Adobe Systems Patent Applications

USE OF NEAR FIELD COMMUNICATION DEVICES AS PROOF OF IDENTITY DURING ELECTRONIC SIGNATURE PROCESS

Granted: September 24, 2015
Application Number: 20150269698
Electronic signatures are authenticated utilizing near field communication (NFC) devices as proof of identity. An identification service collects an identification of a NFC device associated with a signer of a contract. The identification may be utilized as an access control mechanism that enables the signer to receive, view, or sign the contract. An electronic signature associated with the signer is received. The identification of the NFC device and the electronic signature of the…

METHOD AND APPARATUS FOR DIGITAL RIGHTS MANAGEMENT THAT IS FILE TYPE AND VIEWER APPLICATION AGNOSTIC

Granted: September 24, 2015
Application Number: 20150269357
A computer implemented method and apparatus for file type and viewer application agnostic digital rights management. The method comprises intercepting processing of one or more operating system calls from a viewer application, wherein each of the one or more operating system call requests performance of a function on a digital asset of a plurality of digital assets subject to digital rights management (DRM); performing DRM enforcement of the digital asset with respect to the requested…

AUTOMATIC UNIFORM RESOURCE LOCATOR CONSTRUCTION

Granted: September 17, 2015
Application Number: 20150264105
Techniques are disclosed for automatically constructing a human-friendly and meaningful URL based on the content, context, or both, of the resource. An alternate URL can be constructed by analyzing and extracting keywords or other portions of content from a webpage automatically. The content of the webpage or other resource is obtained and analyzed using keyword extraction filters to derive one or more keywords that uniquely represent the content of the resource. An alternate URL is…

Low Latency Live Video Streaming

Granted: September 17, 2015
Application Number: 20150264096
Techniques are disclosed for low latency live video streaming. A client can be configured to send a single HTTP request for live video streaming to a server. The server can be configured to push one or more video segments to the client in response to the request, following a pre-defined push strategy. For example, using a so-called all-push strategy, the client sends only one request to the server, and in response, the server sends all of the video segments to the client as soon as each…

Video Denoising Using Optical Flow

Granted: September 17, 2015
Application Number: 20150262336
In techniques for video denoising using optical flow, image frames of video content include noise that corrupts the video content. A reference frame is selected, and matching patches to an image patch in the reference frame are determined from within the reference frame. A noise estimate is computed for previous and subsequent image frames relative to the reference frame. The noise estimate for an image frame is computed based on optical flow, and is usable to determine a contribution of…

Marketing Strategy Lifecycle Management

Granted: September 17, 2015
Application Number: 20150262257
Marketing strategy lifecycle management techniques are described. In one or more implementations, a marketing strategy is created and managed using a plurality of entities as part of a lifecycle management system. The system may include a hierarchical structure that describes a relationship of portions of the strategy to each other, such as brand, portfolio, marketing campaign, marketing channel, and marketing activity. In this way, users may view and implement different portions of the…

Techniques for Topic Extraction Using Targeted Message Characteristics

Granted: September 17, 2015
Application Number: 20150262238
Disclosed are various embodiments for obtaining messages from content sites accessible via a network. Filtered messages are identified from the messages using filter criteria to identify ones of the messages having one or more characteristics relevant for a particular marketing circumstance. A topic is selected based on determining that multiple occurrences of the filtered messages relate to the topic. Based on selecting the topic, recommending the topic for targeted marketing in the…

System Identification Framework

Granted: September 17, 2015
Application Number: 20150262205
Optimizing customer lifetime value (LTV) techniques are described. In one or more implementations, a simulator is configured to derive a prediction model based on data indicative of user interaction online with marketing offers. The prediction model may be produced by automatically classifying variables according to feature types and matching each feature type to a response function that defines how the variable responds to input actions. The classification of variables and/or…

IMAGE ROTATION BASED ON TOUCH GESTURES

Granted: September 17, 2015
Application Number: 20150261421
Embodiments of the present invention provide systems, methods, and computer storage media for facilitating rotation of images in response to gestures. A user can provide a gesture to effectuate a desired rotation of an image. In some implementations, a user might provide a rotation gesture (i.e., a circular pattern) to cause an in-plane image rotation or a stroke gesture (i.e., a straight line pattern) to cause an out-of-plane image rotation. Using intuitive gestures, such as touch…

Authentication for Online Content using an Access Token

Granted: September 10, 2015
Application Number: 20150254441
Techniques for authentication for online content using an access token are described. According to various embodiments, online content (e.g., webpages and other types of web content) can be served across a variety of different online resources. According to one or more embodiments, an access token is leveraged to enable a user to authenticate with multiple different distributed content resources for access to online content, and without requiring the user to input authentication…

MANAGING A DISTRIBUTED DATABASE ACROSS A PLURALITY OF CLUSTERS

Granted: September 10, 2015
Application Number: 20150254325
A multi-cluster database management system is disclosed that distributes and manages data across a multi-cluster database through the use of cluster partitions. The multi-cluster database management system assigns cluster partitions to clusters of the multi-cluster database. The multi-cluster database management system can evenly or substantially evenly divide the cluster partitions and associated data among the clusters of the multi-cluster database. The multi-cluster database…

METHOD AND APPARATUS FOR SYNCHRONIZING APPLICATION CONFIGURATION DATA OVER A NETWORK

Granted: September 10, 2015
Application Number: 20150254067
An apparatus and computer implemented method for synchronizing application configuration data over a network comprising storing, electronically, application configuration data for an application installed on a first device; providing for selection by a second device, one or more application configuration data packages based on the stored application configuration data; receiving, from the second device, a selection of one of the one or more application configuration data packages;…

SOCIAL LISTENING AND FILTER RULE MODIFICATION

Granted: August 27, 2015
Application Number: 20150242749
Listening rules and/or filter rules are generated or modified for use by a social analysis tool to capture and/or filter social mentions from social networking services for moderation purposes. The text and metadata of social mentions that have previously been moderated may be analyzed to identify common text and/or common metadata amongst those social mentions. The new listening and/or filter rules may be generated by selecting criteria for the rules based on the identified common text…

DETECTION AND RESTORATION OF ERRONEOUS DATA

Granted: August 27, 2015
Application Number: 20150242267
Embodiments of the present invention provide systems, methods, and computer storage media for detecting and restoring erroneous data. In cases that a data entry within a data matrix is determined to be erroneous, the data entry can be restored using a replacement value calculated in accordance with other data from the data matrix. In particular, the number of dimensions used to calculate the replacement value can be reduced from the complete set of dimensions to avoid unnecessary noise…

METHOD AND APPARATUS FOR STORING AND RETRIEVING DATA EMBEDDED INTO THE SURFACE OF A 3D PRINTED OBJECT

Granted: August 20, 2015
Application Number: 20150235069
A computer implemented method and apparatus for storing and retrieving data embedded into the surface of a 3D printed object is described. The method and apparatus develops an electronic file used for printing a 3D object which embeds as structure into the 3D object, a 3D symbol matrix representative of data to be printed concurrently with the 3D object, such as a 3D barcode. A selected symbology is used for making the symbol matrix in accordance with the type of printing process to be…

DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION

Granted: August 20, 2015
Application Number: 20150235011
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server, which eliminates the need of storing or using any secret information in the client application. Further, an encrypted content key generated by a content packager using a public key can be deployed in the key URI of a playlist file, which is sent to the key server. The key server can be…

FONT RESOURCE MANAGEMENT

Granted: August 20, 2015
Application Number: 20150234793
Techniques are disclosed that allow a user to control how an operating system maintains, updates, installs, and uses font resources provided in a font resource repository. A font resource management module can be configured to detect conflicts between font resources and prompt the user to resolve such conflicts. Conflicts may occur, for example, where Version 1.0 of a given font has been installed and is being used by an operating system, but where Version 2.0 of that same font is later…

METHOD AND APPARATUS FOR CONTROLLING PRINTABILITY OF A 3-DIMENSIONAL MODEL

Granted: August 13, 2015
Application Number: 20150224715
A computer implemented method and apparatus for controlling printability of a 3D model. The method comprises modifying a 3D model according to a plurality of transformation details, wherein the transformation details modify the 3D model so as to break one or more printability rules, and wherein modifying does not alter an appearance of the 3D model.

Category Histogram Image Representation

Granted: August 13, 2015
Application Number: 20150227817
In techniques for category histogram image representation, image segments of an input image are generated and bounding boxes are selected that each represent a region of the input image, where each of the bounding boxes include image segments of the input image. A saliency map of the input image can also be generated. A bounding box is applied as a query on an images database to determine database image regions that match the region of the input image represented by the bounding box. The…

METHOD AND APPARATUS FOR EMBEDDING A 2-DIMENSIONAL IMAGE IN A 3-DIMENSIONAL MODEL

Granted: August 13, 2015
Application Number: 20150224716
A computer implemented method and apparatus for embedding a 2D image in a 3D model. The method comprises generating a 3-dimensional (3D) print matrix representing a 2-dimensional (2D) image, wherein the print matrix comprises a plurality of sub-regions, the base plane of each sub-region angled with respect to a top surface of the print matrix so as to produce a plurality of shades, each shade representing a shade of the 2D image; and embedding the print matrix in a (3D) model.