Switching between restricted-access websites on mobile user devices
First Claim
1. An apparatus for switching a mobile user device between restricted-access applications that are accessed over a computer network, the apparatus comprising:
- a processor; and
one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of;
switching a mobile user device between restricted-access applications that are accessed over a computer network, the method comprising;
providing first information, via a mobile user device, to enable access to a first restricted-access application;
storing in memory on the mobile user device a first authentication key authenticating access to the first restricted-access application;
storing a first restricted-access application page of the first restricted-access application in the memory in response to a first user indication, via the mobile user device, to navigate away from the first restricted-access application;
providing second information, via the mobile user device, to enable access to a second restricted-access application;
displaying from the memory the first restricted-access application page on the mobile user device in response to a user indication of navigation back to the first restricted-access application; and
providing the first authentication key from the memory to enable access to the first restricted-access application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system stores first information, provided by a first user input via a mobile operating system, which enables access to a first restricted access website. The system stores a first screenshot and first data associated with the first restricted access website in response to a first user request, via the mobile operating system, to switch to a second restricted access website. The system stores second information, provided by a second user input via the mobile operating system, which enables access to the second restricted access website. The system stores a second screenshot and second data associated with the second restricted access website in response to a second user input, via the mobile operating system, to switch to the first restricted access website. The system outputs the first screenshot supported by the first data. The system enables access to the first restricted access website based on the stored first information.
-
Citations
17 Claims
-
1. An apparatus for switching a mobile user device between restricted-access applications that are accessed over a computer network, the apparatus comprising:
-
a processor; and one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of; switching a mobile user device between restricted-access applications that are accessed over a computer network, the method comprising; providing first information, via a mobile user device, to enable access to a first restricted-access application; storing in memory on the mobile user device a first authentication key authenticating access to the first restricted-access application; storing a first restricted-access application page of the first restricted-access application in the memory in response to a first user indication, via the mobile user device, to navigate away from the first restricted-access application; providing second information, via the mobile user device, to enable access to a second restricted-access application; displaying from the memory the first restricted-access application page on the mobile user device in response to a user indication of navigation back to the first restricted-access application; and providing the first authentication key from the memory to enable access to the first restricted-access application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory machine-readable medium carrying one or more sequences of instructions for switching mobile operating system users between restricted access websites, which instructions, when executed by one or more processors, cause the one or more processors to carry out the steps of:
-
providing first information, via a mobile user device, to enable access to a first restricted-access application; storing in memory on the mobile user device a first authentication key authenticating access to the first restricted-access application; storing in the memory a first restricted-access application page of the first restricted-access application in response to a first user indication, via the mobile user device, to navigate away from the first restricted-access application; providing second information, via the mobile user device, to enable access to a second restricted-access application; displaying from the memory the first restricted-access application page on the mobile user device in response to a user indication of navigation back to the first restricted-access application; and providing the first authentication key from the memory to enable access to the first restricted-access application. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for switching a mobile user device between restricted-access applications that are accessed over a computer network, the method comprising:
-
providing first information, via a mobile user device, to enable access to a first restricted-access application; storing in memory on the mobile user device a first authentication key authenticating access to the first restricted-access application; storing in the memory a first restricted-access application page of the first restricted-access application in response to a first user indication, via the mobile user device, to navigate away from the first restricted-access application; providing second information, via the mobile user device, to enable access to a second restricted-access application; displaying from the memory the first restricted-access application page on the mobile user device in response to a user indication of navigation back to the first restricted-access application; and providing the first authentication key from the memory to enable access to the first restricted-access application. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification