Abstract:
A computer-implemented technique includes initiating, at a first computing device including one or more processors, communication with a second computing device via a short-range wireless communication protocol. The technique includes receiving, at the first computing device, a set of information from the second computing device via the short-range wireless communication protocol, the set of information including a port address for communication with a first application currently executing in a foreground at the second computing device via another wireless communication protocol. The technique also includes automatically configuring, at the first computing device and in response to receiving the set of information from the second computing device via the short-range wireless communication protocol, communication between a second application at the first computing device and the first application executing at the second computing device via the other wireless communication protocol using the set of information.
Abstract:
A computer-implemented technique includes initiating, at a first computing device including one or more processors, communication with a second computing device via a short-range wireless communication protocol. The technique includes receiving, at the first computing device, a set of information from the second computing device via the short-range wireless communication protocol, the set of information including a port address for communication with a first application currently executing in a foreground at the second computing device via another wireless communication protocol. The technique also includes automatically configuring, at the first computing device and in response to receiving the set of information from the second computing device via the short-range wireless communication protocol, communication between a second application at the first computing device and the first application executing at the second computing device via the other wireless communication protocol using the set of information.
Abstract:
A computer-implemented technique for context-based application invocation for short-range wireless communication interactions can include exchanging sets of information between first and second computing devices via a short-range wireless communication medium. The set of information for a specific computing device can include at least one of (i) device type information for the specific computing device and (ii) user information for the specific computing device. The techniques can include performing, at one of the computing devices, at least one of a plurality of actions based on the set of information received from the other computing device. The plurality of actions can generally include (a) automatically configuring another wireless communication medium and (b) outputting a menu configured to receive a user selection from a set of operations associated with at least one of the short-range wireless communication medium and the other wireless communication medium.
Abstract:
A method can include receiving, at a first computing device having one or more processors, a command to transfer a data payload to a second computing device and information from the second computing device using a near-field communication (NFC) protocol. The information can be indicative of a plurality of communication protocols capable of being received at the second computing device, including the NFC communication protocol. Additionally, the method can include estimating a transfer time corresponding to each of the plurality of communication protocols. Each of the transfer times can be indicative of an amount of time to transfer the data payload between the first and second computing devices using its corresponding communication protocol. The method can also include selecting a specific communication protocol based on the estimated transfer times and transmitting the data payload using the specific communication protocol.
Abstract:
A computer-implemented technique for context-based application invocation for short-range wireless communication interactions can include exchanging sets of information between first and second computing devices via a short-range wireless communication medium. The set of information for a specific computing device can include at least one of (i) device type information for the specific computing device and (ii) user information for the specific computing device. The techniques can include performing, at one of the computing devices, at least one of a plurality of actions based on the set of information received from the other computing device. The plurality of actions can generally include (a) automatically configuring another wireless communication medium and (b) outputting a menu configured to receive a user selection from a set of operations associated with at least one of the short-range wireless communication medium and the other wireless communication medium.
Abstract:
A computer-implemented technique includes initiating, at a first computing device including one or more processors, communication with a second computing device via a short-range wireless communication protocol. The technique includes receiving, at the first computing device, a set of information from the second computing device via the short-range wireless communication protocol, the set of information including a port address for communication with a first application currently executing in a foreground at the second computing device via another wireless communication protocol. The technique also includes automatically configuring, at the first computing device and in response to receiving the set of information from the second computing device via the short-range wireless communication protocol, communication between a second application at the first computing device and the first application executing at the second computing device via the other wireless communication protocol using the set of information.
Abstract:
A method can include receiving, at a first computing device having one or more processors, a command to transfer a data payload to a second computing device and information from the second computing device using a near-field communication (NFC) protocol. The information can be indicative of a plurality of communication protocols capable of being received at the second computing device, including the NFC communication protocol. Additionally, the method can include estimating a transfer time corresponding to each of the plurality of communication protocols. Each of the transfer times can be indicative of an amount of time to transfer the data payload between the first and second computing devices using its corresponding communication protocol. The method can also include selecting a specific communication protocol based on the estimated transfer times and transmitting the data payload using the specific communication protocol.