US20120022943A1 - Application purchasing - Google Patents

Application purchasing Download PDF

Info

Publication number
US20120022943A1
US20120022943A1 US13/249,163 US201113249163A US2012022943A1 US 20120022943 A1 US20120022943 A1 US 20120022943A1 US 201113249163 A US201113249163 A US 201113249163A US 2012022943 A1 US2012022943 A1 US 2012022943A1
Authority
US
United States
Prior art keywords
application
purchase
product
interface
targeted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/249,163
Inventor
James Alexander Howard
William Bedford Turner
Christopher Blumenberg
Richard Williamson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple Inc filed Critical Apple Inc
Priority to US13/249,163 priority Critical patent/US20120022943A1/en
Publication of US20120022943A1 publication Critical patent/US20120022943A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0253During e-commerce, i.e. online transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0641Shopping interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04804Transparency, e.g. transparent or translucent windows

Definitions

  • the following relates to presenting a purchase interface and more specifically relates to presenting a purchase interface within an application.
  • the present technology provides a purchasing interface within an application that allows users to purchase a product from another source without leaving the application.
  • the application offers a product for purchase, and a user, desiring to purchase the product can provide an input effective to cause a purchasing interface to be displayed. While the purchasing interface, or information presented therein, comes from the product source, which is different than the application source, it is presented in such a fashion that gives the impression to the user that they are purchasing the product directly from the application.
  • the present technology presents a targeted application, which is an application having content targeted to the user.
  • the targeted application can advertise a product for purchase within the application, or the application can be an interactive advertisement itself. If the user is enticed to purchase the product by the targeted application, the targeted application can call for a purchasing interface from the online store offering the product for purchase.
  • the purchasing interface can be displayed as a transparent or translucent overlay allowing the targeted application to be viewed through the purchasing interface.
  • the combined purchasing interface and targeted application give the user the impression that both interfaces are from the same source and further give the impression that the user is still interacting with the targeted application. Importantly, the user never navigates away from the targeted application.
  • the targeted application can be an HTML application, such as an HTML 5 application, video, game, puzzle, advertisement, image or any other suitable application.
  • FIG. 1 illustrates an exemplary display presenting a targeted application within a primary application
  • FIG. 2 is a flowchart illustrating a method embodiment for receiving a targeted application based on targeting data
  • FIG. 3 is a flowchart illustrating a method embodiment for downloading the targeted application and initial views thereof
  • FIG. 4 illustrates multiple views of the targeted application corresponding to portrait and landscape display orientations
  • FIG. 5 illustrates a banner image for the targeted application that is a portion of the full screen view of the targeted application and a transition from the banner to the full screen view;
  • FIG. 6 illustrates a point-of-sale embodiment without navigating away from the targeted application
  • FIG. 7 is a flowchart illustrating a method embodiment for completing the sale of a product without navigating away from the targeted application.
  • FIG. 8 is a schematic illustration of an exemplary system embodiment.
  • the technology described herein relates to presenting a targeted application within a primary application whereby the targeted application can be identified using a background process to access sensitive data that must be treated with due care appropriate to its sensitive nature.
  • the background process works as a daemon to respond to requests for a targeted application from the primary application.
  • the daemon can have access to sensitive information that should not be shared with third-party applications and using the sensitive data, it can determine which targeted application should be returned to the primary application.
  • Such sensitive data can be application-targeting data, which can be used to deliver content that is targeted to a user of a device.
  • the application-targeting data can include information about the device or about the user.
  • application-targeting data can include information identifying: the type of the device, applications loaded or running on the device, preferences, frequently viewed websites, frequently used applications, global positioning system data (GPS data), the operating system, etc. Due to the sensitive nature of much of this data, it is important that this data not be shared with third-party developers who could misuse the data or whose applications might be more vulnerable to hacking than an operating system. It is important to note, that while the operating system has access to this data, most operating system developers take great care to divorce these characteristics from the user itself to keep the individual user as anonymous as possible. It is a preferred aspect of the present technology that the identity of the user remains anonymous while still accessing enough data to provide properly targeted material.
  • FIG. 1 illustrates an exemplary device 102 displaying a primary application 104 and a targeted application 106 in a view 108 within the primary application 104 .
  • the device 102 is a handheld computing device, for example, a smart phone, e.g., an IPHONE, by Apple Inc. of Cupertino, Calif.
  • the device 102 can be any computing device such as a personal computer, laptop, or personal media-playing device; even a household appliance having a processor and a display can be used with the present technology.
  • the primary application 104 can be any application that reserves a view 108 or a window or a frame to display a second application 106 .
  • the view has a standard dimension that is consistent across all potential primary applications.
  • the view 108 occupies about ten percent of the available screen area.
  • the targeted application can occupy any desired portion of the primary application.
  • the area of the targeted application should not be so large as to obscure or detract from the primary application, yet the targeted application should be large enough to view and interact with. Accordingly, the targeted application could be between one and sixty percent of the available screen area.
  • the targeted application 106 can be any application having content that is created with an audience in mind and can be targeted to that audience.
  • the application can be a game for children; a web application targeted at sports fans; or an advertisement for home improvement products targeted at home owners.
  • the targeted application 106 can have some relationship to the primary application 104 , such as a similarity in the target demographic for the audiences of both applications or in the nature of the content of the applications, etc.
  • FIG. 2 illustrates an exemplary method embodiment for providing the targeted application for presentation within the primary application.
  • the primary application launches, it requests a targeted application for display in the view reserved for the targeted application and the request is received by a background process ( 202 ), a daemon.
  • the daemon has access to and collects various information to be used in determining which targeted application to provide to the primary application. This information, called targeting data, is collected from the application and the operating system.
  • the daemon receives some targeting data directly from the primary application ( 204 ).
  • the primary application requests a targeted application that can fit reserved views of specified dimensions and/or number of views.
  • the primary application can also request applications that meet other specifications, e.g., specifications such as content type (sports applications, retail applications, educational applications, etc.), target demographic information, etc.
  • these specifications can be sent by the primary application as part of the request for a targeted application while in some embodiments these specifications can be sent in a separate communication.
  • the daemon polls the operating system for additional targeting data ( 206 ). Since the daemon is a background process that is part of the operating system, it has access to a variety of targeting data that can be used to determine the optimum content to display to a user.
  • This data can include user preferences, such as configuration preferences; it can also include data identifying specific applications installed or running on the device, or more general information about the applications identifying applications by broad category; it can include information identifying the primary application requesting the targeted application; it can include past internet search terms, topics extracted from electronic communications; it can include network information such as network state, roaming information, type of connection such as 3-G, 2-G, wi-fi, connection speeds, etc., and carrier information; it can include general user information such as country of residence, home zip code, phone number area code, language preferences, keyboard configuration, and parental restrictions; it can include device information such as screen dimensions, screen resolution, hardware capabilities, a device ID, etc.; it can include data extracted from a social network profile, for example what groups or applications the user is a member of, etc., or from an online store profile; and it can include other targeting data.
  • network information such as network state, roaming information, type of connection such as 3-G, 2-G, wi-fi, connection speeds, etc., and carrier information
  • it can include general
  • the daemon can also have access to various hardware components of the device and can access targeting data such as GPS locations.
  • targeting data such as GPS locations.
  • the daemon since the daemon is part of the operating system, it is deemed trusted enough to learn targeting data, some of which can be considered sensitive information, for the limited use of determining the optimum targeted content. While some examples of targeting data are listed above, they should not be considered limiting, but rather exemplary for the purposes of providing a fuller explanation of the present technology.
  • the daemon can be trusted to not share any identifying information.
  • the user's identity is separate from the targeting data used in selecting the targeted applications and not shared, thus keeping the user associated with the targeting data anonymous.
  • the daemon can learn of the primary application's identity from the operating system. While the primary application can send this information directly to the daemon in its request for a targeted application, in some environments, it is more desirable for the daemon to positively identify the application from the operating system itself. For example, in a system wherein all applications on the device originated from an associated store, the daemon can positively identify the application because the application comes from the store and is therefore highly likely to be correctly identified. Some stores cryptographically sign each application and include a unique key to identify the application. Every message sent by one application to another application on the device must identify itself with this key. In such systems each application can know with confidence that the calling application is as it appears, which makes the device more secure.
  • the store is the source of the application, the store will often have more detailed information regarding the application and this data is not subject to manipulation by the software developer. Correctly identifying the application enables the application server to provide better targeted applications, to avoid presenting another ad for this same application to the user, and to track payments to the developer of the application.
  • the targeting data can be sent to an application server ( 208 ) to determine which targeted application should be presented to the user.
  • the daemon can communicate with the application server using any suitable protocol, but in some embodiments, the daemon and the application server communicate via https.
  • the application server can process the received targeting data using algorithms engineered for the purpose of selecting the targeted application. Importantly, the application server never learns the identity of the user, although it will use information about the user in determining the content to deliver to the user.
  • the application server determines which content to deliver to the user, it can send the content to the device and the daemon thereon.
  • the daemon receives metadata describing the targeted application ( 210 ) and forwards the metadata to the primary application.
  • the primary application then downloads the targeted application specified by the metadata and by storing the targeted application in a cache specific to the primary application.
  • the primary application can then present a targeted application stored in its cache in the view field within the primary application ( 212 ).
  • the primary application can always present a targeted application that is already stored in its cache without calling the daemon.
  • the primary application when launched ( 201 ) it can immediately display one of the targeted applications stored in its cache ( 214 ). If there are multiple targeted applications stored in the cache, the targeted application can present them in a round-robin fashion.
  • Targeted applications can have limited life spans, or restrictions on the number of times the application can be presented. Such restrictions may be tied to the life of the targeted application or to only one session of the primary application.
  • the primary application requires a new targeted application it will request the targeted application from the daemon ( 204 ) as described above.
  • the application server can determine that multiple targeted applications should be sent to the device. In such embodiments, the first targeted application that is downloaded will be the first targeted application presented in the primary application.
  • the daemon functions as a proxy for the application server.
  • the daemon receives requests for targeted applications and forwards targeted applications to the primary application.
  • the daemon is a process of the operating system it is also ideally suited to mine data that is needed by the application server to select the best targeted content for presentation in the primary application.
  • the daemon can have additional proxy-like attributes.
  • targeted applications can be stored in a device-wide cache.
  • the daemon can be configured to have limited logic, usually reserved for the application server, to select a targeted application from the pool of targeted applications stored in the device-wide cache.
  • the targeted applications in a device-wide cache would include all applications downloaded from the application server over a certain period irrespective of which primary application for which the targeted applications were originally intended.
  • FIG. 3 illustrates a process for downloading the full content of the targeted application that balances the competing interests of immediately displaying content so that the reserved view is not left blank with presenting a fully operational and interactive application.
  • a static view of the targeted application is downloaded ( 302 ) and displayed ( 304 ).
  • the targeted application can have more than one basic application configuration. Multiple basic configurations can be used, for example, in situations where the primary application can be presented in multiple presentation formats, e.g., landscape or portrait views corresponding to the availability of landscape and portrait orientations of the device display. In such embodiments, one or both of the basic application configurations can be initially downloaded ( 302 ).
  • the targeted application displays as a static banner, the rest of the application content has been optimistically pre-fetched ( 306 ) the targeted application is available for full interaction.
  • the targeted application While only a small portion of the targeted application is displayed, it can be interactive and full of rich content.
  • the additional content can be pre-fetched so that the targeted application can present a functional user interface immediately upon being selected and then download additional resources as the user requests them by interacting with the application.
  • This method of downloading the targeted application overcomes some of the drawbacks related to serving the targeted application from a remote server.
  • content is quickly made available for display on the device. This minimizes the possibility that the targeted-application view will be left blank while the full content is downloaded.
  • the full content of the application is further downloaded and cached so that future interaction with the application will not be delayed by additional downloading operations.
  • the application is optimistically downloaded so that all of the content is available immediately.
  • multiple application configurations can be downloaded if the device has multiple possible presentation formats, such as portrait and landscape. In such aspects, it is anticipated that a view in portrait will not be as desirable in landscape. In some embodiments, it is desired that the targeted-application view and corresponding targeted-application configuration occupy only about ten percent of the display. As illustrated in FIG. 4 , the targeted-application view in the portrait view ( 402 ) is fatter but thinner than the targeted-application view in the landscape view ( 404 ). Both views take up only about ten percent of the available screen area.
  • the targeted-application view can resize along with the rest of the primary application, and the targeted-application configuration for that orientation can be displayed.
  • the primary application will react to the change in orientation by rotating its view and resizing itself according to the new orientation.
  • the primary application can present an alternate configuration for the targeted application that corresponds to the current orientation of the device which was downloaded along with the targeted application.
  • a primary application that can be displayed in both landscape and portrait orientations will download a targeted application that can fit both orientations.
  • the targeted application changes shape and animates to show content appropriate to the new aspect ratio. The content is still the same targeted application; it just has a slightly different representation for the new aspect ratio.
  • the targeted application can be interactive. As illustrated in FIG. 5 , the targeted application ( 504 ) can be selected using a pointing device ( 506 ). In the illustrated embodiment, the device has a touch screen input and thus a finger touch is illustrated, although any other selection mechanism is acceptable. Upon selection, the targeted application expands ( 504 ′) to reveal its full view. In some embodiments, such as the embodiment illustrated in FIG. 5 , the targeted application can be shown in a reduced view or a full view. At the left of FIG. 5 , the targeted application is shown in a reduced view ( 504 ), while at the far right the full view ( 504 ′′) is illustrated.
  • the targeted application Upon selecting the reduced view ( 504 ), the targeted application morphs into its full view. The morphing is illustrated in the middle of FIG. 5 with 504 ′ illustrating the transition between the reduced view ( 504 ) and the full view ( 504 ′′).
  • targeted applications can include banner images such that the targeted application shown in the primary application is a slice of a larger image that is seamlessly revealed when selected. This full screen targeted application provides the full interactive content of the targeted application.
  • the targeted application either advertises products for purchase or links to an online store to purchase products.
  • the present technology provides for allowing a user to purchase products outside of the targeted application, while maintaining the appearance that the user is still operating within the targeted application.
  • FIG. 6 illustrates an exemplary user interface for allowing a user to purchase a product outside of the targeted application while the user experience maintains the appearance of being within the targeted application.
  • the targeted application ( 602 ) is advertising ITEM X (a hypothetical item for purchase), which the user has selected to purchase.
  • a purchase interface ( 604 ) is further shown overlaid the targeted application.
  • the purchase interface ( 604 ) is translucent or has transparent portions so that the targeted application ( 602 ) remains at least partially visible through the purchase interface. While the purchase interface ( 604 ) looks like it is part of the targeted application ( 602 ), it is really an extension of an online store.
  • ITEM X could be a media item such as a movie or music, which is available for purchase from an online store, such as ITUNES, by Apple Inc., of Cupertino, Calif.
  • the targeted application could be a game or video or advertisement relating to the media item.
  • the media item is not sold by the targeted application; it is sold by the online media store.
  • the purchase interface is an extension of the online store and can be used to allow the user to purchase the media item from the store. To the user, it as though they bought the media item from the targeted application.
  • FIG. 7 illustrates an exemplary method for providing a point of purchase that appears to be within the targeted application.
  • the targeted application is displayed on the device and it advertises a product for sale ( 702 ). If a user wishes to purchase the item, the user can select the product for purchase using an input device and the input is detected by the system ( 704 ). Responsive to the received user input, the system can request data needed to provide a purchase interface ( 706 ).
  • the data needed to provide the purchase interface includes data representing the entire purchase interface, while in some embodiments it includes data representing information used to fill out fields in a template purchase interface.
  • the purchase interface is displayed overlaid the targeted application ( 708 ). As addressed above, in some embodiments, the purchase interface is displayed as a substantially translucent or transparent interface so that at least portions of the targeted application can be seen through the purchase interface.
  • Receiving user inputs effective to complete the purchase completes the purchase ( 710 ). Responsive to those inputs, the system can communicate the confirmed purchase with the online store. The purchase interface can be removed and the user is returned to the targeted application or the primary application ( 712 ).
  • the targeted application can be a program, applet, image, object with hyperlinks, html application, video, flash object, etc. It can be for any purpose including, gaming, video, web interaction, advertising, document preparation, presenting, etc.
  • the targeted application is an HTML5 web application for the purpose of advertising.
  • the primary application can call the operating system requesting an advertisement to be displayed in the view reserved for that purpose in the primary application.
  • the operating system can use a daemon to collect advertisement targeting information that can be sent to an advertising server which can select and serve an advertisement that is best suited for display to the specific user in that primary application.
  • the device can download initial banner views of the advertisement suitable for display in any display orientation, which the primary application is expected to run.
  • the primary application might be expected to run in a portrait and a landscape orientation and, accordingly, the device will download the advertisement banners to be initially displayed.
  • the banners for portrait and landscape orientation can be standard sizes, which, in some embodiments, should not take up more than ten percent of the display area.
  • the banner corresponding to the orientation will be loaded and displayed.
  • the device can thereafter download the HTML 5 version of the advertisement that contains interactive features to enrich the user's experience with the advertisement. Additionally, the device can preload a web archive of additional content associated with the ad so that the advertisement can present its full functional advertisement content without waiting for the additional content to be downloaded. However, it may be necessary or desired to download some content upon request.
  • the banner which is initially displayed, is actually only a small portion of the full targeted-advertisement application.
  • the full advertisement can be displayed.
  • an animation can show the banner portion of the targeted-advertisement application grow into the full advertisement, or the animation can show the primary application being pulled back to reveal the full ad.
  • Other animations are possible. It is also possible that the banner is just a link to the full targeted-advertisement application, which can be loaded upon selection of the banner.
  • the full targeted-advertisement application can have a variety of interactive functions.
  • the advertisement can present a game, information, or any other desired content.
  • the advertisement can also provide a point of purchase for one or more advertised items. While it will most commonly be the case that the advertisement is providing a link to an online store that is the entity actually selling the advertised items, to the user, it looks as if the advertisement is the entity selling the item because the user will not have to leave the advertisement to complete the purchase.
  • the advertisement can request information to complete a purchase interface, or can request a purchase interface directly from the store.
  • the purchase interface can be displayed directly in, or above, the advertisement program and thus the purchase is completed without navigating away from the advertisement program.
  • the present technology also protects the operating system and the primary application from unstable and malicious targeted applications by running the targeted application as a separate process.
  • the targeted application is run in a virtual machine type environment or given access to limited resources.
  • the targeted application is run in a sandbox so that it cannot effect the primary application or operating system. Running the targeted application in a sandboxed environment allows the targeted application to crash or freeze and be quit without effecting the primary application. It also prevents the targeted application from including malicious content or extracting data from the primary application.
  • FIG. 8 illustrates a computer system 800 used in executing the described method.
  • Computer system 800 is an example of computer hardware, software, and firmware that can be used to implement disclosures above.
  • System 800 includes a processor 820 , representative of any number of physically and/or logically distinct resources capable of executing software, firmware, and hardware configured to perform identified computations.
  • Processor 820 communicates with a chipset 822 that can control input to and output from processor 820 .
  • chipset 822 outputs information to display 840 and can read and write information to non-volatile storage 860 , which can include magnetic media and solid-state media, for example.
  • Chipset 822 also can read data from and write data to RAM 870 .
  • a bridge 835 for interfacing with a variety of user interface components can be provided for interfacing with chipset 822 .
  • Such user interface components can include a keyboard 836 , a microphone 837 , touch detection and processing circuitry 838 , a pointing device, such as a mouse 839 , and so on.
  • inputs to system 800 can come from any of a variety of sources, machine-generated and/or human-generated.
  • Chipset 822 also can interface with one or more data network interfaces 825 that can have different physical interfaces 817 .
  • data network interfaces can include interfaces for wired and wireless local area networks, for broadband wireless networks, as well as personal area networks.
  • Some applications of the methods for collecting data in the location-popularity index and ranking and returning location search results disclosed herein can include receiving data over physical interface 817 or be generated by the machine itself by processor 820 analyzing data stored in memory 860 or 870 . Further, the machine can receive inputs from a user via devices 836 , 837 , 838 , 839 and execute appropriate functions, such as browsing functions, by interpreting these inputs using processor 820 .
  • Such instructions comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special-purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network.
  • the computer executable instructions may be, for example, binaries, intermediate-format instructions such as assembly language, firmware, or source code, including transitory signals carrying the instructions. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
  • Devices implementing methods according to these disclosures can comprise hardware, firmware, and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality also can be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
  • the instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.

Abstract

The present technology provides a purchasing interface within an application that allows users to purchase a product from another source without leaving the application. The application offers a product for purchase, and a user, desiring to purchase the product can provide an input effective to cause a purchasing interface to be displayed. While the purchasing interface, or information presented therein, comes from the product source, which is different than the application source, it is presented in such a fashion that gives the impression to the user that they are purchasing the product directly from the application.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 12/767,412, filed on Apr. 16, 2010, which claims the benefit of U.S. Provisional Patent Application No. 61/320,666, entitled “IN APPLICATION PURCHASING”, filed on Apr. 2, 2010; both of which are hereby expressly incorporated herein by reference in their entireties.
  • FIELD
  • The following relates to presenting a purchase interface and more specifically relates to presenting a purchase interface within an application.
  • BACKGROUND
  • Converting sales from an application offering a product for purchase or from an advertisement can be difficult task. Consumers can be extremely fickle and accordingly many different things can cause a consumer to walk away from a potential purchase. Each step in the purchasing process presents a new opportunity for the consumer to decide not to purchase a product.
  • When purchasing products offered for sale or advertised in a computer application, a user is required to select the product for purchase and then to navigate to the online store offering a product for sale where the user can purchase the product. Such navigation often takes a user away from the interface or application which presented the product in a favorable light and introduces additional opportunities for the user to not purchase the product, which is undesirable.
  • SUMMARY
  • Accordingly, the present technology provides a purchasing interface within an application that allows users to purchase a product from another source without leaving the application. The application offers a product for purchase, and a user, desiring to purchase the product can provide an input effective to cause a purchasing interface to be displayed. While the purchasing interface, or information presented therein, comes from the product source, which is different than the application source, it is presented in such a fashion that gives the impression to the user that they are purchasing the product directly from the application.
  • The present technology presents a targeted application, which is an application having content targeted to the user. The targeted application can advertise a product for purchase within the application, or the application can be an interactive advertisement itself. If the user is enticed to purchase the product by the targeted application, the targeted application can call for a purchasing interface from the online store offering the product for purchase.
  • The purchasing interface can be displayed as a transparent or translucent overlay allowing the targeted application to be viewed through the purchasing interface. The combined purchasing interface and targeted application give the user the impression that both interfaces are from the same source and further give the impression that the user is still interacting with the targeted application. Importantly, the user never navigates away from the targeted application.
  • Upon completion of the transaction, the user is returned to the targeted application or to another application, referred to herein as the primary application. In some embodiments of the technology, the targeted application can be an HTML application, such as an HTML5 application, video, game, puzzle, advertisement, image or any other suitable application.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates an exemplary display presenting a targeted application within a primary application;
  • FIG. 2 is a flowchart illustrating a method embodiment for receiving a targeted application based on targeting data;
  • FIG. 3 is a flowchart illustrating a method embodiment for downloading the targeted application and initial views thereof;
  • FIG. 4 illustrates multiple views of the targeted application corresponding to portrait and landscape display orientations;
  • FIG. 5 illustrates a banner image for the targeted application that is a portion of the full screen view of the targeted application and a transition from the banner to the full screen view;
  • FIG. 6 illustrates a point-of-sale embodiment without navigating away from the targeted application;
  • FIG. 7 is a flowchart illustrating a method embodiment for completing the sale of a product without navigating away from the targeted application; and
  • FIG. 8 is a schematic illustration of an exemplary system embodiment.
  • DESCRIPTION
  • The technology described herein relates to presenting a targeted application within a primary application whereby the targeted application can be identified using a background process to access sensitive data that must be treated with due care appropriate to its sensitive nature.
  • The background process works as a daemon to respond to requests for a targeted application from the primary application. The daemon can have access to sensitive information that should not be shared with third-party applications and using the sensitive data, it can determine which targeted application should be returned to the primary application.
  • Such sensitive data can be application-targeting data, which can be used to deliver content that is targeted to a user of a device. The application-targeting data can include information about the device or about the user. For example, application-targeting data can include information identifying: the type of the device, applications loaded or running on the device, preferences, frequently viewed websites, frequently used applications, global positioning system data (GPS data), the operating system, etc. Due to the sensitive nature of much of this data, it is important that this data not be shared with third-party developers who could misuse the data or whose applications might be more vulnerable to hacking than an operating system. It is important to note, that while the operating system has access to this data, most operating system developers take great care to divorce these characteristics from the user itself to keep the individual user as anonymous as possible. It is a preferred aspect of the present technology that the identity of the user remains anonymous while still accessing enough data to provide properly targeted material.
  • FIG. 1 illustrates an exemplary device 102 displaying a primary application 104 and a targeted application 106 in a view 108 within the primary application 104. As illustrated, the device 102 is a handheld computing device, for example, a smart phone, e.g., an IPHONE, by Apple Inc. of Cupertino, Calif. However, the device 102 can be any computing device such as a personal computer, laptop, or personal media-playing device; even a household appliance having a processor and a display can be used with the present technology.
  • The primary application 104 can be any application that reserves a view 108 or a window or a frame to display a second application 106. In some embodiments, the view has a standard dimension that is consistent across all potential primary applications. In some embodiments, the view 108 occupies about ten percent of the available screen area. Of course, the targeted application can occupy any desired portion of the primary application. However, the area of the targeted application should not be so large as to obscure or detract from the primary application, yet the targeted application should be large enough to view and interact with. Accordingly, the targeted application could be between one and sixty percent of the available screen area.
  • The targeted application 106 can be any application having content that is created with an audience in mind and can be targeted to that audience. For example, the application can be a game for children; a web application targeted at sports fans; or an advertisement for home improvement products targeted at home owners. In some preferred embodiments, the targeted application 106 can have some relationship to the primary application 104, such as a similarity in the target demographic for the audiences of both applications or in the nature of the content of the applications, etc.
  • FIG. 2 illustrates an exemplary method embodiment for providing the targeted application for presentation within the primary application. When the primary application launches, it requests a targeted application for display in the view reserved for the targeted application and the request is received by a background process (202), a daemon.
  • The daemon has access to and collects various information to be used in determining which targeted application to provide to the primary application. This information, called targeting data, is collected from the application and the operating system.
  • The daemon receives some targeting data directly from the primary application (204). For example the primary application requests a targeted application that can fit reserved views of specified dimensions and/or number of views. The primary application can also request applications that meet other specifications, e.g., specifications such as content type (sports applications, retail applications, educational applications, etc.), target demographic information, etc. In some embodiments these specifications can be sent by the primary application as part of the request for a targeted application while in some embodiments these specifications can be sent in a separate communication.
  • Additionally, the daemon polls the operating system for additional targeting data (206). Since the daemon is a background process that is part of the operating system, it has access to a variety of targeting data that can be used to determine the optimum content to display to a user. This data can include user preferences, such as configuration preferences; it can also include data identifying specific applications installed or running on the device, or more general information about the applications identifying applications by broad category; it can include information identifying the primary application requesting the targeted application; it can include past internet search terms, topics extracted from electronic communications; it can include network information such as network state, roaming information, type of connection such as 3-G, 2-G, wi-fi, connection speeds, etc., and carrier information; it can include general user information such as country of residence, home zip code, phone number area code, language preferences, keyboard configuration, and parental restrictions; it can include device information such as screen dimensions, screen resolution, hardware capabilities, a device ID, etc.; it can include data extracted from a social network profile, for example what groups or applications the user is a member of, etc., or from an online store profile; and it can include other targeting data. The daemon can also have access to various hardware components of the device and can access targeting data such as GPS locations. In short, since the daemon is part of the operating system, it is deemed trusted enough to learn targeting data, some of which can be considered sensitive information, for the limited use of determining the optimum targeted content. While some examples of targeting data are listed above, they should not be considered limiting, but rather exemplary for the purposes of providing a fuller explanation of the present technology.
  • User protection and privacy is a primary concern, and one of the many benefits of the present technology is the protection of the user's sensitive information while gaining the benefit of using the data to determine the optimum content to display to a specific user. Among other protections provided by the present technology, the daemon can be trusted to not share any identifying information. The user's identity is separate from the targeting data used in selecting the targeted applications and not shared, thus keeping the user associated with the targeting data anonymous.
  • As introduced above, the daemon can learn of the primary application's identity from the operating system. While the primary application can send this information directly to the daemon in its request for a targeted application, in some environments, it is more desirable for the daemon to positively identify the application from the operating system itself. For example, in a system wherein all applications on the device originated from an associated store, the daemon can positively identify the application because the application comes from the store and is therefore highly likely to be correctly identified. Some stores cryptographically sign each application and include a unique key to identify the application. Every message sent by one application to another application on the device must identify itself with this key. In such systems each application can know with confidence that the calling application is as it appears, which makes the device more secure. Additionally, because the store is the source of the application, the store will often have more detailed information regarding the application and this data is not subject to manipulation by the software developer. Correctly identifying the application enables the application server to provide better targeted applications, to avoid presenting another ad for this same application to the user, and to track payments to the developer of the application.
  • The targeting data can be sent to an application server (208) to determine which targeted application should be presented to the user. The daemon can communicate with the application server using any suitable protocol, but in some embodiments, the daemon and the application server communicate via https. The application server can process the received targeting data using algorithms engineered for the purpose of selecting the targeted application. Importantly, the application server never learns the identity of the user, although it will use information about the user in determining the content to deliver to the user.
  • Once the application server determines which content to deliver to the user, it can send the content to the device and the daemon thereon. The daemon receives metadata describing the targeted application (210) and forwards the metadata to the primary application. The primary application then downloads the targeted application specified by the metadata and by storing the targeted application in a cache specific to the primary application. The primary application can then present a targeted application stored in its cache in the view field within the primary application (212).
  • Operating in this manner, the primary application can always present a targeted application that is already stored in its cache without calling the daemon. As illustrated in FIG. 2, when the primary application is launched (201) it can immediately display one of the targeted applications stored in its cache (214). If there are multiple targeted applications stored in the cache, the targeted application can present them in a round-robin fashion.
  • However, it is not desirable to allow the primary application to only retrieve a targeted application once and then always display it from the cache. Targeted applications can have limited life spans, or restrictions on the number of times the application can be presented. Such restrictions may be tied to the life of the targeted application or to only one session of the primary application. When the primary application requires a new targeted application it will request the targeted application from the daemon (204) as described above.
  • In some embodiments the application server can determine that multiple targeted applications should be sent to the device. In such embodiments, the first targeted application that is downloaded will be the first targeted application presented in the primary application.
  • In summary, the daemon functions as a proxy for the application server. The daemon receives requests for targeted applications and forwards targeted applications to the primary application. However, because the daemon is a process of the operating system it is also ideally suited to mine data that is needed by the application server to select the best targeted content for presentation in the primary application.
  • In addition to the proxy-like functions already described, in some embodiments the daemon can have additional proxy-like attributes. In such embodiments, targeted applications can be stored in a device-wide cache. The daemon can be configured to have limited logic, usually reserved for the application server, to select a targeted application from the pool of targeted applications stored in the device-wide cache. The targeted applications in a device-wide cache would include all applications downloaded from the application server over a certain period irrespective of which primary application for which the targeted applications were originally intended.
  • FIG. 3 illustrates a process for downloading the full content of the targeted application that balances the competing interests of immediately displaying content so that the reserved view is not left blank with presenting a fully operational and interactive application. Initially, a static view of the targeted application is downloaded (302) and displayed (304).
  • In some embodiments, the targeted application can have more than one basic application configuration. Multiple basic configurations can be used, for example, in situations where the primary application can be presented in multiple presentation formats, e.g., landscape or portrait views corresponding to the availability of landscape and portrait orientations of the device display. In such embodiments, one or both of the basic application configurations can be initially downloaded (302).
  • After the initial application configuration has been downloaded it is displayed within the primary application (304). Initially, the targeted application displays as a static banner, the rest of the application content has been optimistically pre-fetched (306) the targeted application is available for full interaction.
  • While only a small portion of the targeted application is displayed, it can be interactive and full of rich content. The additional content can be pre-fetched so that the targeted application can present a functional user interface immediately upon being selected and then download additional resources as the user requests them by interacting with the application.
  • This method of downloading the targeted application overcomes some of the drawbacks related to serving the targeted application from a remote server. By initially downloading the initial application configurations, content is quickly made available for display on the device. This minimizes the possibility that the targeted-application view will be left blank while the full content is downloaded. The full content of the application is further downloaded and cached so that future interaction with the application will not be delayed by additional downloading operations. The application is optimistically downloaded so that all of the content is available immediately.
  • As mentioned above, multiple application configurations can be downloaded if the device has multiple possible presentation formats, such as portrait and landscape. In such aspects, it is anticipated that a view in portrait will not be as desirable in landscape. In some embodiments, it is desired that the targeted-application view and corresponding targeted-application configuration occupy only about ten percent of the display. As illustrated in FIG. 4, the targeted-application view in the portrait view (402) is fatter but thinner than the targeted-application view in the landscape view (404). Both views take up only about ten percent of the available screen area.
  • When the device is in a first orientation, for example a portrait orientation, and then rotates to a second orientation, for example a landscape orientation, the targeted-application view can resize along with the rest of the primary application, and the targeted-application configuration for that orientation can be displayed. When the device is rotated into a different orientation, the primary application will react to the change in orientation by rotating its view and resizing itself according to the new orientation. Along with this process, the primary application can can present an alternate configuration for the targeted application that corresponds to the current orientation of the device which was downloaded along with the targeted application. In other words, a primary application that can be displayed in both landscape and portrait orientations will download a targeted application that can fit both orientations. When the device is rotated, the targeted application changes shape and animates to show content appropriate to the new aspect ratio. The content is still the same targeted application; it just has a slightly different representation for the new aspect ratio.
  • Except while the targeted application is being downloaded, the targeted application can be interactive. As illustrated in FIG. 5, the targeted application (504) can be selected using a pointing device (506). In the illustrated embodiment, the device has a touch screen input and thus a finger touch is illustrated, although any other selection mechanism is acceptable. Upon selection, the targeted application expands (504′) to reveal its full view. In some embodiments, such as the embodiment illustrated in FIG. 5, the targeted application can be shown in a reduced view or a full view. At the left of FIG. 5, the targeted application is shown in a reduced view (504), while at the far right the full view (504″) is illustrated. Upon selecting the reduced view (504), the targeted application morphs into its full view. The morphing is illustrated in the middle of FIG. 5 with 504′ illustrating the transition between the reduced view (504) and the full view (504″). In other words, targeted applications can include banner images such that the targeted application shown in the primary application is a slice of a larger image that is seamlessly revealed when selected. This full screen targeted application provides the full interactive content of the targeted application.
  • In some aspects of the technology, the targeted application either advertises products for purchase or links to an online store to purchase products. In such aspects of the technology, it is undesirable to have the user navigate away from the application because such additional steps reduce the likelihood that a sale will be converted. Accordingly, the present technology provides for allowing a user to purchase products outside of the targeted application, while maintaining the appearance that the user is still operating within the targeted application.
  • FIG. 6 illustrates an exemplary user interface for allowing a user to purchase a product outside of the targeted application while the user experience maintains the appearance of being within the targeted application. As illustrated, the targeted application (602) is advertising ITEM X (a hypothetical item for purchase), which the user has selected to purchase. A purchase interface (604) is further shown overlaid the targeted application. In some embodiments, the purchase interface (604) is translucent or has transparent portions so that the targeted application (602) remains at least partially visible through the purchase interface. While the purchase interface (604) looks like it is part of the targeted application (602), it is really an extension of an online store. As an example, ITEM X could be a media item such as a movie or music, which is available for purchase from an online store, such as ITUNES, by Apple Inc., of Cupertino, Calif. In such an example, the targeted application could be a game or video or advertisement relating to the media item. The media item is not sold by the targeted application; it is sold by the online media store. Accordingly, the purchase interface is an extension of the online store and can be used to allow the user to purchase the media item from the store. To the user, it as though they bought the media item from the targeted application.
  • FIG. 7 illustrates an exemplary method for providing a point of purchase that appears to be within the targeted application. The targeted application is displayed on the device and it advertises a product for sale (702). If a user wishes to purchase the item, the user can select the product for purchase using an input device and the input is detected by the system (704). Responsive to the received user input, the system can request data needed to provide a purchase interface (706). In some embodiments, the data needed to provide the purchase interface includes data representing the entire purchase interface, while in some embodiments it includes data representing information used to fill out fields in a template purchase interface.
  • Whether a template purchase interface is used with data from the store, or a purchase interface sent by the store is used, the purchase interface is displayed overlaid the targeted application (708). As addressed above, in some embodiments, the purchase interface is displayed as a substantially translucent or transparent interface so that at least portions of the targeted application can be seen through the purchase interface.
  • Receiving user inputs effective to complete the purchase completes the purchase (710). Responsive to those inputs, the system can communicate the confirmed purchase with the online store. The purchase interface can be removed and the user is returned to the targeted application or the primary application (712).
  • The targeted application can be a program, applet, image, object with hyperlinks, html application, video, flash object, etc. It can be for any purpose including, gaming, video, web interaction, advertising, document preparation, presenting, etc.
  • In some embodiments, the targeted application is an HTML5 web application for the purpose of advertising. In such embodiments, the primary application can call the operating system requesting an advertisement to be displayed in the view reserved for that purpose in the primary application. The operating system can use a daemon to collect advertisement targeting information that can be sent to an advertising server which can select and serve an advertisement that is best suited for display to the specific user in that primary application.
  • The device can download initial banner views of the advertisement suitable for display in any display orientation, which the primary application is expected to run. For example, the primary application might be expected to run in a portrait and a landscape orientation and, accordingly, the device will download the advertisement banners to be initially displayed.
  • The banners for portrait and landscape orientation can be standard sizes, which, in some embodiments, should not take up more than ten percent of the display area. When the orientation of the device changes from portrait to landscape or landscape to portrait, the banner corresponding to the orientation will be loaded and displayed.
  • The device can thereafter download the HTML5 version of the advertisement that contains interactive features to enrich the user's experience with the advertisement. Additionally, the device can preload a web archive of additional content associated with the ad so that the advertisement can present its full functional advertisement content without waiting for the additional content to be downloaded. However, it may be necessary or desired to download some content upon request.
  • In some embodiments, the banner, which is initially displayed, is actually only a small portion of the full targeted-advertisement application. When a user selects the banner, the full advertisement can be displayed. In such embodiments, an animation can show the banner portion of the targeted-advertisement application grow into the full advertisement, or the animation can show the primary application being pulled back to reveal the full ad. Other animations are possible. It is also possible that the banner is just a link to the full targeted-advertisement application, which can be loaded upon selection of the banner.
  • The full targeted-advertisement application can have a variety of interactive functions. The advertisement can present a game, information, or any other desired content. The advertisement can also provide a point of purchase for one or more advertised items. While it will most commonly be the case that the advertisement is providing a link to an online store that is the entity actually selling the advertised items, to the user, it looks as if the advertisement is the entity selling the item because the user will not have to leave the advertisement to complete the purchase.
  • When a user desires to purchase an advertised product, the user can select the product from the advertisement. The advertisement can request information to complete a purchase interface, or can request a purchase interface directly from the store. The purchase interface can be displayed directly in, or above, the advertisement program and thus the purchase is completed without navigating away from the advertisement program.
  • The present technology also protects the operating system and the primary application from unstable and malicious targeted applications by running the targeted application as a separate process. In some embodiments, the targeted application is run in a virtual machine type environment or given access to limited resources. In some embodiments, the targeted application is run in a sandbox so that it cannot effect the primary application or operating system. Running the targeted application in a sandboxed environment allows the targeted application to crash or freeze and be quit without effecting the primary application. It also prevents the targeted application from including malicious content or extracting data from the primary application.
  • FIG. 8 illustrates a computer system 800 used in executing the described method. Computer system 800 is an example of computer hardware, software, and firmware that can be used to implement disclosures above. System 800 includes a processor 820, representative of any number of physically and/or logically distinct resources capable of executing software, firmware, and hardware configured to perform identified computations. Processor 820 communicates with a chipset 822 that can control input to and output from processor 820. In this example, chipset 822 outputs information to display 840 and can read and write information to non-volatile storage 860, which can include magnetic media and solid-state media, for example. Chipset 822 also can read data from and write data to RAM 870. A bridge 835 for interfacing with a variety of user interface components can be provided for interfacing with chipset 822. Such user interface components can include a keyboard 836, a microphone 837, touch detection and processing circuitry 838, a pointing device, such as a mouse 839, and so on. In general, inputs to system 800 can come from any of a variety of sources, machine-generated and/or human-generated.
  • Chipset 822 also can interface with one or more data network interfaces 825 that can have different physical interfaces 817. Such data network interfaces can include interfaces for wired and wireless local area networks, for broadband wireless networks, as well as personal area networks. Some applications of the methods for collecting data in the location-popularity index and ranking and returning location search results disclosed herein can include receiving data over physical interface 817 or be generated by the machine itself by processor 820 analyzing data stored in memory 860 or 870. Further, the machine can receive inputs from a user via devices 836, 837, 838, 839 and execute appropriate functions, such as browsing functions, by interpreting these inputs using processor 820.
  • Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from computer-readable media. Such instructions comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special-purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate-format instructions such as assembly language, firmware, or source code, including transitory signals carrying the instructions. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
  • Devices implementing methods according to these disclosures can comprise hardware, firmware, and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality also can be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
  • The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
  • Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further, and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.

Claims (20)

1. A method comprising:
presenting an application offering a product for purchase, the application being from a first entity, the product for purchase being from a second entity;
presenting a purchase interface within the application offering the product for purchase;
receiving a purchase indication by the purchase interface; and
removing the purchase interface upon completing a purchase transaction without navigating away from the application.
2. The method of claim 1, further comprising:
initially presenting a portion of the interface offering the product for purchase and upon receiving an input or selection in the portion of the interface revealing the full application.
3. The method of claim 1, wherein the purchase interface is presented after receiving an input into the application offering the product for purchase indicating that the user desires to purchase the product.
4. The method of claim 1, wherein the purchase interface is translucent.
5. The method of claim 1, wherein the purchase interface is an interface to the second entity.
6. The method of claim 1, wherein the application is an advertisement.
7. The method of claim 1, wherein the application is from an application server that targets applications to users.
8. The method of claim 1, wherein the purchase interface is for purchasing a product directly from an online store.
9. A product comprising:
a non-transitory machine-readable medium; and
machine-executable instructions stored on the machine-readable medium for presenting a portion of an application offering a product for purchase, the application being from a first entity;
receiving an input in the portion of the application;
presenting the full application in response to receiving the input;
receiving a selection in the portion of the application indicating that a user desires to purchase the product;
presenting a purchase interface overlaid the application, the purchase interface being from a second entity; and
completing a sales transaction without navigating away from the application.
10. The product of claim 9, wherein the purchase interface is translucent.
11. The product of claim 9, wherein the purchase interface is partially transparent.
12. The product of claim 9, wherein the application is an advertisement.
13. The product of claim 9, wherein the application is from an application server that targets applications to users.
14. A system for presenting a purchase interface comprising:
a processor configured to present an application offering a product for purchase, the application being from a first entity;
a communications interface configured to communicate with an online store, the online store being an entity offering the product for purchase;
the processor further configured to present a purchase interface overlaid the application, the purchase interface including information received from the online store via the communications interface; and
an input device for receiving inputs effective to cause the communications interface to communicate with the online store to complete a purchase of the product without navigating away from the application.
15. The system of claim 14, wherein the processor is two or more processors.
16. The system of claim 14, wherein the purchase interface is translucent.
17. The system of claim 14, wherein the purchase interface is partially transparent.
18. The system of claim 14, wherein the application is an advertisement.
19. The system of claim 14, wherein the application is from an application server that targets applications to users.
20. The system of claim 14, wherein the purchase interface is for purchasing a product directly from an online store.
US13/249,163 2010-04-02 2011-09-29 Application purchasing Abandoned US20120022943A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/249,163 US20120022943A1 (en) 2010-04-02 2011-09-29 Application purchasing

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US32066610P 2010-04-02 2010-04-02
US12/767,412 US9922354B2 (en) 2010-04-02 2010-04-26 In application purchasing
US13/249,163 US20120022943A1 (en) 2010-04-02 2011-09-29 Application purchasing

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/767,412 Continuation US9922354B2 (en) 2010-04-02 2010-04-26 In application purchasing

Publications (1)

Publication Number Publication Date
US20120022943A1 true US20120022943A1 (en) 2012-01-26

Family

ID=44710740

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/767,412 Active 2031-03-21 US9922354B2 (en) 2010-04-02 2010-04-26 In application purchasing
US13/249,163 Abandoned US20120022943A1 (en) 2010-04-02 2011-09-29 Application purchasing
US15/925,693 Active 2030-10-05 US11120485B2 (en) 2010-04-02 2018-03-19 Application purchasing

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/767,412 Active 2031-03-21 US9922354B2 (en) 2010-04-02 2010-04-26 In application purchasing

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/925,693 Active 2030-10-05 US11120485B2 (en) 2010-04-02 2018-03-19 Application purchasing

Country Status (1)

Country Link
US (3) US9922354B2 (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110137731A1 (en) * 2008-08-07 2011-06-09 Jong Ok Ko Advertising method and system adaptive to data broadcast
US20130013665A1 (en) * 2011-07-06 2013-01-10 Swee Huat Sng Sandboxed Daemon Process Invocation through HTTP
US20130085824A1 (en) * 2011-09-30 2013-04-04 International Business Machines Corporation Timer-based ad placement in content retrieval applications
US8571937B2 (en) 2010-10-20 2013-10-29 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US8577803B2 (en) 2011-06-03 2013-11-05 Visa International Service Association Virtual wallet card selection apparatuses, methods and systems
US9117225B2 (en) 2011-09-16 2015-08-25 Visa International Service Association Apparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9646291B2 (en) 2011-05-11 2017-05-09 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US9652765B2 (en) 2008-08-26 2017-05-16 Visa International Service Association System and method for implementing financial assistance programs
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US9773212B2 (en) 2011-02-28 2017-09-26 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US9830328B2 (en) 2012-02-02 2017-11-28 Visa International Service Association Multi-source, multi-dimensional, cross-entry, multimedia merchant analytics database platform apparatuses, methods and systems
US9842365B2 (en) 2015-09-15 2017-12-12 Google Inc. Guided purchasing via smartphone
JP2018026092A (en) * 2016-08-10 2018-02-15 バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド Method and device for generating nonproprietary page for application store
US9953378B2 (en) 2012-04-27 2018-04-24 Visa International Service Association Social checkout widget generation and integration apparatuses, methods and systems
US9953334B2 (en) 2011-02-10 2018-04-24 Visa International Service Association Electronic coupon issuance and redemption apparatuses, methods and systems
US9996838B2 (en) 2011-03-04 2018-06-12 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
JP2018147455A (en) * 2017-03-07 2018-09-20 シャープ株式会社 Display device, television receiver, display control method, display control program, control apparatus, control method, control program, and recording medium
US10096022B2 (en) 2011-12-13 2018-10-09 Visa International Service Association Dynamic widget generator apparatuses, methods and systems
US10121129B2 (en) 2011-07-05 2018-11-06 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10154084B2 (en) 2011-07-05 2018-12-11 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US10204327B2 (en) 2011-02-05 2019-02-12 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US10223691B2 (en) 2011-02-22 2019-03-05 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10262148B2 (en) 2012-01-09 2019-04-16 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US10318941B2 (en) 2011-12-13 2019-06-11 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10438176B2 (en) 2011-07-17 2019-10-08 Visa International Service Association Multiple merchant payment processor platform apparatuses, methods and systems
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US11216468B2 (en) 2015-02-08 2022-01-04 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US11288661B2 (en) 2011-02-16 2022-03-29 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US11308227B2 (en) 2012-01-09 2022-04-19 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8296568B2 (en) 2009-10-27 2012-10-23 Google Inc. Systems and methods for authenticating an electronic transaction
US8364959B2 (en) * 2010-05-26 2013-01-29 Google Inc. Systems and methods for using a domain-specific security sandbox to facilitate secure transactions
WO2012001232A2 (en) * 2010-06-30 2012-01-05 Nokia Corporation Method and apparatus for in-application purchasing
US10102354B2 (en) * 2010-11-19 2018-10-16 Microsoft Technology Licensing, Llc Integrated application feature store
US10121163B2 (en) * 2010-12-14 2018-11-06 Soorena Salari Apparatus, system, and method for a micro commerce ad
US20120191013A1 (en) * 2011-01-18 2012-07-26 Nelson Samuel J System to select condom using hand held electronic measuring device
WO2012152161A1 (en) * 2011-08-25 2012-11-15 中兴通讯股份有限公司 Application store system and method for implementing in-application purchase function
US8914790B2 (en) 2012-01-11 2014-12-16 Microsoft Corporation Contextual solicitation in a starter application
US20140189514A1 (en) * 2012-12-28 2014-07-03 Joel Hilliard Video player with enhanced content ordering and method of acquiring content
US9053307B1 (en) 2012-07-23 2015-06-09 Amazon Technologies, Inc. Behavior based identity system
US20140188636A1 (en) * 2013-01-03 2014-07-03 Google Inc. Reactive ad formats
US10269029B1 (en) * 2013-06-25 2019-04-23 Amazon Technologies, Inc. Application monetization based on application and lifestyle fingerprinting
US20150248193A1 (en) * 2014-02-28 2015-09-03 Fuhu Holdings, Inc. Customized user interface for mobile computers
GB2525265A (en) * 2014-04-20 2015-10-21 Giftgaming Ltd An advertising method and system
USD752615S1 (en) * 2014-04-17 2016-03-29 Huawei Device Co., Ltd. Display screen or portion thereof with a graphical user interface
US10313264B2 (en) * 2014-05-28 2019-06-04 Apple Inc. Sharing account data between different interfaces to a service
US10565572B2 (en) 2017-04-09 2020-02-18 Microsoft Technology Licensing, Llc Securing customized third-party content within a computing environment configured to enable third-party hosting

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090171906A1 (en) * 2008-01-02 2009-07-02 Research In Motion Limited System and method for providing information relating to an email being provided to an electronic device
US20090204476A1 (en) * 2008-01-31 2009-08-13 Comscore Networks, Inc. Determining effectiveness of advertising campaigns
US20090289956A1 (en) * 2008-05-22 2009-11-26 Yahoo! Inc. Virtual billboards
US20100153831A1 (en) * 2008-12-16 2010-06-17 Jeffrey Beaton System and method for overlay advertising and purchasing utilizing on-line video or streaming media

Family Cites Families (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7133834B1 (en) 1992-08-06 2006-11-07 Ferrara Ethereal Llc Product value information interchange server
US5999908A (en) 1992-08-06 1999-12-07 Abelow; Daniel H. Customer-based product design module
US5991399A (en) 1997-12-18 1999-11-23 Intel Corporation Method for securely distributing a conditional use private key to a trusted entity on a remote system
US6038567A (en) 1998-02-19 2000-03-14 Microsoft Corporation Method and system for propagating object properties in a desktop publishing program
ATE437398T1 (en) 1998-05-06 2009-08-15 Sun Microsystems Inc PROCESSING MACHINE AND PROCESSING METHOD
US6651094B1 (en) 1998-07-17 2003-11-18 International Business Machines Corporation Method and apparatus for creating a preload image for network installation
US6141010A (en) 1998-07-17 2000-10-31 B. E. Technology, Llc Computer interface method and apparatus with targeted advertising
US6289512B1 (en) 1998-12-03 2001-09-11 International Business Machines Corporation Automatic program installation
US6363524B1 (en) 1999-09-10 2002-03-26 Hewlett-Packard Company System and method for assessing the need for installing software patches in a computer system
WO2001029727A2 (en) * 1999-10-21 2001-04-26 Adfluence, Inc. Network methods for interactive advertising and direct marketing
US20010047365A1 (en) 2000-04-19 2001-11-29 Hiawatha Island Software Co, Inc. System and method of packaging and unpackaging files into a markup language record for network search and archive services
US7310801B2 (en) 2000-04-27 2007-12-18 Microsoft Corporation Servicing a component-based software product throughout the software product lifecycle
US7155713B1 (en) 2000-04-27 2006-12-26 Microsoft Corporation Componentized operating system
US7231426B1 (en) 2000-05-24 2007-06-12 Microsoft Corporation System and method for sending a web page via electronic mail
US6616533B1 (en) * 2000-05-31 2003-09-09 Intel Corporation Providing advertising with video games
US6868539B1 (en) 2000-06-28 2005-03-15 Microsoft Corp. System and method providing single application image
US6966034B2 (en) 2000-06-30 2005-11-15 Microsoft Corporation Supplemental request header for applications or devices using web browsers
US7688306B2 (en) 2000-10-02 2010-03-30 Apple Inc. Methods and apparatuses for operating a portable device based on an accelerometer
US9047609B2 (en) 2000-11-29 2015-06-02 Noatak Software Llc Method and system for dynamically incorporating advertising content into multimedia environments
US7512635B1 (en) 2000-12-18 2009-03-31 Bmc Software, Inc. System and method for updating information on a computer system using a limited amount of space
US7200627B2 (en) 2001-03-21 2007-04-03 Nokia Corporation Method and apparatus for generating a directory structure
US6807542B2 (en) 2001-08-14 2004-10-19 International Business Machines Corporation Method and apparatus for selective and quantitative rights management
US20030037325A1 (en) 2001-08-17 2003-02-20 Hargrove David C. System and methods for automatically installing a correct software version from media containing multiple software versions
US20030182652A1 (en) 2001-12-21 2003-09-25 Custodio Gabriel T. Software building and deployment system and method
GB0203617D0 (en) 2002-02-15 2002-04-03 Ibm Application window closure in response to event in parent window
US6999976B2 (en) 2002-05-29 2006-02-14 International Business Machines Corporation Method, apparatus, and program for using a Java archive to encode a file system delta
US20040225647A1 (en) 2003-05-09 2004-11-11 John Connelly Display system and method
US7281245B2 (en) 2002-06-05 2007-10-09 Microsoft Corporation Mechanism for downloading software components from a remote source for use by a local software application
US7418618B2 (en) 2003-01-08 2008-08-26 Transpacific Ip Ltd. Error reporting and correcting method for peripheral
EP1398694B1 (en) 2002-07-26 2013-09-11 Canon Kabushiki Kaisha Information processing method
US20040088397A1 (en) 2002-11-05 2004-05-06 Sidley Austin Brown & Wood Llp. System and method for management of software applications
US7584208B2 (en) 2002-11-20 2009-09-01 Radar Networks, Inc. Methods and systems for managing offers and requests in a network
US20040128583A1 (en) 2002-12-31 2004-07-01 International Business Machines Corporation Method and system for monitoring, diagnosing, and correcting system problems
JP2006523070A (en) 2003-04-10 2006-10-05 エスケーテレコム カンパニー リミテッド Method and apparatus for providing multimedia service in portable terminal
US20040250247A1 (en) 2003-06-09 2004-12-09 Sun Microsystems, Inc. Extensible software installation and configuration framework
US7281254B2 (en) 2003-08-19 2007-10-09 Matsushita Electric Industrial Co., Ltd. Optical disc drive having a traverse holder that is rotatable around an axis that is mutually different from the axis of a traverse base
US7814551B2 (en) 2003-09-09 2010-10-12 Microsoft Corporation System and method for manifest generation
US20050093891A1 (en) 2003-11-04 2005-05-05 Pixel Instruments Corporation Image orientation apparatus and method
DE10352341A1 (en) 2003-11-06 2005-11-03 Mediacare Gmbh & Co. Kg Method for changing the dimensions of an electronically stored image
GB0326626D0 (en) 2003-11-14 2003-12-17 Filewave International Holding A method in a network of the delivery of files
US7574706B2 (en) 2003-12-15 2009-08-11 Microsoft Corporation System and method for managing and communicating software updates
US7385942B2 (en) 2004-03-03 2008-06-10 International Business Machines Corporation System for maintaining the integrity of remote data by making it disposable
US7934210B1 (en) 2004-03-26 2011-04-26 Adobe Systems Incorporated System and method for updating one or more programs and their environment
US7296747B2 (en) 2004-04-20 2007-11-20 Michael Rohs Visual code system for camera-equipped mobile devices and applications thereof
US20050240475A1 (en) 2004-04-23 2005-10-27 Margiloff William A Systems and methods for universal online advertising
US20050262501A1 (en) 2004-05-21 2005-11-24 Claudio Marinelli Software distribution method and system supporting configuration management
US7975265B2 (en) 2004-07-08 2011-07-05 At&T Intellectual Property I, L.P. System and method for providing installation support to a user
US7379063B2 (en) 2004-07-29 2008-05-27 Raytheon Company Mapping application for rendering pixel imagery
US7925549B2 (en) 2004-09-17 2011-04-12 Accenture Global Services Limited Personalized marketing architecture
US7849459B2 (en) 2004-11-04 2010-12-07 International Business Machines Corporation Deploying java applications in resource constrained environments
US20060195334A1 (en) 2004-11-17 2006-08-31 Reeb Shayne A Integrated environmental emission reduction data management system and method
WO2006055838A2 (en) 2004-11-18 2006-05-26 America Online, Inc. Runtime environment
US7308610B2 (en) 2004-12-10 2007-12-11 Intel Corporation Method and apparatus for handling errors in a processing system
KR20060082014A (en) 2005-01-11 2006-07-14 삼성전자주식회사 A manifest file structure, contents downloading method and the contents reproducing apparatus thereof
US20090171847A2 (en) 2005-01-24 2009-07-02 Microsoft Corporation Multi-merchant purchasing environment for downloadable products
US7624086B2 (en) 2005-03-04 2009-11-24 Maxsp Corporation Pre-install compliance system
US7428555B2 (en) 2005-04-07 2008-09-23 Google Inc. Real-time, computer-generated modifications to an online advertising program
US20100049608A1 (en) 2005-04-25 2010-02-25 Grossman Stephanie L Third party content management system and method
US20080275764A1 (en) 2005-04-25 2008-11-06 Wilson Eric S Content management system and method
US8072427B2 (en) 2006-05-31 2011-12-06 Research In Motion Limited Pivoting, multi-configuration mobile device
US7991764B2 (en) 2005-07-22 2011-08-02 Yogesh Chunilal Rathod Method and system for communication, publishing, searching, sharing and dynamically providing a journal feed
US7937672B2 (en) 2005-08-02 2011-05-03 Delphi Technologies, Inc. System and method for scrolling through a list
US20070033202A1 (en) 2005-08-02 2007-02-08 Casto Paul D System and method for scrolling through a list
US7707559B2 (en) 2005-08-30 2010-04-27 International Business Machines Corporation Analysis of errors within computer code
US20090248537A1 (en) 2005-12-01 2009-10-01 Shahriar Sarkeshik Commercial transaction facilitation system
EP1977312A2 (en) 2006-01-16 2008-10-08 Zlango Ltd. Iconic communication
US20070168462A1 (en) 2006-01-18 2007-07-19 Jeffrey Adam Grossberg Online production and media coordination portal/system for telephone ringback messages and digital media content
ATE447160T1 (en) 2006-03-31 2009-11-15 Research In Motion Ltd METHOD AND DEVICE FOR DYNAMIC LABELING OF MAP OBJECTS IN VISUALLY DISPLAYED CARDS OF MOBILE COMMUNICATION DEVICES
US20080004954A1 (en) 2006-06-30 2008-01-03 Microsoft Corporation Methods and architecture for performing client-side directed marketing with caching and local analytics for enhanced privacy and minimal disruption
US20080025307A1 (en) 2006-07-27 2008-01-31 Research In Motion Limited System and method for pushing information from a source device to an available destination device
US20080033997A1 (en) 2006-08-04 2008-02-07 Sap Portals (Israel) Ltd. Transformation tool for migration of web-based content to portal
US20080065491A1 (en) 2006-09-11 2008-03-13 Alexander Bakman Automated advertising optimizer
US8736557B2 (en) 2006-09-11 2014-05-27 Apple Inc. Electronic device with image based browsers
US8601018B2 (en) 2006-11-08 2013-12-03 Open Invention Network, Llc Apparatus and method for dynamically providing web-based multimedia to a mobile phone
US8307288B1 (en) * 2006-12-05 2012-11-06 David Gene Smaltz Active forms content delivery service for entites and mobile networked device users (active forms)
US20080143749A1 (en) 2006-12-15 2008-06-19 Qualcomm Incorporated Post-Render Graphics Rotation
US20080154738A1 (en) 2006-12-22 2008-06-26 Microsoft Corporation Interactive marketplace infrastructure
US7978182B2 (en) 2007-01-07 2011-07-12 Apple Inc. Screen rotation gestures on a portable multifunction device
US20080208712A1 (en) 2007-02-28 2008-08-28 Phil Yerkes Computer based systems to conduct sales of products or services over a communication network
US20080248834A1 (en) 2007-04-03 2008-10-09 Palm, Inc. System and methods for providing access to a desktop and applications of a mobile device
US8407692B2 (en) 2007-06-27 2013-03-26 Microsoft Corporation Dynamic correction of component manifests
US8103865B2 (en) 2007-08-01 2012-01-24 Phunware, Inc. Server method and system for rendering content on a wireless device
US20090037239A1 (en) 2007-08-02 2009-02-05 Daniel Wong Method For Improving Internet Advertising Click-Through Rates through Time-Dependent Keywords
US20090043657A1 (en) 2007-08-06 2009-02-12 Palm, Inc. System and methods for selecting advertisements based on caller identifier information
US8220062B1 (en) * 2007-08-16 2012-07-10 Google Inc. Double sand-boxing for flash library
US8024223B2 (en) 2007-11-08 2011-09-20 International Business Machines Corporation Customizing and distributing advertisments to mobile devices on a communication network
US8275419B2 (en) 2007-11-14 2012-09-25 Yahoo! Inc. Advertisements on mobile devices using integrations with mobile applications
US8223851B2 (en) 2007-11-23 2012-07-17 Samsung Electronics Co., Ltd. Method and an apparatus for embedding data in a media stream
US20090207138A1 (en) 2008-02-18 2009-08-20 Sony Ericsson Mobile Communications Ab Selecting a layout
US8725017B2 (en) 2008-03-26 2014-05-13 Lexmark International, Inc. Fuser assembly heater temperature control
WO2009145848A1 (en) 2008-04-15 2009-12-03 Pvi Virtual Media Services, Llc Preprocessing video to insert visual elements and applications thereof
JP5675589B2 (en) 2008-04-30 2015-02-25 インタートラスト テクノロジーズ コーポレイション Data collection and targeted advertising system
WO2009135303A1 (en) 2008-05-07 2009-11-12 Chalk Media Service Corp. A system and method for embedding interactive components within mobile content
US8233722B2 (en) 2008-06-27 2012-07-31 Palo Alto Research Center Incorporated Method and system for finding a document image in a document collection using localized two-dimensional visual fingerprints
US20100017385A1 (en) 2008-07-16 2010-01-21 International Business Machines Creating and managing reference elements of deployable web archive files
US8860765B2 (en) 2008-09-08 2014-10-14 Qualcomm Incorporated Mobile device with an inclinometer
US8947320B2 (en) 2008-09-08 2015-02-03 Qualcomm Incorporated Method for indicating location and direction of a graphical user interface element
US9342231B2 (en) 2008-12-29 2016-05-17 Apple Inc. Remote control of a presentation
US8132120B2 (en) 2008-12-29 2012-03-06 Verizon Patent And Licensing Inc. Interface cube for mobile device
US9262071B2 (en) 2009-03-16 2016-02-16 Microsoft Technology Licensing, Llc Direct manipulation of content
US8327351B2 (en) 2009-04-30 2012-12-04 Sap Ag Application modification framework
KR20120018145A (en) 2009-05-06 2012-02-29 톰슨 라이센싱 Methods and systems for delivering multimedia content optimized in accordance with presentation device capabilities
US8661075B2 (en) 2009-06-04 2014-02-25 Qualcomm Incorporated Method and apparatus for serving episodic secondary content
US20100317371A1 (en) 2009-06-12 2010-12-16 Westerinen William J Context-based interaction model for mobile devices
US9014685B2 (en) 2009-06-12 2015-04-21 Microsoft Technology Licensing, Llc Mobile device which automatically determines operating mode
US9778810B2 (en) 2009-07-14 2017-10-03 Zumobi, Inc. Techniques to modify content and view content on mobile devices
US20110016427A1 (en) 2009-07-17 2011-01-20 Andre Gene Douen Systems, Methods and Articles For Managing Presentation of Information
US8332180B2 (en) 2009-09-03 2012-12-11 Palo Alto Research Center Incorporated Determining user compass orientation from a portable device
US20110087529A1 (en) 2009-10-14 2011-04-14 Matthew Jason Angell Methods and systems for creation and distribution of promotional materials and gathering of consumer data
US20110125755A1 (en) 2009-11-23 2011-05-26 Ashish Kaila Systems and methods for thumbnail management
US9485535B2 (en) 2010-01-13 2016-11-01 Qualcomm Incorporated Notification of interactivity event asset delivery sources in a mobile broadcast communication system
US20110177775A1 (en) 2010-01-13 2011-07-21 Qualcomm Incorporated Signaling mechanisms, templates and systems for creation and delivery of interactivity events on mobile devices in a mobile broadcast communication system
US20110177774A1 (en) 2010-01-13 2011-07-21 Qualcomm Incorporated Dynamic generation, delivery, and execution of interactive applications over a mobile broadcast network
US9032466B2 (en) 2010-01-13 2015-05-12 Qualcomm Incorporated Optimized delivery of interactivity event assets in a mobile broadcast communication system
US8676991B2 (en) 2010-01-13 2014-03-18 Qualcomm Incorporated Signaling mechanisms and systems for enabling, transmitting and maintaining interactivity features on mobile devices in a mobile broadcast communication system
US20110210922A1 (en) 2010-02-26 2011-09-01 Research In Motion Limited Dual-screen mobile device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090171906A1 (en) * 2008-01-02 2009-07-02 Research In Motion Limited System and method for providing information relating to an email being provided to an electronic device
US20090204476A1 (en) * 2008-01-31 2009-08-13 Comscore Networks, Inc. Determining effectiveness of advertising campaigns
US20090289956A1 (en) * 2008-05-22 2009-11-26 Yahoo! Inc. Virtual billboards
US20100153831A1 (en) * 2008-12-16 2010-06-17 Jeffrey Beaton System and method for overlay advertising and purchasing utilizing on-line video or streaming media

Cited By (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8666814B2 (en) * 2008-08-07 2014-03-04 Fobikr Co., Ltd. Advertising method and system adaptive to data broadcast
US20110137731A1 (en) * 2008-08-07 2011-06-09 Jong Ok Ko Advertising method and system adaptive to data broadcast
US9652765B2 (en) 2008-08-26 2017-05-16 Visa International Service Association System and method for implementing financial assistance programs
US10688385B2 (en) 2010-10-20 2020-06-23 Playspan Inc. In-application universal storefront apparatuses, methods and systems
US8571937B2 (en) 2010-10-20 2013-10-29 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US10500481B2 (en) 2010-10-20 2019-12-10 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US11311797B2 (en) 2010-10-20 2022-04-26 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US9757644B2 (en) 2010-10-20 2017-09-12 Playspin Inc. Dynamic payment optimization apparatuses, methods and systems
US10204327B2 (en) 2011-02-05 2019-02-12 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US11093919B2 (en) 2011-02-05 2021-08-17 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US9953334B2 (en) 2011-02-10 2018-04-24 Visa International Service Association Electronic coupon issuance and redemption apparatuses, methods and systems
US10621605B2 (en) 2011-02-10 2020-04-14 Visa International Service Association Electronic coupon issuance and redemption apparatuses, methods and systems
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US11288661B2 (en) 2011-02-16 2022-03-29 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US10223691B2 (en) 2011-02-22 2019-03-05 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US11023886B2 (en) 2011-02-22 2021-06-01 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US9773212B2 (en) 2011-02-28 2017-09-26 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US11250352B2 (en) 2011-02-28 2022-02-15 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US10482398B2 (en) 2011-02-28 2019-11-19 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US11263640B2 (en) 2011-03-04 2022-03-01 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
US9996838B2 (en) 2011-03-04 2018-06-12 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
US9646291B2 (en) 2011-05-11 2017-05-09 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US11263601B2 (en) 2011-05-11 2022-03-01 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US10489756B2 (en) 2011-05-11 2019-11-26 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US11853977B2 (en) 2011-05-11 2023-12-26 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US8577803B2 (en) 2011-06-03 2013-11-05 Visa International Service Association Virtual wallet card selection apparatuses, methods and systems
US10419529B2 (en) 2011-07-05 2019-09-17 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US11010753B2 (en) 2011-07-05 2021-05-18 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10121129B2 (en) 2011-07-05 2018-11-06 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US11900359B2 (en) 2011-07-05 2024-02-13 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10154084B2 (en) 2011-07-05 2018-12-11 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US10803449B2 (en) 2011-07-05 2020-10-13 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US20130013665A1 (en) * 2011-07-06 2013-01-10 Swee Huat Sng Sandboxed Daemon Process Invocation through HTTP
US8825748B2 (en) * 2011-07-06 2014-09-02 Sharp Laboratories Of America, Inc. Sandboxed daemon process invocation through HTTP
US10438176B2 (en) 2011-07-17 2019-10-08 Visa International Service Association Multiple merchant payment processor platform apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9959531B2 (en) 2011-08-18 2018-05-01 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US11803825B2 (en) 2011-08-18 2023-10-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US11037138B2 (en) 2011-08-18 2021-06-15 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods, and systems
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US11397931B2 (en) 2011-08-18 2022-07-26 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US11763294B2 (en) 2011-08-18 2023-09-19 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US11010756B2 (en) 2011-08-18 2021-05-18 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10354240B2 (en) 2011-08-18 2019-07-16 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9117225B2 (en) 2011-09-16 2015-08-25 Visa International Service Association Apparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US11354723B2 (en) 2011-09-23 2022-06-07 Visa International Service Association Smart shopping cart with E-wallet store injection search
US9367861B2 (en) * 2011-09-30 2016-06-14 International Business Machines Corporation Timer-based ad placement in content retrieval applications
US9355413B2 (en) * 2011-09-30 2016-05-31 International Business Machines Corporation Timer-based ad placement in content retrieval applications
US20130085824A1 (en) * 2011-09-30 2013-04-04 International Business Machines Corporation Timer-based ad placement in content retrieval applications
US10846670B2 (en) 2011-12-13 2020-11-24 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10318941B2 (en) 2011-12-13 2019-06-11 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10096022B2 (en) 2011-12-13 2018-10-09 Visa International Service Association Dynamic widget generator apparatuses, methods and systems
US10685379B2 (en) 2012-01-05 2020-06-16 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US10262148B2 (en) 2012-01-09 2019-04-16 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US11308227B2 (en) 2012-01-09 2022-04-19 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US11036681B2 (en) 2012-02-02 2021-06-15 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems
US10013423B2 (en) 2012-02-02 2018-07-03 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems
US11074218B2 (en) 2012-02-02 2021-07-27 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US9830328B2 (en) 2012-02-02 2017-11-28 Visa International Service Association Multi-source, multi-dimensional, cross-entry, multimedia merchant analytics database platform apparatuses, methods and systems
US10983960B2 (en) 2012-02-02 2021-04-20 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US10430381B2 (en) 2012-02-02 2019-10-01 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US10262001B2 (en) 2012-02-02 2019-04-16 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US9953378B2 (en) 2012-04-27 2018-04-24 Visa International Service Association Social checkout widget generation and integration apparatuses, methods and systems
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US11216468B2 (en) 2015-02-08 2022-01-04 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US11941008B2 (en) 2015-02-08 2024-03-26 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US9842365B2 (en) 2015-09-15 2017-12-12 Google Inc. Guided purchasing via smartphone
US11869067B2 (en) 2015-09-15 2024-01-09 Google Llc Guided purchasing via smartphone
US11023956B2 (en) 2015-09-15 2021-06-01 Google Llc Guided purchasing via smartphone
JP2018026092A (en) * 2016-08-10 2018-02-15 バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド Method and device for generating nonproprietary page for application store
JP2018147455A (en) * 2017-03-07 2018-09-20 シャープ株式会社 Display device, television receiver, display control method, display control program, control apparatus, control method, control program, and recording medium

Also Published As

Publication number Publication date
US20110246290A1 (en) 2011-10-06
US9922354B2 (en) 2018-03-20
US11120485B2 (en) 2021-09-14
US20180211295A1 (en) 2018-07-26

Similar Documents

Publication Publication Date Title
US11120485B2 (en) Application purchasing
US9111309B2 (en) Caching multiple views corresponding to multiple aspect ratios
US10416851B2 (en) Electronic publishing mechanisms
US20190138186A1 (en) Floating animated push interfaces for interactive dynamic push notifications and other content
US20120260158A1 (en) Enhanced World Wide Web-Based Communications
US10481760B2 (en) Interactive dynamic push notifications
US20130067035A1 (en) System and method for cloud based delivery and display of content on mobile devices
US8615432B2 (en) Background process for providing targeted content within a third-party application
US10229429B2 (en) Cross-device and cross-channel advertising and remarketing
US20130238449A1 (en) Polymorphic Advertisements
US20120158515A1 (en) Dynamic advertisement serving based on an avatar
WO2012092240A2 (en) Method and apparatus for providing or utilizing interactive video with tagged objects
US10606443B2 (en) Interactive dashboard for controlling delivery of dynamic push notifications
CA2799426A1 (en) Interactive ads
US20120203865A1 (en) Apparatus and methods for providing behavioral retargeting of content from partner websites
US20160239171A1 (en) Information display apparatus, distribution apparatus, information display method, and non-transitory computer readable storage medium
US8983861B2 (en) Bridge pages for mobile advertising
US20160048875A1 (en) Entity based search advertising within a modular search object framework
CA2793864C (en) Background process for providing targeted content within a third-party application
US9971501B2 (en) Method and system for providing adaptive arrangement and representation of user interface elements
US20200201498A1 (en) Dynamic auxiliary user interface
US20150332322A1 (en) Entity sponsorship within a modular search object framework
JP2020042636A (en) Information display program, information display device, information display method, and delivery device
WO2014014431A1 (en) Serving expandable content items
US20210065237A1 (en) Method and System of Providing Search Results to Users

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION