Patents by Inventor John Pestana
John Pestana has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10826802Abstract: A computer system for managing network communication protocols comprises computer-executable instructions that configure the computer system to receive a dataset of information for network-based analytic elements. The dataset can comprise information received by a network-based destination of the analytic elements. The analytic elements may have been executed within a network-connected software application. The system can also be configured to identify a pattern within the dataset of information. Based upon the identified pattern, the system can create an analytic element rule that is configured to describe the identified pattern on at least a subset of network-based analytic elements that are executable within the network-connected software application. Additionally, the system can be configured to store, within a digital database, the analytic element rule, wherein the digital database comprises a set of analytic element rules for managing analytic elements within the network-connected software application.Type: GrantFiled: February 9, 2016Date of Patent: November 3, 2020Assignee: OBSERVEPOINT, INC.Inventors: John Pestana, Robert K. Seolas, Tyler Broadbent, Daniel Reno, Gregory N. Larson
-
Patent number: 10693943Abstract: Methods and systems allow for using a master tag to monitor and control other tags on a webpage can include identifying a webpage. The method can also include identifying, with a master tag embedded in the webpage, one or more characteristics of at least one other tag embedded within the webpage. Further, the method can include sending a report to a data store that identifies the one or more characteristics of the at least one other tag.Type: GrantFiled: August 9, 2016Date of Patent: June 23, 2020Assignee: OBSERVEPOINT LLCInventors: Robert K Seolas, Alan Martin Feuerlein, Matthew T Miller, John Pestana, Clinton C Eagar
-
Patent number: 10394902Abstract: Methods and system allow for creating rules for a tag management system. One or more implementations create rules for a tag management system can include crawling a page of a website. Additionally, one or more implementations identify the configuration of each of the tags implemented within the page. Further, one or implementations generate one or more rules that enable a tag management system to recreate the configuration of one or more tags implemented within the page. Further still, one or more implementations export the generated one or more rules to a tag management system.Type: GrantFiled: August 16, 2016Date of Patent: August 27, 2019Assignee: OBSERVEPOINT INC.Inventors: Robert K. Seolas, John Pestana, Alan Martin Feuerlein, Matthew T. Miller
-
Publication number: 20180241738Abstract: A method for auditing tags launched within a target mobile application comprises analyzing a network communication generated by a target mobile application to determine if an identifiable tag signature is present within the network communication. An identifiable tag signature can comprise one or more attributes that are associated with the firing of a tag. Based upon a detected tag signature, the method can further comprise determining that a particular tag fired. Further the method can comprise recording information associated with the particular tag. Methods are also provided for inspecting encrypted data traffic and generating reports thereon. Encrypted network communications are intercepted, decrypted using a digital certificate, digital signatures are identified, and reports are generated indicating which digital signatures were found to match tag signatures.Type: ApplicationFiled: November 9, 2015Publication date: August 23, 2018Inventors: Robert K. Seolas, John Pestana, John Pestana, Alan Martin Feuerlein
-
Patent number: 9842133Abstract: A method for auditing a web-based video can comprise receiving validation information associated with one or more video files that are accessible on a webpage. The validation information can comprise one or more time intervals associated with at least one video file. Additionally, the validation information can comprise tag data relating a tag that are associated with the at least one video files. The method can also request through a network connection the at least one video files. The method can then execute the at least one video files. Executing the at least one video file can cause a tag to fire. Additionally, the method can validate the tag by determining whether the tag conforms to the received tag data.Type: GrantFiled: September 12, 2014Date of Patent: December 12, 2017Assignee: OBSERVEPOINT, Inc.Inventors: Robert K. Seolas, John Pestana, Tyler Broadbent, Alan Martin Feuerlein
-
Publication number: 20170230258Abstract: A computer system for managing network communication protocols comprises computer-executable instructions that configure the computer system to receive a dataset of information for network-based analytic elements. The dataset can comprise information received by a network-based destination of the analytic elements. The analytic elements may have been executed within a network-connected software application. The system can also be configured to identify a pattern within the dataset of information. Based upon the identified pattern, the system can create an analytic element rule that is configured to describe the identified pattern on at least a subset of network-based analytic elements that are executable within the network-connected software application. Additionally, the system can be configured to store, within a digital database, the analytic element rule, wherein the digital database comprises a set of analytic element rules for managing analytic elements within the network-connected software application.Type: ApplicationFiled: February 9, 2016Publication date: August 10, 2017Inventors: John Pestana, Robert K. Seolas, Tyler Broadbent, Daniel Reno, Gregory Larson
-
Patent number: 9606971Abstract: An automated website analysis system includes mechanisms for automatically auditing a website to validate that the scanned web page information conforms to validation rules. In one implementation, an auditing system requests web pages of an identified website pursuant to validating at least a portion of each requested web page. Embodiments include scanning page code of at least one of the web pages to identify scanned web page information, including a page tag. The scanned web page information is validated to determine whether is conforms to at least one validation rule by validating variables of the page tag against validation rules, including a vendor validation rule. Results of the validation are reported.Type: GrantFiled: November 14, 2013Date of Patent: March 28, 2017Assignee: OBSERVEPOINT, INC.Inventors: Robert K. Seolas, John Pestana, James Tyler Broadbent, Alan Martin Feuerlein
-
Patent number: 9529859Abstract: Node sequence data, such as website visitation records, are filtered, analyzed, and summarized in reports. An administrator can designate particular target paths of interest in terms of a checkpoint node sequence. Node sequences are filtered based on the checkpoint node sequence, without regard to any additional or tangential nodes appearing in the sequences. In addition, node sequences can be specified in terms of specific nodes of interest along with wild cards. Reports depict the relative frequency of occurrence of node sequences using visual indicators such as line thickness and/or color.Type: GrantFiled: May 26, 2014Date of Patent: December 27, 2016Assignee: Adobe Systems IncorporatedInventors: Brett Error, John Pestana
-
Publication number: 20160357867Abstract: Methods and system allow for creating rules for a tag management system. One or more implementations create rules for a tag management system can include crawling a page of a website. Additionally, one or more implementations identify the configuration of each of the tags implemented within the page. Further, one or implementations generate one or more rules that enable a tag management system to recreate the configuration of one or more tags implemented within the page. Further still, one or more implementations export the generated one or more rules to a tag management system.Type: ApplicationFiled: August 16, 2016Publication date: December 8, 2016Inventors: Robert K. Seolas, John Pestana, Alan Martin Feuerlein, Matthew T. Miller
-
Publication number: 20160352806Abstract: Methods and systems allow for using a master tag to monitor and control other tags on a webpage can include identifying a webpage. The method can also include identifying, with a master tag embedded in the webpage, one or more characteristics of at least one other tag embedded within the webpage. Further, the method can include sending a report to a data store that identifies the one or more characteristics of the at least one other tag.Type: ApplicationFiled: August 9, 2016Publication date: December 1, 2016Inventors: Robert K. Seolas, Alan Martin Feuerlein, Matthew T. Miller, John Pestana, Clinton C. Eagar
-
Patent number: 9418170Abstract: Methods and system allow for creating rules for a tag management system. One or more implementations create rules for a tag management system can include crawling a page of a website. Additionally, one or more implementations identify the configuration of each of the tags implemented within the page. Further, one or implementations generate one or more rules that enable a tag management system to recreate the configuration of one or more tags implemented within the page. Further still, one or more implementations export the generated one or more rules to a tag management system.Type: GrantFiled: May 9, 2013Date of Patent: August 16, 2016Assignee: Observepoint, Inc.Inventors: Robert K. Seolas, John Pestana, Matthew T. Miller, Alan Martin Feuerlein
-
Patent number: 9412115Abstract: Methods and systems allow for using a master tag to monitor and control other tags on a webpage can include identifying a webpage. The method can also include identifying, with a master tag embedded in the webpage, one or more characteristics of at least one other tag embedded within the webpage. Further, the method can include sending a report to a data store that identifies the one or more characteristics of the at least one other tag.Type: GrantFiled: May 9, 2013Date of Patent: August 9, 2016Assignee: Observepoint, Inc.Inventors: Robert K. Seolas, Alan Martin Feuerlein, Matthew T. Miller, John Pestana, Clinton C. Eagar
-
Patent number: 9390138Abstract: Multiple selected checkpoints define a group of paths represented in an analytics database. One or more events which appear between the multiple checkpoints on each of a plurality of the paths are identified as common bridge events. Path analysis information is then output, such as a bridge event analysis including a list of website visitor common bridge events that are ranked by their frequency of appearance, the frequencies calculated without regard to where each visitor event appears on a given path.Type: GrantFiled: October 6, 2015Date of Patent: July 12, 2016Assignee: Adobe Systems IncorporatedInventors: Christopher Reid Error, Brett Michael Error, John Pestana
-
Patent number: 9357366Abstract: A method for auditing tags launched within a target mobile application comprises analyzing a network communication generated by a target mobile application to determine if an identifiable tag signature is present within the network communication. An identifiable tag signature can comprise one or more attributes that are associated with the firing of a tag. Based upon a detected tag signature, the method can further comprise determining that a particular tag fired. Further the method can comprise recording information associated with the particular tag.Type: GrantFiled: September 12, 2014Date of Patent: May 31, 2016Assignee: OBSERVEPOINT, INC.Inventors: Robert K. Seolas, John Pestana, Tyler Broadbent, Alan Martin Feuerlein
-
Publication number: 20160080918Abstract: A method for auditing tags launched within a target mobile application comprises analyzing a network communication generated by a target mobile application to determine if an identifiable tag signature is present within the network communication. An identifiable tag signature can comprise one or more attributes that are associated with the firing of a tag. Based upon a detected tag signature, the method can further comprise determining that a particular tag fired. Further the method can comprise recording information associated with the particular tag.Type: ApplicationFiled: September 12, 2014Publication date: March 17, 2016Inventors: Robert K. Seolas, John Pestana, Tyler Broadbent, Alan Martin Feuerlein
-
Publication number: 20160078078Abstract: A method for auditing a web-based video can comprise receiving validation information associated with one or more video files that are accessible on a webpage. The validation information can comprise one or more time intervals associated with at least one video file. Additionally, the validation information can comprise tag data relating a tag that are associated with the at least one video files. The method can also request through a network connection the at least one video files. The method can then execute the at least one video files. Executing the at least one video file can cause a tag to fire. Additionally, the method can validate the tag by determining whether the tag conforms to the received tag data.Type: ApplicationFiled: September 12, 2014Publication date: March 17, 2016Inventors: Robert K. Seolas, John Pestana, Tyler Broadbent, Alan Martin Feuerlein
-
Publication number: 20160026691Abstract: Multiple selected checkpoints define a group of paths represented in an analytics database. One or more events which appear between the multiple checkpoints on each of a plurality of the paths are identified as common bridge events. Path analysis information is then output, such as a bridge event analysis including a list of website visitor common bridge events that are ranked by their frequency of appearance, the frequencies calculated without regard to where each visitor event appears on a given path.Type: ApplicationFiled: October 6, 2015Publication date: January 28, 2016Inventors: Christopher Reid Error, Brett Michael Error, John Pestana
-
Patent number: 9203720Abstract: A system for monitoring the “analytics health” or “tracking health” of a web page can include one or more modules that render analytics code on the web page. In one implementation, a monitoring service downloads one or more web pages from a web server. The monitoring service can attempt to render any analytics code on the web pages to see if the analytics code renders or executes as expected. The monitoring service can also perform basic text searches to identify analytics code, even if it cannot be rendered, and to determine if such code is present and correctly written in the web page. For web pages that require form input, the monitoring service can prompt the user for corresponding input, or retrieve pre-recorded user input from a store. The monitoring service can determine analytics health for web pages of interest in real-time.Type: GrantFiled: October 30, 2013Date of Patent: December 1, 2015Assignee: ObservePoint, Inc.Inventors: Robert K. Seolas, John Pestana, Tyler Broadbent, Richard A. Zinn
-
Patent number: 9189561Abstract: Two selected checkpoints define a group of paths represented in an analytics database. One or more events which appear between the two checkpoints on each of a plurality of the paths are identified as common bridge events. Path analysis information is then output, such as a bridge event analysis including a list of website visitor common bridge events that are ranked by their frequency of appearance, the frequencies calculated without regard to where each visitor event appears on a given path.Type: GrantFiled: February 8, 2008Date of Patent: November 17, 2015Assignee: Adobe Systems IncorporatedInventors: Christopher Reid Error, Brett Michael Error, John Pestana
-
Publication number: 20140351243Abstract: Node sequence data, such as website visitation records, are filtered, analyzed, and summarized in reports. An administrator can designate particular target paths of interest in terms of a checkpoint node sequence. Node sequences are filtered based on the checkpoint node sequence, without regard to any additional or tangential nodes appearing in the sequences. In addition, node sequences can be specified in terms of specific nodes of interest along with wild cards. Reports depict the relative frequency of occurrence of node sequences using visual indicators such as line thickness and/or color.Type: ApplicationFiled: May 26, 2014Publication date: November 27, 2014Applicant: Adobe Systems IncorporatedInventors: Brett Error, John Pestana