×

Techniques for context-based application invocation for short-range wireless communication interactions

  • US 9,526,120 B2
  • Filed: 03/15/2013
  • Issued: 12/20/2016
  • Est. Priority Date: 03/15/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • initiating, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device via an NFC communication medium;

    determining, at the first computing device, a first set of information including at least one of (i) device type information for the first computing device and (ii) user information for the first computing device;

    receiving, at the first computing device from the second computing device via the NFC link, a second set of information including (i) device type information for the second computing device and (ii) user information for the second computing device;

    receiving, at the first computing device from the second computing device via the NFC link, an indication that the second computing device is currently executing an application in a foreground that is non-compliant with the NFC communication medium; and

    in response to receiving the indication, performing, at the first computing device, at least one of a plurality of actions based on the first and second sets of information, the plurality of actions including;

    (a) without user intervention/interaction, automatically configuring, at the first computing device, communication with the second computing device via a non-NFC communication medium, which is enabled when the application is compliant with the non-NFC communication medium, and(b) determining, at the first computing device, a first set of operations that can be executed between the first computing device and the second computing device via at least one of the NFC communication medium and the non-NFC communication medium, and outputting, at the first computing device, a menu configured to (i) display the first set of operations and (ii) receive a selection of an operation from the first set of operations from a first user of the first computing device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×