feature vectors are generated based on the plurality of network destinations including a first feature vector based on the first network destination. Access by a user via a computing device to a second network destination is detected. A second feature vector is generated, and an indicator is determined based on the second network destination. The second feature vector is compared to the plurality of feature vectors. The access by the user to the second network destination is blocked based on the indicator of the first network destination, the indicator of the second network destination, and the comparison of the second feature vector to the plurality of feature vectors.
-
-
-
-
-
-
-
-
-