In application purchasing
First Claim
Patent Images
1. A computer-implemented method comprising:
- executing a first application by a processor in a first sandboxed environment and displaying a graphical user interface of the first application resulting from the execution of the first application on a display, the first application being a third-party application;
receiving a second application that is selected based on targeting data polled by an operating system daemon, the targeting data comprising user and device data and wherein the operating system daemon prohibits a third party from accessing an identity of a user associated with the targeting data;
in response to receiving a first input within the graphical user interface of the first application, launching, by the processor, the second application executing in a second sandboxed environment that is outside of the first sandboxed environment;
displaying a second graphical user interface resulting from the execution of the second application on the display, the second graphical user interface overlaying the graphical user interface of the first application, and appearing as if it is part of the first application; and
receiving a second input within the second graphical user interface, the second input effective to remove, by the processor, the second graphical user interface from the display and return to the graphical user interface of the first application.
1 Assignment
0 Petitions
Accused Products
Abstract
The present technology provides a purchasing interface within an application that allows users to purchase a product from another source without leaving the application. The application offers a product for purchase, and a user, desiring to purchase the product can provide an input effective to cause a purchasing interface to be displayed. While the purchasing interface, or information presented therein, comes from the product source, which is different than the application source, it is presented in such a fashion that gives the impression to the user that they are purchasing the product directly from the application.
125 Citations
15 Claims
-
1. A computer-implemented method comprising:
-
executing a first application by a processor in a first sandboxed environment and displaying a graphical user interface of the first application resulting from the execution of the first application on a display, the first application being a third-party application; receiving a second application that is selected based on targeting data polled by an operating system daemon, the targeting data comprising user and device data and wherein the operating system daemon prohibits a third party from accessing an identity of a user associated with the targeting data; in response to receiving a first input within the graphical user interface of the first application, launching, by the processor, the second application executing in a second sandboxed environment that is outside of the first sandboxed environment; displaying a second graphical user interface resulting from the execution of the second application on the display, the second graphical user interface overlaying the graphical user interface of the first application, and appearing as if it is part of the first application; and receiving a second input within the second graphical user interface, the second input effective to remove, by the processor, the second graphical user interface from the display and return to the graphical user interface of the first application. - View Dependent Claims (2, 3, 4, 5, 14)
-
-
6. A non-transitory machine-readable medium comprising machine-executable instructions stored on the non-transitory machine-readable medium, the machine-executable instructions being effective to cause a machine to perform a method including:
-
executing a third-party primary application in a first sandboxed environment and displaying a graphical user interface of the third-party primary application resulting from the execution of the third-party primary application on a display, the graphical user interface of the third-party primary application including a space reserved for the display of a targeted application; receiving a targeted application that is selected based on targeting data polled by an operating system daemon, the targeting data comprising user and device data and wherein the operating system daemon prohibits a third party from accessing an identity of a user associated with the targeting data; executing the targeted application in a virtual machine environment that is outside of the first sandboxed environment, and displaying a product for purchase; receiving a first input within the graphical user interface of the targeted application, the first input effective to launch a purchase interface overlaying the graphical user interface of the targeted application, and appearing as if it is part of the targeted application; and receiving a second input within the purchase interface, the second input effective to remove, by the processor, the purchase interface from the display and return to the graphical user interface of the targeted application. - View Dependent Claims (7, 8, 9, 15)
-
-
10. A system comprising:
-
a processor in electrical communication with a machine readable medium, a display, and a user interface device; a primary application stored on the machine readable medium and configured to be executed by the processor in a first sandboxed environment to cause the processor to display a graphical user interface on the display, the graphical user interface including a space reserved for a targeted application; the targeted application stored on the machine readable medium and configured to be executed by the processor in a second sandboxed environment outside of the first sandboxed environment to display a product for purchase on the display in the space reserved for the targeted application, wherein the targeted application is selected from a plurality of applications based on targeting data polled by an operating system daemon, the targeting data comprising user and user interface device data and wherein the operating system daemon prohibits a third party from accessing an identity of a user associated with the targeting data; and the user interface device being configured to receive a first input within the graphical user interface of the targeted application effective to launch, by the processor, a purchase interface overlaying the graphical user interface of the targeted application and appearing as if it is part of the targeted application, and the user interface device further configured to receive a second input within the purchase interface effective to remove, by the processor, the purchase interface from the display and return to the graphical user interface of the targeted application. - View Dependent Claims (11, 12, 13)
-
Specification