Patents by Inventor Nenad Medvidovic

Nenad Medvidovic has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11379551
    Abstract: Systems and methods for reducing latency in use of mobile applications include creating a list of potential internet requests from a mobile application based on an analysis of the mobile application. The systems and methods include creating a trigger map that maps each of a plurality of trigger points of the mobile application with a corresponding target internet request to be prefetched from the list of potential internet requests. The systems and methods include creating a URL map that maps each of a plurality of the potential internet requests with corresponding URL values. The systems and methods include identifying that a current app function matches a trigger point of the plurality of trigger points. The systems and methods include performing the potential internet request in response to identifying that the current app function matches the trigger point prior to the target request being received in order to reduce latency.
    Type: Grant
    Filed: March 26, 2020
    Date of Patent: July 5, 2022
    Assignee: UNIVERSITY OF SOUTHERN CALIFORNIA
    Inventors: Yixue Zhao, Nenad Medvidovic, Marcelo Schmitt Laser, Yingjun Lyu
  • Patent number: 10827349
    Abstract: A system for providing increased security in a mobile operating system includes at least one mobile device and a remote computing device that is remote from the mobile device. The remote computing device receives a list of two or more applications that are currently installed or intended to be installed on the mobile device's operating system. The remote computing device identifies vulnerable inter-component communication (ICC) paths by analyzing files associated with each of the two or more applications. A list of the vulnerable ICC paths is stored in memory of the mobile device. The mobile processor compares the list of the vulnerable ICC paths to intents sent by the components of the two or more applications and identifies a potential unsecure intent that matches one of the list of the vulnerable ICC paths. Unsecured intents can then be blocked by the user.
    Type: Grant
    Filed: May 13, 2019
    Date of Patent: November 3, 2020
    Assignee: UNIVERSITY OF SOUTHERN CALIFORNIA
    Inventors: Jae Young Bang, Youn Kyu Lee, Nenad Medvidovic, Daye Nam, Gholamreza Safi, Arman Shahbazian, Peera Yoodee, Yixue Zhao
  • Publication number: 20200311173
    Abstract: Systems and methods for reducing latency in use of mobile applications include creating a list of potential internet requests from a mobile application based on an analysis of the mobile application. The systems and methods include creating a trigger map that maps each of a plurality of trigger points of the mobile application with a corresponding target internet request to be prefetched from the list of potential internet requests. The systems and methods include creating a URL map that maps each of a plurality of the potential internet requests with corresponding URL values. The systems and methods include identifying that a current app function matches a trigger point of the plurality of trigger points. The systems and methods include performing the potential internet request in response to identifying that the current app function matches the trigger point prior to the target request being received in order to reduce latency.
    Type: Application
    Filed: March 26, 2020
    Publication date: October 1, 2020
    Inventors: Yixue Zhao, Nenad Medvidovic, Marcelo Schmitt Laser, Yingjun Lyu
  • Publication number: 20190349756
    Abstract: A system for providing increased security in a mobile operating system includes at least one mobile device and a remote computing device that is remote from the mobile device. The remote computing device receives a list of two or more applications that are currently installed or intended to be installed on the mobile device's operating system. The remote computing device identifies vulnerable inter-component communication (ICC) paths by analyzing files associated with each of the two or more applications. A list of the vulnerable ICC paths is stored in memory of the mobile device. The mobile processor compares the list of the vulnerable ICC paths to intents sent by the components of the two or more applications and identifies a potential unsecure intent that matches one of the list of the vulnerable ICC paths. Unsecured intents can then be blocked by the user.
    Type: Application
    Filed: May 13, 2019
    Publication date: November 14, 2019
    Inventors: JAE BANG, YOUN KYU LEE, NENAD MEDVIDOVIC, DAYE NAM, GHOLAMREZA SAFI, ARMAN SHAHBAZIAN, PEERA YOODEE, YIXUE ZHAO
  • Patent number: 8332457
    Abstract: A method and system for privacy-preserved distributed computing on large networks using a tile-based architecture is disclosed. An expression for a tile seed assembly characterizing a problem, such as an NP-complete problem, may be determined. The solution to the tile seed assembly is a full tile assembly including a plurality of tile types. In a network of participating nodes, a tile type may be assigned to each node. A description of a tile type specific to a node may be provided to each node. A tile seed assembly may be established on selected nodes. Through progressive recruitment and replication, the tile assembly may mature, in response to the problem being solvable, into a full tile assembly having a solution. The solution may be received by the client computer.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: December 11, 2012
    Assignee: University of Southern California
    Inventors: Yuriy Brun, Nenad Medvidovic
  • Publication number: 20120089960
    Abstract: Multiple architects may concurrently create and modify a model of computer software, each on their own client at a different location. Each change that is made to a model is forwarded to a server for analysis. The server may determine whether the change creates a conflict. If no conflict is detected, the change may be approved, saved, and propagated by the server to all of the other clients that are working on the same model. If a conflict is detected, on the other hand, the change may not be approved by the server. The server may instead provide notice of the conflict.
    Type: Application
    Filed: October 11, 2011
    Publication date: April 12, 2012
    Applicant: UNIVERSITY OF SOUTHERN CALIFORNIA
    Inventors: Nenad MEDVIDOVIC, Jae Young BANG, Daniel POPESCU, George EDWARDS, Srinivas PADMANABHUNI, Girish Maskeri RAMA, Naveen KULKARNI
  • Publication number: 20090112784
    Abstract: A method and system for privacy-preserved distributed computing on large networks using a tile-based architecture is disclosed. An expression for a tile seed assembly characterizing a problem, such as an NP-complete problem, may be determined. The solution to the tile seed assembly is a full tile assembly including a plurality of tile types. In a network of participating nodes, a tile type may be assigned to each node. A description of a tile type specific to a node may be provided to each node. A tile seed assembly may be established on selected nodes. Through progressive recruitment and replication, the tile assembly may mature, in response to the problem being solvable, into a full tile assembly having a solution. The solution may be received by the client computer.
    Type: Application
    Filed: October 27, 2008
    Publication date: April 30, 2009
    Applicant: UNIVERSITY OF SOUTHERN CALIFORNIA
    Inventors: Yuriy Brun, Nenad Medvidovic