Switching between restricted-access websites on mobile user devices
First Claim
1. An apparatus for switching a mobile user device between applications accessed over a computer network, the apparatus comprising:
- a processor; and
one or more stored sequences of instructions which, when executed by the processor, cause the processor to perform operations comprising;
providing authentication information, via the mobile user device, to enable access to an application;
receiving on the mobile user device an authentication key authenticating access to the application;
storing an application page for the application in the mobile user device in response to a user indication, via the mobile user device, to navigate away from the application;
displaying the stored application page on the mobile user device in response to a user indication to navigate back to the application; and
sending the authentication key from the mobile user device to reenable access to the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system stores first information, provided by a first user input via a mobile operating system, which enables access to a first restricted access website. The system stores a first screenshot and first data associated with the first restricted access website in response to a first user request, via the mobile operating system, to switch to a second restricted access website. The system stores second information, provided by a second user input via the mobile operating system, which enables access to the second restricted access website. The system stores a second screenshot and second data associated with the second restricted access website in response to a second user input, via the mobile operating system, to switch to the first restricted access website. The system outputs the first screenshot supported by the first data. The system enables access to the first restricted access website based on the stored first information.
-
Citations
20 Claims
-
1. An apparatus for switching a mobile user device between applications accessed over a computer network, the apparatus comprising:
-
a processor; and one or more stored sequences of instructions which, when executed by the processor, cause the processor to perform operations comprising; providing authentication information, via the mobile user device, to enable access to an application; receiving on the mobile user device an authentication key authenticating access to the application; storing an application page for the application in the mobile user device in response to a user indication, via the mobile user device, to navigate away from the application; displaying the stored application page on the mobile user device in response to a user indication to navigate back to the application; and sending the authentication key from the mobile user device to reenable access to the application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory machine-readable medium carrying one or more sequences of instructions for switching between restricted access websites, which instructions, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
receiving first access information from a mobile user device enabling access to a first restricted-access application; granting the mobile user device access to the first restricted-access application based on the first access information; storing the first access information and sending the mobile user device a first authentication key authenticating access to the first restricted-access application; detecting the mobile user device exiting the first restrictured-access application and sending second access information enabling access to a second restricted-access application; granting the mobile user device access to the second restricted-access application based on the second access information; storing the second access information and sending the mobile user device a second authentication key authenticating access to the second restricted-access application; detecting the mobile user device existing the second restricted-access application; receiving the first authentication key and a request from the mobile user device to reaccess the firm, restricted-access application; using the first authentication key to authenticate the first access information; and granting the mobile user device access back to the first restricted-access application based on the authentication of the first access information. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for switching between restricted-access applications that are accessed over a computer network, the method comprising:
-
receiving a request from a mobile user device to access a restricted-access application; receiving access information from the mobile user device; granting the mobile user device access to the restricted-access application based on verification of the access information; storing the access information and sending an authentication key to the mobile user device for authenticating access back to the restricted-access application; detecting the mobile user device terminating access to the restricted-access application; receiving the authentication key and a request from the mobile user device to reestablish access back to the restricted-access application; using the authentication key to authenticate the stored access information; and granting the mobile user device access back to the restricted-access application based on the authentication of the stored access information. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification