Abstract:
A computer-implemented technique includes establishing, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device. The technique includes identifying, at the first computing device, an application having a foreground designation in an operating system of the first computing device, the identifying being performed upon establishment of the NFC link with the second computing device. The technique includes determining, at the first computing device, an identifier for the application, wherein the identifier uniquely identifies the application at a source external to the first computing device. The technique also includes transmitting, from the first computing device, the identifier for the application via the NFC link to the second computing device.
Abstract:
A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system.
Abstract:
An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying information is extracted and the application is distributed for operation on a user device. A user interacts with the application, creating an access request that is transmitted to the application service system along with the extracted identifying information. The application service system transmits an access token to the user device comprising the received identifying information. The user device transmits the access token with a service request to the application service system. The application service system compares the identifying information from the access token to the identifying information extracted from the application program code received from the merchant services system. If the identifying information matches, the service request is processed. If the identifying information does not match, the service request is denied and an error message is transmitted to the user device.
Abstract:
A method can include receiving, at a first computing device having one or more processors, a command to transfer a data payload to a second computing device and information from the second computing device using a near-field communication (NFC) protocol. The information can be indicative of a plurality of communication protocols capable of being received at the second computing device, including the NFC communication protocol. Additionally, the method can include estimating a transfer time corresponding to each of the plurality of communication protocols. Each of the transfer times can be indicative of an amount of time to transfer the data payload between the first and second computing devices using its corresponding communication protocol. The method can also include selecting a specific communication protocol based on the estimated transfer times and transmitting the data payload using the specific communication protocol.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying information is extracted and the application is distributed for operation on a user device. A user interacts with the application, creating an access request that is transmitted to the application service system along with the extracted identifying information. The application service system transmits an access token to the user device comprising the received identifying information. The user device transmits the access token with a service request to the application service system. The application service system compares the identifying information from the access token to the identifying information extracted from the application program code received from the merchant services system. If the identifying information matches, the service request is processed. If the identifying information does not match, the service request is denied and an error message is transmitted to the user device.
Abstract:
A method can include receiving, at a first computing device having one or more processors, a command to transfer a data payload to a second computing device and information from the second computing device using a near-field communication (NFC) protocol. The information can be indicative of a plurality of communication protocols capable of being received at the second computing device, including the NFC communication protocol. Additionally, the method can include estimating a transfer time corresponding to each of the plurality of communication protocols. Each of the transfer times can be indicative of an amount of time to transfer the data payload between the first and second computing devices using its corresponding communication protocol. The method can also include selecting a specific communication protocol based on the estimated transfer times and transmitting the data payload using the specific communication protocol.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.