![]() computing device configured to manage information associated with web pages, computer-implemented me
专利摘要:
COMPUTING DEVICE CONFIGURED TO MANAGE INFORMATION ASSOCIATED WITH NETWORK PAGES, METHOD IMPLEMENTED BY COMPUTER, DEVICE USE AND SYSTEM. Systems, methods, interfaces and their use are provided for selectively managing information collected by a browser. The browser obtains a network resource, such as a web page, from a content provider, and collects information associated with a user's display and interaction with the content. The browser features, among other controls, a graphical icon that is representative of an integral command, to remove information collected while accessing a first network resource and make the browser application access a second accessed network resource. Upon receipt of an entry corresponding to the selection of the graphic icon, the browser deletes information collected while accessing the first network resource and accessing the network resource. 公开号:BR112014003666B1 申请号:R112014003666-7 申请日:2012-08-14 公开日:2021-07-06 发明作者:Jonathan A. Jenkins;Brett R. Taylor;Gregory M. Hart;Jeffrey P. Pazos 申请人:Amazon Technologies, Inc.; IPC主号:
专利说明:
BACKGROUND [0001] Generally described, computing devices and communication networks can be used to exchange information. In one use, a computing device may request information from content providers over a communication network. Content providers can be, for example, websites such as blog sites, e-commerce sites, search engines, social networking sites and the like. For example, a user of a personal computing device can use a browser to request content (eg, a web page) from a server computing device over the Internet. In such embodiments, the user computing device can be referred to as a client computing device and the server computing device can be referred to as the content provider. [0002] To facilitate accessing a history of accessed network resources, browsers provide navigation controls that allow users to provide an indication that they want to return to a previously accessed network resource. For example, browsers provide a graphical icon or control that corresponds to a user's request to access the latest, previously accessed network resources, often referred to as a “back button” or “back arrow”. Upon receipt of such a request, a browser may use an access history of network resource identifiers (eg, URLs) that have been accessed during a defined period of time to identify the most recent resource identifier listed in history and attempt to display and /or re-access the network resource matching the identifier. Multiple selections of such a back button navigation control cause the browser to display network resources in reverse order of a specific user's access history. A “forward button” navigation control further facilitates content selection of network resources in forward order of the user's access history. [0003] As users can access the same network resources multiple times, browsers often try to improve performance and/or convenience by keeping information about the network resources (eg web pages) that have been accessed. As discussed above, information maintained by browser applications may include an access history of network resource identifiers (eg, URLs) that were accessed during a defined period of time. Information maintained by the browser application may also include account or user identifiers that are exchanged between the browser application and the content provider that allow for the identification of users and customization of content by the content provider. This information may be retained or referenced in what is known as “Web cookies”, among other possibilities. Additionally, information maintained by the browser application may include information provided by a user while accessing a network resource, such as user identifiers/login data, password data, text or form input data, and the like. Still additionally, information held by the browser may include locally stored (eg, cached) copies of embedded text, images, and other content used in presenting the network resource, such as in a file or memory. BRIEF DESCRIPTION OF THE DRAWINGS [0004] The above aspects and many of the inherent advantages will become more readily recognized by reference to the following detailed description, when taken in combination with the accompanying drawings, in which: [0005] Figures 1(a) — 1(c) represent example user interfaces generated by a browser to present one or more controls corresponding to a built-in command to remove information associated with a current network resource and access a network resource. previously accessed network; [0006] Figure 2(a) is an illustrative block diagram of a content delivery environment including a number of client computing devices and a content provider; [0007] Figures 2(b) and 2(c) are block diagrams of the content delivery environment of Figure 2(a) illustrating the access of network resources and the processing of an integrated command to remove information associated with a current network resource and accessing a previously accessed network resource; [0008] Figure 3(a) is an illustrative block diagram of a content delivery environment including a number of client computing devices, a content provider, and a network-accessible computing provider; [0009] Figures 3(b)-3(d) are block diagrams of the content delivery environment of Figure 2(a) illustrating accessing network resources and processing an embedded command to remove information associated with a current network resource and accessing a previously accessed network resource; [0010] Figure 4 is a flowchart of an input processing routine implemented by a browser to process embedded commands to remove information associated with a current network resource and access a previously accessed network resource; [0011] Figures 5(a)-5(f) are illustrative diagrams of various user interfaces generated by a browser to present one or more controls corresponding to an embedded command to remove information associated with a current network resource and access a previously accessed network resource; [0012] Figure 6 is a flowchart illustrative of an embedded command processing routine implemented by a network resource to process notifications of the selection of an embedded command to remove information associated with a current network resource and access a previously network resource accessed; and [0013] Figure 7 is an illustrative diagram of a user interface generated by a browser to present identifiers indicative of network resources that have undergone selection of an embedded command to remove information associated with a current network resource and access a resource previously accessed network. DETAILED DESCRIPTION [0014] Described in general terms, aspects of the present disclosure refer to content management and information corresponding to content access. Specifically, aspects of the present disclosure relate to selectively managing information collected by a software application such as a browser. The browser obtains content by accessing a network resource, such as a web page, from a content provider and collects information associated with a user's viewing and interaction of the network resource. In one modality, the browser presents, among other controls or icons, a graphical icon that is representative of a built-in command to remove access information collected while accessing the current network resource and cause the browser application to return to display a resource previously accessed network. Thus, responsive to a graphical icon selection, the browser removes at least a portion of the access information associated with the current network resource and also requires the previously accessed network resource without any further interaction from the user. Therefore, the user is able to return to the previously viewed web page and remove the appropriate access information from the computing device such that the computing device returns to a state before the web browser accesses the network resource. current, all in one action. [0015] For purposes of illustration, a user accesses a series of web pages using a browser on a client computing device, for example, a tablet computer, a personal computer, an e-book reader, etc. As the browser is accessing each web page under a user's control, the browser is configured to collect and maintain access information, such as adding the URL of the current web page to a history, storing cookies transmitted by the provider. content and save the password and information in the form used while the user accessed the web page. During the specific browsing session, the user uses conventional browsing controls to access a previously accessed web page (eg a “back button”) and return to the web page (eg a “next button”). At some point, however, the user decides that he or she wants not only to return to the previously accessed web page, but that at least some or all of the information associated with the current web page must be removed by the browser application. In this aspect, the computing device returns to a state before the web browser accesses the web page and electronic artifacts stored on the computing device are removed. Therefore, the user selects a different navigation control that corresponds to a built-in command to access the previously accessed web page and remove all access information that the browser application collected when the user accessed the current web page ("command" integrated"). From the user's perspective, the browser deletes at least part or all of the information corresponding to the current web page and automatically accesses the previously accessed web page by simply selecting the built-in command. [0016] In another illustrative example, a user accesses a web page that corresponds to a search provider. Based on a search query, the search provider returns a listing of URLs that might be relevant to the search query. After accessing one of the identified URLs, the user determines that that URL was neither appropriate nor relevant. By selecting a graphical control that matches the built-in command, the user can return to the previously accessed web page that included the search results and cause the removal of at least some or all of the information from the browser that is associated with the URL that was determined to be neither appropriate nor relevant. Additionally, in the same or another mode, the browser can be configured to transmit a notification to the search provider that informs the search provider that the user has used the built-in command. As such, the search provider may use the information to, among other possibilities, modify its relevance ranking systems such that search listings for subsequent queries by users and/or others are modified. In some embodiments, the search provider may modify the presentation of the URL to the user to be indicative of the user's previous use of the embedded command with respect to the network resource at that URL. In some modalities the search provider can alert other users that the integrated action of deleting and displaying the previous web page occurred with one or more other users. [0017] According to another example, a user accesses a web page that corresponds to an e-commerce provider. The user is browsing a selection of items for consumption (eg sale, rent, etc.) presented through a browser interface. The e-commerce provider uses the users' browsing activity to make suggestions to the user later on what the user might be interested in. For example, if the user has browsed mystery books in the past, the e-commerce website can provide automated recommendations for mystery books in the future. While the user is searching for items in the catalog the user views a product network page listing details for an item that does not accurately reflect the user's interests and for which the user does not want their automated recommendations to feature related products. To avoid this problem, the user then selects the graphical control that corresponds to the built-in command causing the software browser application to return to display the previously accessed web page (eg a previous product page, browse page, page search result) and cause the removal of all browser access information that is associated with the URL associated with the product page that lists details for the item that do not accurately reflect the user's interests. Additionally, in one modality, without any further action by the user, the browser transmits a notification to the e-commerce provider informing it that the user has used the integrated command. As such, the e-commerce provider may use the information to, among other possibilities, remove the product page from the user's browsing history in such a way that your visit does not affect the user's recommendations. In some modalities the e-commerce provider could modify the presentation of the URL to the user to be indicative of previous use of the integrated command or could alert other users that the integrated action of deleting and displaying the previous product page occurred with an or plus other users. [0018] Although examples are provided in which the browser displays the most recently accessed network resource in response to a user selecting the embedded command, in other embodiments the embedded command can cause the browser to display any of a number of other resources from network. For example, the browser application might display a predefined network resource, such as a “home page”. Additionally, in some embodiments the browser application may display a subsequent viewed page in a user's access history in response to the embedded command. [0019] With reference to the previous illustrative examples, the user may be presented with a number of graphic icons that are associated with an integrated command. In one approach, a browser might include a first graphical icon that corresponds to a traditional “back button” and a second graphical icon that corresponds to the built-in command. In this approach, the two graphic icons can be distinguished based on size, color, or placement on the display screen. In another approach, a browser might include a single graphical icon that corresponds to a combination of a conventional “back button” and the built-in command. In one example, a graphical icon might include a portion for selecting functionality traditionally associated with a backward navigation control and a second portion for selecting the embedded command. In another example, the control corresponding to functionality traditionally associated with a backward navigation control is embedded as a small back button icon that can be at least partially superimposed on a larger icon corresponding to the embedded command. [0020] According to another illustrative example, a user accesses one or more web pages using a computing device that has a touch user interface. When the user is accessing a specific web page, the user decides that he or she wants not only to return to a previously accessed web page, but that the information associated with the current web page is removed by the browser. Instead of manipulating any kind of graphic icon, the user makes some kind of gesture on the touch interface (eg a swipe pattern) or selects a quadrant of the touch interface (eg hold a finger down for a while predetermined). Based on the gesture, the browser, without any further interaction from the user, deletes all access information on the computing device corresponding to the current web page and accesses the previously accessed web page. [0021] According to a further illustrative example, a user accesses one or more web pages using a computing device that has audio input (eg a microphone). When the user is accessing a specific web page, the user decides that he or she wants not only to return to a previously accessed web page, but that at least some or all of the information associated with the current web page is removed by the browser. In this example, to initiate the built-in command control, the user utters a predetermined phrase, such as “go back and forget”. Based on processing and matching the received voice data, the browser, without any further interaction from the user, deletes at least part or all of the information corresponding to the current web page and accesses the previously accessed web page. [0022] With reference to yet another illustrative example, a user initiates a request for a web page using a browser. In this example, the request for the web page is transmitted to a network-accessible computing provider that starts a network-based virtual machine instance that requests the web page on behalf of the client computing device through a browser running on the virtual machine instance. The browser running on the virtual machine instance works in combination with the browser on the client's computing device to render content associated with the current web page. During a specific browsing session, the user uses traditional browsing controls to access one or more web pages, the information of which is held as browser access information on both the client computing device and the virtual machine instance. At some point, the user selects or starts a control corresponding to the built-in command (eg selecting a graphic icon) and the browser, without any further interaction from the user, deletes all access information corresponding to the web page current maintained on the client computing device. Additionally, the browser passes a notification to the virtual machine instance to cause the same processing as the embedded command received in the browser running on the virtual machine instance. [0023] As used herein, information collected or generated by the browser or client computing device while accessing network resources will be collectively referred to as "browser access information." However, reference to “browser access information” does not indicate any limitation with respect to any single type or specific instance of information or any combination of information. Additionally, although several examples in the detailed description describe removal of browser access information, any modification of the information that effectively removes any history of the computer system accessing the network resource is considered. For example, modifications such as deleting, encrypting or obscuring browser access information are considered. Browser access information could also be modified by moving it to another location (for example, to a location not accessible by the browser). Additionally, reference to "client computing device" will not necessarily be limited to any specific type of device or the illustrative examples of devices described herein. Still further, reference to “browser” will not necessarily be limited to any type of software application and does not preclude incorporating aspects of the present disclosure into other types of software applications or operating system functionality. For example, although a browser app is used to describe various modalities the app can be, among others, an app dedicated to browsing content from a specific mobile content provider as commonly used on mobile devices, tablets, e-readers and the like . Although aspects of the present disclosure are described in relation to an illustrative network environment and component interactions, flowcharts, graphic icons and user interfaces, a person skilled in the relevant art will recognize that the disclosed modalities are illustrative in nature and should not be construed as limiting. [0024] Figures 1(a) - 1(c) represent example user interfaces generated by a browser 50 to present one or more controls corresponding to an embedded command to remove information associated with a current network resource and access a resource previously accessed network. Referring to Fig. 1(a), in one embodiment, a user interface 52 generated by browser 50 displays a set of selectable controls (eg, buttons) that are presented to users as they access a network resource. The set of controls may include a first control 54 reflective of a command to access a previously accessed network resource without deleting any browser access information (e.g., a conventional "back button"). The set of controls also includes a second separate control 56, labeled “FORGET”, reflective of a built-in command to remove information associated with a current network resource and access a previously accessed network resource. User interface 52 may also include an additional control 58, such as a conventional forward button, for additional navigation control to access a network resource in the forward direction of a user's access history. Browser access information 60 represents information stored on a client computing device (not shown) regarding access to a specific network resource (eg, user identification information, account identification information, cookies, electronic tokens, cached and similar content). For example, in Figure 1(a), a user searched information regarding the “ORANGE CAT” on the network resource www.cats.com and the results were delivered to www.cats.com/search_results.html. Block 62 represents the electronic artifacts left behind in browser access information from accessing that page. These artifacts can include, for example, cached search results as depicted in Figure 1(a) and an access history of that network resource. A user then selects, with cursor 64, a hyperlink representing the search result for “Tabby cat”, which has an associated network resource identifier of www.spam.com/tabby.html. [0025] Figure 1(b) represents the resulting web page provided by accessing www.spam.com/tabby.html. The network page includes text and an image represented as content 66. In this illustrated example, the text indicates that the user is the one millionth viewer of the network resource and that he or she has won a prize. Content 66, among other user access information (ie, history information, cookie information, etc.) can be stored in the browser access information 60 represented by block 68. In this example, when the web page is displayed the user may perceive that he or she is not interested in this web page and may even be concerned that the web page includes malicious content. As such, the user can select control 56 labeled “FORGET” to return to the search results and remove any electronic artifacts related to accessing at least that web page. As described above, control 56 is reflective of a built-in command to remove information associated with a current network resource and access the previously accessed network resource. [0026] Therefore, figure 1© represents a user interface as represented after the user selects the embedded command. Specifically, search results on the previously accessed network resource (www.cat.com/search_results.html) are shown. However, the browser access information 60 from block 68 (figure 1(b)) has been removed, thereby leaving no electronic artifacts such as content 66 (figure 1(b)), based on access from www.spam.com /tabby.html. In this way, the user's selection of the built-in command deletes the browser access information 60 related to the network resource from the computing device in such a way that it appears as if the user has never accessed the web site www.spam.com/ tabby.html. [0027] Referring now to Fig. 2(a), an illustrative block diagram of a content delivery environment 100 for accessing network resources and managing access information associated with accessing network resources will be described. As illustrated in Figure 2(a), content delivery environment 100 includes a number of client computing devices 102 for requesting network resources from content providers 110. In an illustrative embodiment, client computing devices 102 may match a wide variety of computing devices including personal computing devices, laptop computing devices, handheld computing devices, terminal computing devices, mobile devices (eg cell phones, tablet computing devices, ebook readers , etc.), wireless devices, various electronic devices and appliances, and the like. Content delivery environment 100 can include any number of and types of client computing devices 102. [0028] In an illustrative embodiment, client computing devices 102 include hardware and software components necessary to establish communications over a communication network 116, such as a remote area network or local area network. For example, client computing devices 102 can be equipped with networking equipment and browsers that facilitate communications over the Internet or an intranet. [0029] Illustratively, client computing devices 102 may have varied local computing resources such as central processing units and architectures, memory, mass storage, graphics processing units, communication network availability and bandwidth, etc. . genetically, however, each client computing device 102 may include one or more processing units, such as one or more CPUs. The client computing device 102 may also include system memory, which may correspond to any combination of storage mechanisms. volatile and/or non-volatile. System memory can store information that provides an operating system component, various program modules, program data, or other components. The client computing device 102 performs functions by utilizing the processing unit(s) to execute instructions provided by system memory. The client computing device 102 may also include one or more input devices (keyboard, mouse device, specialized selection keys, touch screen interface, pen, etc.) and one or more output devices (displays, printers, audio output mechanisms, etc.). The client computing device 102 may also include one or more types of removable storage and one or more types of non-removable storage. Still further, client computing device 102 may include communication components to facilitate communication via wired and wireless communication networks, such as wireless communication network 116. [0030] As illustrated in Figure 2(a), client computing devices 102 may include, among other hardware or software components, a browser 104 to facilitate access to network resources such as web pages provided by the content provider 110. Browser 104 may be a standalone software application or be integrated in combination with other software applications, software components, or operating environments. Alternatively, the software browser application can be a monolithic application, that is, the software browser application can include data access instructions. In this exemplary embodiment, the software browser application can run directly on the hardware of computing device 102 and an operating system is not required. Illustratively, browser 104 includes an input interface component 106 to obtain information associated with selecting input from various users and determining whether the input corresponds to a built-in command to remove information associated with a current network resource and display and/or access a previously accessed network resource. The input interface component 106 is further operable to transmit notifications, to an entity, of the selection of an embedded command to delete information associated with a current network resource and display and/or access a previously accessed network resource. The entity could be, for example, the content provider of the current network resource, an entity that aggregates information associated with the embedded command, or a network-accessible computing provider that runs at least a portion of the browser, among other possibilities. Browser 104 also includes an information management component 108 to process requests to implement a built-in command to delete information associated with a current network resource and display and/or access a previously accessed network resource. Although the input interface component 106 and the information management component 108 are illustrated as logically included in the browser 104, the components can be implemented in other software applications, combined or implemented as separate, independent software applications. [0031] Content delivery environment 100 may also include one or more content providers 110 in communication with one or more client computing devices 102 or other service providers via communication network 116. Content provider 110 illustrated in Figure 2(a) corresponds to a logical association of one or more client computing devices. Specifically, in some embodiments, content provider 110 may include a web server 112 corresponding to one or more server computing devices to obtain and process requests for content (such as web pages or web service information) from the client computing devices 102. A person skilled in the relevant art will recognize that the content provider 110 may be associated with various additional computing resources, such as additional computing devices for managing content and resources, name service name servers and domain (DNS), application servers, Proxy servers and the like. For example, although not illustrated in Figure 2(a), content provider 110 may be associated with one or more DNS name server components that would be authoritative to resolve client computing device DNS queries corresponding to a domain of the content provider. Although only a single content provider 110 is illustrated in Figure 2(a), the content delivery environment 100 can include any number of content providers, including multiple groupings of content providers. For example, other content providers may match an entity such as a network-based service provider, such as search service providers (eg search engines), content management service providers, content delivery service providers. content and the like. [0032] With continued reference to Fig. 2(a), the content delivery environment 100 may include a number of other entities such as 118 network-based service providers. 118 Network-based service providers may be, for example , other content providers (eg search service providers, e-commerce sites, blogs, etc.), content management service providers, content delivery service providers, entities that aggregate information associated with commands integrated systems used by users and the like. [0033] Referring now to Figures 2(b) and 2(c), the integration between various components of the content delivery environment 100 of Figure 2(a) will be illustrated. Specifically, Figure 2(b) illustrates the interaction between various components of the content delivery environment 100 for exchanging content between a client computing device 102 and a content provider 110 via communication network 116. Figure 2 (c) illustrates the interaction between various components of content delivery environment 100 with respect to processing an embedded command to remove information associated with a currently accessed network resource and display a previously accessed network resource. For the purposes of the example, however, the illustration has been simplified such that many of the components used to facilitate communications are not shown. A person skilled in the relevant art will recognize that such components can be used and that additional interactions would therefore occur without departing from the spirit and scope of the present disclosure. [0034] Referring to Fig. 2(b), illustratively, a client computing device 102 initiates a request (1) for content by identifying a desired network resource, such as by identifying a specific URL. In one example, browser 104 takes input from a specific URL to access. In one example, the URL is entered using a keyboard associated with client computing device 102. In another example, a user can manipulate a graphical user interface to select an object, such as a selection from an embedded hyperlink or selection from an entry in a “Favorites” listing. Manipulation of the graphical user interface results in browser 104 receiving or remembering information (e.g., the URL or network address) used to access the desired network resource. As illustrated in Figure 2(b), the request for content is received by an appropriate content provider 110 and processed to provide (2) the requested network resource. [0035] After accessing the network resource (e.g., a web page, document, video object, audio object, etc.) and receiving any associated content from the content provider 110, the client computing device 102, through browser 104, begins to collect (3) various information related to accessing the specific network resource. As described above, such information may be generically referred to as browser access information (or access information). Illustratively, browser access information may include the URL, or other network resource identifier, which may then be added to a history of URLs maintained by browser 104. Browser access information may also include user identification information or account identification information provided by content provider 110 or generated on behalf of a user/user account associated with client computing device 102. Examples of account or user identification information may include display preferences, user preferences content filtering, cookies, electronic tokens and the like. Browser access information may further include information associated with the presentation of content on the client computing device 102 or with interacting with the network resource, including, but not limited to, shape data, password data, text and images downloads, advertisements, video content and the like. [0036] Referring to Figure 2(c), at some point after accessing the network resource and collecting the browser access information, the browser 104 gets (4) an input from a user that is interpreted as a command selection built-in to remove information associated with a current network resource and display and/or access a previously accessed network resource, which, as previously described, will be referred to as the built-in command. Responsive to embedded command selection, browser 104 removes (5), or causes to be removed, at least a subset of the browser access information collected by the browser and associated with the currently accessed network resource. Illustratively, the selection of the information (or type of information) that will be removed can be made according to configuration information provided by a system administrator or user. Browser 104 may cause the deletion of browser access information collected during the most recent access to the current network resource. Additionally, browser 104 can cause the deletion of browser access information collected during all previous accesses to the current network resource using a single action by the user. [0037] In addition to deleting selected browser access information, browser 104 may request (6) a previously accessed network resource, such as the network resource that immediately preceded the current network resource, or some other specified network resource , as one associated with a browser “home” Page. Browser 104 may be able to display and/or access previously accessed network resource, at least in part, using cached information and Proxy server components. Thus, in some modalities accessing previously accessed network resources causes the browser to retrieve the content provider's network resource again before displaying it. However, in some embodiments the browser retrieves the previously accessed network resource from its internal cache and/or intermediate client computing devices instead of accessing the network resource by retrieving it over the network (again) from the content provider. For example, suppose that access information for the current network resource and access information for the previously accessed network resource are stored in client computing device 102. In this specific example, if the built-in command is selected, the access information The browser settings associated with the current network resource are deleted and access information for the previously accessed network resource is used to return the browser 104 to the previously accessed network resource. [0038] As further illustrated in Figure 2(c), the browser 104 can transmit (7) one or more notifications indicative of the receipt and determination of an embedded command to one or more specific entities, such as content providers or other service providers network-based. In one example, notification may be transmitted to content provider 110 associated with the current network resource or one or more other network-based service providers 118, such as a search provider or reporting service. The search provider may be a search engine that uses the information to, among other things, help determine search results relevant to specific keyboards. The reporting service may collect information about notifications and provide that information to other entities. In some embodiments other entities can subscribe to the reporting service to determine periodically (or in real time) which of their own network resources or the resources of others have been subjected to the use of the integrated command by various users. Notifications could be sent in real-time (for example, substantially close to the time when the embedded command was selected) or could be sent at some time substantially after the time the embedded command was selected on the client computing device. In modalities where notifications are sent sometime substantially after the time the embedded command has been selected, notifications can be sent as a batch (for example, once or a few times a day, among other possibilities). [0039] Referring now to Figure 3(a), an illustrative block diagram of another embodiment of a content delivery environment 100 for accessing content provider network resources 110 and managing information associated with accessing the network resources will be described. As illustrated in Figure 3(a), the content delivery environment 100 includes a number of client computing devices 102 for requesting content from content providers 110. In an illustrative embodiment, the client computing devices 102, service providers content 110 and network-based service providers 118 can operate in a mode substantially similar to the functionality discussed with respect to Figure 2(a). [0040] With continued reference to Figure 3(a), the content delivery environment 100 may also include a network accessible computing provider 120 in communication with one or more client computing devices 102, the content provider 110, and the network-based service provider 118 via the communication network 116. The network-accessible computing provider 120 is a logical association of one or more computing devices 122 associated with a network-accessible computing provider 120. Specifically, the network accessible computing provider 120 may include a number of Point of Presence (POP) locations that correspond to nodes on the communication network 116. Each POP includes a network computing component (NCC) for hosting applications such as hosting applications. streaming data, among others, through a number of instances of a virtual machine 124, generically referred to as an instance of an NCC. [0041] A person skilled in the relevant art will recognize that NCCs utilize physical computing device resources and software to provide multiple instances of a virtual machine or dynamically cause the creation of instances of a virtual machine. As applied in the present disclosure, the virtual machine instances run a browser 126 that is in communication with the browser 104 on the client computing device 102. In this embodiment, the browser running on the virtual machine instance works in combination with the browser 104 on the client computing device 102 for processing content retrieved from content provider 110. NCCs may further include additional hardware or software components that facilitate communications including, but not limited to, load-sharing or load-balancing hardware or software components to select instances of a virtual machine supporting a requested application or providing information to a DNS name server to facilitate request routing. While NCC embodiments are described as utilizing virtual machines to host browsers 126 in communication with browser 104 on the client computing device, in some embodiments browsers may be hosted on physical (non-virtual) machines as computing device 122. [0042] Referring now to Figures 3(b)-3(d), the interaction between various components of the content delivery environment 100 of Figure 3(a) will be illustrated. Specifically, Figure 3(b) illustrates the interaction between various components of the content delivery environment 100 for exchanging content between a client computing device 102, network accessible computing provider 120, and a content provider 110 via of the communication network 116. Figures 3(c) and 3(d) illustrate the interaction between various components of the content delivery environment 100 with respect to processing an embedded command to remove information associated with a currently accessed network resource and access a previously accessed network resource. For the purposes of the example, however, the illustration has been simplified such that many of the components used to facilitate communications are not shown. A person skilled in the relevant art will recognize that such components can be used and that such additional interactions would occur, therefore without departing from the spirit and scope of the present disclosure. [0043] Referring to Fig. 3(b), illustratively, a client computing device 102 initiates a request for a network resource by identifying the network resource, such as via a URL. As previously described, in one example, browser 104 receives input from a specific URL to access, such as through a keyboard associated with client computing device 102. In another example, a user can manipulate a graphical user interface to select a URL from a previously accessed web page such that browser 104 receives the information required to access the web resource. In Figure 3(b), the request for the network resource is handled partially by browser 104 of client computing device 102 and partially by browser 126 residing at network-accessible computing provider 120, where both operate together in combination. , to retrieve and display the network resource on the client computing device 102. [0044] As illustrated in Figure 3(b), the network resource request is transmitted (1) by the client computing device 102 and received by the network accessible computing provider 120, which processes (2) the resource request network. In one embodiment, network accessible computing provider 120 may instantiate a virtual machine instance 124 to run a browser 126 that will work in parallel with browser 104 to present content associated with the network resource for display. In another embodiment, the network accessible computing provider 120 may already have an instantiated virtual machine instance 124 to process the network resource request. Thereafter, a network resource request is transmitted (3) to an appropriate content provider 110 and processed by the content provider to provide the requested network resource to the network-accessible computing provider 120 and the client computing device 102 Illustrative modalities for accessing browser-based content running on client computing devices 102 and network accessible computing provider components 120 are described in co-pending and commonly owned US patent application 13/174,615 entitled "Remote browsing session management, ” filed June 30, 2011, and incorporated by reference in its entirety here. [0045] Referring to Fig. 3(c), the network resource is transmitted (4) from the content provider 110 to the network accessible computing provider 120. The network accessible computing provider 120 processes (5) the resource network by performing various operations described in previously incorporated US patent application 13/174,615. In some embodiments, browser 126 running on computing device 122 of network-accessible computing provider 120 collects and stores some browser access information (not shown). The network resource, portions thereof, or an image representing the network resource is then transmitted (6) to the client computing device 102. The client computing device 102 collects (7) various related browser access information accessing the network resource. Illustratively, browser access information collected at network accessible computing provider 120 and/or client computing device 102 may include storing the URL, or other network resource identifier, for a history of URLs maintained by browser 104 The browser access information may also include user identification information or account identification information provided by content provider 110 or generated on behalf of a user/user account associated with client computing device 102 (e.g., preference data, cookies, etc.) Browser access information may further include information associated with the presentation of content on the client computing device 102 or interaction with the network resource, including, but not limited to, form data , password data, downloaded images and text and the like. [0046] Referring to Figure 3(d), at some point after accessing the network resource and collecting the browser access information, the browser 104 gets (8) an input from a user that is interpreted as a selection from the built-in command to remove information associated with a current network resource and access and/or display a previously accessed network resource. Responsive to embedded command selection, browser 104 removes (9), or causes to be removed, at least a subset of the browser access information collected by the browser and associated with the currently accessed network resource. Illustratively, the selection of access information (or type of access information) that will be deleted can be done according to configuration information provided by a user or system administrator. As previously described, browser 104 may cause the removal of browser access information collected during the most recent access to the current network resource (that is, only the access information for the most recently visited network resource). Additionally, browser 104 may cause the deletion of browser access information collected during all previous access to the current network resource (e.g., including historical access to the network resource). In any situation, in some embodiments, removing browser access information can make it appear as if the user has never accessed the current network resource. In such an embodiment there are no electronic artifacts from accessing that network resource remaining on the client computing device 102, including any malicious software or viruses that were transmitted as part of the content associated with the current network resource. For example, malicious software could change registry settings and install programs. The built-in command can be coupled with a system recovery function that causes the client computing device to revert to a previously saved known healthy state. [0047] In addition to deleting selected browser access information, browser 104 lights and/or displays (10) a previously accessed network resource, such as the network resource that immediately preceded the currently accessed network resource. Browser 104 may be able to access previously accessed network resource, at least in part, using cached information and Proxy server components. As further illustrated in Figure 3(d), browser 104 transmits (11) a notification to network accessible computing provider 120, which processes the notification to remove (12) the same set of selected browser access information held in the network accessible computing provider 120 (e.g., in browser 126) and requests (13) the previous network resource. In a further embodiment, receiving notification at network accessible computing provider 120 may further result in modifying the sharing of processing tasks between browser 126 performed at network accessible computing provider 120 and browser 104 at client computing device 102 For example, browser 104 might assume that the user could have used the embedded command because they encountered an unreliable network resource. Therefore, the browser 104 can enter a "safe mode" in which the processing of all content is completed at the network-accessible computing provider 120 to prevent any malicious processing affecting the client's computing device 102. In such a mode, while the processing of the network resource takes place at the network-accessible computing provider 120, only one display of the content can take place at the browser 104 (e.g., via a remote desktop protocol, streaming video, or the like). Additionally, client computing device 102 or a computing device 122 of network accessible computing provider 120 may transmit (14) one or more notifications indicative of receipt of an embedded command for specific network resources. Notification may be transmitted to content provider 110 associated with the current network resource and/or one or more other network-based service providers 118, such as a search provider or reporting service. Notifications can be sent in real time (for example, substantially close to the time when the embedded command was selected) or they may be sent sometime after the time the embedded command was selected on client computing device 102. In some modalities, notifications can be sent as a batch (for example, once or a few times a day, among other possibilities). [0048] Turning now to Fig. 4, a routine 300 for processing embedded commands to remove information associated with a current network resource and access a previously accessed network resource will be described. Illustratively, routine 300 will be described as being implemented by a browser 104 (FIG. 2(a)) in a client computing device 102 (FIG. 2(a)). However, a person skilled in the relevant art will recognize that routine 300, or portions thereof, may be implemented by one or more additional components of a content delivery environment 100 (figure 2(a)). [0049] At block 302, browser 104 obtains user input or user input indications as through information provided to input interface component 106. In one embodiment, user input may correspond to a selection of a graphic icon or control provided by, or otherwise associated with, browser 104. Example graphic icons and controls that are associated with browser 104 will be described with reference to Figures 5(a)-5(c). In another modality, user input can correspond to a manipulation of various touch screen interfaces. An example user interface related to touch screen interfaces will be described with respect to Figure 5(f). In an additional modality, user input can correspond to hardware controls such as dedicated hardware button or custom hardware control. In yet another modality, the input can correspond to audio commands or video-based commands. A person skilled in the relevant art will recognize that additional or alternative inputs can also be implemented. [0050] In decision block 304, a test is performed to determine whether the received input corresponds to an embedded command to remove information associated with a current network resource and access a previously accessed network resource. In one modality, if a graphic icon is exclusively reflected from the built-in command to remove information associated with a current network resource and access a previously accessed network resource, a graphic icon selection is indicative of the built-in command selection. In another embodiment, if a graphic icon combines multiple controls into distinct portions, the input interface component 106 can conduct further processing to determine whether or not the selection corresponds to a selection of an embedded command. For example, if the combined graphic icon includes multiple distinct portions, a selection of the appropriate portion will be indicative of the selection of the embedded command. In another example, a period of time in which a combined graphic icon is selected via a user interface, such as via a mouse interface or a torque-sensitive screen interface, may be indicative of the selection of the integrated command. In this example, the input interface component 106 (Figure 2(a)) can establish one or more location and time limits that are applied to determine whether the period of time an icon is selected is indicative of a command selection. integrated. [0051] In a further embodiment, the input interface component 106 can use additional data processing techniques such as voice data processing, pattern matching, video matching and the like to determine whether the received user input is indicative of a selection of the built-in command. For example, the input interface component 106 may have video pattern processing functionality that can detect user movements and attempt to match the detected movements to a predetermined pattern indicative of a selection of the embedded command. In yet another embodiment, the input interface component 106 can set one or more timing thresholds or implement various pattern-matching routines that process inputs from a touch-screen interface. For example, input interface component 106 may have a location and time limit that is applied to determine whether a consistent touch of the screen (for example, holding a stylus or finger on the touchscreen interface for more than 2 seconds ) is indicative of a selection of the integrated command. [0052] If in decision block 304, the input is not indicative of a selection of an embedded command to remove access information associated with a current network resource and access a previously accessed network resource, in block 306, browser 104 processes the other input. For example, the entry may only correspond to a selection of a "back button" in which browser 104 would access a previously accessed network resource without selectively deleting browser access information. A person skilled in the relevant art will recognize that the type and processing of other input may vary with specific implementations of browser 104. Routine 300 then ends at block 314. [0053] Alternatively, if in decision block 304, the input is indicative of a control selection or icon corresponding to an embedded command, in block 308, the browser 104 obtains configuration information associated with the embedded command. Specifically, in one embodiment, the configuration information can include a specification of the type of browser access information that should be deleted or otherwise removed. For example, a user can configure the browser to delete all collected browser access information. In another example, the user can configure the browser to delete the URL history entry and any stored personal information, but allow cached images and text to remain behind. In some embodiments, browser 104 may be configured with default settings, which may or may not be capable of adjustment by a user or system administrator. [0054] In block 310, the browser 104, through the information management component 108 (figure 2(a)), processes the browser access information according to the configuration information. In one aspect, deleting or removing browser access information can correspond to deleting one or more URLs in a history of accessed network resources, identifiers associated with network resources (eg cookies), shape data, data of password, cached images or data and the like. In another aspect, at least a portion of the browser access information can be maintained for information that can be associated with multiple previously accessed network resources (eg, a company logo) or that has otherwise been selected to avoid deletion. For example, a content provider 110 may associate metadata with selection content, such as images, text, or data that identifies the selected content as content that must persist regardless of a received embedded command. As previously described, the information management component 108 can cause the deletion of browser access information collected only during the most recent access to the current network resource. Additionally, browser 104 may cause the deletion of browser access information collected during all previous accesses to the current network resource or during a specific browsing session. [0055] In block 312, the browser 104, through the interface component 106, transmits any optional warnings or notifications. As previously described, client computing device 102, directly or through network accessible computing provider 120, may transmit one or more notifications indicative of receipt of an embedded command for specific network resources. The notification may be transmitted to the content provider 110 associated with the current network resource or one or more network-based service providers 118 (Figure 2(a)), such as a search provider, reporting service or accessible computing provider per network 120 (figure 3(a)). Additionally, steps can be taken at this point in the process, or earlier to request a previously accessed network resource or some other specified network resource (not shown). At block 314, routine 300 ends. [0056] Figures 5(a)-5(f) are illustrative block diagrams of various user interfaces generated by a browser 104 to present, among other controls, one or more graphic icons or controls corresponding to a built-in command to remove information associated with a current network resource and accessing a previously accessed network resource. Referring to Figure 5(a), in one embodiment, a user interface 400 generated by a browser 104 displays a set of selectable controls (e.g., buttons) that are presented to users as they access a network resource. The set of controls may include a first control 402 reflective of a command to access a previously accessed network resource without deleting any browser access information (e.g., a conventional "back button"). The set of controls also includes a second separate control 404, labeled “FORGET”, reflected from a built-in command to remove information associated with a current network resource and access a previously accessed network resource. User interface 400 may also include an additional control 406, such as a conventional forward button, for additional navigation control to access a network feature in the forward direction. As illustrated in Figure 5(a), the 402, 404, and 406 controls include both graphics and text to indicate to a user the intended configuration of the respective control. [0057] Referring to Figure 5(b), in another embodiment, the user interface 400 generated by a browser 104 displays a set of controls that are presented to users as they access a network resource. The control set includes a first control 408 reflective of a command to access a previously accessed network resource without deleting any browser access information. The controls also include a second control 410 reflective of an integrated command to remove information associated with a current network resource and access a previously accessed network resource. As illustrated in Figure 5(b), the first and second controls 408, 410 are more closely matched and can be covered in a single, multi-part control. User interface 400 may also include an additional control 412, such as a conventional forward button, for additional navigation control to access a network feature in the forward direction. As illustrated in Figure 5(b), the 408, 410, and 412 controls only include graphics to indicate to a user the intended configuration of the respective control. [0058] Referring to Figure 5(c), in another embodiment, the user interface 400 generated by a browser 104 displays a set of controls that are presented to users as they access a network resource. The set of controls includes a first control 414 reflective of a command to access a previously accessed network resource without deleting any browser access information. The controls also include a second control 416 reflective of an integrated command to remove information associated with a current network resource and access a previously accessed network resource. Unlike the examples in Figures 5(a) and 5(b), in this embodiment, the first control 414 is superimposed on the second control 416. In this embodiment, the input interface component 106 can determine whether the first control or second control has been selected according to a time when any portion of the combined graphic icon is selected. User interface 400 may also include an additional control 418, such as a forward button, for additional navigation control. As illustrated in Figure 5(c), controls 414, 416, and 418 include graphics only, with no associated text, to indicate to a user the intended configuration of the respective control. [0059] Referring to Figure 5(d), in a further embodiment, the user interface 400 generated by a browser 104 displays a set of controls that are presented to users as they access a network resource. The set of controls includes a first control 420 reflective of a command to access a previously accessed network resource without deleting any browser access information. The controls also include a second control 422 reflective of an integrated command to remove information associated with a current network resource and access a previously accessed network resource. Unlike the examples in Figures 5(a)-5(c), in this embodiment, the second control 422 is located in a different location on the user interface 400. The user interface 400 may also include an additional control 424, such as a forward button, for additional navigation control. As illustrated in Figure 5(d), controls 420 and 424 include graphics only, with no associated text, to indicate to a user the intended configuration of the respective control. The 422 control includes both graphic and associated text. [0060] Referring to Figure 5(e), in a further embodiment, the user interface 400 generated by a browser 104 displays a set of controls that are presented to users as they access a network resource. The set of controls includes a first control 426 reflective of a command for accessing a previously accessed network resource without deleting any browser access information and an additional control 428 for additional browsing control. The controls also include a third control 430 reflective of an integrated command to remove information associated with a current network resource and access a previously accessed network resource. Unlike the examples in Figures 5(a)-5(c), in this embodiment, the additional control 430 is located in a different location on the user interface 400 and associated with specific ears 432 of the screen display. As illustrated in Figure 5(e), additional control 430 is displayed on each tab 432 that is generated by browser 104. Additionally, controls 426-430 only include graphics to indicate to a user the intended setting of the respective control. In some embodiments control 430 may be configured to remove access information associated with all network resources accessed while the user navigated to associated tab 432 rather than removing the access information associated with only the currently accessed network resource. In such a mode, responsive to access information being removed, tab 432 can be closed and the browser then displays a second tab's network resource, or a new tab can be opened and a predetermined network resource (eg, a user home page) is displayed. Similar to modalities in which the control 430 removes access information associated with all network resources accessed while the user navigated the associated tab, the browser can be configured with a built-in command to close (eg exit) the browser application and remove access information associated with all network resources accessed while the user browsed in any ears while the browser application was open. Such a command could appear to the user in a menu option or a graphic icon in the browser structure similar to control 430. [0061] Referring to Figure 5(f), in an embodiment in which some portion of user interface 400 may correspond to a touch interface, browser 104 may use gestures or physical touch movements to obtain input indicative of a selection of the integrated control. As illustrated in figure 5(f), user interface 400 does not necessarily have any graphical icons or controls that are displayed to users as they access a network resource, like the controls illustrated in figures 5(a)-5(e ). In alternative modalities, however, one or more controls may be provided or displayed in combination with that modality. For example, a client computing device housing could include a physical button (not shown) and/or a control could be displayed by the touch interface (not shown) to allow the user to initiate the embedded command (eg activate the integrated command by pressing a button or clicking an icon). For purposes of an illustrative embodiment the user interface 400 may be divided into a number of sub-areas 434, 436 and 438 in which one-touch input may correspond to different commands. For example, subarea 434 can be configured such that any touch lasting longer than five seconds can correspond to a command to access a previously accessed network resource without deleting any browser access information. Subarea 436 can be configured such that any tap/entry lasting more than ten seconds can correspond to a built-in command to remove information associated with a current network resource and access a previously accessed network resource. In a further embodiment, subarea 438 may also be configured to accept user gestures or patterns (as illustrated at 440) that may be interpreted by input interface component 106 as indicative of one or more commands, such as the embedded command. [0062] In an illustrative modality, a network-based service provider 118, such as a search provider or classification service, can monitor the number of times a specific network resource has been the subject of an integrated command. Based on the number of embedded commands (cumulatively over a number of users) or a severity associated with a specific embedded command (assuming some type of metadata or feedback mechanism is provided) network resources can implement various mitigation or notification techniques . In one embodiment, the network-based service provider 118 may set one or more thresholds based on a number of built-in commands to determine whether to initiate additional actions or mitigation techniques. In one example, the network-based service provider 118 may set a maximum threshold which, when exceeded, causes the network-based service provider 118 to contact a respective content provider 110. In another example, the service-based provider Networking can modify the appearance of URLs or other network identifiers that allow the network-based service provider 118 to identify network resources that are most commonly the subject of an embedded command. For example, if a total of twenty thousand users viewed a specific network resource and ten thousand of those users used the built-in command after accessing it, the network service provider may change the URL color to a more prominent color (for example , red, orange, neon, etc.). In yet another example, if a specific network-based service provider 118 has financial dealings with multiple content providers 110, the network-based service provider 118 may initiate the modification of the financial fee for the one or more content providers 110 with based on the number or severity embedded commands associated with one or more embedded commands. [0063] Turning now to Figure 6, an embedded command processing routine 500 implemented by a network-based service provider 118 to process notifications of the selection of an embedded command to remove information associated with a current network resource and access a previously accessed network resource will be described. Routine 500 describes an embodiment in which a network-based service provider 118 implements various limits on a number of permissible notifications that may result in modifying how network identifiers are subsequently presented to users. [0064] At block 502, the network-based service provider 118 obtains a notification of the start of a built-in command to remove information associated with a current network resource and access a previously accessed network resource. The notification may be transmitted by a browser 104 or network accessible computing provider 120, as previously described. Illustratively, the notification can include an identification of the network resource identifier (eg, URL) that has been submitted to the embedded command. Additionally, the notification may include additional information about the navigation application 104 or user, including additional comments or explanations provided by the user. [0065] In decision block 504, a test is performed to determine whether notification for a specific network resource has exceeded one or more thresholds. In one modality, one or more thresholds can correspond to a total number of embedded commands received during a defined period of time. In another modality, one or more thresholds may correspond to a maximum severity rating that cannot be exceeded. If one or more thresholds are not exceeded, routine 500 returns to block 502 to expect any potential notifications from a browser. [0066] Alternatively, if one or more thresholds have been exceeded, at block 506, the network-based service provider 118 processes one or more network resource identifiers based on the threshold exceeded. In one embodiment, the network-based service provider 118 may modify the appearance of URLs or other network identifiers associated with specific network resources, such as through instructions provided to content providers 110 or browsers 104. An illustrative screen display for modifying the appearance of network resource identifiers is described with reference to Figure 7. In other embodiments, modifying the resource identifiers may correspond to toggling the appearance of the resource identifier when displayed as part of the retrieved network resource, such as color font, size and similar. In additional embodiments, the network-based service provider can cause a modification of various algorithms or criteria that can affect the selection of specific network resources or cause or instruct multiple content providers 110 to do so. For example, network-based service provider 118 may cause selecting the network identifier to display an alert message (eg, “A large number of users have removed access information about this network resource from their browsing history Are you sure you want to select this link ”). In yet another embodiment, network-based service provider 118 may cause or instruct multiple content providers 110 to remove one or more identifiers corresponding to specific network resources. Routine 500 returns to block 502 to wait for any potential notifications from browsers. [0067] Figure 7 illustrates a user interface 600 generated by a browser 104 to present identifiers indicative of network resources that have undergone selection of a built-in command to remove information associated with a current network resource and access a network resource previously accessed. Specifically, user interface 600 corresponds to search results provided by the network-based service provider 118, such as a search provider, which has received a search query from a client computing device 102, as illustrated in Fig. 7 , user interface 600 includes a first portion 602 that corresponds to the search query submitted to the search provider. Additionally, user interface 600 includes a listing of three network resources 604, 606 and 608 determined by the search provider to have some relevance to the search query. Additionally, search listing 608 is also associated with a graphic icon 610 that provides a user with additional information, such as a notice, that the network resource corresponding to the network resource identifiers has been associated with a limit number of built-in commands. In some embodiments this threshold may also reflect a percentage of hits that users accessed the network resource without using the built-in command versus the number of hits that users used the built-in command. Graphic icon 610 may also inform the user that he or she had previously used the built-in command with respect to that particular network resource, although this requires retaining some historical information regarding that user's access to that network resource. . In an additional or alternative modality the notice can be presented to the user in the browser itself as opposed to being superimposed on the displayed content. For example, the warning might be displayed with a 612 graphic icon in the browser framework as the notification tray. When a user hovers over or selects the graphic icon 612 a text box 614 may appear to display an alert such as “Caution! Many users have chosen to remove this site from their browser history after viewing it” or “Caution! You have previously removed this site from your browser history after viewing it.” [0068] According to another embodiment a search provider can implement functionality to fully remove the network resource identifier from the search results when a user uses the embedded command. For example, if a user is provided with the search results shown in Figure 7 and selects the network identifier 604 (www.fancycars.com), the browser 104 then accesses and displays the network resource located at www.fancycars.com. According to such an embodiment, if the user then selects the embedded command, the browser 104 notifies the search provider of that action. The search provider then interprets this action as an indication by the user that they are not interested in the information associated with that network resource subject to the embedded command. When browser 104 accesses previously displayed search results (as part of the built-in command) the search provider removes the network resource submitted to the built-in command and displays the remaining search results. Therefore, the search results would appear as shown in Figure 7 except that the www.fancycars.com URL is not displayed. Thereby, the search provider uses the built-in command notification to additionally remove the network resource identifier entirely from the user's view in any search results or, in some embodiments, for search results for the specific keyword used. [0069] Various modalities of disclosure can be described at least by the following clauses: [0070] Clause 1. Computing device configured to manage information associated with web pages comprising: one or more processors; and one or more computer readable media storing computer executable instructions which, when executed, cause one or more processors to perform acts comprising: receiving a command to display a previously accessed web page on the computing device and removing associated access information to a web page currently accessed from the computing device; and responsive to receiving the command: causing the removal of access information associated with the currently accessed web page from the computing device such that the computing device removes a record that the currently accessed web page was accessed; cause display of previously accessed web page; and transmitting a notification to at least one other entity reporting an indication of receipt of the command and an identification of the currently accessed web page. [0071] Clause 2. Computing device as recited in Clause 1, wherein transmitting the notification to at least one other entity includes transmitting a notification to at least one of: an entity associated with the currently accessed network resource; an entity associated with a network-accessible computing service; an entity associated with a reporting service; and an entity accessed to a search service. [0072] Clause 3. Computing device, as recited in Clause 1, in which one or more computer readable media stored executable instructions which, when executed, cause one or more processors to receive a navigation command to cause display of a previously accessed web page without removing access information associated with the currently accessed web page. [0073] Clause 4. Computing device, as recited in Clause 1, wherein the removal of access information includes the removal of one or more network resource identifiers associated with the currently accessed web page from a history of software application, user ID associated with the currently accessed web page and content previously requested in accessing the currently accessed web page. [0074] Clause 5. Computer implemented method for managing information associated with network resources comprising: under control of one or more processors configured with specific executable instructions; determining whether a single entry corresponds to a command to (i) remove access information associated with accessing a first network resource and (ii) display a second network resource; and responsive to determining that the single entry corresponds to the command to remove access information and display the second network resource: cause the display of the second network resource; and cause access information removal indicating that the first network resource was accessed. [0075] Clause 6. Computer-implemented method of Clause 5, wherein the first network resource is a currently accessed network resource and the second network resource is a network resource that is identified in a resource access history as being displayed immediately before the currently accessed network resource. [0076] Clause 7. Computer-implemented method of Clause 5, further comprising: determining whether at least one additional entry corresponds to a command to navigate to the network resource that is identified, in a network resource access history, as being displayed immediately before the currently accessed network resource without deleting information associated with the currently accessed network resource. [0077] Clause 8. Computer-implemented method of Clause 5, wherein the first network resource is a currently accessed network resource and the second network resource is a network resource that is identified in a resource access history as displayed immediately after the currently accessed network resource. [0078] Clause 9. The computer-implemented method of Clause 8, further comprising: determining whether at least one additional entry corresponds to a command to navigate to the network resource that is identified, in a network resource access history, as being displayed immediately after the currently accessed network resource without deleting information associated with the currently accessed network resource. [0079] Clause 10. Method implemented by computed of Clause 5, in which the single input corresponds to a single integrated action to perform both causing the display of the second network resource and causing removal of access information indicating that the first network resource has been accessed. [0080] Clause 11. Computer-implemented method of Clause 5, in which causing removal of access information indicating that the first network resource was accessed includes causing removal of a software application history of at least one of: an identifier of network resource of the first network resource; account identifiers associated with the first network resource; user identifiers associated with the first network resource; and content associated with the first network resource identifier. [0081] Clause 12. The computer-implemented method of Clause 11, wherein the content associated with the first network resource identifier includes at least one of information, password information, images and text. [0082] Clause 13. Computer-implemented method of Clause 5, further comprising responsive to determining that the single input corresponds to the command to remove access information and display the second network resource: transmitting a notification to at least one provider network-based service. [0083] Clause 14. The computer-implemented method of Clause 13, wherein transmitting the notification to at least one network resource-based service provider includes transmitting a notification to at least one of: a content provider associated with the first resource network: a network-accessible computing provider; a network resource associated with a reporting service; and a network resource associated with a search service. [0084] Clause 15. Computer-implemented method of clause 5, in which causing removal of access information indicating that the first network resource was accessed includes: obtaining configuration information, the configuration information identifying information that will be removed in response to single entry; and cause removal of access information according to the configuration information. [0085] Clause 16. Computer-implemented method of Clause 5, wherein the single input corresponds to at least one of a control button selection, a touch interface selection, a hardware control selection and a voice command. [0086] Clause 17. The computer-implemented method of Clause 5, wherein determining whether the single input corresponds to the command to remove access information and display a second network resource includes determining a time period in which a touch interface has been accessed. [0087] Clause 18. The computer-implemented method of Clause 5, wherein determining whether the single input matches the command to remove access information and display a second network resource includes determining whether a pattern associated with a substantially touch interface home with a previously determined pattern. [0088] Clause 19. Computer readable storage media which stores computer readable instructions which, when executed, instruct a processor to perform a method comprising: presenting, for displaying on a computing device, a selectable first component for displaying a first resource network and modify information associated with a second network resource; and responsive to an input corresponding to a selection of the first selectable component: causing processing of the display of the first network resource; and cause information associated with the second network resource to be modified. [0089] Clause 20. The computer readable instructions of Clause 19, wherein the first selectable component is operative solely to initiate a command to display the first network resource and modify information associated with the second network resource. [0090] Clause 21. The computer readable instructions of Clause 19, wherein the first selectable component is operative to initiate a command to display the first network resource, modify information associated with the second network resource, and at least one additional command. [0091] Clause 22. Computer-readable instructions of Clause 19, wherein causing information associated with the second network resource to be modified includes modifying the information to remove information indicating that the computing device has accessed the second network resource. [0092] Clause 23. Computer-readable instructions of Clause 19, wherein causing information associated with the second network resource to be modified includes at least one of: deleting the information; encrypt the information; and obscuring information. [0093] Clause 24. Computer readable instructions of Clause 19, wherein the first network resource is a previously accessed network resource and the second network resource is a currently accessed network resource. [0094] Clause 25. Computer readable instructions of Clause 19, wherein the first network resource is a predefined network resource and the second network resource is a currently accessed network resource. [0095] Clause 26. The computer readable instructions of Clause 19, further comprising instructions to: present, for display on the computing device, a second selectable component for displaying the first network resource without removing the information associated with the second network resource; and responsive to an input corresponding to a selection of the second selectable component, causing the display of the first network resource to be processed without deleting the information associated with the second network resource. [0096] Clause 27. Computer Readable Instructions of Clause 19, in which causing information associated with the second network resource to be modified includes causing removal of access information from the computing device and a content provider that provided the second network resource to the computing device. [0097] Clause 28. Computer-readable instructions of Clause 27, in which causing removal of access information from the content provider includes: providing a notification to the input-responsive content provider corresponding to the selection of the first selectable component. [0098] Clause 29. Computer-implemented method for managing information associated with network resources comprising: receiving, at a network-based service provider, a notification from a computing device that a single input corresponding to a command to (i) removing access information associated with accessing a first network resource and (ii) displaying a second network resource has been selected, the notification including an identification of the first network resource; and responsive to receipt of referrals, storing a record of the referral along with an identification of the first network resource. [0099] Clause 30. The computer-implemented method of Clause 29, further comprising: determining whether a number of indications received by the network-based service provider has reached at least one threshold; and responsive to the number of referrals that reach at least a threshold initiating an action by the network-based service provider. [0100] Clause 31. The computer-implemented method of Clause 30, wherein the initiation of an action by the network-based service provider includes at least one of: notifying a content provider of the first network resource that the amount of indications received by the network-based service provider has reached at least one threshold; and cause an indication to be displayed on the computing device that the amount of indications received by the network-based service provider has reached the limit. [0101] Clause 32. Computer-implemented method of Clause 29, further comprising: causing the removal of access information associated with accessing the first network resource from the network-based resource provider. Clause 33. The computer-implemented method of Clause 29, wherein the network-based service provider is at least one of: a content provider associated with the first network resource; a network-accessible computing provider; a network resource associated with a reporting service; and a network resource associated with a search service. [0102] Clause 34. Computer-implemented method of Clause 29, wherein the network resource-based service provider is a network-accessible computing provider that runs at least a portion of a browser application in combination with a second application browser on the computing device to display the first and second network resources. [0103] Although illustrative modalities have been disclosed and discussed, a person skilled in the relevant art will recognize that additional or alternative modalities may be implemented understood within the spirit and scope of the present disclosure. Additionally, although many modalities have been indicated as illustrative, a person skilled in the relevant art will recognize that the illustrative modalities need not be combined or implemented together. As such, some illustrative embodiments need not be used or implemented in accordance with the scope of variations of the present disclosure. [0104] Conditional language, such as, among others, "may", "could", unless specifically mentioned otherwise, or otherwise understood in the context as used, is generically intended to convey that certain modalities include, while others modalities do not include certain features, elements or steps. Thus, such conditional language is not generally intended to indicate which features, elements or steps are in any way necessary for one or more modalities or that one or more modalities necessarily include logic to decide, with or without user input or prompting, if these features, elements or steps are included or must be carried out in any specific modality. Furthermore, unless specifically mentioned otherwise, or otherwise understood in the context as used, it is generally intended to pass on the use of the conjunction "or" in enumerating a list of elements does not limit the selection of only a single element and can include a combination of two or more elements. [0105] Any descriptions of processes, elements or blocks in the flowcharts described here and/or represented in the attached figures should be understood as potentially representing modules, segments, or portions of code that include one or more executable instructions to implement specific logic functions or steps in the process. Alternative implementations are included in the scope of the modalities described here in which elements or functions can be deleted, performed out of order from that shown or discussed, including substantially simultaneously or in reverse order, depending on the functionality involved, as would be understood by those skilled in the art. It will be further recognized that the data and/or components described above may be stored on computer readable medium and loaded into the memory of the customer's computing device using a drive mechanism associated with a computer readable medium that stores the computer executable components , such as CD-ROM, DVD-ROM or network interface. Furthermore, the component and/or data may be included in a single device or distributed in any way. Accordingly, general purpose computing devices can be configured to implement the process, algorithms and methodology of the present disclosure with the processing and/or execution of the various data and/or components described above. Alternatively, some or all of the methods described herein may alternatively be incorporated into specialized computer hardware. Furthermore, the components mentioned here can be implemented in hardware, software, firmware or a combination thereof. [0106] It should be emphasized that many variations and modifications can be made in the modalities described above, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included within the scope of the present disclosure herein and protected by the following claims.
权利要求:
Claims (14) [0001] 1. Computing device (102) configured to manage information associated with web pages, characterized in that it comprises: one or more processors; and one or more computer readable media storing computer executable instructions which, when executed, cause one or more processors to perform acts comprising: receiving a command to display a previously accessed web page on the computing device (102) and removing information access points (60) associated with a web page currently accessed from the computing device (120); and responsive to receiving the command: causing the removal of the access information (60) associated with the currently accessed web page from the computing device (120) such that the computing device (120) removes a record that the currently accessed web page was accessed; cause display of previously accessed web page; and transmitting a notification to at least one other entity (110, 118) reporting an indication of receipt of the command and an identification of the currently accessed web page. [0002] 2. The computing device (120) of claim 1, characterized in that transmitting the notification to at least one other entity (110, 118) includes transmitting a notification to at least one of: an entity associated with the reporting resource. network currently accessed; an entity associated with a network-accessible computing service; an entity associated with a reporting service; and an entity accessed to a search service. [0003] 3. Computing device (120) according to claim 1, characterized in that one or more computer readable media storing executable instructions which, when executed, cause one or more processors to receive a navigation command to cause display of a previously accessed web page without removing access information (60) associated with the currently accessed web page. [0004] 4. Computing device (120) according to claim 1, characterized in that the removal of access information includes the removal of one or more network resource identifiers associated with the currently accessed web page from a software application history, user id associated with the currently accessed web page, and content previously requested in accessing the currently accessed web page. [0005] 5. Computer-implemented method for managing information associated with network resources, characterized by the fact that it comprises: under the control of one or more processors configured with specific executable instructions; determining whether a single entry corresponds to a command to (i) remove access information (60) associated with accessing a first network resource and (ii) display a second network resource; where the single entry is a single built-in action to perform both causing the display of the second network resource and removing access information (60) indicating that the first network resource has been accessed and responsive to the determination that the single entry corresponds to the command to remove the access information (60) and display the second network resource: cause the display of the second network resource; and cause removal of access information (60) indicating that the first network resource has been accessed; and transmitting the notification to at least one network-based service provider. [0006] 6. Computer-implemented method according to claim 5, characterized in that the first network resource is a currently accessed network resource and the second network resource is a network resource that is identified in an access history network resource, as displayed or immediately before the currently accessed network resource. [0007] 7. The computer-implemented method of claim 5, further comprising: determining whether at least one additional entry corresponds to a command to navigate to the network resource that is identified, in a resource access history network resource, as displayed immediately before the currently accessed network resource without deleting information associated with the currently accessed network resource. [0008] 8. The computer-implemented method of claim 5, further comprising: determining whether at least one additional entry corresponds to a command to navigate to the network resource that is identified, in a resource access history network resource, as displayed immediately after the currently accessed network resource without deleting information associated with the currently accessed network resource. [0009] 9. The computer-implemented method of claim 8, further comprising: determining whether at least one additional entry corresponding to a command to navigate the network resource that is identified, in a resource access history of network, as displayed immediately after the currently accessed network resource without deleting information associated with the currently accessed network resource. [0010] 10. Computer-implemented method according to claim 5, characterized in that causing removal of access information (60) indicating that the first network resource was accessed includes causing removal of a software application history of at least one de: a network resource identifier of the first network resource; account identifiers associated with the first network resource; user identifiers associated with the first network resource; and content associated with the first network resource identifier. [0011] 11. Computer-implemented method according to claim 5, characterized in that it causes removal of access information indicating that the first network resource was accessed includes: obtaining configuration information, the configuration information identifying information that will be removed in single input response; and cause removal of the access information (60) according to the configuration information. [0012] 12. Computer implemented method according to claim 5, characterized in that the single input corresponds to at least one of a selection of a control button (56), a selection of a touch interface, a selection of a hardware control and a voice command. [0013] 13. The computer-implemented method of claim 5, characterized in that determining whether the single input corresponds to the command to remove access information (60) and display a second network resource includes determining an amount of time that an interface Touchpad has been accessed. [0014] 14. The computer-implemented method of claim 5, characterized in that determining whether the single input corresponds to the command to remove access information (60) and display a second network resource includes determining whether a pattern associated with a touch interface substantially corresponds to a predetermined pattern.
类似技术:
公开号 | 公开日 | 专利标题 BR112014003666B1|2021-07-06|computing device configured to manage information associated with web pages, computer-implemented method US9110568B2|2015-08-18|Browser tab management RU2662636C2|2018-07-26|Information management and display in web browsers BRPI0616320A2|2011-06-14|network search preview information JP6227011B2|2017-11-08|Architecture for sharing browsing session history US20120136941A1|2012-05-31|User specific sharing feature US20200120173A1|2020-04-16|System and method for an adaptive search engine using domain social networking data JP2020515944A|2020-05-28|System and method for direct in-browser markup of elements in Internet content US8898297B1|2014-11-25|Device attribute-customized metadata for browser users US11200293B2|2021-12-14|Method and system for controlling presentation of web resources in a browser window US20160314211A1|2016-10-27|Systems and Methods for Verifying User Credentials for Search US9065827B1|2015-06-23|Browser-based provisioning of quality metadata US20160042080A1|2016-02-11|Methods, Systems, and Apparatuses for Searching and Sharing User Accessed Content US9070169B2|2015-06-30|Undo capability for remotely submitted user-authored content RU2633180C2|2017-10-11|System and method for managing browser application, persistent computer-readable medium and electronic device WO2015114419A2|2015-08-06|System and method for processing a user request for an access to a web resource US20160373554A1|2016-12-22|Computer-readable recording medium, web access method, and web access device US20150154298A1|2015-06-04|Method and system for archiving and searching website collections WO2017001946A1|2017-01-05|Method and system for organizing a browser history KR101748450B1|2017-06-19|Method of Sharing Webpage by Connecting Multiple Platform and the Server thereof EP3147803A1|2017-03-29|Method and apparatus for generating a recommended set of items
同族专利:
公开号 | 公开日 WO2013025717A3|2013-04-25| CN103907112A|2014-07-02| CA2845121C|2018-11-13| US20130046869A1|2013-02-21| US9870426B2|2018-01-16| CA2845121A1|2013-02-21| WO2013025717A2|2013-02-21| JP2014525614A|2014-09-29| JP5872043B2|2016-03-01| EP2745219B1|2018-01-10| RU2014110048A|2015-09-27| AU2012296646A1|2014-04-03| CN103907112B|2017-05-24| SG2014012678A|2014-04-28| US20150254361A1|2015-09-10| US9037696B2|2015-05-19| RU2595761C2|2016-08-27| BR112014003666A2|2017-03-07| EP2745219A2|2014-06-25| AU2012296646B2|2017-03-16|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 CA2154951C|1994-09-12|2004-05-25|John E. Warnock|Method and apparatus for viewing electronic documents| US5872850A|1996-02-02|1999-02-16|Microsoft Corporation|System for enabling information marketplace| US6108637A|1996-09-03|2000-08-22|Nielsen Media Research, Inc.|Content display monitor| US6049812A|1996-11-18|2000-04-11|International Business Machines Corp.|Browser and plural active URL manager for network computers| US5961593A|1997-01-22|1999-10-05|Lucent Technologies, Inc.|System and method for providing anonymous personalized browsing by a proxy system in a network| US6195679B1|1998-01-06|2001-02-27|Netscape Communications Corporation|Browsing session recording playback and editing system for generating user defined paths and allowing users to mark the priority of items in the paths| US6173316B1|1998-04-08|2001-01-09|Geoworks Corporation|Wireless communication device with markup language based man-machine interface| JP3665480B2|1998-06-24|2005-06-29|富士通株式会社|Document organizing apparatus and method| US6138156A|1998-10-05|2000-10-24|International Business Machines Corporation|Selecting and applying content-reducing filters based on dynamic environmental factors| US6452609B1|1998-11-06|2002-09-17|Supertuner.Com|Web application for accessing media streams| US6453342B1|1998-12-03|2002-09-17|International Business Machines Corporation|Method and apparatus for selective caching and cleaning of history pages for web browsers| US6449639B1|1998-12-23|2002-09-10|Doxio, Inc.|Method and system for client-less viewing of scalable documents displayed using internet imaging protocol commands| US6625624B1|1999-02-03|2003-09-23|At&T Corp.|Information access system and method for archiving web pages| US6963850B1|1999-04-09|2005-11-08|Amazon.Com, Inc.|Computer services for assisting users in locating and evaluating items in an electronic catalog based on actions performed by members of specific user communities| US6633316B1|1999-05-13|2003-10-14|International Business Machines Corporation|Method and apparatus for implementing direct link selection of cached, previously visited links in nested web pages| US6560620B1|1999-08-03|2003-05-06|Aplix Research, Inc.|Hierarchical document comparison system and method| US6430624B1|1999-10-21|2002-08-06|Air2Web, Inc.|Intelligent harvesting and navigation system and method| US7031932B1|1999-11-22|2006-04-18|Aquantive, Inc.|Dynamically optimizing the presentation of advertising messages| US6549941B1|1999-11-22|2003-04-15|Alexa Internet|Software system and methods for resubmitting form data to related web sites| US6785864B1|1999-12-01|2004-08-31|International Business Machines Corporation|System and method for notifying of changes in web page hyperlinked documents| US6725269B1|1999-12-02|2004-04-20|International Business Machines Corporation|System and method for maintaining multiple identities and reputations for internet interactions| US7054952B1|1999-12-09|2006-05-30|International Business Machines Corp.|Electronic document delivery system employing distributed document object model based transcoding and providing interactive javascript support| US6691163B1|1999-12-23|2004-02-10|Alexa Internet|Use of web usage trail data to identify related links| US20010039490A1|2000-04-03|2001-11-08|Mikhail Verbitsky|System and method of analyzing and comparing entity documents| US6912689B1|2000-04-17|2005-06-28|Micron Technology, Inc.|Method and apparatus for facilitating substitution of digital images with line drawings| US7373313B1|2000-04-25|2008-05-13|Alexa Internet|Service for enabling users to share information regarding products represented on web pages| WO2002003219A1|2000-06-30|2002-01-10|Plurimus Corporation|Method and system for monitoring online computer network behavior and creating online behavior profiles| US6859217B2|2000-07-19|2005-02-22|Microsoft Corporation|System and method to display and manage data within hierarchies and polyarchies of information| US20070027672A1|2000-07-31|2007-02-01|Michel Decary|Computer method and apparatus for extracting data from web pages| US6704024B2|2000-08-07|2004-03-09|Zframe, Inc.|Visual content browsing using rasterized representations| US7191211B2|2000-10-03|2007-03-13|Raja Tuli|Portable high speed internet access device priority protocol| US7051084B1|2000-11-02|2006-05-23|Citrix Systems, Inc.|Methods and apparatus for regenerating and transmitting a partial page| FI20002823A|2000-12-21|2002-06-22|Nokia Corp|Data Transmission| US6871236B2|2001-01-26|2005-03-22|Microsoft Corporation|Caching transformed content in a mobile gateway| US7085736B2|2001-02-27|2006-08-01|Alexa Internet|Rules-based identification of items represented on web pages| US7792948B2|2001-03-30|2010-09-07|Bmc Software, Inc.|Method and system for collecting, aggregating and viewing performance data on a site-wide basis| US7047294B2|2001-05-02|2006-05-16|Microsoft Corporation|Page-view recording with click-thru tracking| US7353252B1|2001-05-16|2008-04-01|Sigma Design|System for electronic file collaboration among multiple users using peer-to-peer network topology| US20020191020A1|2001-06-18|2002-12-19|International Business Machines Corporation|Method and apparatus for removing confindential information from a history| US7284191B2|2001-08-13|2007-10-16|Xerox Corporation|Meta-document management system with document identifiers| US6944665B2|2001-09-24|2005-09-13|International Business Machines Corporation|Method and system for delivering accessibility using a distributed environment| US7260773B2|2002-03-28|2007-08-21|Uri Zernik|Device system and method for determining document similarities and differences| US20050246193A1|2002-08-30|2005-11-03|Navio Systems, Inc.|Methods and apparatus for enabling transaction relating to digital assets| US8015259B2|2002-09-10|2011-09-06|Alan Earl Swahn|Multi-window internet search with webpage preload| CA2402809A1|2002-09-11|2004-03-11|Ibm Canada Limited-Ibm Canada Limitee|Ubiquitous visited links| US7171478B2|2002-10-25|2007-01-30|Sap Aktiengesellschaft|Session coupling| US8176428B2|2002-12-03|2012-05-08|Datawind Net Access Corporation|Portable internet access device back page cache| JP2004272662A|2003-03-10|2004-09-30|Ricoh Co Ltd|Device, system, and method for managing contents, program for making computer execute the same method, recording medium, and contents data| JP2004295722A|2003-03-28|2004-10-21|Hitachi Ltd|Unnecessary link display browser| US7406459B2|2003-05-01|2008-07-29|Microsoft Corporation|Concept network| JP2004355371A|2003-05-29|2004-12-16|Canon Inc|Document classifying device, its method, and storage medium| GB0314782D0|2003-06-25|2003-07-30|Ibm|A searchable personal browsing history| US7565425B2|2003-07-02|2009-07-21|Amazon Technologies, Inc.|Server architecture and methods for persistently storing and serving event data| US20050060643A1|2003-08-25|2005-03-17|Miavia, Inc.|Document similarity detection and classification system| US8103742B1|2003-11-24|2012-01-24|Amazon Technologies, Inc.|Deferred and off-loaded rendering of selected portions of web pages to incorporate late-arriving service data| US7523315B2|2003-12-22|2009-04-21|Ingeo Systems, Llc|Method and process for creating an electronically signed document| US8150824B2|2003-12-31|2012-04-03|Google Inc.|Systems and methods for direct navigation to specific portion of target document| JP2005202766A|2004-01-16|2005-07-28|National Institute Of Information & Communication Technology|System for simultaneous presentation of similar content| US7810035B2|2004-10-15|2010-10-05|Microsoft Corporation|Browsing web content using predictive navigation links| US7689458B2|2004-10-29|2010-03-30|Microsoft Corporation|Systems and methods for determining bid value for content items to be placed on a rendered page| US20060122889A1|2004-11-22|2006-06-08|Microsoft Corporation|System and method for managing a plurality of content items displayed in a particular placement position on a rendered page| US8302011B2|2005-01-24|2012-10-30|A9.Com, Inc.|Technique for modifying presentation of information displayed to end users of a computer system| US7975000B2|2005-01-27|2011-07-05|Fmr Llc|A/B testing of a webpage| US8019749B2|2005-03-17|2011-09-13|Roy Leban|System, method, and user interface for organizing and searching information| US8060463B1|2005-03-30|2011-11-15|Amazon Technologies, Inc.|Mining of user event data to identify users with common interests| US7536641B2|2005-04-29|2009-05-19|Google Inc.|Web page authoring tool for structured documents| US20060277167A1|2005-05-20|2006-12-07|William Gross|Search apparatus having a search result matrix display| JP2007011778A|2005-06-30|2007-01-18|Microsoft Corp|Information retrieval display method and computer readable recording medium| US7403932B2|2005-07-01|2008-07-22|The Boeing Company|Text differentiation methods, systems, and computer program products for content analysis| US7831582B1|2005-08-23|2010-11-09|Amazon Technologies, Inc.|Method and system for associating keywords with online content sources| US7577665B2|2005-09-14|2009-08-18|Jumptap, Inc.|User characteristic influenced search results| US8161044B2|2005-10-26|2012-04-17|International Business Machines Corporation|Faceted web searches of user preferred categories throughout one or more taxonomies| US8001215B2|2005-11-29|2011-08-16|Microsoft Corporation|Unlimited history store for navigational web applications| US7961188B2|2005-12-05|2011-06-14|Microsoft Corporation|Persistent formatting for interactive charts| US8935429B2|2006-12-19|2015-01-13|Vmware, Inc.|Automatically determining which remote applications a user or group is entitled to access based on entitlement specifications and providing remote application access to the remote applications| US20070139430A1|2005-12-21|2007-06-21|Microsoft Corporation|Rendering "gadgets" with a browser| US9081981B2|2005-12-29|2015-07-14|Nextlabs, Inc.|Techniques and system to manage access of information using policies| US7596761B2|2006-01-05|2009-09-29|Apple Inc.|Application user interface with navigation bar showing current and prior application contexts| KR100877829B1|2006-03-21|2009-01-12|엘지전자 주식회사|Terminal with scrolling function and scrolling method thereof| US8190682B2|2006-03-31|2012-05-29|Amazon Technologies, Inc.|Managing execution of programs by multiple computing systems| US7792944B2|2006-03-31|2010-09-07|Amazon Technologies, Inc.|Executing programs based on user-specified constraints| US8001487B2|2006-04-12|2011-08-16|Laas & Sonder Pty Ltd|Method and system for organizing and displaying data| US8819825B2|2006-05-31|2014-08-26|The Trustees Of Columbia University In The City Of New York|Systems, methods, and media for generating bait information for trap-based defenses| US8527905B2|2006-06-07|2013-09-03|International Business Machines Corporsation|Providing archived web page content in place of current web page content| US20080104502A1|2006-10-26|2008-05-01|Yahoo! Inc.|System and method for providing a change profile of a web page| US20100024015A1|2006-12-21|2010-01-28|Sxip Identity Corp.|System and method for simplified login using an identity manager| US8073850B1|2007-01-19|2011-12-06|Wordnetworks, Inc.|Selecting key phrases for serving contextually relevant content| WO2008092131A2|2007-01-25|2008-07-31|Skyfire Labs, Inc.|Mobile device user interface for remote interaction| US7593928B2|2007-01-29|2009-09-22|Aol Llc|Dynamically altering search result page layout to increase user response| US8250474B2|2007-03-31|2012-08-21|Topix Llc|Chronology display and feature for online presentations and web pages| IL182702D0|2007-04-19|2007-09-20|90 Yitshak Barashi|Method for changing visual modes of documents stored over a data network| US8370424B2|2007-06-22|2013-02-05|Aol Inc.|Systems and methods for caching and serving dynamic content| US7831596B2|2007-07-02|2010-11-09|Hewlett-Packard Development Company, L.P.|Systems and processes for evaluating webpages| US8185621B2|2007-09-17|2012-05-22|Kasha John R|Systems and methods for monitoring webpages| US8010901B1|2007-10-26|2011-08-30|Sesh, Inc.|System and method for automated synchronized co-browsing| US20100312788A1|2007-10-26|2010-12-09|Commonwealth Scientific And Industrial Research Or|Method and system for information retrieval and processing| US8775391B2|2008-03-26|2014-07-08|Zettics, Inc.|System and method for sharing anonymous user profiles with a third party| US8473836B2|2007-12-21|2013-06-25|The Invention Science Fund I, Llc|Look ahead of links/alter links| US10269024B2|2008-02-08|2019-04-23|Outbrain Inc.|Systems and methods for identifying and measuring trends in consumer content demand within vertically associated websites and related content| GB0805695D0|2008-03-28|2008-04-30|British Telecomm|Web content management| US8112431B2|2008-04-03|2012-02-07|Ebay Inc.|Method and system for processing search requests| US20090254867A1|2008-04-03|2009-10-08|Microsoft Corporation|Zoom for annotatable margins| US8886637B2|2008-05-12|2014-11-11|Enpulz, L.L.C.|Web browser accessible search engine which adapts based on user interaction| US8078974B2|2008-06-27|2011-12-13|Microsoft Corporation|Relating web page change with revisitation patterns| US8271887B2|2008-07-17|2012-09-18|The Boeing Company|Systems and methods for whiteboard collaboration and annotation| US8010545B2|2008-08-28|2011-08-30|Palo Alto Research Center Incorporated|System and method for providing a topic-directed search| US20100057639A1|2008-08-30|2010-03-04|Yahoo! Inc.|System and method for utilizing time measurements in advertising pricing| CN101364233B|2008-09-28|2010-07-28|腾讯科技(深圳)有限公司|Management system and management method for searching network resource| US8316124B1|2008-09-29|2012-11-20|Amazon Technologies, Inc.|Managing network data display| US20100125507A1|2008-11-17|2010-05-20|Escape Media Group, Inc.|Method and system for presenting sponsored content| JP2010123073A|2008-11-21|2010-06-03|Toshiba Corp|Page access method and server| US8249904B1|2008-12-12|2012-08-21|Amazon Technologies, Inc.|Managing use of program execution capacity| US20100198742A1|2009-02-03|2010-08-05|Purplecomm, Inc.|Online Social Encountering| US8336049B2|2009-02-05|2012-12-18|Vmware, Inc.|Virtual machine utility computing method and system| TW201032131A|2009-02-24|2010-09-01|Ibm|Device, method and computer program product for automatically selecting internet browser and providing web page service| GB0905953D0|2009-04-06|2009-05-20|Bowling Anthony|Document editing method| US8661423B2|2009-05-01|2014-02-25|Telcordia Technologies, Inc.|Automated determination of quasi-identifiers using program analysis| US9170700B2|2009-05-13|2015-10-27|David H. Kaiser|Playing and editing linked and annotated audiovisual works| US9330191B2|2009-06-15|2016-05-03|Microsoft Technology Licensing, Llc|Identifying changes for online documents| CN103488681A|2009-06-19|2014-01-01|布雷克公司|Slash label| US9213780B2|2009-06-26|2015-12-15|Microsoft Technology Licensing Llc|Cache and index refreshing strategies for variably dynamic items and accesses| KR20110011002A|2009-07-27|2011-02-08|삼성전자주식회사|Method and apparatus for web browsing| US8335784B2|2009-08-31|2012-12-18|Microsoft Corporation|Visual search and three-dimensional results| US8433996B2|2009-09-15|2013-04-30|Oracle International Corporation|Hierarchical model for web browser navigation| US8745039B2|2009-09-25|2014-06-03|International Business Machines Corporation|Method and system for user guided search navigation| US8689225B2|2009-09-29|2014-04-01|Amazon Technologies, Inc.|Attributing causality to program execution capacity modifications| US8375316B2|2009-12-31|2013-02-12|Verizon Patent And Licensing Inc.|Navigational transparent overlay| US20110173177A1|2010-01-11|2011-07-14|Flavio Junqueira|Sightful cache: efficient invalidation for search engine caching| US8924982B2|2010-01-12|2014-12-30|Amazon Technologies, Inc.|Managing private use of program execution capacity| US20110178868A1|2010-01-21|2011-07-21|Priyank Shanker Garg|Enhancing search result pages using content licensed from content providers| US8782145B2|2010-01-28|2014-07-15|Microsoft Corporation|Following content item updates via chat groups| US9367123B2|2010-01-29|2016-06-14|International Business Machines Corporation|Systems and methods for collaborative browsing on the telecom web| US20110191327A1|2010-01-31|2011-08-04|Advanced Research Llc|Method for Human Ranking of Search Results| US9514103B2|2010-02-05|2016-12-06|Palo Alto Research Center Incorporated|Effective system and method for visual document comparison using localized two-dimensional visual fingerprints| US20110208840A1|2010-02-22|2011-08-25|Lee Blackman|Cookie alert| US8555155B2|2010-06-04|2013-10-08|Apple Inc.|Reader mode presentation of web content| JP5616695B2|2010-06-18|2014-10-29|キヤノン株式会社|Image processing apparatus, control method thereof, and program| JP5523220B2|2010-06-30|2014-06-18|キヤノン株式会社|Information processing apparatus, control method therefor, and program| US20120084644A1|2010-09-30|2012-04-05|Julien Robert|Content preview| WO2012044539A2|2010-10-01|2012-04-05|Imerj, Llc|Multi-operating system| US20120137201A1|2010-11-30|2012-05-31|Alcatel-Lucent Usa Inc.|Enabling predictive web browsing| US20120166922A1|2010-12-28|2012-06-28|Franklin Keith Rolles|Content Management System for Resume and Portfolio Data for Producing Multiple Interactive Websites| US8667139B2|2011-02-22|2014-03-04|Intuit Inc.|Multidimensional modeling of software offerings| US9009218B2|2011-02-23|2015-04-14|Broadcom Corporation|Cloud server/thin client/gateway selective browser instantiation| US9225763B2|2011-06-07|2015-12-29|Cisco Technology, Inc.|Distributed overlay browser for transparent streaming media support in virtualized desktop environment| US8769011B2|2011-06-21|2014-07-01|Cisco Technology, Inc.|Survivable browsing in virtualized desktop environment when host connectivity is lost| US8706860B2|2011-06-30|2014-04-22|Amazon Technologies, Inc.|Remote browsing session management| WO2013003631A2|2011-06-30|2013-01-03|Amazon Technologies, Inc.|Remote browsing session management| US8577963B2|2011-06-30|2013-11-05|Amazon Technologies, Inc.|Remote browsing session between client browser and network based browser| CN102902693B|2011-07-29|2018-01-12|慧与发展有限责任合伙企业|Detect the repeat pattern on webpage| US8843608B2|2011-09-22|2014-09-23|Blue Coat Systems, Inc.|Methods and systems for caching popular network content|US8601090B1|2008-03-31|2013-12-03|Amazon Technologies, Inc.|Network resource identification| US7962597B2|2008-03-31|2011-06-14|Amazon Technologies, Inc.|Request routing based on class| US8447831B1|2008-03-31|2013-05-21|Amazon Technologies, Inc.|Incentive driven content delivery| US8156243B2|2008-03-31|2012-04-10|Amazon Technologies, Inc.|Request routing| US7970820B1|2008-03-31|2011-06-28|Amazon Technologies, Inc.|Locality based content distribution| US8533293B1|2008-03-31|2013-09-10|Amazon Technologies, Inc.|Client side cache management| US8321568B2|2008-03-31|2012-11-27|Amazon Technologies, Inc.|Content management| US8606996B2|2008-03-31|2013-12-10|Amazon Technologies, Inc.|Cache optimization| US9912740B2|2008-06-30|2018-03-06|Amazon Technologies, Inc.|Latency measurement in resource requests| US7925782B2|2008-06-30|2011-04-12|Amazon Technologies, Inc.|Request routing using network computing components| US8028090B2|2008-11-17|2011-09-27|Amazon Technologies, Inc.|Request routing utilizing client location information| US8521880B1|2008-11-17|2013-08-27|Amazon Technologies, Inc.|Managing content delivery network service providers| US8073940B1|2008-11-17|2011-12-06|Amazon Technologies, Inc.|Managing content delivery network service providers| US8065417B1|2008-11-17|2011-11-22|Amazon Technologies, Inc.|Service provider registration by a content broker| US8060616B1|2008-11-17|2011-11-15|Amazon Technologies, Inc.|Managing CDN registration by a storage provider| US8732309B1|2008-11-17|2014-05-20|Amazon Technologies, Inc.|Request routing utilizing cost information| US8122098B1|2008-11-17|2012-02-21|Amazon Technologies, Inc.|Managing content delivery network service providers by a content broker| US7991910B2|2008-11-17|2011-08-02|Amazon Technologies, Inc.|Updating routing information based on client location| US8521851B1|2009-03-27|2013-08-27|Amazon Technologies, Inc.|DNS query processing using resource identifiers specifying an application broker| US8688837B1|2009-03-27|2014-04-01|Amazon Technologies, Inc.|Dynamically translating resource identifiers for request routing using popularity information| US8412823B1|2009-03-27|2013-04-02|Amazon Technologies, Inc.|Managing tracking information entries in resource cache components| US8756341B1|2009-03-27|2014-06-17|Amazon Technologies, Inc.|Request routing utilizing popularity information| US8782236B1|2009-06-16|2014-07-15|Amazon Technologies, Inc.|Managing resources using resource expiration data| US8397073B1|2009-09-04|2013-03-12|Amazon Technologies, Inc.|Managing secure content in a content delivery network| US8433771B1|2009-10-02|2013-04-30|Amazon Technologies, Inc.|Distribution network with forward resource propagation| US9495338B1|2010-01-28|2016-11-15|Amazon Technologies, Inc.|Content distribution network| US8468247B1|2010-09-28|2013-06-18|Amazon Technologies, Inc.|Point of presence management in request routing| US8577992B1|2010-09-28|2013-11-05|Amazon Technologies, Inc.|Request routing management based on network components| US10958501B1|2010-09-28|2021-03-23|Amazon Technologies, Inc.|Request routing information based on client IP groupings| US8819283B2|2010-09-28|2014-08-26|Amazon Technologies, Inc.|Request routing in a networked environment| US9407681B1|2010-09-28|2016-08-02|Amazon Technologies, Inc.|Latency measurement in resource requests| US10097398B1|2010-09-28|2018-10-09|Amazon Technologies, Inc.|Point of presence management in request routing| US8930513B1|2010-09-28|2015-01-06|Amazon Technologies, Inc.|Latency measurement in resource requests| US9712484B1|2010-09-28|2017-07-18|Amazon Technologies, Inc.|Managing request routing information utilizing client identifiers| US9003035B1|2010-09-28|2015-04-07|Amazon Technologies, Inc.|Point of presence management in request routing| US8452874B2|2010-11-22|2013-05-28|Amazon Technologies, Inc.|Request routing processing| US9391949B1|2010-12-03|2016-07-12|Amazon Technologies, Inc.|Request routing processing| US9146656B1|2011-06-27|2015-09-29|Google Inc.|Notifications user interface| US8904009B1|2012-02-10|2014-12-02|Amazon Technologies, Inc.|Dynamic content delivery| US10021179B1|2012-02-21|2018-07-10|Amazon Technologies, Inc.|Local resource delivery network| US10623408B1|2012-04-02|2020-04-14|Amazon Technologies, Inc.|Context sensitive object management| JP6095277B2|2012-04-13|2017-03-15|キヤノン株式会社|COMMUNICATION DEVICE, COMMUNICATION DEVICE CONTROL METHOD, PROGRAM| JP2013239146A|2012-04-17|2013-11-28|Panasonic Corp|Information processing apparatus and computer program| US9154551B1|2012-06-11|2015-10-06|Amazon Technologies, Inc.|Processing DNS queries to identify pre-processing information| US20140032743A1|2012-07-30|2014-01-30|James S. Hiscock|Selecting equipment associated with provider entities for a client request| US9525659B1|2012-09-04|2016-12-20|Amazon Technologies, Inc.|Request routing utilizing point of presence load information| US9323577B2|2012-09-20|2016-04-26|Amazon Technologies, Inc.|Automated profiling of resource usage| US10205698B1|2012-12-19|2019-02-12|Amazon Technologies, Inc.|Source-dependent address resolution| US9686242B2|2013-03-14|2017-06-20|Alcatel Lucent|Protection of sensitive data of a user from being utilized by web services| US9344426B2|2013-05-14|2016-05-17|Citrix Systems, Inc.|Accessing enterprise resources while providing denial-of-service attack protection| US9294391B1|2013-06-04|2016-03-22|Amazon Technologies, Inc.|Managing network computing components utilizing request routing| US20140372948A1|2013-06-15|2014-12-18|Microsoft Corporation|Persistent Reverse Navigation Mechanism| US9537925B2|2013-07-09|2017-01-03|Google Inc.|Browser notifications| JP2015052821A|2013-09-05|2015-03-19|株式会社東芝|Communication device and communication method| US9391787B2|2014-01-03|2016-07-12|Chegg, Inc.|Tagging content for social interchange in online education platforms| US9928221B1|2014-01-07|2018-03-27|Google Llc|Sharing links which include user input| US10698591B2|2014-03-31|2020-06-30|Microsoft Technology Licensing, Llc|Immersive document interaction with device-aware scaling| US9349007B2|2014-05-29|2016-05-24|The United States Of America As Represented By The Secretary Of The Air Force|Web malware blocking through parallel resource rendering| US9524352B1|2014-07-15|2016-12-20|Google Inc.|Sharing data across partner websites| US10091096B1|2014-12-18|2018-10-02|Amazon Technologies, Inc.|Routing mode and point-of-presence selection service| US10097448B1|2014-12-18|2018-10-09|Amazon Technologies, Inc.|Routing mode and point-of-presence selection service| US10033627B1|2014-12-18|2018-07-24|Amazon Technologies, Inc.|Routing mode and point-of-presence selection service| TW201627880A|2015-01-19|2016-08-01|富智康(香港)有限公司|Service searching system and method| US10225326B1|2015-03-23|2019-03-05|Amazon Technologies, Inc.|Point of presence based data uploading| US9819567B1|2015-03-30|2017-11-14|Amazon Technologies, Inc.|Traffic surge management for points of presence| US9887931B1|2015-03-30|2018-02-06|Amazon Technologies, Inc.|Traffic surge management for points of presence| US9887932B1|2015-03-30|2018-02-06|Amazon Technologies, Inc.|Traffic surge management for points of presence| RU2015115352A|2015-04-24|2016-11-20|Закрытое акционерное общество "Лаборатория Касперского"|The way to launch the browser in protected mode| US9832141B1|2015-05-13|2017-11-28|Amazon Technologies, Inc.|Routing based request correlation| US10616179B1|2015-06-25|2020-04-07|Amazon Technologies, Inc.|Selective routing of domain name systemrequests| US10097566B1|2015-07-31|2018-10-09|Amazon Technologies, Inc.|Identifying targets of network attacks| US9742795B1|2015-09-24|2017-08-22|Amazon Technologies, Inc.|Mitigating network attacks| US9794281B1|2015-09-24|2017-10-17|Amazon Technologies, Inc.|Identifying sources of network attacks| US9774619B1|2015-09-24|2017-09-26|Amazon Technologies, Inc.|Mitigating network attacks| US10270878B1|2015-11-10|2019-04-23|Amazon Technologies, Inc.|Routing for origin-facing points of presence| US10257307B1|2015-12-11|2019-04-09|Amazon Technologies, Inc.|Reserved cache space in content delivery networks| US10049051B1|2015-12-11|2018-08-14|Amazon Technologies, Inc.|Reserved cache space in content delivery networks| US10348639B2|2015-12-18|2019-07-09|Amazon Technologies, Inc.|Use of virtual endpoints to improve data transmission rates| US10163150B1|2016-01-07|2018-12-25|Walgreen Co.|Seamless user retail experience based on location| KR20170089642A|2016-01-27|2017-08-04|삼성전자주식회사|Apparatus and method for managing of history information in a electronic device| US10075551B1|2016-06-06|2018-09-11|Amazon Technologies, Inc.|Request management for hierarchical cache| US10110694B1|2016-06-29|2018-10-23|Amazon Technologies, Inc.|Adaptive transfer rate for retrieving content from a server| US9992086B1|2016-08-23|2018-06-05|Amazon Technologies, Inc.|External health checking of virtual private cloud network environments| US10033691B1|2016-08-24|2018-07-24|Amazon Technologies, Inc.|Adaptive resolution of domain name requests in virtual private cloud network environments| US10469513B2|2016-10-05|2019-11-05|Amazon Technologies, Inc.|Encrypted network addresses| US10372499B1|2016-12-27|2019-08-06|Amazon Technologies, Inc.|Efficient region selection system for executing request-driven code| US10831549B1|2016-12-27|2020-11-10|Amazon Technologies, Inc.|Multi-region request-driven code execution system| US10938884B1|2017-01-30|2021-03-02|Amazon Technologies, Inc.|Origin server cloaking using virtual private cloud network environments| US10616211B2|2017-04-12|2020-04-07|Cisco Technology, Inc.|System and method for authenticating clients| US10503613B1|2017-04-21|2019-12-10|Amazon Technologies, Inc.|Efficient serving of resources during server unavailability| US11075987B1|2017-06-12|2021-07-27|Amazon Technologies, Inc.|Load estimating content delivery network| US10447648B2|2017-06-19|2019-10-15|Amazon Technologies, Inc.|Assignment of a POP to a DNS resolver based on volume of communications over a link between client devices and the POP| US10627978B2|2017-12-05|2020-04-21|Dodles, Inc.|Virtual stack button for software having a branched task structure| US10592578B1|2018-03-07|2020-03-17|Amazon Technologies, Inc.|Predictive content push-enabled content delivery network| US11190573B2|2018-07-25|2021-11-30|Vmware, Inc.|Techniques for improving implementation of a remote browser within a local browser| US10862852B1|2018-11-16|2020-12-08|Amazon Technologies, Inc.|Resolution of domain name requests in heterogeneous network environments| US11025747B1|2018-12-12|2021-06-01|Amazon Technologies, Inc.|Content request pattern-based routing system|
法律状态:
2018-12-11| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2019-11-05| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2021-04-27| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2021-07-06| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 14/08/2012, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US13/211,188|2011-08-16| US13/211,188|US9037696B2|2011-08-16|2011-08-16|Managing information associated with network resources| PCT/US2012/050793|WO2013025717A2|2011-08-16|2012-08-14|Managing information associated with network resources| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|