A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever. The following notice applies to the software and data as described below and in the drawings that form a part of this document: Copyright eBay, Inc. 2013, All Rights Reserved.
The present application relates generally to data processing systems and, in one specific example, to techniques for chipless near field communication for mobile devices.
The near field communication (NFC) standard allows for the transfer of information between smartphones. In order for smartphones to transfer data based on the NFC standard, the smartphones must be equipped with specialized NFC hardware, such as an NFC chip or NFC tag.
Some embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings in which:
Example methods and systems for chipless near field communication for mobile devices are described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of example embodiments. It will be evident, however, to one skilled in the art that the present invention may be practiced without these specific details.
According to various exemplary embodiments described herein, when a user taps or touches their mobile device against a wireless access point (WAP) device, or when the user brings the mobile device in close proximity to the WAP device, the WAP device is configured to identify the user and to perform a predefined action, even if the mobile device of the user does not include a near field communication (NFC) chip. While the conventional NFC standard allows smartphones to be paired with each other when the smart phones are brought into physical contact with each other, the NFC standard requires smartphones to be outfitted with special NFC hardware, such as NFC chips or NFC tags. However, a large portion of smartphones available today (including smartphones provided by Apple®) do not include the special NFC hardware and do not support the NFC standard. Accordingly, various embodiments described throughout allow almost any mobile device to communicate in a similar manner to the NFC standard, without the requirement for a special NFC hardware to be installed in the mobile device.
According to various exemplary embodiments, a WAP device may be attached to a point of sale terminal, vending machine, a door lock, or various other devices. When the WAP device senses that it has been touched or moved slightly by an external object, or when the WAP device senses that an object is located within close proximity of the WAP device, the WAP device may activate a passive listening mode to detect if a wireless device is in range and, if so, the WAP device may access the media access control (MAC) address associated with the wireless device. Thereafter, the WAP device may correlate this MAC address to a user of the wireless device, and perform some predefined action associated with the user, such as completing a transaction at a point-of-sale terminal, completing a purchase at a vending machine, locking or unlocking a door lock mechanism, and so on.
An Application Program Interface (API) server 114 and a web server 116 are coupled to, and provide programmatic and web interfaces respectively to, one or more application servers 118. The application servers 118 host one or more applications 120. The application servers 118 are, in turn, shown to be coupled to one or more databases servers 124 that facilitate access to one or more databases 126. According to various exemplary embodiments, the applications 120 may be implemented on or executed by one or more of the modules of the system 200 illustrated in
Further, while the system 100 shown in
The web client 106 accesses the various applications 120 via the web interface supported by the web server 116. Similarly, the programmatic client 108 accesses the various services and functions provided by the applications 120 via the programmatic interface provided by the API server 114.
Turning now to
According to various exemplary embodiments described in more detail below, the determination module 202 of the WAP system 200 is configured to determine that a particular object has physically contacted a wireless access point device (e.g., the WAP system 200), and to activate a passive listening mode of the WAP system 200 in response to the detected physical contact. Moreover, while in the passive listening mode, the determination module 202 is configured to detect a wireless access probe request broadcast by a mobile device, and to determine that the mobile device that transmitted the probe request is the particular object that physically contacted the WAP system 200. Thereafter, the identification module 204 of the WAP system 200 is configured to determine a media access control (MAC) address associated with the mobile device, and to identify a user of the mobile device, based on the MAC address. The operation of the aforementioned modules of the WAP system 200 will now be described in greater detail in conjunction with
In operation 302, in response to determining that an object has physically contacted the WAP system 200 and/or has come within close proximity of (e.g., is currently located within a predetermined distance of) the WAP system 200, the determination module 202 activates a passive listening mode of the WAP system 200. In other words, the trigger for the initiation of the passive listening mode of the WAP system 200 is when an object is touched against the WAP system 200 and/or is brought to within a predetermined range of the WAP system 200. While operating in the passive listening mode, the WAP system 200 is configured to detect wireless access probe requests transmitted by nearby mobile devices, as described in more detail below.
As understood by those skilled in the art, a passive listening mode (also referred to as a passive scan mode, passive mode, or listening mode) of an access point is a mode in which the access point listens and detects information that is broadcast by nearby client stations (e.g., mobile devices). For example, as understood by those skilled in the art, network interface cards (NICs) of client stations broadcast various types frames of information in accordance with the 802.11 wireless standard, including a probe request frame (also referred to throughout as a wireless access probe request). A probe request frame is a special type of WLAN frame sent by a client station requesting information from either a specific access point, or all access points in the area. More specifically, a client station sends a probe request frame to determine which access points are within range and to obtain information from these access points. Probe requests may be transmitted by a client stations while they are operating in an active scan mode themselves, e.g. when they are performing an active scan of either a specific network or all networks in the area by actively sending probe requests and requesting all nearby access points to announce their presence. The probe request may include information describing the client station, such as a media access control (MAC) address of a NIC of the client station. The information being requested in the probe request includes the data rates supported by the access point, and various other information required to establish a communication session between the station and the access point. Accordingly, the access point operating in passive scan mode may detect all of the nearby wireless networks based on a passive scan, such that the access point may remain completely silent without sending out any data, and the data compiled is done so only using probe requests freely available over a network.
Typically when an access point operating in a passive scan mode detects a probe request frame, either directed at the specific access point or to all access points in the area, it will send out a probe response frame containing capability information, station parameters, supported data rates, etc. After the client station receives the probe response, the client station may utilize the information in the probe response to determine whether a connection with the access point should be established. In the method 300 in
Accordingly, with reference to the method 300 in
In operation 305 in
In operation 306 in
The aforementioned MAC address information may be generated by the WAP system 200 or another device in various ways. For example, a mobile application installed on a mobile device may be configured to collect and maintain user information describing a user of the mobile device, including user name, user contact information (e.g., phone number, e-mail address), user financial account information, and so on. For example, the mobile application may be associated with a retailer, business, marketplace website (e.g., eBay®), financial institution or a financial payment service (e.g., PayPal®, a bank), and so on, and the mobile application may request user permission (e.g., based on an opt in system) to upload various information about the user to a remote server to be assembled into the aforementioned MAC address information 400. If the user agrees, the mobile application may prompt the user to enter login or authentication information for a user account that the user has with the retailer, business, marketplace website, financial institution, financial payment service, etc., and the mobile application may access the various user information from the user account of the user. The mobile application may also be configured to detect a MAC address of the mobile device, such as by accessing configuration files or system files of the mobile device that are stored in memory of the mobile device. Thereafter, the mobile application may transmit the user information describing the user and MAC address of the mobile device to a remote server, which may collect this information and assemble it into the aforementioned MAC address information 400. Although not illustrated in
According to various exemplary embodiments, the passive listening mode activated in operation 302 may be a low-power or reduced power passive listening mode of the WAP system 200. For example, the WAP system 200 may include both a regular power passive listening mode (where the WAP system 200 may detect probe requests transmitted by clients located a further distance from the WAP system 200), as well as a low-power or reduced power passive listening mode (where the WAP system 200 may detect wireless access probe requests from mobile devices located within a closer specific distance of the WAP system 200). By operating in the low-power or reduced power passive listening mode, the WAP system 200 may avoid being inundated with probe requests from all mobile devices within a large range of the WAP system 200 (e.g., all mobile devices in the same room or the same building floor as the WAP system 200). Accordingly, the WAP system 200 may more easily identify the mobile device that physically contacted the WAP system 200, since the WAP system 200 will only be receiving probe requests from nearby mobile devices. This also improves the security and safety of both the WAP system 200 and the other mobile devices.
According to various exemplary embodiments, once the user associated with a mobile device is identified in the manner described above (e.g., see operation 306 in
In some embodiments, if the identification module 204 identifies a particular user in the user action information 500, the identification module 204 may transmit a notification to the user requesting user approval to perform the predefined action, and if the identification module 204 receives an appropriate response with approval from the user, the identification module 204 may perform the predefined action. The aforementioned notification may be, for example, an e-mail message, text message, an alert displayed in an operating system user interface of the mobile device, a pop-up window displayed by mobile application installed on the user's mobile device, a pop-up window displayed in a web browser installed on the user's mobile device, and so on. The identification module 204 may transmit the aforementioned notification based on user contact information associated with the user that is included in the MAC address information 400.
Accordingly, whereas various existing communication systems operating in accordance with the near field communication (NFC) standard require mobile devices to be installed with specific hardware, various embodiments described throughout allow mobile devices to communicate in a similar manner to the NFC protocol, without the requirement for a specific NFC hardware to be installed. Thus, by simply having a regular 802.11 wireless card or network interface card installed on a mobile device (which is the case for almost every mobile device manufactured today), the user may simply touched their mobile device against a WAP device, in order for the WAP system 200 to identify the user and to perform some predefined user action for the user, such as transmitting a message to the user, establishing a pairing connection between the WAP system 200 and mobile device of the user, transferring information between the WAP system 200 or a third-party device and the mobile device of the user, locking or unlocking access to content, locking or unlocking a physical locking mechanism, performing a financial transaction, causing personalized content to be displayed to the user, and so on. This is particularly advantageous since the NFC protocol is not supported on a large number of smartphones (e.g., smartphones manufactured by Apple®).
In some embodiments, the WAP system 200 of this disclosure may be utilized to allow a user to operate a locking mechanism (e.g., locking or unlocking a door locking mechanism or a safe locking mechanism), simply by touching their mobile phone against the WAP system 200. For example, in some embodiments, one or more modules of the WAP system 200 may be attached to a locking mechanism or may be integrated into a physical structure of a locking mechanism. After the identification module 204 identifies a user of a mobile device that physically contacts the WAP system 200 (see operation 306 in
In some embodiments, the WAP system 200 of this disclosure may be utilized to allow a user to perform a financial transaction (e.g., purchasing a product from a vending machine or purchasing a product at a point-of-sale terminal), simply by touching their mobile phone against the WAP system 200. For example, in some embodiments, one or more modules of the WAP system 200 may be attached to a vending machine or point-of-sale terminal, or may be integrated into a physical structure of a vending machine or point-of-sale terminal. In some embodiments, after the identification module 204 identifies a user of a mobile device that physically contacts the WAP system 200 (see operation 306 in
In some embodiments, the WAP system 200 of this disclosure may be utilized to allow a user to transfer information between a kiosk terminal or another computing device, simply by touching their mobile phone against the WAP system 200. For example, in some embodiments, one or more modules of the WAP system 200 may be attached to a kiosk terminal, or may be integrated into a physical structure of a kiosk terminal. In some embodiments, after the identification module 204 identifies a user of a mobile device that physically contacts the WAP system 200 (see operation 306 in
In some embodiments, the WAP system 200 of this disclosure may be utilized to allow a user to view personalized content on a kiosk terminal, simply by touching their mobile phone against the WAP system 200. For example, in some embodiments, one or more modules of the WAP system 200 may be attached to a kiosk terminal, or may be integrated into a physical structure of a kiosk terminal. In some embodiments, after the identification module 204 identifies a user of a mobile device that physically contacts the WAP system 200 (see operation 306 in
Certain embodiments are described herein as including logic or a number of components, modules, or mechanisms. Modules may constitute either software modules (e.g., code embodied (1) on a non-transitory machine-readable medium or (2) in a transmission signal) or hardware-implemented modules. A hardware-implemented module is tangible unit capable of performing certain operations and may be configured or arranged in a certain manner. In example embodiments, one or more computer systems (e.g., a standalone, client or server computer system) or one or more processors may be configured by software (e.g., an application or application portion) as a hardware-implemented module that operates to perform certain operations as described herein.
In various embodiments, a hardware-implemented module may be implemented mechanically or electronically. For example, a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware-implemented module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
Accordingly, the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired) or temporarily or transitorily configured (e.g., programmed) to operate in a certain manner and/or to perform certain operations described herein. Considering embodiments in which hardware-implemented modules are temporarily configured (e.g., programmed), each of the hardware-implemented modules need not be configured or instantiated at any one instance in time. For example, where the hardware-implemented modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware-implemented modules at different times. Software may accordingly configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
Hardware-implemented modules can provide information to, and receive information from, other hardware-implemented modules. Accordingly, the described hardware-implemented modules may be regarded as being communicatively coupled. Where multiple of such hardware-implemented modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) that connect the hardware-implemented modules. In embodiments in which multiple hardware-implemented modules are configured or instantiated at different times, communications between such hardware-implemented modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware-implemented modules have access. For example, one hardware-implemented module may perform an operation, and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware-implemented module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware-implemented modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).
The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some example embodiments, comprise processor-implemented modules.
Similarly, the methods described herein may be at least partially processor-implemented. For example, at least some of the operations of a method may be performed by one or processors or processor-implemented modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment or as a server farm), while in other embodiments the processors may be distributed across a number of locations.
The one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., Application Program Interfaces (APIs).)
Example embodiments may be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. Example embodiments may be implemented using a computer program product, e.g., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable medium for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
In example embodiments, operations may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output. Method operations can also be performed by, and apparatus of example embodiments may be implemented as, special purpose logic circuitry, e.g., a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC).
The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In embodiments deploying a programmable computing system, it will be appreciated that that both hardware and software architectures require consideration. Specifically, it will be appreciated that the choice of whether to implement certain functionality in permanently configured hardware (e.g., an ASIC), in temporarily configured hardware (e.g., a combination of software and a programmable processor), or a combination of permanently and temporarily configured hardware may be a design choice. Below are set out hardware (e.g., machine) and software architectures that may be deployed, in various example embodiments.
The example computer system 1200 includes a processor 1202 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both), a main memory 1204 and a static memory 1206, which communicate with each other via a bus 1208. The computer system 1200 may further include a video display unit 1210 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)). The computer system 1200 also includes an alphanumeric input device 1212 (e.g., a keyboard or a touch-sensitive display screen), a user interface (UI) navigation device 1214 (e.g., a mouse), a disk drive unit 1216, a signal generation device 1218 (e.g., a speaker) and a network interface device 1220.
The disk drive unit 1216 includes a machine-readable medium 1222 on which is stored one or more sets of instructions and data structures (e.g., software) 1224 embodying or utilized by any one or more of the methodologies or functions described herein. The instructions 1224 may also reside, completely or at least partially, within the main memory 1204 and/or within the processor 1202 during execution thereof by the computer system 1200, the main memory 1204 and the processor 1202 also constituting machine-readable media.
While the machine-readable medium 1222 is shown in an example embodiment to be a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more instructions or data structures. The term “machine-readable medium” shall also be taken to include any tangible medium that is capable of storing, encoding or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention, or that is capable of storing, encoding or carrying data structures utilized by or associated with such instructions. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media. Specific examples of machine-readable media include non-volatile memory, including by way of example semiconductor memory devices, e.g., Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
The instructions 1224 may further be transmitted or received over a communications network 1226 using a transmission medium. The instructions 1224 may be transmitted using the network interface device 1220 and any one of a number of well-known transfer protocols (e.g., HTTP). Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), the Internet, mobile telephone networks, Plain Old Telephone (POTS) networks, and wireless data networks (e.g., WiFi and WiMax networks). The term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible media to facilitate communication of such software.
Although an embodiment has been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the invention. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. The accompanying drawings that form a part hereof, show by way of illustration, and not of limitation, specific embodiments in which the subject matter may be practiced. The embodiments illustrated are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed herein. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. This Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.
Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description.