Abstract:
A method of printing a document from a mobile device coupling the mobile device to a print device. The method may also include launching a tap-to-print application software on the mobile device in response to the coupling, identifying a document to be printed via the tap-to-print application, and transmitting the document to be printed to the print device by the tap-to-print application. The tap-to-print application does not modify an operating system of the mobile device.
Abstract:
A system and method for verifying proximity to a computational tag by receiving a first token from a server and transmitting the first token to the computational tag. The computational tag can verify the first token and generate a second token based on the first token where the second token includes a signature of the computational tag. The computational tag can transmit the second token to the mobile device and the mobile device can transmit the second token to the server. The server can verify the second token and allow access to a messaging service based on the verification of the second token.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.
Abstract:
A method of printing a document from a mobile device coupling the mobile device to a print device. The method may also include launching a tap-to-print application software on the mobile device in response to the coupling, identifying a document to be printed via the tap-to-print application, and transmitting the document to be printed to the print device by the tap-to-print application. The tap-to-print application does not modify an operating system of the mobile device.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.
Abstract:
According to embodiments illustrated herein there is provided a method for controlling an electronic device. The method includes detecting, in a mobile device, a contact with the electronic device at a predetermined reference location on the electronic device. The method further includes tracking a movement of the mobile device from the predetermined reference location to a second location on the electronic device, wherein the second location corresponds to a first component of the electronic device. Additionally, the method includes receiving an input from a user to control one or more functionalities of the first component.
Abstract:
A method and system of configuring a network using a network application of a mobile device including detecting a gesture sequence that comprises at least one gesture, in response to a user performed action. The detected gesture sequence may be indicative of network configuration rules associated with at least one network device. The method may further include receiving and storing network access credentials, and accessing a network configuration database. The network configuration database may comprise a plurality of gesture sequences and a plurality of associated tasks. The method may also include determining a match for the detected gesture sequence among the plurality of gesture sequences; determining an associated task based on the match; and performing the associated task to achieve the network configuration action. The associated task may include a network configuration action based on the network configuration rules associated with at least one network device.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.
Abstract:
A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.