Patents by Inventor Rajarshi Gupta

Rajarshi Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210185046
    Abstract: A method for controlling application enabling includes receiving from a particular user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the particular user to enable a particular application via a computing device is detected. Data permission requirements of the particular application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the particular application. The multidimensional zone is compared to the multidimensional coordinate, and the particular user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the particular user via the computing device, and the particular application is enabled responsive to the affirmation of the request.
    Type: Application
    Filed: December 13, 2019
    Publication date: June 17, 2021
    Applicant: Avast Software s.r.o.
    Inventor: Rajarshi Gupta
  • Patent number: 11005871
    Abstract: A central platform remote from a local network can detect anomalies on the local network. The central platform can assign a unique pair of DNS server IP addresses to the local network. The central platform can receive configuration data from the local network and use the configuration data and the assigned pair of DNS server IP addresses to uniquely identify devices on the local network. In the case that current network flow statistics do not match expected network flow statistics for the local network, a device causing the anomalous behavior can be identified using the assigned pair of DNS server IP addresses and configuration data.
    Type: Grant
    Filed: January 10, 2019
    Date of Patent: May 11, 2021
    Assignee: Avast Software s.r.o.
    Inventors: Joe Anakata, Rajarshi Gupta
  • Patent number: 10997278
    Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: May 4, 2021
    Assignee: Avast Software, s.r.o.
    Inventors: Rajarshi Gupta, Juyong Do
  • Patent number: 10984105
    Abstract: Minimizing the latency of on-device detection of malicious executable files, without sacrificing accuracy, by applying a machine learning model to an executable file in quantized steps. Allowing a threshold confidence level to be set to different values enables controlling the tradeoff between accuracy and latency in generating a confidence level indicative of whether the executable file includes malware.
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: April 20, 2021
    Assignee: Avast Software s.r.o.
    Inventors: Petr Gronat, Rajarshi Gupta, Filip Havlicek, Michal Wojcik
  • Publication number: 20210097201
    Abstract: Systems and methods receive a form having one or more fields for receiving personally identifying information (PII). Input data that includes PII is received for the form. The system and methods model the characteristics of true PII to generate a model associated with the form. Synthetic PII is generated based, at least in part, the true provided to the one or more fields of the form.
    Type: Application
    Filed: September 27, 2019
    Publication date: April 1, 2021
    Inventors: Armin Wasicek, Juyong Do, Rajarshi Gupta
  • Publication number: 20210099431
    Abstract: A method of generating a synthetic user profile to protect the user's privacy includes generating a synthetic profile comprising a plurality of profile elements and selecting a network egress point for use with the synthetic profile. The synthetic profile elements and egress point have a consistent geographic location, or the synthetic profile elements are consistent with other external information.
    Type: Application
    Filed: July 1, 2020
    Publication date: April 1, 2021
    Applicant: Avast Software s.r.o.
    Inventors: Armin Wasicek, Juyong Do, Rajarshi Gupta
  • Patent number: 10965802
    Abstract: A method of controlling use of network-connectable devices is provided. The method includes monitoring by a first computational process, operating at a first processor utilization level, communication on a user device operated by a particular user and determining based on the monitoring by the first computational process a trigger event. The method further includes monitoring by a second computational process, operating at a second processor utilization level higher than the first processor utilization level, the communication on the user device responsive to determining the trigger event. Use of the user device is restricted based at least on the monitoring by the second computational process of the communication.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: March 30, 2021
    Assignee: Avast Software, s.r.o.
    Inventors: Juyong Do, Rajarshi Gupta
  • Patent number: 10915183
    Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.
    Type: Grant
    Filed: March 30, 2018
    Date of Patent: February 9, 2021
    Assignee: Avast Software s.r.o.
    Inventors: Thomas Wespel, Rajarshi Gupta
  • Publication number: 20210026978
    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Applicant: Avast Software s.r.o.
    Inventors: John Poothokaran, Juyong Do, Rajarshi Gupta
  • Publication number: 20200412728
    Abstract: A method of selecting devices on a private network for security protection via a network security device comprises classifying devices on the private network into devices that are sometimes protected and devices that are always either protected or not protected. Threats are monitored, the threats comprising at least one of a macro security event and a local security event, the macro security event detected by one or more external systems and the local security event detected by one or more devices local to the private network. When a threat is detected, it is determined whether the detected threat is a threat to one or more devices on the private network classified as devices that are sometimes protected, and if the detected threat is determined to be a threat to the one or more devices that are sometimes protected the one or more devices are protected.
    Type: Application
    Filed: June 27, 2019
    Publication date: December 31, 2020
    Inventor: Rajarshi Gupta
  • Publication number: 20200404093
    Abstract: A method of controlling use of network-connectable devices is provided. The method includes monitoring by a first computational process, operating at a first processor utilization level, communication on a user device operated by a particular user and determining based on the monitoring by the first computational process a trigger event. The method further includes monitoring by a second computational process, operating at a second processor utilization level higher than the first processor utilization level, the communication on the user device responsive to determining the trigger event. Use of the user device is restricted based at least on the monitoring by the second computational process of the communication.
    Type: Application
    Filed: June 19, 2019
    Publication date: December 24, 2020
    Applicant: Avast Software s.r.o.
    Inventors: Juyong Do, Rajarshi Gupta
  • Patent number: 10862862
    Abstract: A device identification module identifies devices on a remote network, where the remote network may use Network Address Translation techniques. The device identification module can receive a list of devices on the remote network. The devices in the remote network can be identified by the device classification module based, at least in part, on the device classification and one or more of Dynamic Host Configuration Protocol (DHCP) information for the remote network, port sequences used in Network Address Translation on the remote network, and a live Uniform Resource Locator (URL) check performed on the remote network.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: December 8, 2020
    Assignee: Avast Software s.r.o.
    Inventors: Rajarshi Gupta, Joe Anakata, Richard Kmieciak
  • Patent number: 10855836
    Abstract: A content filter setting method includes enabling a user to choose a setting of a filter for a particular application in a user interface of a user device. The setting of the filter is received from the user via the user interface, and a model is applied to determine a plurality of default settings of a plurality of filters of the particular application based on the setting of the filter and the identifying information of the user. The plurality of default settings is displayed in the user interface, and modified settings of the default settings are received via the user interface.
    Type: Grant
    Filed: September 24, 2018
    Date of Patent: December 1, 2020
    Assignee: Avast Software s.r.o.
    Inventors: Jinshan Liu, Richard Kmieciak, Juyong Do, Rajarshi Gupta
  • Patent number: 10846705
    Abstract: Systems and methods are disclosed for automating customer service for a monitored device (MD). A method for an Internet of Everything management device to automate customer service for a monitored device comprises collecting sensor data from a plurality of sensors, wherein the plurality of sensors comprises a first sensor that is not included in the MD, determining whether the MD is exhibiting abnormal behavior based on an analysis of the collected sensor data, and transmitting a report to a customer service entity associated with the MD in response to a determination that the MD is exhibiting abnormal behavior.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: November 24, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Mastooreh Salajegheh, Vinay Sridhara, Rajarshi Gupta
  • Publication number: 20200288306
    Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.
    Type: Application
    Filed: March 5, 2019
    Publication date: September 10, 2020
    Applicant: Avast Software s.r.o.
    Inventors: Juyong Do, Rajarshi Gupta, Ondrej Vlcek Resslova
  • Publication number: 20200210871
    Abstract: Systems and methods for device type classification system include a rules engine and a machine learning engine. The machine learning engine can be trained using device type data from multiple networks. The machine learning engine and the rules engine can receive data for devices on a network at a first point in time. The data can be submitted to a rules engine and the machine learning engine, which each produce device type probabilities for devices on the network. The device type probabilities from the rules engine and the machine learning engine can be processed to determine device types for one or more devices on the network. As more data becomes available at later points in time, the additional data can be provided to the rules engine and the machine learning engine to update the device type determinations for the network.
    Type: Application
    Filed: December 23, 2019
    Publication date: July 2, 2020
    Inventors: Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta
  • Publication number: 20200210549
    Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 2, 2020
    Applicant: Avast Software s.r.o.
    Inventors: Rajarshi Gupta, Juyong Do
  • Publication number: 20200099783
    Abstract: A content filter setting method includes enabling a user to choose a setting of a filter for a particular application in a user interface of a user device. The setting of the filter is received from the user via the user interface, and a model is applied to determine a plurality of default settings of a plurality of filters of the particular application based on the setting of the filter and the identifying information of the user. The plurality of default settings is displayed in the user interface, and modified settings of the default settings are received via the user interface.
    Type: Application
    Filed: September 24, 2018
    Publication date: March 26, 2020
    Applicant: Avast Software s.r.o.
    Inventors: Jinshan Liu, Richard Kmieclak, Juyong Do, Rajarshi Gupta
  • Patent number: 10536867
    Abstract: Systems, methods, and devices of the various aspects enable detecting a malfunction caused by radio frequency (RF) interference. A computing device processor may identify a location of the computing device based on a plurality of real-time data inputs received by the computing device. The processor may characterize an RF environment of the computing device based on the identified location and the plurality of real-time data inputs. The processor may determine at least one RF emissions threshold based on the characterization of the RF environment. The processor may compare the characterization of the RF environment to the at least one RF emissions threshold, and may perform an action in response to determining that the characterization of the RF environment exceeds the at least one RF emissions threshold.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: January 14, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Mastooreh Salajegheh, Govindarajan Krishnamurthi, Rajarshi Gupta, Mihai Christodorescu, Vinay Sridhara, Patrick Hughes
  • Publication number: 20190394220
    Abstract: A method of identifying malicious activity in a sequence of computer instructions includes monitoring data flows from a public network to one or more networked devices on a private network and to one or more honeypots that appear to the public network to be devices on the private network, representing each such data flow as a word, and the sequence of data flows as comprising an n-gram of two or more words. The data flows are characterized with a likelihood of being malicious based on their statistical association with the one or more honeypots relative to their statistical association with one or more networked devices. Identified malicious activity is used to train a network device to identify malicious data flows and prevent them from reaching devices on the private network.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 26, 2019
    Inventor: Rajarshi Gupta