-
公开(公告)号:US20220239657A1
公开(公告)日:2022-07-28
申请号:US17687235
申请日:2022-03-04
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta
IPC: H04L9/40 , G06F17/16 , H04L67/50 , G06F3/0482 , G06F21/62
Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.
-
公开(公告)号:US20220207170A1
公开(公告)日:2022-06-30
申请号:US17135989
申请日:2020-12-28
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
Abstract: A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.
-
公开(公告)号:US20220012365A1
公开(公告)日:2022-01-13
申请号:US16926645
申请日:2020-07-11
Applicant: Avast Software s.r.o.
Inventor: Deepali Garg , Rajarshi Gupta
Abstract: A method for applying electronic data sharing settings. The method includes determining a first image or a first plurality of images shared by a user to a first network-enabled application. A first plurality of image components are extracted from the first image or the first plurality of images, and access by the first network-enabled application to a second image or a second plurality of images stored on a computing device of the user is enabled based on the first plurality of image components extracted from the first image or the first plurality of images. A method for controlling internet browsing is further provided.
-
公开(公告)号:US10965802B2
公开(公告)日:2021-03-30
申请号:US16446105
申请日:2019-06-19
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta
IPC: H04M3/00 , H04M1/72463 , H04L12/58 , G06N3/04 , G10L15/26 , H04L29/08 , G06F40/279
Abstract: A method of controlling use of network-connectable devices is provided. The method includes monitoring by a first computational process, operating at a first processor utilization level, communication on a user device operated by a particular user and determining based on the monitoring by the first computational process a trigger event. The method further includes monitoring by a second computational process, operating at a second processor utilization level higher than the first processor utilization level, the communication on the user device responsive to determining the trigger event. Use of the user device is restricted based at least on the monitoring by the second computational process of the communication.
-
公开(公告)号:US20200210871A1
公开(公告)日:2020-07-02
申请号:US16725906
申请日:2019-12-23
Applicant: Avast Software s.r.o.
Inventor: Galina Alperovich , Dmitry Kuznetsov , Rajarshi Gupta
Abstract: Systems and methods for device type classification system include a rules engine and a machine learning engine. The machine learning engine can be trained using device type data from multiple networks. The machine learning engine and the rules engine can receive data for devices on a network at a first point in time. The data can be submitted to a rules engine and the machine learning engine, which each produce device type probabilities for devices on the network. The device type probabilities from the rules engine and the machine learning engine can be processed to determine device types for one or more devices on the network. As more data becomes available at later points in time, the additional data can be provided to the rules engine and the machine learning engine to update the device type determinations for the network.
-
公开(公告)号:US11244065B2
公开(公告)日:2022-02-08
申请号:US16519556
申请日:2019-07-23
Applicant: Avast Software s.r.o.
Inventor: John Poothokaran , Juyong Do , Rajarshi Gupta
Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
-
公开(公告)号:US20210232661A1
公开(公告)日:2021-07-29
申请号:US17228064
申请日:2021-04-12
Applicant: Avast Software s.r.o.
Inventor: Rajarshi Gupta , Juyong Do
IPC: G06F21/10
Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
-
公开(公告)号:US10984105B2
公开(公告)日:2021-04-20
申请号:US16193822
申请日:2018-11-16
Applicant: Avast Software s.r.o.
Inventor: Petr Gronat , Rajarshi Gupta , Filip Havlicek , Michal Wojcik
Abstract: Minimizing the latency of on-device detection of malicious executable files, without sacrificing accuracy, by applying a machine learning model to an executable file in quantized steps. Allowing a threshold confidence level to be set to different values enables controlling the tradeoff between accuracy and latency in generating a confidence level indicative of whether the executable file includes malware.
-
公开(公告)号:US10915183B2
公开(公告)日:2021-02-09
申请号:US15942360
申请日:2018-03-30
Applicant: Avast Software s.r.o.
Inventor: Thomas Wespel , Rajarshi Gupta
IPC: G06F3/023 , H04W4/14 , G06F3/0482 , G06F3/0488 , G06F40/58 , G06F40/263
Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.
-
公开(公告)号:US20200288306A1
公开(公告)日:2020-09-10
申请号:US16293152
申请日:2019-03-05
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta , Ondrej Vlcek Resslova
Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.
-
-
-
-
-
-
-
-
-