TECHNIQUES FOR THIRD-PARTY CONTENT DELIVERY VIA A UNIQUE MOBILE APPLICATION ADDRESS
First Claim
1. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors configured to execute the method, comprising:
- obtaining a unique address for a mobile application that is processing on a first device of a user;
receiving a request from a content service to deliver customized secure content to the user on the first device;
acquiring the customized secure content for the user based on the unique address and the request; and
delivering the customized secure content to the mobile application using the unique address.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques for third-party content delivery via a unique mobile application address are presented. A mobile application on a mobile device of a consumer generates or is assigned a unique address. The consumer uses the mobile application to communicate with an enterprise over a network. The enterprise delegates delivery of content to the mobile application to a third-party service and provides the unique address. The third-party service directly sends the content over the network to the mobile application of the mobile device on behalf of the enterprise.
-
Citations
20 Claims
-
1. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors configured to execute the method, comprising:
-
obtaining a unique address for a mobile application that is processing on a first device of a user; receiving a request from a content service to deliver customized secure content to the user on the first device; acquiring the customized secure content for the user based on the unique address and the request; and delivering the customized secure content to the mobile application using the unique address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors configured to execute the method, comprising:
-
logging a user onto a content service; requesting secure content from the content service; receiving the secure content from a third-party content delivery manager that is independent of and external to the content service over a network; and retaining the secure content for subsequent transactions of the user in a local processing environment of the user. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system, comprising:
-
a first machine having a third-party content delivery manager implemented in a non-transitory computer-readable storage medium and which processes on the first machine; and a second machine having a third-party content delivery agent implemented in a non-transitory computer-readable storage medium and which processes on the second machine; the third-party content delivery manager configured to interact with a content service that the third-party content delivery agent communicates with to acquire secure content for a user of the second machine, the third-party content delivery manager also configured to identify a unique address for the third-party content delivery agent and directly deliver the secure content on behalf of the content service to the third-party content delivery agent, the third-party content delivery agent configured to manage the secure content on the second machine and interact with the content service and the third-party content delivery manager. - View Dependent Claims (20)
-
Specification