SEAMLESS TETHERING SETUP BETWEEN PHONE AND LAPTOP USING PEER-TO-PEER MECHANISMS
First Claim
1. A computer-implemented method, the method comprising:
- determining, at a first computing device, if a second computing device is within a predetermined distance of the first computing device;
establishing, at the first computing device, a wireless near field communication (NFC) connection with the second computing device, wherein establishing the wireless NFC connection is responsive to the determination that the first computing device is within the predetermined distance of the second computing device;
transmitting, over the wireless NFC connection, information for configuring a wireless tethering connection with the second computing device; and
receiving, over the wireless NFC connection, confirmation that the wireless tethering connection has been configured.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject technology discloses configurations for determining, at a first computing device, if a second computing device is within a predetermined distance of the first computing device. The subject technology then establishes, at the first computing device, a wireless near field communication (NFC) connection with the second computing device. Information for configuring a wireless tethering connection with the second computing device is then transmitted over the wireless NFC connection. Further, the subject technology receives, over the wireless NFC connection, confirmation that the wireless tethering connection has been configured.
91 Citations
22 Claims
-
1. A computer-implemented method, the method comprising:
-
determining, at a first computing device, if a second computing device is within a predetermined distance of the first computing device; establishing, at the first computing device, a wireless near field communication (NFC) connection with the second computing device, wherein establishing the wireless NFC connection is responsive to the determination that the first computing device is within the predetermined distance of the second computing device; transmitting, over the wireless NFC connection, information for configuring a wireless tethering connection with the second computing device; and receiving, over the wireless NFC connection, confirmation that the wireless tethering connection has been configured. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method, the method comprising:
-
determining, at a first computing device, if a second computing device is within a predetermined distance of the first computing device; establishing, at the first computing device, a wireless near field communication (NFC) connection with the second computing device, wherein establishing the wireless NFC connection is responsive to the determination that the first computing device is within the predetermined distance of the second computing device; receiving, over the wireless NFC connection, information for configuring a wireless tethering connection with the second computing device; performing, at the first computing device, a configuration to set up the wireless tethering connection with the second computing device; and transmitting, over the wireless NFC connection, a confirmation that the wireless tethering connection has been configured to the second computing device. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system, the system comprising:
-
memory; one or more processors; one or more modules stored in memory and configured for execution by the one or more processors, the modules comprising; a wireless near field communication (NFC) module configured to determine if a computing device is within a predetermined distance, establish a wireless NFC connection with the computing device, wherein establishing the wireless NFC connection is responsive to the determination that the computing device is within the predetermined distance; and a wireless tethering module configured to transmit, over the wireless NFC connection, information for configuring a wireless tethering connection with the computing device, and receive, over the wireless NFC connection, confirmation that the wireless tethering connection has been configured. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A non-transitory machine-readable medium comprising instructions stored therein, which when executed by a machine, cause the machine to perform operations comprising:
-
determining, at a first computing device, if a second computing device is within a predetermined distance of the first computing device; establishing, at the first computing device, a wireless near field communication (NFC) connection with the second computing device, wherein establishing the wireless NFC connection is responsive to the determination that the first computing device is within the predetermined distance of the second computing device; transmitting, over the wireless NFC connection, information for configuring a wireless tethering connection with the second computing device; receiving, over the wireless NFC connection, confirmation that the wireless tethering connection has been configured; and transmitting, over the wireless tethering connection, data from a web browser to access one or more web sites on the Internet.
-
Specification