Utilizing A Secondary Application To Render Invitational Content
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for utilizing a secondary application to render invitational content. Primary content rendered by a web browser can be embedded with a command requesting that a secondary application be executed. The secondary application can be executed in a secured sand box environment and configured to render invitational content in a second window above the primary content. The secondary application can be known and trusted by the operating system to gather sensitive data used to select appropriate invitational content. Further, data can be included in the command requesting that the secondary application be executed. The invitational content can be associated with secondary views that can be rendered without affecting the primary content. The secondary application can collect data to render the secondary view, such as the exact point selected, which is used to render graphical transition effects leading to the secondary view.
-
Citations
21 Claims
-
1. (canceled)
-
2. A mobile device, comprising:
-
a processor; and a memory storing instructions, which when executed by the processor causes the processor to; render primary content on a primary application; executing a secondary application, the secondary application configured to render secondary content, having access to a subset of the primary application'"'"'s functionality and being known and trusted by an operating system of the mobile device; determine dimensions of an allocated space of the primary application; share with the secondary application based on being known and trusted by the operating system, sensitive information specific to a user, wherein the sensitive information is harvested by the operating system; render the secondary content in the secondary application, the secondary content layered over the allocated space of the primary application and the secondary content determined based on the sensitive information specific to the user and the dimensions of the allocated space. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
rendering, by a processor of a mobile device, primary content on a primary application; executing a secondary application on the mobile device, the secondary application configured to render secondary content, having access to a subset of the primary application'"'"'s functionality and being known and trusted by an operating system of the mobile device; determining, dimensions of an allocated space of the primary application; sharing, by the processor with the secondary application based on being known and trusted by the operating system, sensitive information specific to a user, wherein the sensitive information is harvested by the operating system; rendering, by the processor, secondary content in the secondary application, the secondary content layered over the allocated space of the primary application and the secondary content determined based on the sensitive information specific to the user and the dimensions of the allocated space. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium storing instructions, which when executed by a processor causes the processor to:
-
render a primary content on a primary application executing on a mobile device; executing a secondary application on the mobile device, the secondary application configured to render secondary content, having access to a subset of the primary application'"'"'s functionality and being known and trusted by an operating system of the mobile device; determine dimensions of an allocated space of the primary application; share with the secondary application based on being known and trusted by the operating system, sensitive information specific to a user, wherein the sensitive information is harvested by the operating system; render the secondary content in the secondary application, the secondary content layered over the allocated space of the primary application and the secondary content determined based on the sensitive information specific to the user and the dimensions of the allocated space. - View Dependent Claims (19, 20, 21)
-
Specification