Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
A computer-implemented method can include establishing, at a mobile computing device having a processing device, a near-field communication (NFC) session with a second device when the second device is within a communication range of the mobile computing device. When the second device is determined to have exited the communication range of the mobile computing device, the method can a) interrupt the NFC session, b) determine a reentry direction to move the mobile computing device in relation to the second device in order to bring the second device back within the communication range, c) start a timer, d) determine whether the second device reenters the communication range before the timer exceeds a threshold, and e) provide an instruction to a user to move the mobile computing device in the reentry direction when the second device has not reentered the communication range and the timer exceeds the threshold.
Abstract:
A user accesses an application on a reader mode device, activating a reader communication mode and disabling conflicting communication modes. The reader mode device activates a radio frequency field and creates a secure communication channel with a payment device. A secure element application on the reader mode device requests and receives payment information from a payment device. The secure element application on the reader mode device decrypts the payment information and requests account verification from the user. The secure element application on the reader mode device receives input from the user and verifies the payment information. In response to verifying the account information, the secure element application on the reader mode device encrypts the payment information and transmits it to a payment processing system. The payment processing system processes the payment transaction and transmits a notice of approved or declined transaction to the reader mode device.
Abstract:
A computer-implemented technique includes establishing, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device. The technique includes identifying, at the first computing device, an application having a foreground designation in an operating system of the first computing device, the identifying being performed upon establishment of the NFC link with the second computing device. The technique includes determining, at the first computing device, an identifier for the application, wherein the identifier uniquely identifies the application at a source external to the first computing device. The technique also includes transmitting, from the first computing device, the identifier for the application via the NFC link to the second computing device.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
Generally, aspects of the present disclosure are directed to techniques for determining a transport mechanism to transfer data peer-to-peer between computing devices. One or more alternative transport mechanisms supported by both a first computing device and a second computing device may be determined. The first computing device may determine whether to use one of near-field communication (NFC) and one of the one or more alternative transport mechanisms as a transport mechanism to transfer data between the first computing device and the second computing device based at least in part on at least one attribute of the data to be transferred. Data may be transferred between the first computing device and the second computing device using the transport mechanism.
Abstract:
A user accesses an application on a reader mode device, activating a reader communication mode and disabling conflicting communication modes. The reader mode device activates a radio frequency field and creates a secure communication channel with a payment device. A secure element application on the reader mode device requests and receives payment information from a payment device. The secure element application on the reader mode device decrypts the payment information and requests account verification from the user. The secure element application on the reader mode device receives input from the user and verifies the payment information. In response to verifying the account information, the secure element application on the reader mode device encrypts the payment information and transmits it to a payment processing system. The payment processing system processes the payment transaction and transmits a notice of approved or declined transaction to the reader mode device.
Abstract:
A user accesses an application on a reader mode device, activating a reader communication mode and disabling conflicting communication modes. The reader mode device activates a radio frequency field and creates a secure communication channel with a payment device. A secure element application on the reader mode device requests and receives payment information from a payment device. The secure element application on the reader mode device decrypts the payment information and requests account verification from the user. The secure element application on the reader mode device receives input from the user and verifies the payment information. In response to verifying the account information, the secure element application on the reader mode device encrypts the payment information and transmits it to a payment processing system. The payment processing system processes the payment transaction and transmits a notice of approved or declined transaction to the reader mode device.