Abstract:
In some implementations, a website can be certified by a push notification service operator to send push notifications to user devices. A web browser on the user's device can communicate with the website to advertise the user device's ability to receive push notifications. The website can provide to the web browser a certificate indicating that the website is authorized to utilize the push notification service. If the certificate is valid and has not been revoked, the browser can prompt the user to allow push notifications from the website. If the user authorizes push notifications, a device token can be provided to the website that allows the website to send push notifications to the user device through the push notification service. In some implementations, the web browser can be configured to provide websites access to APIs for accessing information stored on a user device.
Abstract:
Systems, methods, and computer-readable media for validating online access to secure device functionality are provided that may use shared secrets between different subsystems and limited use validation data.
Abstract:
A first messaging app, in one embodiment receives text and detects that the text includes a URL that refers to audio or audiovisual media content in a catalog of media content, and the messaging app obtains metadata about the media content and transmits the metadata to a second messaging app. Both the first and the second messaging app can operate, through interprocess communication, with its own music extension app that displays a user interface within a view hosted by the respective messaging app.
Abstract:
In various embodiments described herein, a content extension and programming interface enable third-party content extensions to supply transformation and filtering actions and associated criteria to native web clients on a system. In one embodiment, the native web client loads data for a third-party content filtering, blocking, or transformation extension and conducts extension defined actions without requiring additional intermediation by the third-party content. In one embodiment, a third-party application downloaded to a mobile or handheld device can include an extension data object that provides actions and triggers that are loaded by a native web client of the system. The third-party application is not required to execute continuously and can exit or be terminated once the web client retrieves the extension data object.
Abstract:
An electronic device displays a content region including first content that contains an image; and, while displaying the first content, detects an input at a location that corresponds to the location of the image. In response, the electronic device, in accordance with a determination that the input includes an intensity above a respective threshold and that the image is associated with a link to second content that is different from the first content, displays a preview of the second content while maintaining display of at least a portion of the first content in the content region; and, in accordance with a determination that the input includes an intensity above the respective threshold and that the image is not associated with a link to additional content, displays an enlarged version of the image while maintaining display of at least a portion of the first content in the content region.
Abstract:
Methods and systems for associating, in a secure manner, a link between web sites (or other network resources) and installed applications. In one embodiment, a signed list of one or more URLs is downloaded and validated to establish an association, which is stored in a data structure, between a first application and a second application. In response to receiving a selection of a URL in the second application, comparing the selected URL to URLs in the data structure and displaying, in the first application, content of the selected URL in response to determining that at least a prefix portion of the selected URL matches one of the URL associated with the first application in the data structure.
Abstract:
Methods and systems for associating, in a secure manner, a link between web sites (or other network resources) and installed applications. In one embodiment, a signed list of one or more URLs is downloaded and validated to establish an association, which is stored in a data structure, between a first application and a second application. In response to receiving a selection of a URL in the second application, comparing the selected URL to URLs in the data structure and displaying, in the first application, content of the selected URL in response to determining that at least a prefix portion of the selected URL matches one of the URL associated with the first application in the data structure.
Abstract:
The method for managing a plurality of windows of a browser application on an electronic device includes assigning a priority level to each process, including the browser application, running on the device, and distributing computing resources based on priority level. In response to receiving an action to open a window, the browser application starts the execution of a process for opening the window, associates the process with the window, and assigns a priority level to the process associated with the window. The browser application then monitors an activity level of each process associated with its windows. If the activity level decreases, the browser application assigns the process with the decreased activity level to a lower priority level. If requested computing resources exceed a maximum threshold, a process is selected from the lowest priority level processes, and the selected process is suspended.
Abstract:
Methods and apparatuses that maintain one or more data stores capable of storing local data in a device for loading a resource of a domain are described. The resource may be loaded to cause one or more data access operations on the data stores. Access to usage tracking data of the device from the domain may depend on at least one of the data access operations. The data access operations may be configured to block the usage tracking data of the device from the domain. The data access operations may be performed on the data stores for the loading of the resource. A web page may be presented to a user when the resource is successfully loaded.