(19)
(11)EP 2 674 011 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
13.11.2019 Bulletin 2019/46

(21)Application number: 12744828.0

(22)Date of filing:  07.02.2012
(51)Int. Cl.: 
H04W 12/00  (2009.01)
H04L 29/06  (2006.01)
(86)International application number:
PCT/US2012/024202
(87)International publication number:
WO 2012/109286 (16.08.2012 Gazette  2012/33)

(54)

SYSTEM AND METHOD FOR LINKING AND SHARING RESOURCES AMONGST DEVICES

SYSTEM UND VERFAHREN ZUR VERKNÜPFUNG UND TEILUNG VON RESSOURCEN ZWISCHEN VORRICHTUNGEN

SYSTÈME ET PROCÉDÉ DE LIAISON ET DE PARTAGE DE RESSOURCES ENTRE DES DISPOSITIFS


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 08.02.2011 US 201161440858 P
29.06.2011 US 201113171878

(43)Date of publication of application:
18.12.2013 Bulletin 2013/51

(73)Proprietor: QUALCOMM Incorporated
San Diego, CA 92121-1714 (US)

(72)Inventors:
  • BERG, Samantha
    Sunnyvale, CA 94085 (US)
  • LENOX, Kim
    Sunnyvale, CA 94085 (US)
  • BROWN, Robert
    Sunnyvale, CA 94085 (US)
  • KUGLIKOV, Vitaly
    Sunnyvale, CA 94085 (US)
  • CHATTERJEE, Manjirnath
    Sunnyvale, CA 94085 (US)
  • GEORGE, Moses
    Sunnyvale, CA 94085 (US)

(74)Representative: Dunlop, Hugh Christopher et al
Maucher Jenkins 26 Caxton Street
London SW1H 0RJ
London SW1H 0RJ (GB)


(56)References cited: : 
WO-A1-2009/104131
KR-A- 20100 136 255
US-A1- 2007 202 807
US-A1- 2011 028 091
WO-A2-2004/079962
KR-B1- 100 863 420
US-A1- 2010 211 785
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    RELATED APPLICATIONS



    [0001] This application claims the benefit of priority under 35 U.S.C. 119(e) to U.S. Application Serial No. 13/171,878, filed June 29, 2011, titled SYSTEM AND METHOD FOR LINKING AND SHARING RESOURCES AMONGST DEVICES, and also claims the benefit of priority under 35 U.S.C. 119(e) to Provisional Application Serial No. 61/440,858, filed February 8, 2011, titled SYSTEM AND METHOD FOR LINKING AND SHARING RESOURCES AMONGST DEVICES.

    TECHNICAL FIELD



    [0002] The disclosed embodiments relate to a system and method for linking and sharing resources amongst devices.

    BACKGROUND



    [0003] The use of docking stations and other accessory devices in connection with mobile computing devices (e.g. smart phones, media players etc.) is well known. Traditionally, docking stations are used to (i) recharge or supply power to the mobile computing device, (ii) enable the computing device to communicate with other devices connected to the docking station (e.g. synchronization with a personal computer), or (iii) use additional resources provided with the docking station (e.g. speakers for audio output).

    [0004] In a traditional scheme, docking stations and mobile computing devices connect using insertive male/female connectors. Numerous factors come into consideration when mobile devices are designed with connectors for use with docking stations. For example, such connectors typically take into account the ease by which users may establish the connection (e.g. can the user simply drop the device into the cradle), as well as the mechanical reliability of the connectors. When users repeatedly mate devices with docking stations, both the mating action and the removal of the device from the docking station can strain the connector structure and its elements.

    [0005] Connectors also restrain the amount by which a device's form factor can be reduced in thickness and/or other dimensions. Connector schemes (particularly those that abide by an industry standard) have constraints that dictate the physical dimensions of the male and female ends of the connectors. As devices get smaller, accommodating the size constraints of the connectors has become more challenging.

    PRIOR ART



    [0006] US 2007/0202807 A1 relates to Bluetooth communication and, particularly, a Bluetooth system comprising a Bluetooth device including a Radio Frequency Identification (RFID) reader for reading out RFID information from the RFID Tag within an effective transmission and receiving range and outputting the RFID information; a control unit for activating the RFID reader when a request for Bluetooth connection using the RFID is inputted by a user in a Bluetooth communication mode, extracting the bonding information from the RFID information inputted from the RFID reader, and outputting the bonding information; and a Bluetooth module for receiving the bonding information outputted from the control unit, pairing the first Bluetooth device using the bonding information, and performing Bluetooth communication.

    [0007] US 2011/0028091 A1 relates to near-field wireless device pairing, wherein a first communication device (e.g., a radio) and a second communication device (e.g., an accessory) implement a wireless device pairing procedure to exchange numerical credentials so that the devices can subsequently form a link for communications using electromagnetic radio signals. The accessory transmits a beacon comprises a pairing request. Upon a user bringing the radio and accessory in close enough proximity, the radio receives the beacon using near-field apparatus included in the radio. In response to receiving the beacon, the radio initiates a pairing procedure, wherein the pairing procedure comprises a data exchange between the radio and accessory, and wherein the beacon and the data exchange comprise a non-propagating radio signal generated using the near-field apparatus. Upon completing the pairing procedure, the radio forms a link with the accessory to communicate using propagating electromagnetic radio signals.

    [0008] WO 2009/104131 A1 relates to a pairing mode without user intervention, using a first secondary wireless module and a second secondary wireless module, which configured to facilitate the establishment of a trusted pair relationship.

    SHORT DESCRIPTION OF THE INVENTION



    [0009] The present invention provides method and apparatus according to the independent claims. Preferred embodiments thereof are defined in dependent claims.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0010] 

    FIG. illustrates a pairing system that may be implemented on a computing device in order to enable linking and sharing of resources with other devices, in accordance with various embodiments described herein.

    FIG. 2 illustrates a method for pairing two devices, according to embodiments described herein.

    FIG. 3 illustrates a method for configuring pairing of two devices, according to one or more embodiments.

    FIG. 4 illustrates a method for sharing data objects amongst paired devices, according to one or more embodiments.

    FIG. 5 illustrates a method for sharing application data amongst paired devices, according to one or more embodiments.

    FIG. 6 illustrates another embodiment in which two devices are paired to enable ongoing pairing and synchronization between the two devices, according to one or more embodiments.

    FIG. 7A through FIG. 7C illustrate inductive coupling and subsequent RF pairing between two devices, according to one or more embodiments.

    FIG. 8A through FIG. 8C illustrates object sharing amongst paired devices, in accordance with one or more embodiments.

    FIG. 9A through FIG. 9C illustrate a variation to object sharing amongst paired devices, in accordance with one or more embodiments.

    FIG. 10A through FIG. 10C illustrate application data sharing amongst paired devices, in response to occurrences of application events, according to one or more embodiments.

    FIG. 11A through FIG. 11C illustrate a variation to application data sharing amongst paired devices, in response to occurrences of application events, according to one or more embodiments.


    DETAILED DESCRIPTION



    [0011] Embodiments described herein enable a computing device to be paired to another device. In particular, embodiments enable devices to establish a secure and persistent pairing with one another across a wireless, radio-frequency communication medium, using credential information that is exchanged out-of-band (e.g. communicated inductively or through alternative communication mediums).

    [0012] According to an embodiment, credential information is received for enabling a computing device to communicate with another device. The credential information may be communicated using a first medium. The computing device may generate a link key for communicating with the second computing device over a second communication medium, using the credential information communicated over the first medium. The link key may be stored for use in pairing the first computing device to the second computing device repeatedly, so as to enable multiple communication sessions to be conducted using the same link key.

    [0013] In variations, both the first and second communication medium may be inductive. Still further, one communication medium may be through cloud computing.

    [0014] As used herein, the term "inductive" or "inductively" refers to use of electromagnetism to transfer an electrical signal. An inductive signal transfer uses electromagnetic flux variations or electromagnetic resonance to induce signal transfer. Electromagnetic resonance or evanescent coupling can enable inductive coupling even when the devices that are being coupled are physically separated from one another.

    [0015] Some embodiments described herein may be implemented using programmatic elements, often referred to as modules or components, although other names may be used. Such programmatic elements may include a program, a subroutine, a portion of a program, or a software component or a hardware component capable of performing one or more stated tasks or functions. As used herein, a module or component, can exist on a hardware component independently of other modules/components or a module/component can be a shared element or process of other modules/components, programs or machines. A module or component may reside on one machine, such as on a client or on a server, or a module/component may be distributed amongst multiple machines, such as on multiple clients or server machines. Any system described may be implemented in whole or in part on a server, or as part of a network service. Alternatively, a system such as described herein may be implemented on a local computer or terminal, in whole or in part. In either case, implementation of system provided for in this application may require use of memory, processors and network resources (including data ports, and signal lines (optical, electrical etc.), unless stated otherwise.

    [0016] Some embodiments described herein may generally require the use of computers, including processing and memory resources. For example, systems described herein may be implemented on a server or network service. Such servers may connect and be used by users over networks such as the Internet, or by a combination of networks, such as cellular networks and the Internet. Alternatively, one or more embodiments described herein may be implemented locally, in whole or in part, on computing machines such as desktops, cellular phones, personal digital assistances, laptop computers, printers, picture frames, tablets. Thus, memory, processing and network resources may all be used in connection with the establishment, use or performance of any embodiment described herein (including with the performance of any method or with the implementation of any system).

    [0017] Furthermore, some embodiments described herein may be implemented through the use of instructions that are executable by one or more processors. These instructions may be carried on a computer-readable medium. Machines shown in figures below provide examples of processing resources and computer-readable mediums on which instructions for implementing embodiments of the invention can be carried and/or executed. In particular, the numerous machines shown with embodiments of the invention include processor(s) and various forms of memory for holding data and instructions. Examples of computer-readable mediums include permanent memory storage devices, such as hard drives on personal computers or servers. Other examples of computer storage mediums include portable storage units, such as CD or DVD units, flash memory (such as carried on many cell phones and personal digital assistants (PDAs), and magnetic memory. Computers, terminals, network enabled devices (e.g. mobile devices such as cell phones) are all examples of machines and devices that utilize processors, memory, and instructions stored on computer-readable mediums.

    [0018] FIG. 1 illustrates a pairing system that may be implemented on a computing device in order to enable linking and sharing of resources with other devices, in accordance with various embodiments described herein. The system 100 can be implemented on various types of computing devices, such as for example, a portable computing device that includes wireless networking and/or telephony capabilities. In particular, embodiments described herein may apply to numerous kinds of mobile or small form-factor computing devices. As an example, the computing device may correspond to a device that includes roaming wireless network and/or telephony capabilities, including cellular telephony devices and/or mobile messengers. Other types of computing devices on which system 100 can be implemented on include laptops, notebooks and tablet devices. In some implementations, such devices are capable of providing cellular telephony features in combination with other applications, such as messaging, web browsing, media playback, personal information management (e.g., such as contact records management, calendar applications, tasks lists), image or video/media capture and other functionality. As a class, portable computing devices can have numerous types of input mechanisms and user-interface features, such as keyboards or keypads, multi-directional or navigation buttons, application or action buttons, and contact or touch-sensitive display screens. Some devices may include combinations of keyboard, button panel area, and display screen on one fagade. Other devices may include primarily a display fagade. Still further, one or more embodiments may be implemented through any type of computing device such as a desktop computer that is configured to include real-time voice data exchange (e.g. through use of Internet Protocol telephony).

    [0019] Computing device 10 may operate one or more connectivity applications 116 that control use of local wireless communication ports 117. For example, computing device 10 may include a Bluetooth application for controlling a Bluetooth communication port. Similarly the computing device 10 may include a WiFi application for controlling it WiFi communication port (e.g. for connecting to hotspot, other devices using WiFi Direct, access point connections, Ad-Hoc connections).

    [0020] According to some embodiments, the computing device 10 also includes an inductive signal interface 130. The inductive signal interface 130 may be structured to transmit power and/or data. In some implementations, the inductive signal interface 130 may include one or more coils which transmit power, as well as modulated inductive signals that carry data. For example, the inductive signal interface 130 may be implemented through use of magnetic coils and signaling protocol, implemented on Touchstone devices (manufactured by the Hewlett-Packard Inc.). In some variations, the inductive signal interface 130 is provided as a standardized NFC (Near Field Communication) port.

    [0021] The computing device 10 may also include a library of applications 112 which can operate as a high-level operating layer on the operating system of the device. In one embodiment, a user interface 114 may be provided as a component of the operating system, on which content and interfaces from other applications are presented.

    [0022] The pairing system 100 enables the computing device 10 to pair to other devices that have some similar capabilities and components as those described with computing device 10. In the example shown by FIG. 1, computing device 10 pairs to a second computing device 20, which for purpose of simplicity, can be assumed to include components that are equivalent or compatible to, for example, the pairing system 100 and the inductive signal interface 130. For example, the first and second computing devices 10, 20 may correspond to devices that are owned or operated by the user (or by different users), and which share resources for local wireless communications and inductive signal transfer (power and data). Accordingly, components and functionality that are described on computing device 10 for purpose of establishing pairing with the second computing device 20 may be assumed to have equivalents to components and functionality performed on the second computing device 20, for purpose of pairing to device 10. For brevity, computing device 10 is described in detail, as the description provided is applicable to the second computing device 20 (or other computing devices that may pair to the first computing device 10).

    [0023] On computing device 10, the pairing system 100 identifies non-secure identification information from the second computing device 20. This information can include, for example, (under the Bluetooth protocol) the location 127 and the name of the second device 20. Additionally, pairing system 100 generates a unique and secure link key 125 for the second computing device. Both types of information is then stored and used for subsequent pairing to the second computing device 20. The information may be stored in the pairing information data store 120.

    [0024] Once generated on the computing device 10, the link key 125 is persistent, in that it can be used by the first computing device 10 to pair to the second computing device 20 over multiple instances. Each time the two devices pair, a communication session is formed in which one or both devices exchange data with the other device. As described with other embodiments, the data that is exchanged may include objects (e.g. URLs), application data, content, or references to such data.

    [0025] Furthermore, the generation of the link key 125 enables computing device 10 to programmatically, or at least substantially automatically, pair to the second computing device 20 when the second computing device becomes available to the first computing device 10. In particular, the pairing between the two devices may occur over a local wireless communication medium, such as provided through the wireless port 117. When the two devices encounter one another (e.g. when the two devices are brought into range of the local wireless communication port), the link key 125 (along with the identifier 127 and location 129 of the second device 20) are used to automatically (or substantially automatically) pair the two devices together. As a result of the pairing, the one or both devices communicates data, using the communication medium of the local wireless communication port 117. As examples, the pairing between the first and second computing devices 10, 20 may correspond to the user pairing two mobile computing devices (e.g. smart phones), mobile computing device and other portable computer device (e.g. smart phone and tablet), or between any two computing devices (e.g. smart phone, tablet, laptop, personal computer).

    [0026] With further reference to FIG. 1, the pairing system 100 uses pairing services 110 and pairing information store 120. The pairing service 110 includes link logic 118, data share manager 122, resource selector 124, UI logic 126, and application logic 128. The link logic 118 receives credential information 121 that is transmitted from the second device 20. The credential information 121 includes (i) name 127 of the second device, (ii) location 129 of the second device. If the second device has a link key for the first computing device, the link key may be used to communicate the credential information and/or subsequent data. On the first device 10, the link logic 118 utilizes the credential information 121 to generate the link key 125. The link key 125 is used to conduct subsequent wireless communications with the first device 10 over the local wireless communication medium.

    [0027] According to at least some embodiments, the credential information 121 of the second computing device 20, used in generating the corresponding link key 125, may be received on the first device 10 over anyone of multiple communication mediums. As described with FIG. 1, some implementations enable the credential 121 information to be received over the local wireless communication port 117.

    [0028] According to some embodiments, the credential information 121 is received from an out-of-band medium (other than the wireless communication port 117). In particular, the first and second computing device 10, 20 can inductively couple to exchange credential information 121 over the inductive signal interface 130. Thus, the first computing device 10 can also transmit its credential information 123 to the second computing device 20 over the same inductive interface. The exchange of credential information 121, 123 over the inductive signal interface 130 provides the necessary data for establishing a connection using the local wireless communication port 117. The link logic 118 uses the credential information 121, without having to use any information or data communicated by the second computing device 20 across the local wireless communication port 117 (for which the link key is to be generated). Furthermore, the link logic 118 does not communicate the credential information 123 of the first computing device using the medium of the local communication port 117.

    [0029] Thus, the exchange of credential information 121, 123 over the inductive communication medium is complete in that it enables exchange of all data and information needed to establish a connection using the local wireless communication port 117. Moreover, the credential information 121, 123 is communicated amongst the devices without using the local wireless communication port 117.

    [0030] Once the link key 125 (as well as other information provided from exchange of credential information 121, 123) is established on the first computing device 10 (for use in communicating with the second computing device 20), the information is stored in the data store 120 for subsequent use (note data may alternatively be transaction bound or transient). In one embodiment, the devices are paired using the link key 125 (in other information established by the credential information) when the two devices are in range of one another on the medium of the local communication port 117. The pairing may be performed automatically and seamlessly, so that occurs with no user input. Alternatively, the pairing may be performed with some programmatic or automatic implementation, so that the user may enter some input (e.g. confirmation input), but does not have to, for example, select the particular device that he would like to pair to.

    [0031] At individual instances when the two devices are paired, the computing device 10 can enter into a data sharing mode with the second computing device in order to send and/or receive data. The resource selector 124 may identify what data is to be selected for transmission to the second computing device 20. In one embodiment, the resource selector 124 may utilize user input and/or settings 127 in order to identify what data is to be selected and transmitted. The user input and/or settings 127 may identify preferences of the user as to what data is to be communicated to the second computing device 20, as well as the user's preference for the level of automation in transferring such data (e.g. fully automated versus prompting versus manual selection).

    [0032] The resource selector 124 may also include UI logic 126 and application logic 128 for identifying data that is to be communicated to the second computing device 20. Depending on design implementations, user settings, and other parameters, data identified to be transmitted to the second computing device 20 may be identified from the user interface logic 126 and/or application logic 128. In particular, one or more embodiments provide that data is selected, or preselected, for transmission to the second computing device based on the state of the user interface 114. The input 137 of the state of the user interface 114 may identify, for example, the particular application that is in focus or in use, or alternatively the content item that the user has selected to be in focus/in use or otherwise shared. In this way, the UI logic 126 may identify what object, application data, content, or other information is to be communicated when the first and second computing devices 10, 20 are paired over the local wireless communication port 117.

    [0033] As an addition or alternative, application logic 128 drives, or otherwise selects what object, application data or content is to be communicated to the second computing device 10. The application logic 128 may be responsive to specific application events and parameters 129, and may identify objects or data that is in use on the application. For example, the application event 129 may correspond to an incoming phone call, which causes the application logic 128 to identify caller information and route data corresponding to the incoming phone call to the paired second computing device 20.

    [0034] The resource selector 124 can also use priority schemes, rules and logic in identifying what data is to be shared from the computing device 10 when the computing device is paired to the second computing device 20.

    [0035] The data share manager 122 communicates selected data 135 to the second computing device 20. The selected data 145 may correspond to, for example, an object (e.g. URL, record, image file, media file) that can be handled by a corresponding application on the second computing device 20. As an alternative or addition, the selected data 145 may be application data, generated to replicate operation of an application on the second computing device 20. The pairing services 110 may utilize the connectivity application 116 for the local wireless communication port 117 in order to communicate the selected shared data 145 to the second computing device 20. The connectivity application 116 may utilize the link key 125, as well as location information (or device address) and identification information of the second device 20 in maintaining and exchanging communications with the second computing device 20. The link key 125 may be communicated to the connectivity application 116 by, for example, link logic 118. The link logic 118 may retrieves\ the link key 125 (and other information for establishing and using the link to the second computing device 20) from the pairing information store 120. The pairing information data store 120 maintains a list of known devices 131 (e.g. devices that have previously been paired with computing device 10). Additionally, some embodiments provide that the pairing information data store 120 may maintain a list 133 of devices that are on a common profile (e.g. same user profile). Other information may also be maintained by the pairing information data store 120, such as, for example, device types and/or resources available on known devices (e.g. screen size).

    [0036] The data share manager 122 communicates the selected data ("shared data 145") to the connectivity application 116, for transmission to the second device 20 using the local wireless communication port 117. Alternatively, the data share manager 122 (or other component of the pairing services 120) may direct one of the applications 112 or other component to communicate selected data to the second computing device 20 using the connectivity application 116 and local wireless communication port 117. In one embodiment, the connectivity application 116 corresponds to Bluetooth application. Under normal Bluetooth operations, the Bluetooth application encrypts the selected data 135 when transmitting to the second computing device 20.

    [0037] When pairing occurs, the communications between the devices may be bidirectional. Data share manager 122 may process data, received through operation of the connectivity application 116. In one embodiment, the device 10 receives an object. The data share manager 122 identifies an application for the object, and forwards the object to the application for use. The application logic 128 may further trigger the application receiving the object to launch and to utilize the object received from the second device.

    [0038] In another embodiment, the device 10 receives application data. The application data may be communicated in response to an application event, such as a call connect event, messaging event or notification. The application data may be communicated to a corresponding application in order to enable the application to partially or completely respond to the application event (e.g. receive message, handle notification, receive or complete call connect). In such embodiments, the data share manager 122 may be configured to make objects 145 and application data 147 available for use by the appropriate application.

    METHODOLOGY



    [0039] FIG. 2 through FIG. 6 illustrate various methods for operating computing devices to pair computing devices such as described with an embodiment of FIG. 1 to one another, according to one or more embodiments. Accordingly, reference is made to FIG. 1 for purpose of illustrating suitable components and elements for implementing a step or sub step being described.

    [0040] In FIG. 2, a method is described for enabling repeated pairing of computing device 10 to second computing device 20, according to one or more embodiments. In an embodiment, the computing device 10 exchanges credential information 121 with the second computing device 20 in order to generate the link key 125 (210). As described with an embodiment of FIG. 1, the pairing services 120 of the computing device 10 generate the link key 125 for the second computing device 20 using credential information 121 that is communicated from the second device 20. The link logic 118 also communicates the credential information 123 of the device 10 to the second computing device in order to enable that device to generate a corresponding link key for the first computing device 10.

    [0041] According to one or more embodiments, the computing devices 10, 20 exchange respective credential information 121, 123 using an out-of-band medium (212). The out-of-band medium corresponds to a communication medium other than the one that is to be used with the pairing using the link key 125. As described with an embodiment of FIG. 1, the out-of-band communication medium may correspond to an inductive communication channel (211). As an alternative or variation, alternative out-of-band communication mediums may be used. Specific examples include (i) RF transports other than the transport of the local communication medium (e.g. use cellular or WiFi link to receive credential information 121, for use in establishing Bluetooth link); (ii) physical connector, such as provided by a USB type connector or FireWire; (iii) optical coupling (e.g. infrared); (iv) acoustic coupling, or (v) QR similar system.

    [0042] While out-of-band connectivity may be used to exchange the credential information 121, in-band connectivity may also be used to receive the credential information (214). In particular, in-band connectivity may be used when, for example, the computing device 10 is seeking to establish pairing with another device that does not have the same resources (e.g. no inductive signal interface 130).

    [0043] In some implementations, the generation of the link key 125 on the computing devices 10, 20 coincides or is concurrent with the two computing devices being paired. For example, in some embodiments, the first and second computing devices exchange credential information 121, 123 when the two devices are inductively coupled. This may correspond to the act of the user bringing the two devices together, in a manner that enables the inductive signal interface 130 (of the computing device 10) and of the second computing device to exchange data. With exchange of the credential information 121, 123, and generation of the link key 125, the two devices may also be auto paired so that they can communicate using, for example, a Bluetooth communication medium or some other local wireless connection.

    [0044] In contrast to more conventional approaches, embodiments enable the use of out-of-band communication mediums (e.g. inductive coupling) to securely generate a link key for use in pairing the two devices together using a local wireless communication medium. The out-of-band communication can also eliminate the need for requiring the user to select what device he or she wants to be paired with. For example, the user may tap the two inductive signal interfaces of the computing device 10, 20 in order to generate the link key for enabling subsequent wireless communications between the two devices. The activity causes the inductive coupling (e.g. to tap between the two devices) to coincide with the act of the user selecting what device he or she wants to pair with.

    [0045] The pairing across a local wireless communication medium is session-based, meaning that pairing terminates when, for example, one device becomes unavailable, when a sharing mode or task is complete, or when the two devices are separated by a distance that is outside of the range of the local wireless communication medium. The link key 125 may be stored on the computing device 10 (and conversely, the corresponding link key for device 10 may be stored on the second computing device 20) to enable future pairings between the two devices using the local wireless communication port 117.

    [0046] According to some embodiments, the pairing between the two computing devices 10, 20 is repeated using the link key 125. In some embodiments, the two computing devices auto-pair using their respective link keys 125 based on proximity triggers 120 (220). The proximity triggers can include presence merely of one or both devices, sufficient to establish connectivity using the local wireless communication medium of the link key 125 (222). In other embodiments, other proximity triggers are used. In particular, one or both devices may employ sensors (e.g. optical, acoustic) to detect the presence of the other computing device (224). Alternatively, RF sensors may be used. For example, the link key 125 may be generated for use in establishing pairing over a medium such as cellular or WiFi. Bluetooth proximity determination may be used to identify when the two devices are in sufficient proximity to one another. Still further, some embodiments may auto pair the two devices when they are brought in close proximity or contact to one another (226). For example, an inductive signal interface such as described with FIG. 1 may be used to determine either proximity or contact. When such proximity/contact is made, one or both devices 10, 20 uses the link key 125 to establish a connection using the local wireless communication medium 117.

    [0047] Upon proximity triggers being detected, the two devices 10, 20 auto select one another for pairing, using the link key 125 (240). In contrast to many conventional approaches, the two devices may auto pair using the link keys communicated out of band, over multiple communication sessions.

    [0048] FIG. 3 illustrates a method for configuring pairing of two devices, according to one or more embodiments. A pairing event occurs that triggers two devices into pairing with one another (310). The pairing event may correspond to a first instance when two devices are coupled for pairing (introduction), or to subsequent instances after introduction of the two devices. As described with other embodiments, the pairing event may be triggered by a proximity or presence trigger amongst the two devices. In particular, to devices may pair when (i) in presence of one another, as determined by, for example, a local communication port (312), sensor (e.g. optical or acoustic) (314), or contact or close proximity (316). As described with an embodiment of FIG. 1, contact detection may be made through inductive coupling. However, sensors in combination with accelerometers and/or other components may alternatively be used to determine when two devices contact one another.

    [0049] Once pairing is triggered, embodiments provide that a determination is made as to the pairing relationship (320). In particular, embodiments recognize that different levels of pairing may be warranted, depending on a variety of factors, including user or manufacturing preferences, security, and/or compatibility. According to some embodiments, one or more of the following determinations may be made: (i) the devices 10, 20 are being introduced (322); (ii) the devices 10, 20 are associated with different profiles (324); (iii) the devices 10, 20 are subject to restricted pairing by one or more rules (such as set forth by the manufacturer or wireless carrier) (326). The determination as to whether two devices are being introduced may be made on each device by comparing the received credential information to a list of devices that are known (i.e. previously connected to) to that device. The list of known devices 131 may be stored in the pairing information data store 120. The determination as to whether the devices are on same profile may be based on using credential information 121, 123, as exchanged by the two devices. Credential information such as device identifier may be compared to lists of devices that are on the user's profile. Such lists may be maintained on, for example, the pairing information data store 120. Another determination that can be made is that no restrictions are to be placed on the pairing (328), based on for example, the two devices having previously been introduced and/or being sharing the same profile.

    [0050] Pairing operations are then performed using configurations as provided by the pairing determination (330). Various pairing configurations may be employed. Among them, the pairing configuration may require UI presence and interaction from the user (332). For example, if the devices 10, 20 or being introduced in the first pairing, the UI on each device may generate prompts that require input from the user(s) in order to confirm that data is to be transferred from one device to the other. Likewise, if two devices are not on the same profile, UI presence may be required, as the data transfer would be between two different users, rather than the same user.

    [0051] As an alternative of variation, the pairing configurations may be limited in what is to be shared. For example, if two devices are determined to not be on the same profile, then there may be limitations as to what can be shared by the two devices. For example, emails or other information may not transfer, while content that is in focus on one device may transfer to the other. Additionally, if two devices are of different types, manufacturing or provider rules may preclude a full data transfer that would otherwise be permitted if the two devices were of the same type.

    [0052] Still further, the configuration of the pairing may be seamless (326). Such pairing may seamlessly cause the transfer of data from one device to the other. Under seamless transfers, background tasks may be used to synchronize records amongst two devices, and to transfer application data in response to designated application events. User settings and pre-determined input may also be used to identify what specific kind of data transfer or to be fully automated, partially automated, or made manual.

    USAGE IMPLEMENTATIONS



    [0053] FIG. 4 illustrates a method for sharing data objects amongst paired devices, according to one or more embodiments. Computing devices may pair using credential information that is communicated to the respective devices using an out-of-band communication medium (410, 412). For example, each device may communicate its respective credential information using an inductive signal interface. The pairing establishes a link key that each device can use to communicate with the other device over a local communication port.

    [0054] While embodiments provide that each device can transmit or receive in the paired relationship, the example shown by FIG. 4 assumes one device ("Device A") communicates a data object to another device ("Device B") using, for example, a local wireless communication medium. In communicating the data object, Device A includes logic (e.g. resource selector 124) to identify what data object is to be selected and communicated (420). In one embodiment, the selection of the data object is made automatically, or substantially automatically using programmatically implemented logic. The selection of the data object may occur in response to a trigger. Examples of triggers that can result in the selection of a data object include: (i) an inductive trigger, corresponding to one or both devices inductively detecting the other; (ii) an RF link trigger, corresponding to one or both devices detecting one another across a communication medium; (iii) application state, such as one application being in focus or in a particular manner of use; (iv) an application event (v) pre-set user settings, and/or (vi) affirmative user input. The data object that is selected may be associated with the particular trigger. In this regard, the object transfer may include object identification and transfer. The object transfer may be performed responsively (e.g. automatically, or substantially automatically) in response to an associated or designated event.

    [0055] With regard to inductive coupling, the triggering event may coincide with, for example, one or more devices detecting the other device over the inductive communication medium, authenticate the other device, and enumerating information about themselves. An RF link trigger may coincide with, for example, devices becoming in range of one another for purpose of establishing local communication medium. The application event can be application specific, and associated with any event that is designated to cause a sharing of information. Specific examples include a call connect event, and messaging event (receiving or transmitting a message, or a notification generated by one application. The user may also specify settings that identify what triggers aren't to cause data sharing (assuming devices are paired and actively communicating). For example, the user may designate the device 10 to be responsive to inductive triggers, but not application events. Additionally, the user can enter manual input in order to the identified content that is to be shared.

    [0056] On Device B, the object is received 432 over, for example, the local communication medium. The object may be associated with an application type, which may be identified by the receiving device. The application may be executed (442) (assuming the application is not already opened). An operation is then performed by the application (444), using the object communicated from the Device A. FIG. 7A through FIG. 7C and FIG. 8A through FIG. 8C illustrate examples of the transfer of an object corresponding to a URL, and its use thereof. As an alternative or addition, the object may be saved on Device B.

    [0057] According to embodiments, much of the data exchange through the pairing between device A and device B is automatically communicated and/or used (446). Accordingly, for example, the object may be placed in use on device B without user input. This may correspond to the object being utilized in an application (which may require the application to be opened) in a manner that is automated.

    [0058] FIG. 5 illustrates a method for sharing application data amongst paired devices, according to one or more embodiments. Devices may pair in a manner described with, for example, prior embodiments (510, 512). In an embodiment, one or both devices may be configured to respond to a particular application event. Application events can include those requiring tasks or operations performed by specific application as, including background tasks or operations performed when the application is in active use. Specific examples of application events include call connect events (user receives or places call), messaging events (device receives or sends message), and/or notifications. Device A may be configured to detect the application event (520). The application event may be detected by a corresponding application (one that handles the event), or by some other programmatic component of the device.

    [0059] The application receiving the application event may execute on the Device A (530). According to some embodiments, at least part of the response to the application event can be performed on Device B. In such embodiments, Device A may execute by launching (if application not opened). Device A may execute the application by generating application data for completing operations in response to the application event. The application data is then transferred to Device B using the medium of the pairing (540). For example, Device A transfers application data to Device B using the local wireless communication medium (e.g. Bluetooth, WiFi).

    [0060] Device B receives the application data in response to the occurrence of the application event (542). In response, Device B opens the corresponding application (552) and performs operations for completing the response to the application event (562).

    [0061] FIG. 6 illustrates another embodiment in which two devices are paired to enable ongoing pairing and synchronization between the two devices, according to one or more embodiments. With reference to FIG. 6, Device A and Device B can be inductively coupled to exchange credential information. The process by which the two devices are inductively coupled may correspond to one or more the following: (i) the two devices may exchange data in connection with one device inductively supplying power to the other device; (ii) the two devices may exchange data through inductive communication medium. In the latter case, inductive coupling may be achieved by simple tap between two devices. Still further, inductive coupling may be achieved by bringing devices sufficiently proximate to one another to trigger coil response.

    [0062] The two devices may pair using credential information exchange over the inductive medium (620, 622). As described with some other embodiments, the pairing may be achieved over local wireless communication medium, such as provided by Bluetooth or WiFi.

    [0063] When the pairing over the local wireless communication medium is achieved, one or both devices may synchronize with the other (630, 632). Synchronization on each device may correspond to one or more of the following: (i) device overwrites some or all of its records with records received from another device, (ii) device analyzes records with information (or records) received from another device in order to identify changes, modifications, additions, or deletions, and/or (iii) device communicates records and/or information about records to the other device.

    [0064] Synchronization may be performed on different collections of records and data. Examples of data files that can be synchronized amongst two devices include: emails folders, SMS and/or MMS messaging folders, pictures, media collections (e.g. music), documents, applications and personal information records such as contact records, calendar events.

    [0065] In some embodiments, while the devices are paired, each performs operations to maintain a synchronized state between the two for example, one or both devices may periodically communicate an update to the other device (640, 642). The update may have the form of metadata, or the actual records/data sets that are to be maintained on each device. Alternatively, one or both devices may synchronize a collection of records or datasets a response to an event that alters the collection. For example, if email records are being synchronized amongst the two devices, Device A may generate an outgoing communication to synchronize Device B, based on Device A receiving the change. The latter implementation may be most pertinent when only one of the two devices has capability to be updated. For example, if Device A includes cellular messaging capabilities, and Device B does not, the update to Device A may be received from a cellular data channel and then communicated to Device B. Likewise, Device B may receive updates through user input, and then communicate those updates to Device A.

    [0066] As shown by an embodiment of FIG. 6, when pairing is accomplished through exchange of credential information that is passed through an out-of-band medium (e.g. inductive channel), the out-of-band data (or keys generated therefrom) can be treated as authenticating when used in subsequent communication sessions. Among other benefits, embodiments recognize that the link key generation through the passage of credential information over the inductive channels enables automatic device pairing for various applications, such as synchronization. In particular, embodiments provide that the link key generated through the passage of credential information over the inductive medium enables the two devices to automatically pair over a local wireless communication medium repeatedly 650, 652), to establish multiple communication sessions. Thus, if as shown, the two devices terminate a communications session (e.g. one device turns of or leaves range of RF medium), the link key established using the inductive channel can be used to automatically pair the two devices when the two devices encounter one another over the wireless communication medium. Once paired, the two devices automatically perform a designated set of operations, such as synchronization operations.

    [0067] FIG. 7A through FIG. 7C, FIG. 8A through FIG. 8C , FIG. 9A through FIG. 9C, FIG. 10A through FIG. 10C, and FIG. 11A through FIG. 11C each illustrate an implementation for auto-pairing two devices using a combination of inductive credential exchange and wireless communications, according to one or more embodiments. The examples provided illustrate pairing as between a mobile computing device 710 and a tablet device 720. Each device is equipped with an inductive signal interface (not shown). On the device 710, the inductive signal interface is provided on a rear fagade of the device. On the tablet 720, the inductive signal interface is provided on a front surface.

    [0068] FIG. 7A through FIG. 7C illustrate inductive coupling and subsequent RF pairing between two devices, according to one or more embodiments. The inductive pairing is accomplished by bringing the two devices 710, 720 into contact with one another. In particular, a user can align surfaces of the two devices so that the coils of the respective devices are aligned. (see FIG. 7A). The user then taps (or brings into contact) one device against the other, with coils maintaining alignment. In one embodiment, when the coils are in alignment and brought near one another, the user is provided a visual feedback on the screen of one or both devices. The visual feedback indicates to the user that the coils of the two devices are aligned sufficiently to initiate an inductive pairing.

    [0069] In the example provided, the visual feedback as provided by way of a halo 720, which propagates across at least a portion of the display area. In at least some variations, the halo 712 indicates that the inductive pairing of the two devices is ongoing, or alternatively complete. Additional or alternative indicators may be provided, including audible or vibration indicators.

    [0070] In order to effectuate an effective exchange of credential information, embodiments provide that the two devices need only to be momentarily tapped. In the act of tapping, one or both devices may identify the other, use inductively exchanged information to authenticate the other device, enumerate, and further pass additional data such as credential information for enabling generation of a link key to enable the two devices to securely pair to one another using a local wireless communication port.

    [0071] In FIG. 7A, the halo 712 indicates that the coils are aligned properly. As mentioned, other visual indicators may be used. The inductive coupling between the two devices results in the two devices being paired across a local wireless communication port. FIG. 7B illustrates that each device conveys a message for when the wireless link is established. FIG. 7C illustrates that when the devices are connected, Bluetooth (or other indicators) show each device as being wirelessly connected.

    [0072] FIG. 8A through FIG. 8C illustrates object sharing amongst paired devices, in accordance with one or more embodiments. In the example provided, device 710 operates (or has in focus) a browser application that utilizes a URL. The URL may correspond to an object that can be passed to the tablet device 720. In FIG. 8A the two devices are inductively coupled, generating the halo 712. In the implementation depicted, the browser on the device 710 carded, while a new application card is launched on the tablet device 720. The depiction of cards corresponds to windows in which application content is displayed. When an application is carded on one device, it coincides with the window carrying the application content being reduced and made into an object that can be moved or discard it. Furthermore, in the example provided, the tablet device 720 launches its browser and uses the past URL to navigate the corresponding page. The launch of the browser, and use of the URL by the browser, may be performed automatically on the tablet 720. That webpage may be displayed on the screen of the tablet. In the example provided, the webpage is displayed in a full-screen mode, in order to take advantage of the added display screen and resources of the tablet 720 (as compared to the mobile device 710).

    [0073] FIG. 9A through FIG. 9C illustrate a variation to object sharing amongst paired devices, in accordance with one or more embodiments. In contrast to the examples provided by FIG. 8A through FIG. 8C, FIG. 9A through FIG. 9C depict content as being initially displayed on the tablet device 720 prior to inductive pairing with the mobile device 710. In FIG. 9A, the inductive pairing occurs with the mobile device 710 being tapped against a tablet device 720. With the content displayed in the tablet device, the halo 712 is overlaid on the displayed application content. FIG. 9B content being carded on the tablet device 720. A card is introduced on the mobile device 710, carrying the application content from the tablet device 720. As described with other embodiments, after the devices are inductively paired (as shown by FIG. 9A), the tablet device 720 transmits wirelessly (over a local RF communication medium) in object corresponding to a URL. On the mobile device 710, the browser is launched, and the URL is used by the browser to navigate to the webpage previously rendered on the tablet 710. In FIG. 9C, both devices render the browser content as located by the URL that is transmitted from the tablet device.

    [0074] FIG. 10A through FIG. 10C illustrate application data sharing amongst paired devices, in response to occurrences of application events, according to one or more embodiments. FIG. 10A through FIG. 10C assume devices are paired and in communication over a local RF link (e.g. Bluetooth). As described with prior embodiments, the local RF link may be established using data communicated by the inductive pairing, which authenticates and selects the devices for secure communications with one another. Once paired, the two devices may share application data responsive to application events. In one embodiment, mobile device 710 may receive an incoming phone call (application event). The incoming phone call may correspond to a call connect event. Other call connect event include, for example, the user attempting to operate one or the other device to place a call.

    [0075] In an embodiment, when the two devices are paired, the mobile device 710 automatically notifies the tablet device 720 of the incoming call. The tablet device 720 may lack telephony resources in and of itself, but may be telephonically enabled when paired to the mobile device 710. The user may provide settings or input to enable automatic notification of incoming calls, as well as other application events, which can be provided on one or both devices. Alternatively, when the user receives a telephone call on the mobile device 710, he may perform some action on one or the other device to cause application data associated with incoming phone call to be transferred to the tablet device 720.

    [0076] According to an embodiment, the application data communicated from one device to the other may cause the receiving device to launch a corresponding application. In the example provided, mobile device 710 communicates application data corresponding to information about the incoming call. The tablet device 720 may launch a phone application to handle the data communicated from the incoming call. In this regard, the tablet 720 may operate in a headset mode with the device 710. FIG. 10B illustrates that the application interface provided on the tablet may include many of the same functions provided on the mobile device, such as call conferencing, hang-up, mute, and dialpad functionality. Thus, the management functions that are used on the mobile device 710 can be replicated on the tablet 720. Such features include dialing phone calls, answering incoming calls, hanging up calls, rejecting calls. More advanced functionality includes multi-party call features such as call waiting, swapping calls, conferencing calls, pulling calls out of conference into private calls FIG. 10C illustrate that the user can transfer a call from the phone 710 to the table7 720 using the local RF link.

    [0077] FIG. 11A through FIG. 11C illustrate a variation to application data sharing amongst paired devices, in response to occurrences of application events, according to one or more embodiments. FIG. 11A and FIG. 11B illustrate an application event corresponding to the user placing a call. When the two devices are synced, they launch a telephony application on either device in order to initiate a phone call. In some embodiments, the tablet device 720 lacks telephony resources in and of itself. The tablet device 720 can be used as a telephony device only if it is paired with the mobile device 710. If the user initiates the phone call from the mobile device 710, or uses the tablet when the two devices are paired, the call connect event can be accomplished. If however, the user initiates the call connect from the tablet device 720 when the two devices are not paired, the application running on the tablet device 720 is inoperable, at least for the purpose of connecting the call.

    ALTERNATIVES AND VARIATIONS



    [0078] Numerous alternatives and variations exist to embodiments described herein. In one embodiment, devices share input. For example, a user may interact with the touch-screen of the tablet device 720 in order to enter the same input on the mobile device 710. Specific inputs that can be enhanced with sharing include those relating to movement or motion by the user other than direct contact with a physical interface of the device. For example, one device may include gesture detection resources to detect a user making gestures with fingers or arms. The gesture recognition may be processed as input, and shared by one device to the other (using pairing as described herein).

    [0079] As another example, one device may share its accelerometer information with the other as a result of being auto-paired. For example, with reference to FIG. 7A through FIG. 7C, the mobile device 710 may bemoved (e.g. jerked or thrown), resulting in generation of accelerometer information. The motion (or ccelerometer use) may further trigger the accelerometer input to be communicated to the tablet device 720. A user may enter input by, for example, throwing' his device in a direction of the tablet 720.

    [0080] It is contemplated for embodiments described herein to extend to individual elements and concepts described herein, independently of other concepts, ideas or systems, as well as for embodiments to include combinations of elements recited anywhere in this application. Although illustrative embodiments of the invention have been described in detail herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments. As such, many modifications and variations will be apparent to practitioners skilled in this art. Accordingly, it is intended that the scope of the invention be defined by the following claims and their equivalents. Furthermore, it is contemplated that a particular feature described either individually or as part of an embodiment can be combined with other individually described features, or parts of other embodiments, even if the other features and embodiments make no mentioned of the particular feature. Thus, the absence of describing combinations should not preclude the inventor from claiming rights to such combinations.


    Claims

    1. A method for pairing a first computing device (10) having a first inductive coil, with a second computing device (20) having a second inductive coil, the method performed by one or more processors of the first computing device (10) and comprising:

    (a) establishing, via an inductive out-of-band communication medium, a communication link with the second computing device;

    (b) receiving credential information (121) of the second computing device (20) over the inductive out-of-band communication medium;

    (c) generating a link key (125), using the credential information (121) for pairing with the second computing device (20) over a wireless communication medium;

    (d) sending credential information (123) of the first computing device (10) through the out-of-band communication medium to the second computing device (20) to enable the second computing device (20) to generate the link key (125);

    (e) storing the link key (125) to pair with the second computing device (20) over multiple communication sessions, wherein each of the multiple communication sessions corresponds to a wireless pairing and unpairing with the second computing device (20);

    (f) in response to an inductive trigger, establishing pairing with the second computing device (20) using the link key (125),

    (g) and automatically sending data to the second computing device (20) in response to establishing pairing, the data comprising application data corresponding to an application running on the first and second computing devices to enable functions associated with the application on the second computing device (20), wherein said functions are not operable on the second computing device (20) when not paired with the first computing device (10);

    wherein the inductive trigger comprises an inductive coupling of the first and the second computing device by alignment of the first and second inductive coils, and wherein the alignment of the first and second inductive coils is indicated via a visual indicator generated on the display of at least one of the first or second computing devices.
     
    2. The method of claim 1, wherein the first computing device utilizes the stored link key to connect with the second computing device over a plurality of communication sessions.
     
    3. The method of claim 1, wherein pairing the computing device with the second computing device using the link key, in each of the multiple communication sessions is performed automatically in response to detecting that the second computing device is in communication with the first computing device.
     
    4. The method of claim 1, wherein the visual indicator corresponds to a halo rendered on the display of the at least one of the first or second computing devices.
     
    5. The method of claim 1, wherein the first and second computing devices correspond to a mobile computing device and a tablet device.
     
    6. The method of claim 1, further comprising:
    in response to sending the application data, analyzing and synchronizing a set of records corresponding to the application running on each of the first and second computing devices.
     
    7. The method of claim 1, wherein an application event causes a user notification to be displayed on at least one of the first or second computing devices, and wherein the other of the first or second computing devices renders a graphic corresponding to the application event.
     
    8. The method of claim 1, further comprising the steps of:

    (d1) determining a pairing configuration via a wireless communications link for the first and second computing devices based on the credential information;

    (e1) storing the pairing configuration to pair with the second computing device over the multiple communication sessions.


     
    9. The method of claim 8, wherein (c2) includes determining whether the first and second computing devices have previously paired.
     
    10. The method of claim 8, further comprising:
    generating a user prompt for user-input to pair with the second computing device.
     
    11. The method of claim 8, wherein (c2) includes determining whether the first and second computing devices are associated with a common profile.
     
    12. The method of claim 11, wherein in response to determining that the first and second computing devices are not associated with the common profile, configuring the first computing device to limit resources to be shared with the second computing device.
     
    13. A first computing device comprising:

    a first inductive signal interface;

    a local communication port;

    a memory resource; and

    one or more processors coupled to operate the first inductive signal interface and the local communication port;

    wherein the one or more processors are configured to:

    establish, using the inductive signal interface, and inductive out-of-band communication link with a second computing device, wherein the second computing device includes a second inductive signal interface;

    receive credential information for the second computing device over the inductive out-of-band communication link via the inductive signal interface;

    generate a link key using the credential information for pairing, using a local communication port, with the second computing device, wherein the link key is stored in the memory resource for use in wireless pairing with the second computing device; and

    send credential information of the first computing device through the out-of-band communication link to the second computing device to enable the second computing device to generate the link key;

    store the link key to pair with the second computing device over multiple communication sessions, wherein each of the multiple communication sessions corresponds to a wireless pairing and unpairing with the second computing device;

    in response to an inductive trigger, establish pairing with the second computing device using the link key,

    and automatically send data to the second computing device in response to establishing pairing , the data comprising application data corresponding to an application running on the first and second computing devices to enable functions associated with the application on the second computing device, wherein the said functions are not operable on the second computing device when not paired with the first computing device;

    and

    wherein the inductive trigger comprises an inductive coupling of the first and the second computing device by alignment of the first and second inductive coils, and wherein the alignment of the first and second inductive coils is indicated via a visual indicator generated on the display of at least one of the first or second computing devices.


     
    14. The first computing device of claim 13, wherein
    the one or more processors are further configured to generate a link key for a third computing device using credential information exchanged with the third computing device via the inductive signal interface.
     


    Ansprüche

    1. Ein Verfahren zum Paarbilden bzw. Koppeln einer ersten Recheneinrichtung (10) mit einer ersten induktiven Spule mit einer zweiten Recheneinrichtung (20) mit einer zweiten induktiven Spule, wobei das Verfahren durch einen oder mehrere Prozessoren der ersten Recheneinrichtung (10) durchgeführt wird und Folgendes aufweist:

    (a) Einrichten, über ein induktives Out-of-Band-Kommunikationsmedium bzw. außerbandiges Kommunikationsmedium, einer Kommunikationsverbindung mit der zweiten Recheneinrichtung;

    (b) Empfangen von Credential- bzw. Berechtigungsnachweisinformation (121) von der zweiten Recheneinrichtung (20) über das induktive Out-of-Band-Kommunikationsmedium;

    (c) Generieren eines Verbindungsschlüssels (125) unter Verwendung der Berechtigungsnachweisinformation (121) zum Koppeln mit der zweiten Recheneinrichtung (20) über einen Drahtloskommunikationsmedium;

    (d) Senden von Berechtigungsnachweisinformation (123) von der ersten Recheneinrichtung (10) durch das Out-Of-Band-Kommunikationsmedium an die zweite Recheneinrichtung (20), um es der zweiten Recheneinrichtung (20) zu ermöglichen bzw. diese zu aktivieren, den Verbindungsschlüssel (125) zu generieren;

    (e) Speichern des Verbindungsschlüssels (125) zum Koppeln mit der zweiten Recheneinrichtung (20) über mehrere Kommunikationssitzungen, wobei jede der mehreren Kommunikationssitzungen einer drahtlosen Koppelung und Entkoppelung mit der zweiten Recheneinrichtung (20) entspricht;

    (f) ansprechend auf einen induktiven Auslöser, Einrichten einer Koppelung mit der zweiten Recheneinrichtung (20) unter Verwendung des Verbindungsschlüssels (125),

    (g) und automatisches Senden von Daten an die zweite Recheneinrichtung (20) ansprechend auf Einrichten einer Koppelung, wobei die Daten Anwendungsdaten aufweisen, die einer Anwendung entsprechen, die auf der ersten und zweiten Recheneinrichtung läuft um Funktionen zu aktivieren, die mit der Anwendung auf der zweiten Recheneinrichtung (20) assoziiert sind, wobei die Funktionen auf der zweiten Recheneinrichtung (20) nicht betreibbar sind, wenn sie nicht mit der ersten Recheneinrichtung (10) gekoppelt ist;

    wobei der induktive Auslöser eine induktive Koppelung der ersten und zweiten Recheneinrichtung aufweist durch Ausrichtung der ersten und zweiten induktiven Spulen, und wobei die Ausrichtung der ersten und zweiten induktiven Spulen über einen visuellen Indikator angezeigt wird, der auf der Anzeige wenigstens einer von der ersten und zweiten Recheneinrichtung generiert wird.
     
    2. Verfahren nach Anspruch 1, wobei die erste Recheneinrichtung den gespeicherten Verbindungsschlüssel nutzt zum Verbinden mit der zweiten Recheneinrichtung über eine Vielzahl von Kommunikationssitzungen.
     
    3. Verfahren nach Anspruch 1, wobei die Koppelung der Recheneinrichtung mit der zweiten Recheneinrichtung unter Verwendung des Verbindungsschlüssels in jeder der mehreren Kommunikationssitzungen automatisch durchgeführt wird ansprechend auf Detektieren, dass die zweite Recheneinrichtung in Kommunikation mit der ersten Recheneinrichtung ist.
     
    4. Verfahren nach Anspruch 1, wobei der visuelle Indikator einem Halo entspricht, der auf der Anzeige der wenigstens einen von der ersten oder zweiten Recheneinrichtung wiedergegeben wird.
     
    5. Verfahren nach Anspruch 1, wobei die erste und zweite Recheneinrichtung einer mobilen Recheneinrichtung und einer Tablet-Einrichtung entsprechen.
     
    6. Verfahren nach Anspruch 1, das weiter Folgendes aufweist:
    ansprechend auf Senden der Anwendungsdaten, Analysieren und Synchronisieren eines Satzes von Aufzeichnungen entsprechend der Anwendung, die auf jeder der ersten und zweiten Recheneinrichtung läuft.
     
    7. Verfahren nach Anspruch 1, wobei ein Anwendungsereignis bewirkt, dass eine Nutzerbenachrichtigung auf wenigstens einer von der ersten oder zweiten Recheneinrichtung angezeigt wird und wobei die andere von der ersten oder zweiten Recheneinrichtung eine Grafik entsprechend dem Anwendungsereignis rendert bzw. wiedergibt.
     
    8. Verfahren nach Anspruch 1, das weiter die folgenden Schritte aufweist:

    (d1) Bestimmen einer Koppelungskonfiguration über eine Drahtloskommunikationsverbindung für die erste und zweite Recheneinrichtung basierend auf der Berechtigungsnachweisinformation;

    (e1) Speichern der Koppelungskonfiguration zum Koppeln mit der zweiten Recheneinrichtung über die mehreren Kommunikationssitzungen.


     
    9. Verfahren nach Anspruch 8, wobei (c2) Bestimmen aufweist, ob die erste und zweite Recheneinrichtung zuvor gekoppelt gewesen sind.
     
    10. Verfahren nach Anspruch 8, das weiter Folgendes aufweist:
    Generieren einer Nutzeraufforderung für eine Nutzereingabe zum Koppeln mit der zweiten Recheneinrichtung.
     
    11. Verfahren nach Anspruch 8, wobei (c2) Bestimmen beinhaltet, ob die erste und zweite Recheneinrichtung mit einem gemeinsamen Profil assoziiert sind.
     
    12. Verfahren nach Anspruch 11, wobei ansprechend auf Bestimmen, dass die erste und zweite Recheneinrichtung nicht mit dem gemeinsamen Profil assoziiert sind, die erste Recheneinrichtung konfiguriert wird zum Begrenzen von Ressourcen, die mit der zweiten Recheneinrichtung geteilt bzw. gemeinsam verwendet werden.
     
    13. Eine erste Recheneinrichtung, die Folgendes aufweist:

    eine erste induktive Signalschnittstelle;

    einen lokalen Kommunikations-Port bzw. Kommunikationsanschluss;

    eine Speicherressource; und

    einen oder mehrere Prozessoren, die gekoppelt sind, um mit der ersten induktiven Signalschnittstelle und dem lokalen Kommunikations-Port zu arbeiten;

    wobei der eine oder die mehreren Prozessoren konfiguriert sind zum:

    Einrichten, unter Verwendung der induktiven Signalschnittstelle, einer induktiven Out-of-Band-Kommunikationsverbindung bzw. außerbandigen Kommunikationsverbindung mit einer zweiten Recheneinrichtung, wobei die zweite Recheneinrichtung eine zweite induktive Signalschnittstelle beinhaltet;

    Empfangen von Credential- bzw. Berechtigungsnachweisinformation für die zweite Recheneinrichtung über die induktive Out-of-Band-Kommunikationsverbindung über die induktive Signalschnittstelle;

    Generieren eines Verbindungsschlüssels unter Verwendung der Berechtigungsnachweisinformation zum Paarbilden bzw. Koppeln, unter Verwendung eines lokalen Kommunikationsanschlusses, mit der zweiten Recheneinrichtung, wobei der Verbindungsschlüssel in der Speicherressource zur Verwendung bei drahtloser Koppelung mit der zweiten Recheneinrichtung gespeichert wird; und

    Senden von Berechtigungsnachweisinformation von der ersten Recheneinrichtung durch die Out-of-Band-Kommunikationsverbindung an die zweite Recheneinrichtung zum Aktivieren der zweiten Recheneinrichtung den Verbindungsschlüssel zu generieren;

    Speichern des Verbindungsschlüssels zum Koppeln mit der zweiten Recheneinrichtung über mehrere Kommunikationssitzungen, wobei jede der mehreren Kommunikationssitzungen einer drahtlosen Koppelung und Entkoppelung mit der zweiten Recheneinrichtung entspricht;

    ansprechend auf einen induktiven Auslöser, Einrichten einer Koppelung mit der zweiten Recheneinrichtung unter Verwendung des Verbindungsschlüssels,

    und automatisches Senden von Daten an die zweite Recheneinrichtung ansprechend auf Einrichten einer Koppelung, wobei die Daten Anwendungsdaten aufweisen, die einer Anwendung entsprechen, die auf der ersten und zweiten Recheneinrichtung läuft, um Funktionen zu aktivieren, die mit der Anwendung auf der zweiten Recheneinrichtung assoziiert sind, wobei die Funktionen auf der zweiten Recheneinrichtung nicht betreibbar sind, wenn sie nicht mit der ersten Recheneinrichtung gekoppelt ist;,

    und

    wobei der induktive Auslöser eine induktive Koppelung der ersten und zweiten Recheneinrichtung aufweist durch Ausrichten der ersten und zweiten induktiven Spulen, und wobei die Ausrichtung der ersten und zweiten induktiven Spulen über einen visuellen Indikator angezeigt wird, der auf der Anzeige wenigstens einer von der ersten oder zweiten Recheneinrichtung generiert wird.


     
    14. Erste Recheneinrichtung nach Anspruch 13, wobei
    der eine oder die mehreren Prozessoren weiter konfiguriert sind zum Generieren eines Verbindungsschlüssels für die dritte Recheneinrichtung unter Verwendung von Berechtigungsnachweisinformation, die mit der dritten Recheneinrichtung über die induktive Signalschnittstelle ausgetauscht wird.
     


    Revendications

    1. Procédé d'appariement d'un premier dispositif informatique (10) présentant une première bobine d'induction, avec un deuxième dispositif informatique (20) ayant une seconde bobine d'induction, le procédé réalisé par un ou plusieurs processeurs du premier dispositif informatique (10) et comprenant :

    (a) un établissement, par l'intermédiaire d'un support de communication hors bande par induction, d'une liaison de communication avec le deuxième dispositif informatique ;

    (b) une réception d'informations de justificatif d'identité (121) du deuxième dispositif informatique (20) sur le support de communication hors bande par induction ;

    (c) une génération d'une clé de liaison (125), en utilisant les informations de justificatif d'identité (121) pour un appariement avec le deuxième dispositif informatique (20) sur un support de communication sans fil ;

    (d) un envoi d'informations de justificatif d'identité (123) du premier dispositif informatique (10) par le biais du support de communication hors bande au deuxième dispositif informatique (20) pour permettre au deuxième dispositif informatique (20) de générer la clé de liaison (125) ;

    (e) un stockage de la clé de liaison (125) pour un appariement avec le deuxième dispositif informatique (20) sur de multiples sessions de communication, dans lequel chacune des multiples sessions de communication correspond à un appariement et un désappariement sans fil du deuxième dispositif informatique (20) ;

    (f) en réponse à un déclencheur inductif, un établissement d'un appariement avec le deuxième dispositif informatique (20) en utilisant la clé de liaison (125),

    (g) et un envoi automatique de données vers le deuxième dispositif informatique (20) en réponse à un établissement d'un appariement, les données comprenant des données d'application correspondant à une application exécutée sur les premier et deuxième dispositifs informatiques pour permettre des fonctions associées à l'application sur le deuxième dispositif informatique (20), dans lequel lesdites fonctions ne sont pas utilisables sur le deuxième dispositif informatique (20) lorsqu'il n'est pas apparié au premier dispositif informatique (10) ;

    dans lequel le déclencheur inductif comprend un accouplement inductif du premier et du deuxième dispositif informatique en alignant les première et seconde bobines d'induction, et dans lequel l'alignement des première et seconde bobines d'induction est indiqué par l'intermédiaire d'un indicateur visuel généré sur l'affichage d'au moins un des premier ou deuxième dispositifs informatiques.
     
    2. Procédé selon la revendication 1, dans lequel le premier dispositif informatique utilise la clé de liaison stockée pour se connecter au deuxième dispositif informatique sur une pluralité de sessions de communication.
     
    3. Procédé selon la revendication 1, dans lequel un appariement du dispositif informatique avec le deuxième dispositif informatique en utilisant la clé de liaison, dans chacune des multiples sessions de communication, est réalisé automatiquement en réponse à une détection du fait que le deuxième dispositif informatique est en communication avec le premier dispositif informatique.
     
    4. Procédé selon la revendication 1, dans lequel l'indicateur visuel correspond à un halo fourni sur l'affichage de l'au moins un des premier ou deuxième dispositifs informatiques.
     
    5. Procédé selon la revendication 1, dans lequel les premier et deuxième dispositifs informatiques correspondent à un dispositif informatique mobile et à un dispositif tablette.
     
    6. Procédé selon la revendication 1, comprenant en outre :
    en réponse à un envoi des données d'application, une analyse et une synchronisation d'un ensemble de relevés correspondant à l'application exécutée sur chacun des premier et deuxième dispositifs informatiques.
     
    7. Procédé selon la revendication 1, dans lequel un événement d'application entraîne un affichage d'une notification d'utilisateur sur au moins un des premier ou deuxième dispositifs informatiques, et dans lequel l'autre des premier ou deuxième dispositifs informatiques fournit un graphique correspondant à l'événement d'application.
     
    8. Procédé selon la revendication 1, comprenant en outre les étapes :

    (d1) de détermination d'une configuration d'appariement par l'intermédiaire d'une liaison de communication sans fil pour les premier et deuxième dispositifs informatiques sur la base des informations de justificatif d'identité ;

    (e1) d'un stockage de la configuration d'appariement pour un appariement avec le deuxième dispositif informatique sur les multiples sessions de communication.


     
    9. Procédé selon la revendication 8, dans lequel (c2) inclut une détermination du fait que les premier et deuxième dispositifs informatiques ont déjà été appariés.
     
    10. Procédé selon la revendication 8, comprenant en outre :
    une génération d'une invite d'utilisateur pour une entrée d'utilisateur pour un appariement avec le deuxième dispositif informatique.
     
    11. Procédé selon la revendication 8, dans lequel (c2) inclut une détermination du fait que les premier et deuxième dispositifs informatiques sont associés avec un profil commun.
     
    12. Procédé selon la revendication 11, dans lequel en réponse à une détermination du fait que les premier et deuxième dispositifs informatiques ne sont pas associés avec le profil commun, une configuration du premier dispositif informatique pour limiter les ressources à partager avec le deuxième dispositif informatique.
     
    13. Premier dispositif informatique comprenant :

    une première interface de signal inductif ;

    un port de communication local ;

    une ressource de mémoire ; et

    un ou plusieurs processeurs couplés pour faire fonctionner la première interface de signal inductif et le port de communication local ;

    dans lequel les un ou plusieurs processeurs sont configurés pour :

    un établissement, en utilisant l'interface de signal inductif, d'une liaison de communication hors bande par induction avec un deuxième dispositif informatique,

    dans lequel le deuxième dispositif informatique inclut une seconde interface de signal inductif ;

    une réception d'informations de justificatif d'identité pour le deuxième dispositif informatique sur la liaison de communication hors bande par induction par l'intermédiaire de l'interface de signal inductif ;

    une génération d'une clé de liaison en utilisant les informations de justificatif d'identité pour un appariement, en utilisant un port de communication local, avec le deuxième dispositif informatique, dans lequel la clé de liaison est stockée dans la ressource de mémoire pour une utilisant dans un appariement sans fil avec le deuxième dispositif informatique ; et

    un envoi d'informations de justificatif d'identité du premier dispositif informatique par le biais de la liaison de communication hors bande au deuxième dispositif informatique pour permettre au deuxième dispositif informatique de générer la clé de liaison ;

    un stockage de la clé de liaison pour un appariement avec le deuxième dispositif informatique sur de multiples sessions de communication, dans lequel chacune des multiples sessions de communication correspond à un appariement et un désappariement sans fil du deuxième dispositif informatique ;

    en réponse à un déclencheur inductif, un établissement d'un appariement avec le deuxième dispositif informatique en utilisant la clé de liaison,

    et un envoi automatique de données vers le deuxième dispositif informatique en réponse à un établissement d'un appariement, les données comprenant des données d'application correspondant à une application exécutée sur les premier et deuxième dispositifs informatiques pour permettre des fonctions associées à l'application sur le deuxième dispositif informatique, dans lequel lesdites fonctions ne sont pas utilisables sur le deuxième dispositif informatique lorsqu'il n'est pas apparié au premier dispositif informatique ;

    et

    dans lequel le déclencheur inductif comprend un accouplement inductif du premier et du deuxième dispositif informatique en alignant les première et seconde bobines d'induction, et

    dans lequel l'alignement des première et seconde bobines d'induction est indiqué par l'intermédiaire d'un indicateur visuel généré sur l'affichage d'au moins un des premier ou deuxième dispositifs informatiques.


     
    14. Premier dispositif informatique selon la revendication 13, dans lequel
    les un ou plusieurs processeurs sont en outre configurés pour générer une clé de liaison pour un troisième dispositif informatique en utilisant des informations de justificatif d'identité échangées avec le troisième dispositif informatique par l'intermédiaire de l'interface de signal inductif.
     




    Drawing






























    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description