Patent application number | Description | Published |
20120290657 | Transferring Application State Across Devices - A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system. | 11-15-2012 |
20120290663 | Transferring Application State Across Devices with Checkpoints - A first client device executes a plurality of actively running applications, each having one or more checkpoints, each checkpoint identifying an execution breakpoint at which a respective application can be suspended and subsequently resumed. The first client device detects a transfer triggering condition, stores an application state for each of the plurality of actively running applications, and transmits the stored application state for each of the plurality of actively running applications to a second client device or system. The stored application state for each respective application of the plurality of actively running applications corresponds to a checkpoint of the respective application. Optionally, the transfer triggering condition includes presence of the second client device or system within a predefined proximity of the first client device or system, wherein the predefined proximity is a predefined proximity for near field communication. | 11-15-2012 |
20120290669 | Zero-Click Sharing of Application Context Across Devices - A first client device performs a handoff operation to a second client device by transmitting application information, associated with a first application, to the second client device when the first client device is positioned within a predefined proximity of the second client device. The first application has a first client device user interface state when the handoff operation is performed. Further, the first client device, in response to receiving from another client device application information associated with a second application executed by the other first client device, executes a third application corresponding to the second application with an initial user interface state corresponding to a user interface state of the other client device. | 11-15-2012 |
20130073848 | ENABLING USERS TO SELECT BETWEEN SECURE SERVICE PROVIDERS USING A KEY ESCROW SERVICE - Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element. | 03-21-2013 |
20130095756 | TECHNIQUES FOR USING SOFTWARE APPLICATION-RELATED METADATA IN NEAR FIELD COMMUNICATION TRANSMISSIONS - A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application. | 04-18-2013 |
20130115932 | TRANSFERRING AN ACTIVE CALL TO ANOTHER DEVICE - In general, this disclosure describes techniques for transferring an active telephone call between devices using short-range wireless communication. In one example, a method includes, while the first device and a second device are connected to a telephone call, obtaining, by the first device and from a third device using short-range wireless communication, configuration information associated with the third device, sending, by the first device, a message to a call controller in order to connect the third device to the telephone call, wherein the message includes at least a portion of the configuration information associated with the third device, and disconnecting the first device from the telephone call after the third device is connected to the telephone call. | 05-09-2013 |
20130138959 | Enabling Users to Select Between Secure Service Providers Using a Central Trusted Service Manager - Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element. | 05-30-2013 |
20130173699 | Zero-Click Sharing of Application Context Across Devices - A first client device performs a handoff operation to a second client device by transmitting application information, associated with a first application, to the second client device when the first client device is positioned within a predefined proximity of the second client device. The first application has a first client device user interface state when the handoff operation is performed. Further, the first client device, in response to receiving from another client device application information associated with a second application executed by the other first client device, executes a third application corresponding to the second application with a user interface state corresponding to a user interface state of the other client device. | 07-04-2013 |
20130212384 | ENABLING USERS TO SELECT BETWEEN SECURE SERVICE PROVIDERS USING A KEY ESCROW SERVICE - Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element. | 08-15-2013 |
20130325967 | TRANSFERRING APPLICATION STATE ACROSS DEVICES - A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system. | 12-05-2013 |
20140006510 | TECHNIQUES FOR TRANSFERRING A DATA PAYLOAD UTILIZING NEAR-FIELD COMMUNICATION | 01-02-2014 |
20140017996 | AUTOMATED SHARING OF APPLICATION DATA OVER A NEAR FIELD COMMUNICATION LINK - A computer-implemented technique includes establishing, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device. The technique includes identifying, at the first computing device, an application having a foreground designation in an operating system of the first computing device, the identifying being performed upon establishment of the NFC link with the second computing device. The technique includes determining, at the first computing device, an identifier for the application, wherein the identifier uniquely identifies the application at a source external to the first computing device. The technique also includes transmitting, from the first computing device, the identifier for the application via the NFC link to the second computing device. | 01-16-2014 |
20150082407 | CONFIRMING THE IDENTITY OF INTEGRATOR APPLICATIONS - An application service system receives, from a merchant service system, an application program code comprising identifying information. The identifying information is extracted and the application is distributed for operation on a user device. A user interacts with the application, creating an access request that is transmitted to the application service system along with the extracted identifying information. The application service system transmits an access token to the user device comprising the received identifying information. The user device transmits the access token with a service request to the application service system. The application service system compares the identifying information from the access token to the identifying information extracted from the application program code received from the merchant services system. If the identifying information matches, the service request is processed. If the identifying information does not match, the service request is denied and an error message is transmitted to the user device. | 03-19-2015 |