Our trademark portfolio includes (i) our registered trademarks; (ii) our pending trademarks; and (iii) a non-exhaustive list of our unregistered trademarks
 
    
    
    
   
    
    
    
   
    
    
    
   
    
    
    
   
    
    
    
   
    
    
    
   
    
    
    
  | Product name | Patent Application Name | Serial Number | 
|---|---|---|
| Avast Antivirus | Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system | 8,812,832 (13/030,693) | 
| Ā | Method and system for securing bank account access | WO 2015131860 | 
| Ā | Cloud based reputation system for browser settings | US 2016/0103929 | 
| Ā | Authentication and secure communication with application extensions | 62/175,102 | 
| Ā | Clustering using filters working over file attributes | 62/254,063 | 
| Ā | Creating rules describing malicious files based on file properties | 62/232,791 | 
| Ā | Detection of malware in derived pattern space | 62/222,634 | 
| Ā | Distance and method of indexing sandbox logs for mapping program behavior | 62/265,790 | 
| Ā | File clustering using filters working over file attributes | 62/254,063 | 
| Ā | Identification of mislabeled samples via phantom nodes in label propagation | 62/265,891 | 
| Ā | Length of the longest common subsequence algorithm optimization | 62/173,257 | 
| Ā | Sequential access to page metadata stored in a multi-level page table | 62/273,198 | 
| Ā | Dynamic Binary Translation and instrumentation with postponed attachment to running native threads | 62/185,475 | 
| Ā | Tunable multi-part perceptual image hashing | 14/716,685 | 
| Ā | Selective Disk Volume Cloning for Virtual Disk Creation | 14/581,494 | 
| Ā | Partial Snapshots in Virtualized Environments (CIP of Selective Disk Volume Cloning for Virtual Disk Creation) | 14/868,194 | 
| Ā | Rebooting to a UEFI Application from a UEFI Supported System | 14/996,788 | 
| Ā | File Similarity Fingerprint | 62/313,597 | 
| Ā | Malware Label Inference in a Graph Database | 62/316,147 | 
| Ā | Method and system of posting achievements regarding scans for malware programs | 13/030,715 | 
| Ā | Method and system for disabling malware programs | 13/030,669 | 
| Avast Browser Cleanup | Cloud-based reputation system for browser extensions and toolbars | 14/874,291 | 
| Ā | Recommending Software Based on User Similarity | 62/315,956 | 
| Avast Mobile Security | Gesture Recognition for Device Unlocking | 62/012,137 | 
| Avast Virtual Mobile Platform | Environmentally adaptive and segregated media pipeline architecture for multiple streaming sessions | 62/270,342 | 
| Ā | Data filtration prevention from mobile platforms | 61/880,076 | 
| Avast Passwords | Extending a classification database by user interactions | 62/221,962 | 
| Ā | Injecting credentials into web browser requests | 62/181,699 | 
| Ā | Distributed Ring of Trust | 62/315,149 | 
 
    
    
    
   
    
    
    
   
    
    
    
  