Patents by Inventor Peter Raymond Fransen
Peter Raymond Fransen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180253224Abstract: Facilitating analysis of user interface gesture patterns is described. In example implementations, a computing device acquires data that describes a user interface gesture pattern, such as finger movements on a touchscreen, in terms of pixels of a visual display. A repetitive arrangement of polygons, such as a grid of rectangles, is logically overlaid on the visual display. The computing device transforms the pixel-based data into polygon-based data that represents the gesture pattern in terms of polygons traversed by the gesture pattern. The computing device also converts the polygon-based data into text-based data such that the gesture pattern is represented by textual characters, such as a text string. The text string can include, for instance, a list of polygons traversed by the gesture pattern. The text-based data is forwarded to a service that can efficiently analyze relationships that may exist among multiple gesture patterns across multiple devices or end users.Type: ApplicationFiled: March 2, 2017Publication date: September 6, 2018Applicant: Adobe Systems IncorporatedInventors: Peter Raymond Fransen, Christine Xuan Phan
-
Publication number: 20180234796Abstract: A digital medium environment is described to control provision of digital content within a physical environment to a mobile device associated with a user. User identification data and position data are received. The position data describes a physical location at which the mobile device is disposed within the physical environment. A user profile is selected based on the user identification data. The user profile describes user online interaction with digital content. Digital content is generated that is personalized based on the selected user profile and the position data. Output is then controlled of the generated digital content to the mobile device.Type: ApplicationFiled: February 10, 2017Publication date: August 16, 2018Applicant: Adobe Systems IncorporatedInventors: Manaswi Saha, Thomas William Randall Jacobs, David M. Tompkins, Peter Raymond Fransen
-
Patent number: 10044687Abstract: Techniques allow owners of Internet of Things (IoT) devices to provide specific access to data from their IoT devices to requesters of data. A request for data from an IoT device is received from a requester, and the request is provided to the owner of the IoT device. An indication of acceptance by the owner is provided for the request. A public key of a public/private key pair associated with the accepted requester is received. A plurality of datapoints from the IoT device is also received. At least one datapoint of the plurality of datapoints is encrypted with the public key of the requester. The encrypted at least one datapoint is then sent to the requester, where the requester can decrypt the encrypted at least one datapoint using the private key of the public/private key pair.Type: GrantFiled: July 10, 2017Date of Patent: August 7, 2018Assignee: Adobe Systems IncorporatedInventor: Peter Raymond Fransen
-
Publication number: 20180211281Abstract: Techniques and systems are described in which an image similarity determination of paths is used to control digital content output. In one example, a plurality of coordinates is received that represent a plurality of physical locations within a physical environment. A digital image is then generated having a path that describes the plurality of coordinates. The path of the generated digital image is compared to a plurality of reference paths described by respective ones of a plurality of reference digital images, e.g., through image similarity. An item of digital content is selected based at least in part on the comparison. Output is then controlled of the selected item of the digital content.Type: ApplicationFiled: January 26, 2017Publication date: July 26, 2018Applicant: Adobe Systems IncorporatedInventors: Peter Raymond Fransen, Christine Xuan Phan
-
Publication number: 20180059898Abstract: Techniques and systems are described to implement a platform to create and disseminate virtual user experiences. In one example, a service provider exposes a platform usable for creation of virtual user experiences. In another example, a service provider exposes functionality to enable specification of physical environment conditions to be met in order to cause dissemination of respective virtual user experiences maintained by the service provider. In one instance, triggers are detected by a computing device of a user that are indicative of a likelihood to cause output of a virtual user experience. Once triggered, the computing device communicates data describing physical environment conditions to the service provider. The service provider then matches these conditions to specified physical environment conditions that are to be used to control dissemination of the virtual user experience.Type: ApplicationFiled: August 24, 2016Publication date: March 1, 2018Applicant: Adobe Systems IncorporatedInventors: Gavin Stuart Peter Miller, Nadia Rehman-Murphy, Cory Lynn Edwards, Peter Raymond Fransen
-
Publication number: 20180053236Abstract: Navigation and reward techniques involving physical goods and services are described. In one example, digital content is configured to aid navigation of a user between different physical goods or services. This navigation includes user specified good or services as well as recommended goods or services that are not specified by the user. In another example, digital content is provided as part of a reward system. In return for permitting access to user data, the user is provided with rewards that are based on this monitored interaction. In this way, an owner of the store may gain detailed knowledge which may be used to increase likelihood of offering goods or services of interest to the user. In return, the user is provided with rewards to permit access to this detailed knowledge.Type: ApplicationFiled: August 16, 2016Publication date: February 22, 2018Applicant: Adobe Systems IncorporatedInventors: Peter Raymond Fransen, Matthew William Rozen, Brian David Williams, Cory Lynn Edwards
-
Publication number: 20180039479Abstract: Digital content search and environmental context techniques and systems are described. The environmental context is leveraged to provide additional information and insight into a likely goal of a textual search query input by a user. In one example, environmental conditions are leveraged to provide a search query context. In another example, environmental conditions are detected to determine a type of object that is disposed in the physical environment of a user. From this, the computing device identifies and launches an application that corresponds to the detected type of object from an image captured of the physical environment. In a further example, the environmental context is used to refine a search in response to user selection of physical objects in a physical environment of the user.Type: ApplicationFiled: August 4, 2016Publication date: February 8, 2018Applicant: Adobe Systems IncorporatedInventors: Peter Raymond Fransen, Yuyan Song, Pradhan S. Rao
-
Publication number: 20180025028Abstract: Facilitating location-aware analysis is described. In some embodiments, a database building module is configured to build a point of interest (POI) database based on a tree data structure that includes multiple nodes respectively corresponding to multiple areas. The database building module includes a content node processing module that inserts an entry in the POI database having a content field populated by a POI descriptor included with a content node. The database building module also includes a reference node processing module that inserts an entry having multiple reference fields respectively populated with area indicators corresponding to multiple subnodes of a reference node. In other embodiments, a POI database search module is configured to search a POI database to ascertain multiple POIs with regard to a location of a computing device. The search module searches key fields of reference entries and content entries using an area indicator matching the computing device's location.Type: ApplicationFiled: July 22, 2016Publication date: January 25, 2018Applicant: Adobe Systems IncorporatedInventor: Peter Raymond Fransen
-
Publication number: 20170310645Abstract: Techniques allow owners of Internet of Things (IoT) devices to provide specific access to data from their IoT devices to requesters of data. A request for data from one or more IoT devices is received from one or more requesters, and the request is provided to the owner of the one or more IoT devices. An indication of acceptance by the owner is provided for at least one of the requests from the requesters. A public key of a public/private key pair associated with each of the accepted requester(s) is received. A plurality of datapoints from the one or more IoT devices is also received. For each of the selected requester(s), at least one datapoint of the plurality of datapoints is encrypted with the public key of the requester. The encrypted at least one datapoint is then sent to the requester, where the requester can decrypt the encrypted at least one datapoint using the private key of the public/private key pair.Type: ApplicationFiled: July 10, 2017Publication date: October 26, 2017Inventor: PETER RAYMOND FRANSEN
-
Patent number: 9749130Abstract: In some embodiments, a server can establish a session with a remote client. The server can generate a session key portion for the session and a client key portion for the remote client. The server can use a combined encryption key to encrypt client data received from the remote client during the session. The combined encryption key can be generated from a static key portion accessible by the server, the session key portion, and the client key portion. The server can associate the session key portion with the session. The session key portion is accessible by the server during the session. The server can delete the client key portion after providing the client key portion to the remote client. The server can obtain the client key portion from the remote client in response to determining that subsequent transactions during the session involve decrypting the encrypted client data.Type: GrantFiled: November 12, 2015Date of Patent: August 29, 2017Assignee: Adobe Systems IncorporatedInventors: Jeffrey Michael Day, Peter Raymond Fransen
-
Patent number: 9742740Abstract: Techniques allow owners of Internet of Things (IoT) devices to provide specific access to data from their IoT devices to requesters of data. A request for data from one or more IoT devices is received from one or more requesters, and the request is provided to the owner of the one or more IoT devices. An indication of acceptance by the owner is provided for at least one of the requests from the requesters. A public key of a public/private key pair associated with each of the accepted requester(s) is received. A plurality of datapoints from the one or more IoT devices is also received. For each of the selected requester(s), at least one datapoint of the plurality of datapoints is encrypted with the public key of the requester. The encrypted at least one datapoint is then sent to the requester, where the requester can decrypt the encrypted at least one datapoint using the private key of the public/private key pair.Type: GrantFiled: November 18, 2015Date of Patent: August 22, 2017Assignee: ADOBE SYSTEMS INCORPORATEDInventor: Peter Raymond Fransen
-
Publication number: 20170142073Abstract: Techniques allow owners of Internet of Things (IoT) devices to provide specific access to data from their IoT devices to requesters of data. A request for data from one or more IoT devices is received from one or more requesters, and the request is provided to the owner of the one or more IoT devices. An indication of acceptance by the owner is provided for at least one of the requests from the requesters. A public key of a public/private key pair associated with each of the accepted requester(s) is received. A plurality of datapoints from the one or more IoT devices is also received. For each of the selected requester(s), at least one datapoint of the plurality of datapoints is encrypted with the public key of the requester. The encrypted at least one datapoint is then sent to the requester, where the requester can decrypt the encrypted at least one datapoint using the private key of the public/private key pair.Type: ApplicationFiled: November 18, 2015Publication date: May 18, 2017Inventor: PETER RAYMOND FRANSEN
-
Publication number: 20170017998Abstract: Embodiments of the present invention provide systems and methods for generating personalized targeted content based on user sentiment and micro-location. A user's sentiment toward content, or items represented by the content, may be used to personalize targeted content when a user is determined to be near items (e.g., products) related to the content. Micro-location technology may be used to identify when the user is in an appropriate location to receive such personalized targeted content. Content may be provided to a user based on identifying a positive user sentiment toward particular portions of the content. Additionally, content may be provided to a user upon identifying a negative user sentiment toward particular portions of the content in order to allay concerns. User sentiments may be dynamically updated over time or as exposure to content changes.Type: ApplicationFiled: July 17, 2015Publication date: January 19, 2017Inventors: Anmol Dhawan, Walter W. Chang, Ashish Duggal, Peter Raymond Fransen, Sachin Soni
-
Publication number: 20160080145Abstract: In some embodiments, a server can establish a session with a remote client. The server can generate a session key portion for the session and a client key portion for the remote client. The server can use a combined encryption key to encrypt client data received from the remote client during the session. The combined encryption key can be generated from a static key portion accessible by the server, the session key portion, and the client key portion. The server can associate the session key portion with the session. The session key portion is accessible by the server during the session. The server can delete the client key portion after providing the client key portion to the remote client. The server can obtain the client key portion from the remote client in response to determining that subsequent transactions during the session involve decrypting the encrypted client data.Type: ApplicationFiled: November 12, 2015Publication date: March 17, 2016Inventors: Jeffrey Michael Day, Peter Raymond Fransen
-
Patent number: 9215064Abstract: In some embodiments, a server can establish a session with a remote client. The server can generate a session key portion for the session and a client key portion for the remote client. The server can use a combined encryption key to encrypt client data received from the remote client during the session. The combined encryption key can be generated from a static key portion accessible by the server, the session key portion, and the client key portion. The server can associate the session key portion with the session. The session key portion is accessible by the server during the session. The server can delete the client key portion after providing the client key portion to the remote client. The server can obtain the client key portion from the remote client in response to determining that subsequent transactions during the session involve decrypting the encrypted client data.Type: GrantFiled: October 21, 2013Date of Patent: December 15, 2015Assignee: Adobe Systems IncorporatedInventors: Jeffrey Michael Day, Peter Raymond Fransen
-
Publication number: 20150113276Abstract: In some embodiments, a server can establish a session with a remote client. The server can generate a session key portion for the session and a client key portion for the remote client. The server can use a combined encryption key to encrypt client data received from the remote client during the session. The combined encryption key can be generated from a static key portion accessible by the server, the session key portion, and the client key portion. The server can associate the session key portion with the session. The session key portion is accessible by the server during the session. The server can delete the client key portion after providing the client key portion to the remote client. The server can obtain the client key portion from the remote client in response to determining that subsequent transactions during the session involve decrypting the encrypted client data.Type: ApplicationFiled: October 21, 2013Publication date: April 23, 2015Applicant: Adobe Systems IncorporatedInventors: Jeffrey Michael Day, Peter Raymond Fransen
-
Publication number: 20150058074Abstract: In an example embodiment, user interactions with a software component may be tracked in an efficient manner. Specifically, an analytics tracking request triggered by user interaction with a software component is received. Then a value assigned to the user is retrieved. It is then determined if the value assigned to the user exceeds a value threshold assigned to the analytics tracking request. Based on a comparison between the value assigned to the user and the threshold value, an analytics tracking function associated with the analytics tracking request is launched.Type: ApplicationFiled: August 26, 2013Publication date: February 26, 2015Applicant: ADOBE SYSTEMS INCORPORATEDInventor: Peter Raymond Fransen