System and method for information sharing using near proximity communication

ABSTRACT

Source data stored on a source device may be shared with other devices. Sharing the source data may include facilitating communication associated with the source data, based on a first communication protocol, between a first device and another device. Receiving a first token associated with the source data may be facilitated. The first token may be encoded to enable communication using a near proximity communication (NPC) protocol. Communication of the first token may be provided to a second device, located within five feet of the first device, using the NPC protocol, to enable the second device to access the source data utilizing a second communication protocol. The NPC protocol is a wireless communication protocol, and supports automatic connection between at least two devices located within five feet. The first and second devices are NPC-enabled devices.

FIELD

The subject technology relates in general to information sharing, andmore particularly to information sharing using near proximitycommunication.

BACKGROUND

With the advancement of network technologies and rapid development ofmany social networks (e.g., Facebook, LinkedIn, MySpace, Twitter,Google+, etc.), people may share information in a verity of methods. Forexample, via email, one can attach files intended to be shared includinga host of documents and media files (e.g., image files, audio files,video files, etc.) to an email message or provide links to the onlinesources of information by including one or more uniform resource locator(URLs) that point to the online sources. Sharing information via socialnetworks is also very popular and effective for a number of purposes,for example, people may readily share various media files and even havetheir peers informed about their whereabouts and kind of activities theyare enjoying.

Using mobile phones, money can be transferred from one account toanother account. Mobile phones can also be used as credit card readersfor transferring money from a credit card account of a credit cardholder to an account associated with another person. A credit cardholder may also setup a mobile phone to store the credit cardinformation and use the mobile phone, instead of the credit card toperform transactions with a machine such as an automated teller machine(ATM).

SUMMARY

In one aspect of the disclosure, a non-transitory machine-readablemedium may comprise instructions stored therein and executable by one ormore processors to facilitate performing a method for facilitatingsharing source data. The method may comprise supporting communicationbased on a first communication protocol between a first device and aremote device. The communication may be associated with a source data,and may be based on detection of presence of a second device within fivefeet of the first device. The method may facilitate receiving a firsttoken, associated with the source data. Encoding the first token toenable communication using a near proximity communication (NPC) protocolmay be facilitated. Communication of the first token to the seconddevice, located within five feet of the first device, may be facilitatedusing the NPC protocol to en The second device may be unable to accessthe source data without using the first token. The NPC protocol may bedifferent from the first and second communication protocols, and thefirst communication protocol may be the same or different from thesecond communication protocol. The NPC protocol may support a datatransfer rate that is not greater than a data transfer rate supported bythe first communication protocol or a data transfer rate supported bythe second communication protocol. The NPC protocol may be a wirelesscommunication protocol that supports automatic connection between atleast two devices located within five feet. The first device may be anNPC-enabled device adapted to detect presence of the second devicewithin five feet of the first device, and the first device may be acommunication end point device.

In another aspect of the disclosure, a non-transitory machine-readablemedium may comprise instructions stored therein and executable by one ormore processors to facilitate performing a method for facilitatingsharing source data. The method may comprise facilitating receiving atoken associated with the source data. Encoding the token to enablecommunication using a near proximity communication (NPC) protocol may befacilitated. Communication of the token to a second device, locatedwithin five feet of a first device, may be provided using the NPCprotocol to enable the second device to access the source data utilizinga communication protocol. The second device may be unable to access thesource data without using the token.

The NPC protocol may be a wireless communication protocol that supportsautomatic connection between at least two devices located within fivefeet. The first device may be an NPC-enabled device adapted to detectpresence of the second device within five feet of the first device, andthe token may be a non-public token.

In yet another aspect of the disclosure, an apparatus for facilitatingsharing source data may comprise a processor operable to facilitatereceiving a token associated with the source data stored in theapparatus or another device. The processor may be operable to facilitateencoding a token to enable communication using a near proximitycommunication (NPC) protocol. An NPC interface may be operable toprovide for communication, using the NPC protocol, to a first devicelocated within five feet of the apparatus, the token to enable the firstdevice to access the source data utilizing a communication protocol. Thefirst device may be unable to access the source data without using thetoken. The NPC protocol may support a data transfer rate that is notgreater than a data transfer rate supported by the communicationprotocol.

The NPC protocol may be a wireless communication protocol that supportsautomatic connection between two or more devices located within fivefeet of one another. The apparatus may comprise an NPC-enabled deviceadapted to detect presence of the first device within five feet of theapparatus, and the source data may be non-public data.

In yet another aspect of the disclosure, a method for facilitatingsharing source data may comprise supporting communication based on afirst communication protocol between a first device and a remote device.The communication may be associated with a source data and may be basedon detection of presence of a second device within five feet of thefirst device. Receiving of a first token associated with the source datamay be facilitated. Encoding the first token to enable communicationusing a near proximity communication (NPC) protocol may be facilitated.Communication of the first token to the second device, located withinfive feet of the first device, may be facilitated using the NPC protocolto enable the second device to access the source data utilizing a secondcommunication protocol. The second device may be unable to access thesource data without using the first token. The NPC protocol may bedifferent from the first and second communication protocols, and thefirst communication protocol may be the same or different from thesecond communication protocol. The NPC protocol may support a datatransfer rate that is not greater than a data transfer rate supported bythe first communication protocol or a data transfer rate supported bythe second communication protocol. The NPC protocol may be a wirelesscommunication protocol that supports automatic connection between atleast two devices located within five feet. The first device may be anNPC-enabled device adapted to detect presence of the second devicewithin five feet of the first device, and the first device may be acommunication end point device.

In yet another aspect of the disclosure, a method for facilitatingsharing source data may comprise facilitating receiving a tokenassociated with the source data. Encoding the token to enablecommunication using a near proximity communication (NPC) protocol may befacilitated. Communication of the token to a second device, locatedwithin five feet of a first device, may be facilitated, using the NPCprotocol to enable the second device to access the source data utilizinga communication protocol. The second device may be unable to access thesource data without using the token. The NPC protocol may be a wirelesscommunication protocol that supports automatic connection between atleast two devices located within five feet of one another. The firstdevice may be an NPC-enabled device adapted to detect presence of thesecond device within five feet of the first device, and the token isnon-public token.

In yet another aspect of the disclosure, a non-transitorymachine-readable medium comprising instructions stored therein andexecutable by one or more processors to facilitate performing a methodfor facilitating sharing source data may comprise facilitatingreceiving, at a first device, a first token associated with the sourcedata, from a second device located within five feet of the first device,using a near proximity communication (NPC) protocol. The method may alsosupport generation of the first token based on detection of presence ofthe first device within five feet of the second device. The first tokenmay be an encoded first token for near proximity communication. Thefirst token may be a non-public token and may be based on the sourcedata for sharing. The receipt of the first token may be based on thedetection. Decoding the first token may be facilitated. Communicationbased on a first communication protocol to a third device to downloadthe source data using the decoded first token may be provided. The firstdevice may be an NPC-enabled device, having an NPC interface, to allowpresence of the first device to be detected by the second device whenthe first device is within five feet of the second device. The seconddevice may be an NPC-enabled device, and the NPC protocol may support adata transfer rate that is not greater than a data transfer ratesupported by the first communication protocol. The NPC two or moredevices located within five feet of one another.

In yet another aspect of the disclosure, an apparatus for facilitatingsharing source data may comprise a processor operable to facilitatereceiving a first token associated with the source data from a firstdevice, located within five feet of the apparatus using an NPC protocol.The first token may be based on detection of presence of the apparatuswithin five feet of the first device, and the first token may be anencoded first token for near proximity communication. The first tokenmay be a non-public token and may be based on the source data forsharing. The processor may be operable to facilitate decoding the firsttoken. The processor may be operable to provide for communication basedon a first communication protocol to a second device to download thesource data using the decoded first token. The apparatus may be anNPC-enabled device, having an NPC interface, to allow presence of theapparatus to be detected by the first device when the apparatus iswithin five feet of the first device. The first device may be anNPC-enabled device, in addition, the NPC protocol may support a datatransfer rate that is not greater than a data transfer rate supported bythe first communication protocol. The NPC protocol may be a wirelesscommunication protocol that may support automatic connection between atleast two devices located within five feet.

In yet another aspect of the disclosure, a method for facilitatingsharing source data may comprise facilitating receiving, at a firstdevice, a first token associated with the source data, from a seconddevice located within five feet of the first device, using a nearproximity communication (NPC) protocol. The NPC protocol may supportgeneration of the first token based on detection of presence of thefirst device within five feet of the second device. The first token maybe an encoded first token for near proximity communication and may be anon-public token. The first token may be based on the source data forsharing, wherein the receipt of the first token is based on thedetection. Decoding the first token may be facilitated. Communicationbased on a first communication protocol to a third device to downloadthe source data using the decoded first token may be provided for. Thefirst device may be an NPC-enabled device, having an NPC interface, toallow presence of the first device to be detected by the second devicewhen the first device is within five feet of the second device. Thesecond device is an NPC-enabled device, and the NPC protocol may supporta data transfer rate that is not greater than a data transfer ratesupported by the first communication protocol. The NPC protocol may be awireless communication protocol that supports automatic connectionbetween two or more devices located within five feet of each other.

It is understood that various configurations of the subject technologywill become readily apparent to those skilled in the art from thedisclosure, wherein various configurations of the subject technology areshown and described by way of illustration. As will be realized, thesubject technology is capable of other and different configurations andits several details are capable of modification in various otherrespects, all without departing from the scope of the subjecttechnology. Accordingly, the summary, drawings and detailed descriptionare to be regarded as illustrative in nature and not as restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1D are conceptual block diagrams of examples of systems forsharing information using a near proximity communication (NPC) protocol.

FIGS. 2A-2C are conceptual block diagrams of examples of systems forsharing information using the NPC protocol.

FIGS. 3A-3B are diagrams of examples of tokens including metadataassociated with source data shared using the NPC protocol.

FIG. 4 is a block diagram of an example of a source data that can beshared using the NPC protocol.

FIG. 5 is a conceptual block diagram of an example of a device forsharing information using the NPC protocol.

FIG. 6 is a conceptual block diagram of an example of a device forreceiving shared information using the NPC protocol.

FIGS. 7A-7C are flowcharts illustrating exemplary methods for sharinginformation using the NPC protocol.

FIGS. 8A-8B are flowcharts illustrating exemplary methods for sharinginformation using the NPC protocol.

FIGS. 9A-9B are flowcharts illustrating exemplary methods fordownloading a source file using the information shared based on the NPCprotocol.

FIG. 10 is a conceptual block diagram of an example of a device orserver.

FIG. 11 is a block diagram representing an example of an apparatus forsharing information using NPC protocol.

FIG. 12 is a block diagram representing an example of an apparatus forsharing information using NPC protocol.

FIG. 13 is a block diagram representing an example of an apparatus forsharing information using NPC protocol.

DETAILED DESCRIPTION

The detailed description set forth below is intended as a description ofvarious configurations of the subject technology and is not intended torepresent the only configurations in which the subject technology may bepracticed. The appended drawings are incorporated herein and constitutea part of the detailed description. The detailed description includesspecific details for the purpose of providing a thorough understandingof the subject technology. However, it will be apparent to those skilledin the art that the subject technology may be practiced without thesespecific details. In some instances, well-known structures andcomponents are shown in block diagram form in order to avoid obscuringthe concepts of the subject technology. Like components are labeled withidentical element numbers for ease of understanding.

Often information is shared between devices using email or one or moresocial networks. Certain information may be transmitted among multipledevices using near field communications (NFC). For example, for a creditcard transaction, a handheld device such as a mobile phone may be usedto function as a credit card substitute, and exchange the credit cardinformation between the mobile phone and an automated teller machine(ATM). In another example of NFC usage, two handheld devices includingrequired NFC hardware and applications may exchange business cardinformation between the two handheld devices. The information shared insuch NFC exchanges is generally limited to the information stored in afirst device (e.g., a credit card or business card information stored ina mobile phone) and is directly transferred to the second device. Thesizes of data files transferred are restricted by the limited data rateof the available NFC technology (e.g., currently 106 Kbits/s-424Kbits/s) and the practical time duration that the two device are kepttouching or in close proximity of each other (e.g., less than twentycentimeters or less than five centimeters).

In an aspect of the subject technology, a source data intended to beshared between the first and the second devices may be stored on aremote device and have a desired size not limited by the aspects of thesubject technology. The type of the source data is also not limited bythe aspects of the subject technology. For example, the source data maycomprise data files including media data, connection settingsinformation, device management information, device configurationinformation and so forth, which can be downloaded by the second devicefrom the remote device by using a token communicated from the firstdevice to the second device using a near proximity communication (NPC)protocol. The NPC protocol may facilitate communication between twodevices, which are physically located within approximately five feet ofeach other, and the two devices may be connected automatically withoutuser intervention or input, and the set-up time for connection is quick(e.g., less than one second). In one example, NPC is not operableoutside the five feet range so that if the devices are moved away fromeach other more than five feet, then the devices are not detectable fromeach other and cannot communicate with each other using NPC protocol.The data transfer rate in NPC protocol may vary with technology and isnot limited by aspects of the subject technology and may include, but isnot limited to data rates applicable to NFC protocol.

FIGS. 1A-1D are conceptual block diagrams of examples of systems forsharing information using a near NPC protocol. Systems 100A-100B includea first device 110 (hereinafter “device 110”) one or more second devices120 (herein after “device 120”), and one or more remote devices 130 and140. Device 110 and device 120 may comprise handheld devices (e.g.,mobile phones, personal data assistants (PDAs), tablet computers, laptopcomputers, etc.). Remote devices 130 and 140 may comprise serversincluding cloud servers, desktop computers, or portable devices such aslaptop computers, tablets, personal data assistants (PDAs), mobilephones and the like. In an aspect, a “remote” device, or a device“remote” to a system or another device, may be a device that is notdirectly connected to the system or the other device. For example, theremote devices 130 and 140 are remote to both device 110 and device 120,because remote devices 130 and 140 are not directly connected to device110 and device 120, but may be connected indirectly through a networkwhich can include, for example, another server, or the Internet. Inparticular, device 120 may not have authorized access to remote devices130 and 140.

A user of device 110 may decide to share, with device 120 or otherdevices, a source data 135 stored in a source device. In one aspect, asource device may be a remote device such as one or more remote devices130 and 140 or one or more other remote devices. In another aspect, asource device may be a local device such as device 110 or another localdevice. In a scenario that source device is a remote device, once theuser of device 110 decides to share the source data 135 stored in thesource device with device 120, device 110 may request and obtaininformation (e.g., metadata) associated with accessing the source data135 by device 120 (e.g., a token 150) from the remote device. Device 110may encode token 150 to enable communication of the token 150 using theNPC protocol and may communicate token 150 to device 120 using the NPCprotocol. For example, the user of first device 110 may position device110 near device 120 (e.g., at a distance less than five feet, such as afew inches) to enable transfer of token 150 from device 110 to device120. Device 120 may then use token 150 to obtain authorized access toremote device 130 and download source data 135 (see FIG. 1B).

In one aspect, once token 150 is transferred to device 120, device 110and device 120 are no longer required to be in close proximity, anddevices 110 and 120 can be moved away from each other, for example, formore than five feet, and device 120 can still obtain/download the sourcedata using one or more of the various communication protocols describedherein.

In a scenario that device 110 is the source device (relevant arrows arenot shown in FIG. 1A for simplicity), the metadata associated withaccessing the source data 135 by device 120 (e.g., token 150) can begenerated by device 110 and stored in device 110 and can be readilyaccessed and encoded to enable communication of the token 150 using theNPC protocol to device 120. Device 120 may then use token 150 todownload source data 135 from device 110 (relevant arrows are not shownin FIG. 1B for simplicity). In both scenarios, device 120 may downloadsource data 135 by using one or more communication protocols, forexample, a peer-to-peer (P2P) protocol, an interactive connectivityestablishment (ICE) protocol, a session initiation protocol, a Bluetoothprotocol (BT), a wireless fidelity (Wi-Fi) protocol, an extendablemessaging and presence protocol (XMPP), a push protocol, or anon-industry standard communication protocol). Even an NPC protocol canbe used if the source data is sufficiently small. When downloadingsource data 135, device 120 does not need be in close proximity ofdevice 110, unless source data 135 is downloaded using an NPC protocol.

In an aspect, device 120 may comprise a mobile device provided to a newemployee of a business entity (e.g., a company, corporation,organization, firm, etc.) and device 110 may be a mobile device used byan information technology (IT) person of the business entity. The ITperson may use device 110 to setup or configure device 120 of a numberof new employees by merely positioning device 110 near device 120 ofeach new employee to transfer information necessary to setup andconfigure device 120 of the new employee and even communicate commandsto perform the setup and configurations of the device 120. The IT personmay also use the same technique to update information on device 120 ofemployees when needed. The configuration of device120 may compriseproviding authentication and connection information for connection to aprivate network, servers and other computers of the business unit. TheIT person may also use device 110 to communicate to device 120, usingNPC protocol, and a file including metadata relating to a source filethat may be located in device 110 or a remote device 130. The newemployee may use the metadata to access device 110 using bluetooth orWiFi or device 130 using WiFi or through a proxy server as will bedescribed herein.

In another aspect, the remote devices 130 and 140 may represent a numberof computing devices or servers of the business entity. The IT personmay intend to enable one or more users of devices 120 (e.g., a newemployee such as IT technician) to log on to one or more of the remotedevices 130 and 140 and perform a host of actions such accessing filesand performing device setup, device configuration, or other activitieson any of remote devices 130 or 140. The IT person may position device110 near device 120 of the IT technician and transfer token 150 todevice 120 using the NPC protocol. Token 150 can provide authorizedaccess by the user of device 120 to remote devices 130 and/or 140.

In an aspect, token 150 may be requested and obtained from one of theremote devices, for example, remote device 130. Device 120 may use token150 to access device 130 and download source data 135. Although, FIGS.1A-1D, for simplicity, show that source data 135 is stored in remotedevice 130, in general, source data 135 may be stored on one or moreother remote devices 140 and token 150 may provide access informationfor connection to the device 140 that holds source data 135 and downloadpermission to download source data 135. In FIG. 1B, for simplicity, onlyone device 120 is shown. In case of multiple devices 120, for eachdevice 120, device 110 requests and receives from remote device 130 arespective token 150, which may include particulars of that device 120and can be expirable.

In systems 100C and 100D, devices 110 and 120 are coupled to remotedevices 130 and 140 (which may be behind a firewall) via a proxy server160 (hereinafter “proxy 160”). Proxy 160 can establish various modes ofcommunications (e.g., P2P communication through ICE protocol) over anetwork (e.g., the Internet) between devices that could not reach othersdirectly otherwise. Accordingly, as shown in FIG. 1C, device 110 mayrequest and obtain information associated with accessing the source data135 by device 120 (e.g., a token 150) from the remote device 130 throughproxy 160, and communicate token 150 to device 120 by using the NPCprotocol, as mentioned above. Device 120, may then access remote devices130 and/or 140 via proxy 160, by using token 150 (for simplicity, onlyone device 120 is shown and coupling to remote devices 140 via proxyserver 160 is not shown in FIG. 1D). In case source data 135 is storedin device 110 (relevant arrows are not shown in FIG. 1D for simplicity),device 120 may access the source data 135 via proxy 160 or by usingother communication protocols such as BT protocol. When downloadingsource data 135, device 120 may not need be in close proximity of device110.

FIGS. 2A-2C are conceptual block diagrams of examples of systems 200A,200B and 200C for sharing information using the NPC protocol. System200A includes device 110, one or more devices 120, network 150, remotedevice 130, server 230, and cloud server 240. In an aspect, device 110may instruct remote device 130 to transmit source data 135 of FIG. 1 toanother remote device such as a server 230 or a cloud server 240. Device110 may subsequently request and obtain, for each device 120, a token(e.g., token 150), which is created in real time, from remote device130. Device 110 may communicate token 150 to each device 120 using NPCprotocol. Device 120 may be coupled to remote device 130, server 230,and cloud server 240, via network 250. Token 150 may comprise metadataincluding information that enables device 120 to connect to any ofserver 230 or cloud server 240 that has received the source data 135transmitted by remote device 130, and to download source data 135.

In order to access the source data, each device 120 (for simplicity,only one device 120 is shown in FIG. 2B) may use metadata included intoken 150 to connect to any of server 230 or cloud server 240, vianetwork 250, and download source data 135. Network 250 may include, forexample, any one or more of a personal area network (PAN), a local areanetwork (LAN), a campus area network (CAN), a metropolitan area network(MAN), a wide area network (WAN), a broadband network (BBN), theInternet, and the like. Further, the network 250 can include, but is notlimited to, any one or more of network topologies, including a busnetwork, a star network, a ring network, a mesh network, a star-busnetwork, tree or hierarchical network, and the like.

In one example, system 200C includes device 210, one or more devices220, a web server 260 (e.g., associated with pocketcloud.com), a remoteserver 270 (e.g., a native access translate (NAT) Traversal server), andsource device 280 (optional), coupled via network 250. Device 210 mayreceive token 150 of FIGS. 1A-1D from remote server 270 (or sourcedevice 280) via network 250. In an aspect, source data 135 may be storedin device 210 and device 110 may generate token 150. As mentioned above,device 210 may encode token 150 to enable communication of token 150 toone or more devices 220 via NPC protocol. Device 220 may use token 150to access source device 280 or remote device 270, via network 250, toobtain source data 135. In case source data 135 is stored in device 210,token 150 includes access information associated with device 210, anddevice 220 may access device 210 via network 250 or other modes ofcommunication using communication protocols such as BT protocol, P2Pprotocol and the like.

In some aspects, token 150 may be encoded in the form of a uniformresource locator (URL) (e.g., HTTP URL) to allow device 220 to accesssource data 135 via a website (e.g., pocketcloud.com) represented by theURL of token 150. The HTTP URL can be launched through any Web browserwithout the need for any specialized application. The HTTP URL may pointto a Web application that contains necessary JavaScript code to detectwhether a suitable application (e.g., a remote access application or aPocketCloud application) is installed locally on device 220 or not. Ifthe local application is installed on device 220, the local applicationcan be launched by the Web browser. The local application may proceed todownload source data 135 from, e.g., source device 280, remote device270 or device 210, depending on the information encoded in token 150,which includes identification information of the device that storessource data 135. If the application is not installed locally on device220, the Web browser may communicate back to the Web Server (e.g., Webserver 260) and request the Web server to obtain source data135 from thedevice that stores the source data 135 (e.g., one of source device 280,remote device 270 or device 210). This may allow the Web browser tosubsequently download the file from the Web server 260 without the needof the Web application (e.g., the native application).

FIGS. 3A-3B are diagrams of examples of tokens 150 including metadataassociated with source data 135 of FIG. 1A shared using the NPCprotocol. As mentioned above, source data 135 to be shared by user ofdevice 110 of FIG. 1A with users of devices 120 of FIG. 1A may be storedin remote devices 130 or 140 of FIGS. 1A-1D. For this scenario, token150 may comprise a number of metadata. For example, token 150 maycomprise, among other things, information relating to the source devicessuch as an identifier 310 and authentication information 320 associatedwith any of source devices (e.g., device 130 or 140, device 110 ordevices 270, 280 and 220 of FIG. 2C) that holds the source data 135.Token 150 may also comprise information pertaining to the source data135, for example, an identifier 330 and a path 340. The identifier 330may identify a file that contains source data 135 among other files, andpath 340 may show a path in the file system of the source device thatpoints to the file containing source data 135. Token 150 may be encodedin the form of a URL 342 (e.g., HTTP URL), which can be launched throughany Web browser without the need for any specialized application.

In another scenario discussed with respect to FIGS. 2A-2B above, thesource data is transmitted from device 130 of FIGS. 2A-2B to one or moreremote servers (e.g., server 230 or cloud server 240 of FIGS. 2A-2B).Token 150, in this scenario, may comprise among other things,information relating to the remote servers such as an identifier 350 andauthentication information 360 associated with any of server 230 orcloud server 240 that holds the source data 135. Token 150 may alsocomprise information pertaining to the source data 135, for example, anidentifier 370 and a path 380. The identifier 370 may identify a filethat contain source data 135 among other files stored in the remoteservers (e.g., server 230 or cloud server 240), and path 380 may show apath in the file system of the remote servers that points to the filethat contains source data 135. Token 150 may be issued by the remotedevice 130 with an expiration time (including date), after which theremote device 130 may not accept token 150 as being valid. Token 150 mayalso uniquely represent, or be uniquely associated with, one or more ofthe following: the source data 135, the device 120, the user of thedevice 120, and a time related to creation or usage of token 150. In oneaspect, token 150 is generated based on, or as a function of (e.g., ahash function), one or more of the following: the source data 135, theidentity of device 120, the identity of the user of the device 120, anda time related to creation or usage of token 150. Token 150 may be anon-public, unique token. Token 150 may be a secure (or encrypted)token. In one aspect, token 150 is temporary and not permanent, and doesnot exist until the presence of device 120 is detected and the sourcedata is identified. In one aspect, token 150 is generated only after thepresence of device 120 is detected by device 110. In one aspect, token150 is generated only after the source data 135 for sharing isidentified or selected by device 110.

FIG. 4 is a block diagram of an example of source data 135 that can beshared using the NPC protocol. Although the metadata relating to thesource data 135 (i.e., token 150 of FIGS. 3A-3B) may be limited in sizesuch that the token 150 can be communicated using NPC protocol, nolimitation regarding the size or the type of information in the sharedsource data 135 is exerted by the subject technology. For example,source data 135 may comprise, among other information, media files 410,source path information 420, remote desktop connection information 430,security information 440, device management information 450, and deviceconfiguration information 460. Media files may include, for example,audio files 412 (e.g., music, recorded voice and recorded sounds, etc.)video files 414 (e.g., files containing frames of images such as videoclips), audio-video files 416 (e.g., movies, video clips with sound),images 418 (e.g., personal picture, graphic arts, images of variousobjects, advertisement images, etc.) or other files such as text filesincluding PDF files. Source path information 420 may include, forexample, a directory name 422, a folder name 424, a subfolder name 426and a file name 428. Source path information 426 may provide for a userof device 120 of FIGS. 1A-1D to access a remote device and update afile. For example, an IT person may use path information 426 to updateor make changes to certain files in an employee's computer.

Remote desktop connection information 430 may include, for example, anInternet Protocol (IP) address 432, a user name 434, and a file name436. Remote desktop connection information 430 may facilitate for amobile device user (e.g., user of device120) to remotely connect todesktop of a remote computer (e.g., a personal computer) and access afile identified by the file name 436. Security information 440 mayinclude, for example, a network security information 422 (e.g., asecurity tokens such as shared secrets and the like) and a securitycoding information 444 (e.g., cryptographic information such aspublic-keys and the like). Security information enables the user ofdevice 120 to access secured remote computers or servers.

Device management information 450 may include, for example, color depth452, resolution 454, and desktop settings 456. Device managementinformation 450 may be useful for a user of a mobile device (e.g.,device 120) and may enable the user to modify various features (e.g.,resolution, color, or other settings) of, for example, his/hers desktopcomputer, remotely, from the mobile device. Device configurationinformation 460 may include, for example, network configurationinformation 462, peripheral device configuration information 464, andclient-server configuration information 466. A user of a mobile device(e.g., device 120) may use network configuration information 462 toconfigure a device (e.g., the mobile device a remote device such adesktop computer) for connection to a network (e.g., PAN, a LAN, a CAN,a MAN, a WAN, etc.). Peripheral device configuration information 464may, for instance, be used by the user of device 120 to configure adevice (e.g., device 120, or a remote device such as a remote computer)for connection to a printer (e.g., a dedicated printer or a networkprinter) or a television for connection to another device such asdigital video recorder (DVR). Client server configuration information466 may provide a user of device 120 to configure a number of remotecomputers as clients or servers.

FIG. 5 is a conceptual block diagram of an example of a device 110 ofFIGS. 1A-1D or device 210 of FIG. 2C for sharing information using theNPC protocol. In the following, for simplicity, references are made todevices 110 and 120. Such references may also be valid for devices 210and 220 of FIG. 2C. Device 110 may include an NPC interface 510, storage520, a processor 530, a first network interface 512, a second networkinterface 514, a display 540, and a memory 550 coupled to one anothervia a bus 555. It should be understood that communication means otherthan busses can be utilized with the disclosed configurations. Thememory may store various software modules such as a validation module552, a remote desktop module 554, a security module 556, an encoder 558,an identification module 560, a decoder module 562, and an interfacemodule 570. NPC interface module 510 may facilitate communication, usingNPC protocol, between device 110 and one or more devices 120 of FIGS.1A-1D, where a token 150 of FIGS. 3A-3B encoded via encoder 558 iscommunicated from device 110 to device 120. In an aspect, device 110 mayuse first network interface 512 to communicate with a source device suchas device 110, device 220, or a remote device (e.g., remote devices 130or 140 of FIGS. 1A-1D, or devices 270 or 280 of FIG. 2C) using a firstcommunication protocol (e.g., HTTP protocol or another protocol) toconnect to the source device via a network (e.g., network 250 of FIGS.2A-2B). In another aspect, device 110 may use second network interface514 to communicate with the remote device 130 using a secondcommunication protocol (e.g., P2P protocol, an ICE protocol, a sessioninitiation protocol, a BT protocol a Wi-Fi protocol, an XMPP, a pushprotocol, or a non-industry standard communication protocol). When usingsecond network interface 514, device 110 may connect to the sourcedevice through a proxy server 160 of FIGS. 1C-1D.

When a first user (e.g., the user of device 110 or 210) decides to sharea source data 135 of FIG. 4 with a second user (e.g., a user of device120), the first user may start an application in device 110. Theapplication may comprise remote desktop module 554 and identificationmodule 560. Remote desktop module 554 may be configured to facilitateproviding for display a desktop representation of a remote device on adisplay 540 of device 110. Remote desktop module 554 may facilitateproviding for display various files on the source device that may beselected for sharing. The identification module 560 (e.g., inconjunction with remote desktop module 554) may be configured tofacilitate searching for or selecting source data 135 and identifyingsource data 135 and providing an identification information of sourcedata 135. The identification information may comprise, for example, oneor more identifiers (e.g., a device name, an IP address, etc.) of thesource device, a path in a file system of the source device, or a filename that identifies a file that contains the source data 135. The firstor second network interfaces 512 or 514 may facilitate connection to thesource device, and communicating the identification information to thesource device. The source device may create token 150 in real time andprovide token 150 to device 110, which can be received by one of thefirst or second network interfaces 512 or 514. In an aspect, theprovided token 150 sent over proxy server (e.g., proxy server 160) usinga communication protocol (e.g., XMPP, or ICE) is encoded based on thecommunication protocol. At device 110, decoder 562 may decode theencoded token 150, before encoder 558 facilitates encoding token 150 toenable communication of token 150 via NPC protocol. The NPC interface510 may communicate the encoded token 150 to device 120, when the userof device 110 (or device 120) positions devices 110 and 120 close toeach other (e.g., within five feet).

When device 120 as described in more detail with respect to FIG. 6,connects to the source device (e.g., remote devices 130 or 140 of FIGS.1A-1D, devices 270 and 280 of FIG. 2C, device 110 or device 220) andattempts to access source data 135, the source device, for example, mayobtain an identifier of device 120 or a user of the device 120 andinform device 110 of the attempt. At device 110, security module 556 mayfacilitate one or more security measures. For example, security module556 may cause first or second network interfaces 512 or 514 to receivethe identifier of device 120 or the user of the device 120 from thesource device. Validation module 552 may validate the identifier bydisplaying the identifier using display 540 and receiving approval fromthe user of device 110. Security module 556 may subsequently cause firstor second network interfaces 512 or 514 to communicate the approval tothe source device to enable authentication of device 120 or the user ofdevice 120. In one aspect, security module 445 may cause first or secondnetwork interfaces 512 or 514 to communicate to the source deviceinformation that can identify device 120 or the user of device 120, toenable the source device to authenticate device 120 or the user ofdevice 120 when device 120 attempts to access source device to downloadsource data 135.

The interface module 570 may provide user interfaces for communicationof various information to the user of device 110. For example, a userinterface provided by interface module 570 and displayed on display 540may be configured to receive inputs from the user of device 110, forexample, the approval discussed above with respect to the securitymeasures. Display 540 may include a liquid crystal display (LCD) or atouch sensitive display. Processor 530 may be a general-purposeprocessor (e.g., a central processing unit (CPU)), a graphics processingunit (GPU), a microcontroller, a Digital Signal Processor (DSP), anApplication Specific Integrated Circuit (ASIC), a Field ProgrammableGate Array (FPGA), a Programmable Logic Device (PLD), a controller, astate machine, gated logic, discrete hardware components, or any othersuitable entity that can perform calculations or other manipulations ofinformation. Processor 530 may execute various applications and softwaremodules stored in memory 550, for example, validation module 552, remotedesktop module 554, security module 556, encoder 558, etc. In oneaspect, some of the applications or modules may be implemented asfirmware.

In some aspects, various application and software modules such asvalidation module 552, remote desktop module 554, security module 556,encoder 558, and the like may be stored on storage 520, which mayinclude one or more machine-readable media. Storage 520 may include aRandom Access Memory (RAM), a flash memory, a Read Only Memory (ROM), aProgrammable Read-Only Memory (PROM), an Erasable PROM (EPROM),registers, a hard disk, a removable disk, a CD-ROM, a DVD, or any othersuitable storage device. The machine-readable medium may be a singlemedium or multiple media (e.g., a centralized or distributed database,and/or associated caches and servers) that store the one or more sets ofinstructions. The term “machine-readable medium” shall also be taken toinclude any non-transitory medium that is capable of storing, encodingor carrying a set of instructions for execution by the machine and thatcause the machine to perform any one or more of the methodologies of theembodiments discussed herein. The term “machine-readable medium” shallaccordingly be taken to include, but not be limited to, storage mediumssuch as solid-state memories, optical media, and magnetic media.Non-transitory medium includes volatile and non-volatile memories.

Still referring to FIG. 5, in one aspect, utilizing NPC interface (e.g.,510), and device 110 may detect presence of device 120, for example,automatically without user intervention. For instance, the operatingsystem of device 110 may include an NPC communication module 581 thatcan monitor and detect presence of NPC-enabled devices. Upon detectionof presence of device 120, the NPC communication module 581 may initiatethe application (e.g., the application described with reference to FIGS.5, 7A and 8A) for sharing information, for example, automaticallywithout user intervention. Identification module 560 of the applicationmay enable a user of device 110 to identify or select source data forsharing (e.g., identification or selection of a source device(s) and afile(s) therein) by, for example, providing for display a graphical userinterface to allow the user to select a source data among a plurality ofsource data or allow the user to enter information that identifies thesource data (e.g., type in the name of the file). Based on the detectionof the presence of device 120, identification module 560 may alsodetermine an identifier of device 120. In one example, if multipledevices 120 are detected, then identification module 560 may provide fordisplay the devices that are detected to allow the user of device 110 toselect one or more of the detected devices for sharing the source data.

In one aspect, device 110 is a hardware device (including software) andis a communication end point device. Device 110 may be, for example, adevice handled by an end user. Device 110 typically has a user interfacemodule/device (e.g., items 570, 540) to provide/receive informationto/from a user. In one aspect, device 110 is not a router or an accesspoint that simply routes data transmissions initiated by anotherhardware device. As a communication end point device, device 110 mayinitiate a data communication. Device 110 (e.g., utilizing items 560,570) may initiate sharing of a source data, for example, based on a useraction at device 110 (e.g., based on the selection of the source dataand/or selection of device 120). In one aspect, device 110 (e.g.,utilizing items 560, 570) may determine the final end destinations of adata communication. For example, item 560 of device 110 may decide thatthe final end destinations of a data communication are devices 110 and130 for requesting and receiving a token. Upon receiving and processingthe token, device 110 may decide the final end destinations of a datacommunication are devices 110 and 120 for sending and receiving theprocessed token, and device 110 may initiate this transaction withdevice 120.

Device 110 may also initiate a remote desktop session between device 110(as a first end point) and device 130 (as a second end point) to providefor display at device 110 a representation of the entire desktop ofdevice 130 (or a representation of files or folders on device 130), toallow accessing any and all files on device 130 (or allow accessingfiles that the user of device 110 is permitted to access), and toexchange the request for, and receipt of, a token.

In one aspect, device 120 is a hardware device (including software) andis a communication end point device. For example, upon receiving atoken, device 120 (e.g., item 652 in FIG. 6) may determine that thefinal end destinations of a data communication are devices 120 and 130for requesting and downloading the source data and may initiate thedownloading transaction.

In one aspect, device 130 is a hardware device (including software) andis a communication end point device. For example, device 130 may be thefinal destination point to receive a request from device 110 to generatea token for the identified source data. Device 130 may be the finaldestination point to receive a request from device 120 to provide thesource data to device 120.

In one aspect, source data 135 may be non-public information (e.g.,information stored on a source device that is not generally accessibleto the public without specific permission). A non-public source devicemay be a server that is not an HTTP server.

In one aspect, each of items 510, 520, 530, 555, 512, 514 and 540comprises hardware, and each of items in memory 550 comprises software.In one aspect, each of items 510, 520, 530, 555, 512, 514 and 540 maycomprise hardware and software. Item 510 may comprise software such asitems 558, 562 and/or 581. Each of items 512 and 514 may comprisesoftware such as items 558, 562 and/or 582.

FIG. 6 is a conceptual block diagram of an example of a device 120 ofFIGS. 1A-1D or device 220 of FIG. 2C for receiving shared informationusing the NPC protocol. In the following, for simplicity, references aremade to devices 110 and 120. Such references may also be valid fordevices 210 and 220 of FIG. 2C. Device 120 may include an NPC interface610, storage 620, a processor 630, a first network interface 612, asecond network interface 614, a display 640, and a memory 650 coupled toone another via a bus 655. It should be understood that communicationmeans other than busses can be utilized with the disclosedconfigurations. Memory 650 may store various applications and softwaremodules such as a download module 654, a remote desktop module 654, adecoder module 656, an interface module 658, an encoder 672, an NPCcommunication module 681, and a network communication module 682including a Web browser and an application (e.g., a remote accessapplication, PocketCloud application). NPC interface 610 may facilitatecommunication, using NPC protocol, between devices 120 and device 110 ofFIGS. 1A-1D, where an encoded (i.e. based on NPC protocol) token 150 ofFIGS. 3A-3B is communicated from device 110 to device 120, when device120 is positioned near (e.g., within five feet) of device 110. Decoder656 may decode the encoded token 150. The decoded token 150 maysubsequently (prior to an expiration date of token 150) be used bydevice 120 to access source data135 of FIG. 4 stored on one of thesource devices (e.g., remote devices 130 or 140 of FIGS. 1A-1D, devices270 and 280 of FIG. 2C, device 110, or device 220). FIGs.

Download manager 562 may facilitate accessing the source device anddownloading source data 135 using decoded token 150 within a time periodprior to the expiration time of token 150. Download manager 562 maycause first network interface 512 to access the source device, via anetwork (e.g., network 250 of FIGS. 2A-2B), using a communicationprotocol such as HTTP In one aspect, download manager 562 may causefirst network interface 614 to access the source device, via a proxyserver (e.g., proxy server 160 of FIGS. 1C-1D), using a communicationprotocol such as XMPP or ICE. Remote desktop module 654 may beconfigured to facilitate displaying a desktop representation of a sourcedevice on a display 640 of device 120. Interface module 658 may provideuser interfaces for communication of various information to the user ofdevice 120. For example, a user interface provided by interface module658 and displayed on display 640 may be configured to receive inputsfrom the user of device 120, for instance, a location in device 120,where the user wishes to store the downloaded source data 135.

In some aspects, token 150 may include a HTTP URL to allow device 220 toaccess source data 135 via a website (e.g., pocketcloud.com) representedby the URL of token 150. The HTTP URL can be launched through the Webbrowser without the need for any specialized application. The HTTP URLmay point to a Web application that contains necessary JavaScript codeto detect whether an appropriate application (e.g., remote accessapplication, PocketCloud application) is installed on device 220 or not.If the application is installed locally on device 220, the localapplication can be launched by the Web browser. The local applicationmay proceed to download source data 135 from the source device. If thenecessary application is not installed locally on device 220, the Webbrowser may communicate back to the Web Server (e.g., Web server 260 ofFIG. 2C) and request the Web server to obtain source data135 from thedevice that stores the source data. This may allow the Web browser tosubsequently download the file from the Web server 260 without the needof the Web application (e.g., the native application).

Display 640 may include a liquid crystal display (LCD) or a touchsensitive display. Processor 630 may be a general-purpose processor(e.g., a central processing unit (CPU)), a graphics processing unit(GPU), a microcontroller, a Digital Signal Processor (DSP), anApplication Specific Integrated Circuit (ASIC), a Field ProgrammableGate Array (FPGA), a Programmable Logic Device (PLD), a controller, astate machine, gated logic, discrete hardware components, or any othersuitable entity that can perform calculations or other manipulations ofinformation. Processor 630 may execute various applications and softwaremodule stored in memory 650, for example, download manager 652, remotedesktop module 654, decode 656, and interface module 658. In one aspect,some of the applications or modules may be implemented as firmware. Insome aspects, various applications and software modules such as downloadmanager 652, remote desktop module 654, decode 656, and interface module658 may be stored on a storage 620, which may include one or moremachine-readable media. Storage 620 may include a Random Access Memory(RAM), a flash memory, a Read Only Memory (ROM), a ProgrammableRead-Only Memory (PROM), an Erasable PROM (EPROM), registers, a harddisk, a removable disk, a CD-ROM, a DVD, or any other suitable storagedevice The machine-readable medium may be a single medium or multiplemedia (e.g., a centralized or distributed database, and/or associatedcaches and servers) that store the one or more sets of instructions.

In one aspect, each of items 610, 620, 630, 655, 612, 614 and 640comprises hardware, and each of items in memory 650 comprises software.In one aspect, each of items 610, 620, 630, 655, 612, 614 and 640 maycomprise hardware and software. Item 610 may comprise software such asitems 672, 656 and/or 681. Each of items 612 and 614 may comprisesoftware such as items 672, 656 and/or 682.

FIGS. 7A-7B are flowcharts illustrating exemplary methods 700A and 700Bfor sharing information using the NPC protocol. Method 700A isimplemented at device 110 of FIGS. 1A-1D or device 210 of FIG. 2C. Inthe following, for simplicity, references are made to devices 110 and120 of FIGS. 1A-1D. Such references may also be valid for devices 210and 220 of FIG. 2C. Method 700 A begins at operation 710, where device110 supports communication based on a first protocol (e.g., HTTP orXMPP) between device 110 and the source device (e.g., remote devices 130or 140 of FIGS. 1A-1D, devices 270 and 280 of FIG. 2C, device 110, ordevice 220). For example, identification module 560 may determine orprovide identification information of the source data, and interface 512or 514 may receive the identification information directly or indirectlythrough one or more other items such as network communication module 582(that may provide software support for item 512 and/or 514) and/orencoder 558. Interface 512 or 514 may then facilitate transmission ofthe identification information from device 110 to the source device,utilizing the first protocol. Hence, at least one of items 560, 512, 514and/or other items (e.g., 582) may support communication based on thefirst protocol between devices 110 and 130. Information may be encodedinto the first protocol utilizing items such as 558 and/or 582.

At operation 720, device 110 facilitates receiving token 150 of FIGS.3A-3B that is associated with source data 135 of FIG. 4. For example,interface 512 or 514 may receive token 150, which may then be receivedby one or more items such as items 582, 562, 558 for processing. Hence,at least one of items 512, 514, 582, 562, 558 and/or other items mayfacilitate receiving token 150.

Device 110 (e.g., encoder 558 and/or other items such as item 581) mayinitiate encoding, or encode, token 150 to enable communication of token150 using the NPC protocol (operation 730). At operation 740, device 110may provide for communication of token 150 to one or more devices 120located within five feet of device 110. Token 150 may be communicatedusing the NPC protocol. For example, encoder 558 and/or NPCcommunication module 581 may allow token 150 to be provided to NPCinterface 510, which may (directly or indirectly) initiate sending token150 to device 120. Hence, at least one of items 558, 581, 510 and/orother items may provide for communication to device 120 the encodedtoken 150. In one aspect, once device 110 identifies or selects a sourcedata, all of the operations shown in FIG. 7A may be carried outautomatically without user intervention.

Method 700B is implemented at device 120 and begins at operation 750,where device 120 facilities receiving token 150 from device 110, usingthe NPC protocol, when device 120 is located within five feet of device110. In one example, at least one of items 610, 656, 681 and/or otheritems may perform or facilitate performing operation 750. Device 120 maysubsequently decode token 150, which was encoded for communication basedon NPC protocol (operation 760). In one example, at least one of items656, 681 and/or other items may perform or facilitate performingoperation 760. At operation 770, device 120 may provide forcommunication, based on a communication protocol (e.g., e.g., P2Pprotocol, an ICE protocol, a session initiation protocol, a BT protocola Wi-Fi protocol, an XMPP, a push protocol, a non-industry standardcommunication protocol, or HTTP), to the source device to downloadsource file 135 using decoded token 150. In one example, at least one ofitems 612, 614, 672, 682 and/or other items may perform or facilitateperforming operation 770.

In one advantageous example, some or all of the operations shown in FIG.7B are performed automatically without user intervention.

FIGS. 8A-8B are flowcharts illustrating exemplary methods 880A and 800Bfor sharing information using the NPC protocol. Method 800A may beimplemented at device 110 of FIGS. 1A-1D. In the following, forsimplicity, references are made to devices 110 and 120 of FIGS. 1A-1D.Such references may also be valid for devices 210 and 220 of FIG. 2C.Method 800A begins at operation 810, where a user of device 110 startsan application on device 110 to share a source data with a user ofdevice 120 of FIGS. 1A-1D. At operation 815, using the application, theuser of device 110 searches and locates (or selects from a list) sourcedata 135 of FIG. 4 stored on a source device (e.g., remote devices 130or 140 of FIGS. 1A-1D, devices 270 and 280 of FIG. 2C, device 110, ordevice 220). Device 110 may receive metadata (e.g., token 150 of FIGS.3A-3B) related to source data 135 and save the metadata on device 110(operation 820). At operation 825, device 110 may encode metadata forNPC transfer with an expiration date. The encoded metadata issubsequently shared with device 120 using the NPC protocol (operation830).

Method 800B may be implemented at device 120 and begins at operation840, where the user of device 120 starts an application for receivingthe encoded metadata from device 110, which is located within five feetof device 120. At operation 845, device 120 may listen for an NPC recordreceived from device 110, which includes the metadata. Device 120 maydecode the metadata (operation 850) and at operation 855, push themetadata to the application's download queue. The application maycomprise download manager 652 of FIG. 6, a Web browser or a Webapplication. At operation 860, download manager 652 may facilitatedownloading source data 135 using the metadata. In some aspects, thesource data 135 may be downloaded through the Web browser using a URLincluded in token 150 or through the Web application.

FIGS. 9A-9B is flowchart illustrating an exemplary method 900 fordownloading a source file using the information shared based on the NPCprotocol. Method 900A includes portions 940, 950 and 970. Portion 940may be implemented at device 110 of FIG. 1A-1D or device 210 of FIG. 2C.In the following, for simplicity, references are made to devices 210 and220 of FIG. 2C. Such references may also be valid for devices 110 and120 of FIG. 1A-1D. Portion 950 may be implemented at device 120 or 220,and portion 970 may be implemented by device 260 of FIG. 2C or any ofdevices 130 or 140 of FIGS. 1A-1D. Portion 940 begins with operation942, where at device 210 a file is selected by the user of device 210 toshare with device 210. At operation 944, NPC communication startsbetween device 210 and 220, as described in more detail above. Using theNPC communication, metadata encoded in URL, including information suchas, source device identification (SID), source file details (FD), andtoken 150, is communicated to device 220 using the NPC protocol(operation 946).

Portion 950 of method 900A begins at operation 952, where NPCinformation (e.g., the metadata) is received by device 220. Device 220may use the Web browser to access a web server 260 (operation 954).Server 260, at operation 974, the URL points to Web application thatcontains necessary JavaScript to detect a local Web application. Atoperation 956, the Web application detects whether the local Webapplication (e.g., PocketCloud application) is installed on device 220.At control operation 958, if the PocketCloud application is installed ondevice 220, control is passed to operation 960, where the PocketCloudapplication is launched at device 220 and the SID, FD, and token 150 arepassed to the PocketCloud application. Subsequently, at operation 962,PocketCloud application downloads the source data 135 of FIG. 1A-1D formthe source device (e.g., remote devices 130 or 140 of FIGS. 1A-1D,devices 270 and 280 of FIG. 2C, device 110, or device 220).

Otherwise, if the PocketCloud application is not installed in device220, control is passed to operation 964, where a request is made to webserver 260 (e.g., a PocketCloud server) to download source file 135.Subsequently, at operation 972, server 260 may access source data 135from the source device. Finally, the Web browser downloads the sourcefile 135 from the web server 260 to device 220 (operation 966).

In method 900B, after the operation starts, download manager 652 of FIG.6, at control operation 910, may inquire one of first network interface612 or second network interface 614 of FIG. 6 to find out whether aconnection is made between device 120 and a source device (e.g., remotedevices 130 or 140 of FIGS. 1A-1D, devices 270 and 280 of FIG. 2C,device 110, or device 220). If the connection is made, the control istransferred to control operation 920, otherwise the download manger 652keeps inquiring. At control operation 920, device 120 may determinewhether there are any files pending to be downloaded. If there is nopending file, control is transferred back to control operation 910.Otherwise, at operation 930, download manager 652 downloads source file135 using the shared metadata (e.g., token 150 of FIGS. 3A-3B).

FIG. 10 is a conceptual block diagram of an example of a device orserver. System 1000 may comprise remote devices 130 or 140 of FIGS.1A-1D or server 230 or cloud server 240 of FIGS. 2A-2B, or any device260, 270, 280. System 1000 may be device 110, 120, 210 or 220. System1000 may be device 110 or device 120. System 1000 includes a processingsystem 1002, which may include one or more processors or one or moreprocessing systems. A processor 530 or 630 may be processing system1002, and a processor can be one or more processors. The processingsystem 1002 is capable of communication with a receiver 1006 and atransmitter 1009 through a bus 1004 or other structures or devices. Itshould be understood that communication means other than busses can beutilized with the disclosed configurations. Processing system 1002 cangenerate token 150 of FIGS. 3A-3B. In some aspects, processing system1002 may generate audio, video, multimedia, and/or other types of datato be provided to the transmitter 1009 for communication. In addition,audio, video, multimedia, and/or other types of data can be received atthe receiver 1006, and processed by the processing system 1002.

The processing system 1002 may include a general-purpose processor or aspecific-purpose processor for executing instructions and may furtherinclude a machine-readable medium 1019, such as a volatile ornon-volatile memory, for storing data and/or instructions for softwareprograms. The instructions, which may be stored in a machine-readablemedium 1010 and/or 1019, may be executed by the processing system 1002to control and manage access to the various networks, as well as provideother communication and processing functions. The instructions may alsoinclude instructions executed by the processing system 1002 for varioususer interface devices, such as a display 1012 and a keypad 1014. Theprocessing system 1002 may include an input port 1022 and an output port1024. Each of the input port 1022 and the output port 1024 may includeone or more ports. The input port 1022 and the output port 1024 may bethe same port (e.g., a bi-directional port) or may be different ports.

The processing system 1002 may be implemented using software, hardware,or a combination of both. By way of example, the processing system 1002may be implemented with one or more processors. A processor may be ageneral-purpose microprocessor, a microcontroller, a Digital SignalProcessor (DSP), an Application Specific Integrated Circuit (ASIC), aField Programmable Gate Array (FPGA), a Programmable Logic Device (PLD),a controller, a state machine, gated logic, discrete hardwarecomponents, or any other suitable device that can perform calculationsor other manipulations of information.

A machine-readable medium can be one or more machine-readable media.Software shall be construed broadly to mean instructions, data, or anycombination thereof, whether referred to as software, firmware,middleware, microcode, hardware description language, or otherwise.Instructions may include code (e.g., in source code format, binary codeformat, executable code format, or any other suitable format of code).

Machine-readable media (e.g., 1019) may include storage integrated intoa processing system such as might be the case with an ASIC.Machine-readable media (e.g., 1010) may also include storage external toa processing system, such as a Random Access Memory (RAM), a flashmemory, a Read Only Memory (ROM), a Programmable Read-Only Memory(PROM), an Erasable PROM (EPROM), registers, a hard disk, a removabledisk, a CD-ROM, a DVD, or any other suitable storage device. Inaddition, machine-readable media may include a transmission line or acarrier wave that encodes a data signal. Those skilled in the art willrecognize how best to implement the described functionality for theprocessing system 1002. According to one aspect of the disclosure, amachine-readable medium is a computer-readable medium encoded or storedwith instructions and is a computing element, which defines structuraland functional interrelationships between the instructions and the restof the system, which permit the instructions' functionality to berealized. Instructions may be executable, for example, by a clientterminal or server or by a processing system of a client terminal orserver. Instructions can be, for example, a computer program includingcode.

A network interface 1016 may be any type of interface to a network(e.g., an Internet network interface) or a proxy server using XMPP, andmay reside between any of the components shown in FIG. 10. For theexample of a remote device 130 of FIGS. 1A-1D, the network interface1016 may be used to communicate with device 110 or 120, for example, toreceive identification information and an approval from device 110 andan identifier of device 120 or the user of device 120 from device 120and to communicate token 150 to device 110 or source data 135 to device120 over network 250 or via proxy server 160 of FIGS. 1C-1D.

A device interface 1018 may be any type of interface to a device and mayreside between any of the components shown in FIG. 10. A deviceinterface 1018 may, for example, be an interface to an external device(e.g., USB device) that plugs into a port (e.g., USB port) of the system1000.

A transceiver block 1007 may represent one or more transceivers, andeach transceiver may include a receiver 1006 and a transmitter 1009. Afunctionality implemented in a processing system 1002 may be implementedin a portion of a receiver 1006, a portion of a transmitter 1009, aportion of a machine-readable medium 1010, a portion of a display 1012,a portion of a keypad 1014, or a portion of an interface 1016, and viceversa.

The subject technology may provide mechanisms and methodology oftransferring information between two or more separate devices tofacilitate file sharing, remote desktop connection settings and devicemanagement settings, by the mechanism of NPC protocol. The aboveinformation transfer may otherwise occur locally throughdevice-to-device communications such as with a WiFi or bluetoothconnection. The subject technology may also facilitate the finaltransfer through an intermediary cloud based server infrastructure. Thesubject technology may be viewed as a simple mechanism for transferringcomplex information from one device to another. The complex informationtransfer might include, for example, file sharing, which may involvesharing source path information (e.g., remote path information), remotedesktop connection details, security information, device management,setup information, etc.

In one aspect, the subject technology can provide various advantages,including without limitation the following: quick initial informationtransfer concerning connection information or file information betweentwo distinct devices using a hardware device based approach of NPC(e.g., less than 0.1 second in setup time); transfer of remote desktopconnection information without requiring user interaction (specificallytext entry); and transfer device management information withoutrequiring user interaction (specifically text entry or manual setup).

The two devices may advantageously utilize the built-in NPC hardware toperform the sharing of information. For example, a mobile applicationmay provide the mechanism to choose the file or connection setting thatis meant to be shared. The application may communicate over NPC from onedevice to another. The application may handle the final retrieval of andapplication of the NFC payload information (e.g., file transferinformation, remote connection details, and device management details).A cloud based server infrastructure may contain software to allow forthe downloading of file data that is being shared, connectioninformation for a remote desktop or desktops, or device managementinformation. A WiFi connection can provide the transport necessary todownload the file, connection information, or device managementinformation. A bluetooth connection can provide the transport necessaryto download the file, connection information, or device managementinformation.

In one aspect, various elements of the subject technology may comprise:two devices (e.g., smart phones) with built-in NPC support hardware; amobile application utilizing the framework of the subject technology;(optional) cloud based server infrastructure; (optional) Wi-Ficonnection; (optional) Bluetooth connection; and (optional) P2Pconnection. In one aspect, the subject technology may utilize a numberof steps, for example, the steps for sharing a source file between twodevices, as follows: an application in the first device is used to finda file to share with a second device; the file is optionally uploaded toa remote cloud-based server if the file is to be shared remotely; a filecontaining the meta information of the sharing information can betransmitted by NPC to the second device; the second device runs asoftware to read the encoded data by NPC; the second device uses thismeta information to either download directly through bluetooth, WiFi,P2P or from a cloud based server infrastructure housing the shared file.

In one aspect, a method for transmitting remote desktop connectioninformation may include the following steps: an application is used tofind a remote desktop connection or group of connections to share; afile containing the meta information of the remote desktop connectiondetails can be transmitted by NPC; the second device runs a software toreceive the meta information over NPC; the second device uses this metainformation directly to read the encoded information to reproduce theremote desktop connection settings, or download directly throughbluetooth, WiFi, P2P or from a cloud-based server infrastructure housinga file containing extended remote desktop connection information.

In one advantageous example, various operations described herein may beperformed automatically without user intervention, except that, forexample, a process may require a user to identify/select a source datafor sharing, to select one or more devices 120, and/or toapprove/authenticate device 120 or its user so that device 120 canaccess the source data.

In one aspect, a communication protocol may comprise one or morecommunication protocols. In one aspect, a first communication protocolcan be the same as a second communication protocol utilized by the sameor different devices. In one aspect, a first communication protocol canbe different from a second communication protocol utilized by the sameor different devices. In one aspect, a notation such as a firstdevice/item can be the same as a second device/item. In one aspect, anotation such as a first device/item can be different from a seconddevice/item.

Illustration of Method/Machine-Readable Storage Medium/Apparatus forFacilitating Sharing Information Among Multiple Devices Using NPCProtocol (Described as Clauses)

Various examples of aspects of the subject technology are described asnumbered clauses (1, 2, 3, etc.) for convenience. These are provided asexamples, and do not limit the subject technology. Identifications ofthe figures and reference numbers are provided below merely as examplesand for illustrative purposes, and the clauses are not limited by thoseidentifications.

Examples of Encoding Clauses

1. A non-transitory machine-readable medium (e.g., 520, 550, FIG. 5)comprising instructions stored therein, the instructions executable byone or more processors (e.g., 530, FIG. 5) to facilitate performing amethod for facilitating sharing source data (e.g., 700A, FIG. 7A), themethod comprising:

supporting communication based on a first communication protocol betweena first device and a remote device, wherein the communication isassociated with a source data, and the communication is based ondetection of presence of a second device within five feet of the firstdevice (e.g., 710, FIG. 7A);

facilitating receiving a first token, associated with the source data(e.g., 720, FIG. 7A);

facilitating encoding the first token to enable communication using anear proximity communication (NPC) protocol (e.g., 730, FIG. 7A); and

providing for communication to the second device, located within fivefeet of the first device, the first token using the NPC protocol toenable the second device to access the source data utilizing a secondcommunication protocol, wherein the second device is unable to accessthe source data without using the first token (e.g., 740, FIG. 7A),

wherein the NPC protocol is different from the first and secondcommunication protocols, wherein the first communication protocol is thesame or different from the second communication protocol,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol or a data transfer rate supported by the second communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet,

wherein the first device is an NPC-enabled device adapted to detectpresence of the second device within five feet of the first device,

wherein the first device is a communication end point device.

2. The non-transitory machine-readable medium of clause 1, wherein themethod comprises identifying the source data, to initiate sharing of thesource data, based on a user action at the first device.

3. The non-transitory machine-readable medium of clause 1, wherein themethod comprises identifying, at the first device, the source data forsharing, wherein the supporting communication comprises providing forcommunication, from the first device utilizing the first communicationprotocol to the remote device through a proxy server, identificationinformation of the source data based on the identifying the source data,wherein the NPC protocol comprises a near field communication (NFC)protocol.

4. The non-transitory machine-readable medium of clause 1, wherein themethod comprises identifying the source data for sharing,

wherein the supporting communication comprises providing forcommunication, to the remote device, identification information of thesource data, wherein the identification information comprises at leastone of an identifier of the remote device, a path in a file system ofthe remote device, or a file name,

wherein the supporting communication comprises providing forcommunication, to the remote device, a request for the first token,

wherein the facilitating receiving comprises facilitating receiving thefirst token in response to the request.

5. The non-transitory machine-readable medium of clause 1, wherein themethod comprises identifying the source data for sharing,

wherein the supporting communication comprises facilitating providingidentification information of the source data to the remote device toenable generation of the first token in real time in response to thefacilitating providing identification information of the source data,

wherein the facilitating receiving the first token comprisesfacilitating receiving the first token, at the first device, utilizingthe first communication protocol, from the remote device via a proxyserver, in response to the facilitating providing identificationinformation of the source data,

wherein the method comprises, prior to the encoding, decoding the firsttoken received utilizing the first communication protocol,

wherein the providing for communication to the second device the firsttoken comprises providing for communication from the first device to thesecond device the first token,

wherein the method comprises providing for communication from the firstdevice to the second device other information for accessing the sourcedata, wherein the other information comprises location of the sourcedata, wherein a size of the first token and the other information forcommunication to the second device is less than a size of the sourcedata, wherein the source data comprises more than one mega bytes,

wherein the encoding comprises encoding of the first token at the firstdevice.

6. The non-transitory machine-readable medium of clause 1, wherein themethod comprises at least one of a first security measure and a secondsecurity measure,

wherein the first security measure comprises:

facilitating receiving, from the remote device, information identifyingat least one of the second device or a user of the second device, inresponse to the second device attempting to access the source data; and

providing for communication to the remote device, an approval followingvalidation of the received information by a user of the first device,

wherein the second security measure comprises:

providing for communication to the remote device, informationidentifying at least one of the second device or the user of the seconddevice, to enable the remote device to authenticate the second device orthe user of the second device when the second device attempts to accessthe source data.

7. The non-transitory machine-readable medium of clause 1, wherein themethod comprises one or more of a first method, a second method, a thirdmethod or a fourth method,

wherein the first method comprises:

-   -   providing a request, directed to the remote device, to transmit        the source data to a first server comprising a cloud server to        enable the second device to access the source data via the first        server;

wherein the second method comprises:

-   -   providing a request, directed to the remote device, to transmit        the source data to a second server comprising a cloud server and        to send a second token to the first device;    -   providing for communication to the second device, located within        five feet of the first device, the second token using the NPC        protocol to enable the second device to access the source data        transmitted to the second server;

wherein the third method comprises:

-   -   facilitating transmitting the source data to a third server        comprising a cloud server to enable the second device to access        the source data via the third server;

wherein the fourth method comprises:

-   -   facilitating generating a third token;    -   facilitating transmitting the source data from the first device        to a fourth server;    -   providing for communication to the second device, located within        five feet of the first device, the third token using the NPC        protocol to enable the second device to access the source data        via the fourth server.

8. The non-transitory machine-readable medium of clause 1, wherein thefirst token comprises a metadata comprising at least some of anidentifier of a source device, authentication information associatedwith the source device, an identifier of the source data, or a path ofthe source data, wherein the source device is a device where the sourcedata is stored, wherein the source device is the first device or theremote device.

9. The non-transitory machine-readable medium of clause 1, wherein thesource data comprises at least one of a media file, a document, remotepath information, remote desktop connection information, securityinformation, device management information, or device configurationinformation.

10. The non-transitory machine-readable medium of clause 9, wherein:

the media file comprises at least one of an audio file, a video file, anaudio-video file, or an image,

the remote path information comprises at least one of a directory name,a folder name, a sub-folder name, or a file name,

the remote desktop connection information comprises at least one of anInternet Protocol (IP) address, a username, or a password,

the security information comprises at least one of network securityinformation or security coding information,

the device management information comprises at least one of a colordepth, a resolution, or a desktop setting, and

the device configuration comprises at least one of a networkconfiguration, a peripheral device configuration, or a client-serverconfiguration.

11. The non-transitory machine-readable medium of clause 1, wherein thefirst token is expirable and is a representation unique to one or moreof the following: the source data, the second device, a user of thesecond device, and a time related to creation or usage of the firsttoken, wherein the method comprises at least one of a first method and asecond method,

wherein the first method comprises:

facilitating receiving a second token associated with second sourcedata;

encoding the second token to enable communication using the NPCprotocol; and

providing for communication to a third device, located within five feetof the first device, the second token using the NPC protocol, to enablethe third device to access the second source data utilizing a thirdcommunication protocol,

wherein the first communication protocol is the same or different fromthe third communication protocol,

wherein the second token is a representation unique to one or more ofthe following: the second data, the third device and time related tocreation or usage of the second token,

wherein the second method comprises:

facilitating receiving, at the first device, a third token associatedwith the source data;

encoding, at the first device, the third token to enable communicationusing the NPC protocol; and

providing for communication to a fourth device, located within five feetof the first device, the third token using the NPC protocol, to enablethe fourth device to access the source data utilizing a fourthcommunication protocol,

wherein the first communication protocol is the same or different fromthe fourth communication protocol,

wherein the third token is a representation unique to one or more of thefollowing: the source data, the third device, a user of the thirddevice, and time related to creation or usage of the third token.

12. The non-transitory machine-readable medium of clause 1, wherein thefirst device is a mobile device comprising one or more displays, one ormore processors, one or more network interfaces, and the non-transitorymachine-readable medium, wherein a first one of the one or more networkinterfaces is configured to support communication based on the firstcommunication protocol, wherein a second one of the one or more networkinterfaces is configured to support communication based on the NPCprotocol, wherein the second device is a mobile device, wherein theremote device is a computing device behind a firewall, wherein the firsttoken does not exist prior to identifying the source data to be shared,wherein the first token is creatable in real time and expirable, whereineach of the first and second communication protocols comprises one ormore communication protocols.

13. A non-transitory machine-readable medium (e.g., 520, 550, FIG. 5)comprising instructions stored therein, the instructions executable byone or more processors (e.g., 530, FIG. 5) to facilitate performing amethod for facilitating sharing source data (e.g., 700C, FIG. 7C), themethod comprising:

facilitating receiving a token associated with the source data (e.g.,780, FIG. 7C);

facilitating encoding the token to enable communication using a nearproximity communication (NPC) protocol (e.g., 782, FIG. 7C); and

providing for communication to a second device, located within five feetof a first device, the token using the NPC protocol to enable the seconddevice to access the source data utilizing a communication protocol,wherein the second device is unable to access the source data withoutusing the token (e.g., 784, FIG. 7C),

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet,

wherein the first device is an NPC-enabled device adapted to detectpresence of the second device within five feet of the first device,

wherein the token is non-public.

14. The non-transitory machine-readable medium of clause 13, wherein themethod comprises identifying the source data, to initiate sharing of thesource data, based on a user action at the first device,

wherein the NPC protocol is different from the communication protocol,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the communicationprotocol.

15. The non-transitory machine-readable medium of clause 13, wherein thesource data is stored in the first device, wherein the method comprisesfacilitating generating the token associated with the source data storedon the first device, wherein the facilitating encoding facilitatesreceiving the token prior to encoding.

16. The non-transitory machine-readable medium of clause 13, wherein thecommunication protocol comprises at least one of a peer-to-peerprotocol, an interactive connectivity establishment protocol, a sessioninitiation protocol, the NPC protocol, a Bluetooth protocol, a wirelessfidelity (Wi-Fi) protocol, an extendable messaging and presence protocol(XMPP), a push protocol, or a non-industry standard communicationprotocol.

17. The non-transitory machine-readable medium of clause 13, wherein thefacilitating encoding the token comprises facilitating encoding thetoken in a form of a uniform resource locator (URL) to allow the seconddevice to access the source data via a website represented by the URL ofthe token.

18. The non-transitory machine-readable medium of clause 13, wherein themethod comprises a security measure comprising:

facilitating receiving information identifying at least one of thesecond device or a user of the second device, in response to the seconddevice attempting to access the source data;

validating the received information by a user of the first device; and

authenticating the second device or the user of the second device beforeallowing the second device to access the source data.

19. The non-transitory machine-readable medium of clause 13, wherein theproviding for communication allows the second device to access thesource data via a third device,

wherein the first device supports communication between the first deviceand the third device to facilitate receiving the token from the thirddevice or to facilitate the second device to access the source data,

wherein the token comprises a metadata comprising at least some of anidentifier of the first device, authentication information associatedwith the first device, an identifier of the source data, a path of thesource data, wherein the token enables downloading the source data,wherein the source data is for at least setup, configuration, ormanagement of the second device or one or more computers.

20. An apparatus for facilitating sharing source data (e.g., 110, FIG.5), the apparatus comprising:

a first network interface (e.g., 512, FIG. 5) configured to supportcommunication based on a first communication protocol between theapparatus and a remote device;

an encoder (e.g., 558, FIG. 5) configured to facilitate receiving afirst token associated with a source data;

the encoder configured to facilitate encoding the first token to enablecommunication using a near proximity communication (NPC) protocol; and

an NPC interface (e.g., 510, FIG. 5) configured to provide forcommunication, using the NPC protocol, to a first device (e.g., 120,FIG. 6) located within five feet of the apparatus, the first token toenable the first device to access the source data utilizing a secondcommunication protocol, wherein the first device is unable to access thesource data without using the first token,

wherein the NPC protocol is different from the first and secondcommunication protocols, wherein the first communication protocol is thesame or different from the second communication protocol,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol or a data transfer rate supported by the second communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet.

21. The apparatus of clause 20, further comprising:

an identification module configured to identify the source data and toprovide an identification information of the source data, to facilitatesharing of the source data, based on a user action at the apparatus; and

a second network interface configured to support communication, based onthe first communication protocol, from the apparatus to the remotedevice through a proxy server, the identification information, whereinthe first communication protocol comprises an extendable messaging andpresence protocol (XMPP), wherein the NPC protocol comprises a nearfield communication (NFC) protocol, wherein the identificationinformation comprises at least one of an identifier of the remotedevice, a path in a file system of the remote device, or a file name.

22. The apparatus of clause 20, further comprising an identificationmodule configured to identify the source data and provide anidentification information of the source data, to facilitate sharing ofthe source data, based on a user action at the apparatus, wherein thefirst network interface is further configured to support communication,based on the first communication protocol, from the apparatus to theremote device, of the identification information, wherein theidentification information comprises at least one of an identifier ofthe remote device, a path in a file system of the remote device, or afile name.

23. The apparatus of clause 20, further comprising an identificationmodule configured to identify the source data and to facilitateproviding of an identification information of the source data, tosupport sharing of the source data, based on a user action at theapparatus,

wherein the first network interface is configured to supportcommunication for providing the identification information of the sourcedata to the remote device to enable generation of the first token inreal time in response to the communication for providing identificationinformation of the source data,

wherein the first network interface is further configured to facilitatereceiving the first token, at the apparatus from the remote device via aproxy server, utilizing the first communication protocol, in response tothe communication for providing identification information of the sourcedata,

wherein the apparatus comprises, a decoder to decode, prior to theencoding, the first token received utilizing the first communicationprotocol,

wherein the first network interface is further configured to provide forcommunication from the apparatus to the first device the first token,

wherein the first network interface is further configured to provide forcommunication from the apparatus to the first device other informationfor accessing the source data, wherein the other information compriseslocation of the source data, wherein a size of the first token and theother information for communication to the first device is less than asize of the source data, wherein the source data comprises more than onemega bytes,

wherein the encoder is further configured to encode the first token atthe apparatus.

24. The apparatus of clause 20, further comprising a security moduleconfigured to facilitate at least one of a first security measure and asecond security measure,

wherein the first security measure comprises:

facilitating receiving, via the first network interface, from the remotedevice, information identifying at least one of the first device or auser of the first device, in response to the first device attempting toaccess the source data; and

providing for communication, via the first network interface, to theremote device, an approval following validation of the receivedinformation by a user of the apparatus,

wherein the second security measure comprises:

providing for communication, via the first network interface, to theremote device, information identifying at least one of the first deviceor the user of the first device, to enable the remote device toauthenticate the first device or the user of the first device when thefirst device attempts to access the source data.

25. The apparatus of clause 20, wherein the first network interface isfurther configured to facilitate providing a request, directed to theremote device, to transmit the source data to a server comprising acloud server and to send a second token to the apparatus, and whereinthe NPC interface is further configured to provide for communication tothe first device, located within five feet of the apparatus, the secondtoken using the NPC protocol, to enable the first device to access thesource data transmitted to the server.

26. The apparatus of clause 25, wherein the first or the second tokencomprises a metadata comprising at least some of an identifier of theremote device, an identifier of the server, authentication informationassociated with the remote device, authentication information associatewith the server, an identifier of the source data stored in the remotedevice, a path of the source data stored in the remote device, anidentifier of the source data transmitted to the server, or a path ofthe source data transmitted to the server.

27. The apparatus of clause 25, wherein the source data comprises atleast one of a media file, a document, remote path information, remotedesktop connection information, security information, device managementinformation, or device configuration information, and wherein:

the media file comprises at least one of an audio file, a video file, anaudio-video file, or an image,

the remote path information comprises at least one of a directory name,a folder name, a sub-folder name, or a file name,

the remote desktop connection information comprises at least one of anInternet Protocol (IP) address, a username, or a password,

the security information comprises at least one of network securityinformation or security coding information,

the device management information comprises at least one of a colordepth, a resolution, or a desktop setting, and

the device configuration comprises at least one of a networkconfiguration, a peripheral device configuration, or a client-serverconfiguration.

28. The apparatus of clause 20, wherein the first token is expirable andis a representation unique to one or more of the following: the sourcedata, the first device, a user of the first device, and time related tocreation or usage of the first token, and wherein the apparatus isconfigured to support a plurality of first devices, by providing forreceiving from the remote device a plurality of first tokens, andproviding for communicating, using the NPC protocol, each token of theplurality of first tokens to one of the plurality of the first devices,wherein each token of the plurality of first tokens is a representationunique to one or more of the following: the source data, the one of theplurality of the first devices, a user of the one of the plurality ofthe first devices, and a time related to creation or usage of the tokenof the plurality of first tokens.

29. The apparatus of clause 20, wherein the apparatus is a mobile deviceand further comprises one or more displays, one or more processors, oneor more non-transitory machine-readable medium, wherein the first deviceis another mobile device, wherein the remote device is a computingdevice behind a firewall, wherein the first token does not exist priorto identifying the source data to be shared, wherein the first token iscreatable in real time and expirable, wherein each of the first andsecond communication protocols comprises one or more communicationprotocols.

30. An apparatus (e.g., 110, FIG. 5) for facilitating sharing sourcedata, the apparatus comprising:

a processor (e.g., 530, FIG. 5) operable to facilitate receiving a tokenassociated with the source data stored in the apparatus or anotherdevice;

a processor (e.g., 530, FIG. 5) operable to facilitate encoding a tokento enable communication using a near proximity communication (NPC)protocol; and

an NPC interface (e.g., 510, FIG. 5) operable to provide forcommunication, using the NPC protocol, to a first device (e.g., 120,FIG. 6) located within five feet of the apparatus, the token to enablethe first device to access the source data utilizing a communicationprotocol, wherein the first device is unable to access the source datawithout using the token,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet,

wherein the apparatus comprises an NPC-enabled device adapted to detectpresence of the first device within five feet of the apparatus,

wherein the source data is non-public.

31. The apparatus of clause 30, further comprising an identificationmodule operable to identify the source data, to initiate sharing of thesource data, based on a user action at the apparatus,

wherein the NPC protocol is different from the communication protocol.

32. The apparatus of clause 30, wherein the source data is stored in theapparatus, wherein the processor is operable to facilitate generatingthe token associated with the source data prior to facilitating encodingthe token.

33. The apparatus of clause 30, wherein the communication protocolcomprises at least one of a peer-to-peer protocol, an interactiveconnectivity establishment protocol, a session initiation protocol, aBluetooth protocol, a wireless fidelity (Wi-Fi) protocol, an extendablemessaging and presence protocol (XMPP), a push protocol, or anon-industry standard communication protocol.

34. The apparatus of clause 30, wherein the processor is operable tofacilitate encoding the token in a form of a uniform resource locator(URL) to allow the first device to access the source data via a websiterepresented by the URL of the token.

35. The apparatus of clause 30, wherein the NPC interface is operable toprovide for communication to the first device the token to allow thefirst device to access the source data via a second device,

wherein the apparatus supports communication between the apparatus andthe second device to facilitate receiving the token from the seconddevice or to facilitate the first device to access the source data,

wherein the token comprises a metadata comprising at least some of anidentifier of the apparatus, authentication information associated withthe apparatus, an identifier of the source data, a path of the sourcedata, wherein the token enables downloading the source data, wherein thesource data is for at least setup, configuration, or management of thefirst device or one or more computers.

36. A method (e.g., 700A, FIG. 7A) for facilitating sharing source data,the method comprising:

supporting communication based on a first communication protocol betweena first device and a remote device, wherein the communication isassociated with a source data, and the communication is based ondetection of presence of a second device within five feet of the firstdevice (e.g., 710, FIG. 7A);

facilitating receiving a first token associated with the source data(e.g., 720, FIG. 7A);

facilitating encoding the first token to enable communication using anear proximity communication (NPC) protocol (e.g., 730, FIG. 7A); and

providing for communication to the second device, located within fivefeet of the first device, the first token using the NPC protocol toenable the second device to access the source data utilizing a secondcommunication protocol, wherein the second device is unable to accessthe source data without using the first token (e.g., 740, FIG. 7A),

wherein the NPC protocol is different from the first and secondcommunication protocols, wherein the first communication protocol is thesame or different from the second communication protocol,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol or a data transfer rate supported by the second communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet,

wherein the first device is an NPC-enabled device adapted to detectpresence of the second device within five feet of the first device,

wherein the first device is a communication end point device.

37. The method of clause 36, wherein the method comprises identifyingthe source data, to initiate sharing of the source data, based on a useraction at the first device.

38. The method of clause 36, wherein the method comprises identifying,at the first device, the source data for sharing, wherein the supportingcommunication comprises providing for communication, from the firstdevice utilizing the first communication protocol to the remote devicethrough a proxy server, identification information of the source databased on the identifying the source data, wherein the firstcommunication protocol comprises an extendable messaging and presenceprotocol (XMPP), wherein the NPC protocol comprises a near fieldcommunication (NFC) protocol.

39. The method of clause 36, wherein the method comprises identifyingthe source data for sharing,

wherein the supporting communication comprises providing forcommunication, to the remote device, identification information of thesource data, wherein the identification information comprises at leastone of an identifier of the remote device, a path in a file system ofthe remote device, or a file name,

wherein the supporting communication comprises providing forcommunication, to the remote device, a request for the first token,

wherein the facilitating receiving comprises facilitating receiving thefirst token in response to the request.

40. The method of clause 36, wherein the method comprises identifyingthe source data for sharing,

wherein the supporting communication comprises facilitating providingidentification information of the source data to the remote device toenable generation of the first token in real time in response to thefacilitating providing identification information of the source data,

wherein the facilitating receiving the first token comprisesfacilitating receiving the first token, at the first device, utilizingthe first communication protocol, from the remote device via a proxyserver, in response to the facilitating providing identificationinformation of the source data,

wherein the method comprises, prior to the encoding, decoding the firsttoken received utilizing the first communication protocol,

wherein the providing for communication to the second device the firsttoken comprises providing for communication from the first device to thesecond device the first token,

wherein the method comprises providing for communication from the firstdevice to the second device other information for accessing the sourcedata, wherein the other information comprises location of the sourcedata, wherein a size of the first token and the other information forcommunication to the second device is less than a size of the sourcedata, wherein the source data comprises more than one mega bytes,

wherein the first communication protocol comprises an extendablemessaging and presence protocol (XMPP),

wherein the encoding comprises encoding of the first token at the firstdevice.

41. The method of clause 36, wherein the method comprises at least oneof a first security measure and a second security measure,

wherein the first security measure comprises:

facilitating receiving, from the remote device, information identifyingat least one of the second device or a user of the second device, inresponse to the second device attempting to access the source data; and

providing for communication to the remote device, an approval followingvalidation of the received information by a user of the first device,

wherein the second security measure comprises:

providing for communication to the remote device, informationidentifying at least one of the second device or the user of the seconddevice, to enable the remote device to authenticate the second device orthe user of the second device when the second device attempts to accessthe source data.

42. The method of clause 36, wherein the method comprises:

providing a request, directed to the remote device, to transmit thesource data to a server comprising a cloud server and to send a secondtoken to the first device;

providing for communication to the second device, located within fivefeet of the first device, the second token using the NPC protocol toenable the second device to access the source data transmitted to theserver.

43. The method of clause 42, wherein the first or the second tokencomprises a metadata comprising at least some of an identifier of theremote device, an identifier of the server, authentication informationassociated with the remote device, authentication information associatewith the server, an identifier of the source data, a path of the sourcedata, an identifier of the source data transmitted to the server, or apath of the source data transmitted to the server, and wherein the firstand the second token enable downloading the source data, wherein thesource data is for at least setup, configuration, or management of oneor more computers.

44. The method of clause 36, wherein the source data comprises at leastone of a media file, a document, remote path information, remote desktopconnection information, security information, device managementinformation, or device configuration information.

45. The method of clause 44, wherein:

the media file comprises at least one of an audio file, a video file, anaudio-video file, or an image,

the remote path information comprises at least one of a directory name,a folder name, a sub-folder name, or a file name,

the remote desktop connection information comprises at least one of anInternet Protocol (IP) address, a username, or a password,

the security information comprises at least one of network securityinformation or security coding information,

the device management information comprises at least one of a colordepth, a resolution, or a desktop setting, and

the device configuration comprises at least one of a networkconfiguration, a peripheral device configuration, or a client-serverconfiguration.

46. The method of clause 36, wherein the first token is expirable and isa representation unique to one or more of the following: the sourcedata, the second device, a user of the second device, and a time relatedto creation or usage of the first token, wherein the method comprises atleast one of a first method and a second method,

wherein the first method comprises:

facilitating receiving a second token associated with second sourcedata;

encoding the second token to enable communication using the NPCprotocol; and

providing for communication to a third device, located within five feetof the first device, the second token using the NPC protocol, to enablethe third device to access the second source data utilizing a thirdcommunication protocol,

wherein the first communication protocol is the same or different fromthe third communication protocol,

wherein the second token is a representation unique to one or more ofthe following: the second data, the third device and time related tocreation or usage of the second token,

wherein the second method comprises:

facilitating receiving, at the first device, a third token associatedwith the source data;

encoding, at the first device, the third token to enable communicationusing the NPC protocol; and

providing for communication to a fourth device, located within five feetof the first device, the third token using the NPC protocol, to enablethe fourth device to access the source data utilizing a fourthcommunication protocol,

wherein the first communication protocol is the same or different fromthe fourth communication protocol,

wherein the third token is a representation unique to one or more of thefollowing: the source data, the third device, a user of the thirddevice, and time related to creation or usage of the third token.

47. The method of clause 36, wherein the first device is a mobile devicecomprising one or more displays, one or more processors, one or morenetwork interfaces, and the method, wherein a first one of the one ormore network interfaces is configured to support communication based onthe first communication protocol, wherein a second one of the one ormore network interfaces is configured to support communication based onthe NPC protocol, wherein the second device is a mobile device, whereinthe remote device is a computing device behind a firewall, wherein thefirst token does not exist prior to identifying the source data to beshared, wherein the first token is creatable in real time and expirable,wherein each of the first and second communication protocols comprisesone or more communication protocols.

48. A method for facilitating sharing source data (e.g., 700C, FIG. 7C),comprising:

facilitating receiving a token associated with the source data (e.g.,780, FIG. 7C);

facilitating encoding the token to enable communication using a nearproximity communication (NPC) protocol (e.g., 782, FIG. 7C); and

providing for communication to a second device, located within five feetof a first device, the token using the NPC protocol to enable the seconddevice to access the source data utilizing a communication protocol,wherein the second device is unable to access the source data withoutusing the token (e.g., 784, FIG. 7C),

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet,

wherein the first device is an NPC-enabled device adapted to detectpresence of the second device within five feet of the first device,

wherein the token is non-public.

49. The method of clause 48, wherein the method comprises identifyingthe source data, to initiate sharing of the source data, based on a useraction at the first device,

wherein the NPC protocol is different from the communication protocol,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the communicationprotocol.

50. The method of clause 48, wherein the source data is stored in thefirst device, wherein the method comprises facilitating generating thetoken associated with the source data stored on the first device,wherein the facilitating encoding facilitates receiving the token priorto encoding.

51. The method of clause 48, wherein the facilitating encoding the tokencomprises facilitating encoding the token in a form of a uniformresource locator (URL) to allow the second device to access the sourcedata via a website represented by the URL of the token.

52. The method of clause 48, wherein the providing for communicationallows the second device to access the source data via a third device,which is a remote device,

wherein the first device supports communication between the first deviceand the third device to facilitate receiving the token from the thirddevice or to facilitate the second device to access the source data.

53. The method of clause 48, wherein the method for facilitating sharingallows a distance between the first device and the second device to bemore than five feet after the operation of providing for communicationto the second device the token, and the method allows the access to thesource data regardless of the distance.

54. An apparatus for facilitating sharing source data (e.g., 1100, FIG.11), the apparatus comprising:

means for supporting communication based on a first communicationprotocol between a first device and a remote device, wherein thecommunication is associated with a source data, and the communication isbased on detection of presence of a second device within five feet ofthe first device (e.g., 1110, FIG. 11);

means for facilitating receiving a first token associated with thesource data (e.g., 1120, FIG. 11);

means for facilitating encoding the first token to enable communicationusing a near proximity communication (NPC) protocol (e.g., 1130, FIG.11); and

means for providing for communication to the second device, locatedwithin five feet of the first device, the first token using the NPCprotocol to enable the second device to access the source data utilizinga second communication protocol, wherein the second device is unable toaccess the source data without using the first token (e.g., 1140, FIG.11),

wherein the NPC protocol is different from the first and secondcommunication protocols, wherein the first communication protocol is thesame or different from the second communication protocol,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol or a data transfer rate supported by the second communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet,

wherein the first device is an NPC-enabled device adapted to detectpresence of the second device within five feet of the first device,

wherein the first device is a communication end point device.

55. An apparatus for facilitating sharing source data (e.g., 1300, FIG.13), the apparatus comprising:

means for facilitating receiving a token associated with the source data(e.g., 1310, FIG. 13);

means for facilitating encoding the token to enable communication usinga near proximity communication (NPC) protocol (e.g., 1320, FIG. 13); and

means for providing for communication to a second device, located withinfive feet of a first device, the token using the NPC protocol to enablethe second device to access the source data utilizing a communicationprotocol, wherein the second device is unable to access the source datawithout using the token (e.g., 1330, FIG. 13),

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet,

wherein the first device is an NPC-enabled device adapted to detectpresence of the second device within five feet of the first device,

wherein the token is non-public.

56. A hardware apparatus comprising means adapted for performing amethod associated with any one of the foregoing clauses.

57. An apparatus comprising means for performing a method associatedwith any one of the foregoing clauses.

58. An apparatus comprising one or more processors configured to performa method associated with any one of the foregoing clauses.

59. An apparatus comprising one or more processors and amachine-readable medium, the machine-readable medium comprisinginstructions executable by one or more processors to perform a methodassociated with any one of the foregoing clauses.

Examples of Decoding Clauses

1. A non-transitory machine-readable medium (e.g., 620, 650 FIG. 6)comprising instructions stored therein, the instructions executable byone or more processors (e.g., 630, FIG. 6) to facilitate performing amethod for facilitating sharing source data, the method (e.g., 700B,FIG. 7B) comprising:

facilitating receiving, at a first device, a first token associated withthe source data, from a second device located within five feet of thefirst device, using a near proximity communication (NPC) protocol, whichsupports generation of the first token based on detection of presence ofthe first device within five feet of the second device, wherein thefirst token is an encoded first token for near proximity communication,wherein the first token is a non-public token, wherein the first tokenis based on the source data for sharing, wherein the receipt of thefirst token is based on the detection (e.g., 750, FIG. 7B);

facilitating decoding the first token (e.g., 760, FIG. 7B);

providing for communication based on a first communication protocol to athird device to download the source data using the decoded first token(e.g., 770, FIG. 7B),

wherein the first device is an NPC-enabled device, having an NPCinterface, to allow presence of the first device to be detected by thesecond device when the first device is within five feet of the seconddevice,

wherein the second device is an NPC-enabled device,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet.

2. The non-transitory machine-readable medium of clause 1, furthercomprising facilitating accessing the source data by the first device,after a time period to allow the third device to receive from the seconddevice an approval by a user of the second device for the access of thesource data.

3. The non-transitory machine-readable medium of clause 1, furthercomprising:

facilitating receiving a second token associated with the source datafrom the second device located within five feet of the first deviceusing the NPC protocol, wherein the second token is an encoded secondtoken for near proximity communication;

facilitating decoding the second token; and

providing for communication based on a second communication protocol toa server comprising a cloud server to download the source data using thedecoded second token, after the source data is transmitted to theserver, in response to a request from the second device.

4. The non-transitory machine-readable medium of clause 1, wherein thesource data comprises at least one of a media file, a document, remotepath information, remote desktop connection information, securityinformation, device management information, or device configurationinformation.

5. The non-transitory machine-readable medium of clause 3, wherein thefirst token or the second token comprises a metadata comprising at leastsome of an identifier of the third device, an identifier of the server,authentication information associated with the third device,authentication information associate with the server, an identifier ofthe source data, a path of the source data, an identifier of the sourcedata transmitted to the server, or a path of the source data transmittedto the server, wherein the first token and the second token areexpirable and are representations unique to one or more of thefollowing: the source data, the first device, a user of the firstdevice, and time related to creation or usage of the first token or thesecond token.

6. The non-transitory machine-readable medium of clause 3, furthercomprising:

providing for communication based on the first communication protocol tothe third device to download the source data within a time period priorto an expiration of the first token; and

providing for communication based on the second communication protocolto the server to download the source data within a time period prior toan expiration of the second token.

7. The non-transitory machine-readable medium of clause 3, wherein thefirst device is a mobile device comprising one or more displays, one ormore processors, one or more network interfaces, and the non-transitorymachine-readable medium, wherein a first one of the one or more networkinterfaces is configured to support communication based on the firstcommunication protocol or the second communication protocol, wherein asecond one of the one or more network interfaces is configured tosupport communication based on the NPC protocol, wherein the seconddevice is a mobile device, wherein the third device is a computingdevice behind a firewall, wherein the first token and the second tokendo not exist prior to identifying the source data to be shared, whereinthe first token and the second token are creatable in real time and areexpirable, wherein each of the first and second communication protocolscomprises one or more communication protocols.

8. The non-transitory machine-readable medium of clause 1, wherein thethird device is a remote device, wherein the source data is stored inthe remote device, wherein the NPC protocol is different from the firstcommunication protocol.

9. The non-transitory machine-readable medium of clause 1, wherein thesource data is stored in the second device.

10. The non-transitory machine-readable medium of clause 1, wherein thedecoded first token comprises a uniform resource locator (URL), whereinthe providing for communication comprises facilitating opening the URLon a web browser to allow a determination as to whether the first deviceis enabled to facilitate downloading the source data using the decodedfirst token.

11. The non-transitory machine-readable medium of clause 10,

wherein if the first device is enabled to facilitate downloading, thenthe method comprises facilitating downloading the source data based onthe decoded first token,

wherein if the first device is not enabled to facilitate downloading,then the method comprises providing for communication to the thirddevice a request to download the source data and facilitating receivingthe source data based on the request.

12. The non-transitory machine-readable medium of clause 1, wherein thedecoded first token comprises a uniform resource locator (URL), whereinthe URL comprises an identifier of a device storing the source data, apath of the source data stored in the device, and authenticationinformation.

13. The non-transitory machine-readable medium of clause 1, wherein thefirst communication protocol comprises at least one of a peer-to-peerprotocol, an interactive connectivity establishment protocol, a sessioninitiation protocol, the NPC protocol, a Bluetooth protocol, a wirelessfidelity (Wi-Fi) protocol, an extendable messaging and presence protocol(XMPP), a push protocol, or a non-industry standard communicationprotocol.

14. An apparatus for facilitating sharing source data (e.g., 120, FIG.6), the apparatus comprising:

a processor (e.g., 630, FIG. 6) operable to facilitate receiving a firsttoken associated with the source data from a first device (e.g., 110,FIG. 5), located within five feet of the apparatus using an NPCprotocol, wherein the first token is based on detection of presence ofthe apparatus within five feet of the first device, wherein the firsttoken is an encoded first token for near proximity communication,wherein the first token is a non-public token, wherein the first tokenis based on the source data for sharing;

the processor (e.g., 630, FIG. 6) operable to facilitate decoding thefirst token;

the processor (e.g., 630, FIG. 6) operable to provide for communicationbased on a first communication protocol to a second device to downloadthe source data using the decoded first token,

wherein the apparatus is an NPC-enabled device, having an NPC interface,to allow presence of the apparatus to be detected by the first devicewhen the apparatus is within five feet of the first device,

wherein the first device is an NPC-enabled device,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet.

15. The apparatus of clause 14, wherein the processor is operable tofacilitate accessing the source data by the apparatus, after a timeperiod to allow the second device to receive from the first device anapproval by a user of the first device for the access of the sourcedata.

16. The apparatus of clause 14, wherein the processor is operable tofacilitate receiving a second token associated with the source data fromthe first device located within five feet of the apparatus using the NPCprotocol, wherein the second token is an encoded second token for nearproximity communication; wherein the processor is operable to facilitatedecoding the second token; and wherein the processor is operable toprovide for communication based on a second communication protocol to aserver comprising a cloud server to download the source data using thedecoded second token, after the source data is transmitted to theserver, in response to a request from the first device.

17. The apparatus of clause 14, wherein the source data comprises atleast one of a media file, a document, remote path information, remotedesktop connection information, security information, device managementinformation, or device configuration information.

18. The apparatus of clause 16, wherein the first token or the secondtoken comprises a metadata comprising at least some of an identifier ofthe second device, an identifier of the server, authenticationinformation associated with the second device, authenticationinformation associate with the server, an identifier of the source data,a path of the source data, an identifier of the source data transmittedto the server, or a path of the source data transmitted to the server,wherein the first token and the second token are expirable and arerepresentations unique to one or more of the following: the source data,the apparatus, a user of the apparatus, and a time related to creationor usage of the first token or the second token.

19. The apparatus of clause 16, wherein:

the processor is operable to provide for communication based on thefirst communication protocol to the second device to download the sourcedata within a time period prior to an expiration of the first token; and

the processor is operable to provide for communication based on thesecond communication protocol to the server to download the source datawithin a time period prior to an expiration of the second token.

20. The apparatus of clause 16, wherein the apparatus is a mobile devicecomprising one or more displays, one or more processors, one or morenon-transitory machine-readable media, wherein the second device is acomputing device behind a firewall, wherein the first token and thesecond token do not exist prior to identifying the source data to beshared, wherein the first token and the second token are creatable inreal time and are expirable, and wherein the first and the second tokenenable downloading the source data, wherein the source data is for atleast setup, configuration, or management of one or more computers, andwherein each of the first and second communication protocols comprisesone or more communication protocols.

21. The apparatus of clause 14, wherein the second device is a remotedevice, wherein the source data is stored in the remote device, whereinthe NPC protocol is different from the first communication protocol.

22. The apparatus of clause 14, wherein the source data is stored in thefirst device.

23. The apparatus of clause 14, wherein the decoded first tokencomprises a uniform resource locator (URL), wherein the processor isoperable to facilitate opening the URL on a web browser to allow adetermination as to whether the apparatus is enabled to facilitatedownloading the source data using the decoded first token.

24. The apparatus of clause 23,

wherein if the apparatus is enabled to facilitate downloading, then theprocessor is operable to facilitate downloading the source data based onthe decoded first token,

wherein if the apparatus is not enabled to facilitate downloading, thenthe processor is operable to provide for communication to the seconddevice a request to download the source data and facilitate receivingthe source data based on the request.

25. A method for facilitating sharing source data (e.g., 700B, FIG. 7B),comprising:

facilitating receiving, at a first device, a first token associated withthe source data, from a second device (e.g., 110, FIG. 5) located withinfive feet of the first device, using a near proximity communication(NPC) protocol, which supports generation of the first token based ondetection of presence of the first device within five feet of the seconddevice, wherein the first token is an encoded first token for nearproximity communication, wherein the first token is a non-public token,wherein the first token is based on the source data for sharing, whereinthe receipt of the first token is based on the detection (e.g., 750,FIG. 7B);

facilitating decoding the first token (e.g., 760, FIG. 7B);

providing for communication based on a first communication protocol to athird device to download the source data using the decoded first token(e.g., 770, FIG. 7B),

wherein the first device is an NPC-enabled device, having an NPCinterface, to allow presence of the first device to be detected by thesecond device when the first device is within five feet of the seconddevice,

wherein the second device is an NPC-enabled device,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet.

26. The method of clause 25, further comprising facilitating accessingthe source data by the first device, after a time period to allow thethird device to receive from the second device an approval by a user ofthe second device for the access of the source data.

27. The method of clause 25, further comprising:

facilitating receiving a second token associated with the source datafrom the second device located within five feet of the first deviceusing the NPC protocol, wherein the second token is an encoded secondtoken for near proximity communication;

facilitating decoding the second token; and

providing for communication based on a second communication protocol toa server comprising a cloud server to download the source data using thedecoded second token, after the source data is transmitted to theserver, in response to a request from the second device.

28. The method of clause 25, wherein the source data comprises at leastone of a media file, a document, remote path information, remote desktopconnection information, security information, device managementinformation, or device configuration information.

29. The method of clause 27, wherein the first token or the second tokencomprises a metadata comprising at least some of an identifier of thethird device, an identifier of the server, authentication informationassociated with the third device, authentication information associatewith the server, an identifier of the source data, a path of the sourcedata, an identifier of the source data transmitted to the server, or apath of the source data transmitted to the server, wherein the firsttoken and the second token are expirable and are representations uniqueto one or more of the following: the source data, the second device, auser of the second device, and time related to creation or usage of thefirst token or the second token.

30. The method of clause 27, further comprising:

providing for communication based on the first communication protocol tothe third device to download the source data within a time period priorto an expiration of the first token; and

providing for communication based on the second communication protocolto the server to download the source data within a time period prior toan expiration of the second token.

31. The method of clause 25, wherein the third device is a remotedevice, wherein the source data is stored in the remote device, whereinthe NPC protocol is different from the first communication protocol.

32. The method of clause 25, wherein the source data is stored in thesecond device.

33. The method of clause 25, wherein the decoded first token comprises auniform resource locator (URL), wherein the providing for communicationcomprises facilitating opening the URL on a web browser to allow adetermination as to whether the first device is enabled to facilitatedownloading the source data using the decoded first token.

34. The method of clause 33,

wherein if the first device is enabled to facilitate downloading, thenthe method comprises facilitating downloading the source data based onthe decoded first token,

wherein if the first device is not enabled to facilitate downloading,then the method comprises providing for communication to the thirddevice a request to download the source data and facilitating receivingthe source data based on the request.

35. An apparatus for facilitating sharing source data (e.g., 1200, FIG.12), comprising:

means for facilitating receiving, at a first device, a first tokenassociated with the source data, from a second device (e.g., 110, FIG.5) located within five feet of the first device, using a near proximitycommunication (NPC) protocol, which supports generation of the firsttoken based on detection of presence of the first device within fivefeet of the second device, wherein the first token is an encoded firsttoken for near proximity communication, wherein the first token is anon-public token, wherein the first token is based on the source datafor sharing, wherein the receipt of the first token is based on thedetection (e.g., 1210, FIG. 12);

means for facilitating decoding the first token (e.g., 1220, FIG. 12);

means for providing for communication based on a first communicationprotocol to a third device to download the source data using the decodedfirst token (e.g., 1230, FIG. 12),

wherein the first device is an NPC-enabled device, having an NPCinterface, to allow presence of the first device to be detected by thesecond device when the first device is within five feet of the seconddevice,

wherein the second device is an NPC-enabled device,

wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the first communicationprotocol,

wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet.

36. A hardware apparatus comprising means adapted for performing amethod associated with any one of the foregoing clauses.

37. An apparatus comprising means for performing a method associatedwith any one of the foregoing clauses.

38. An apparatus comprising one or more processors configured to performa method associated with any one of the foregoing clauses.

39. An apparatus comprising one or more processors and amachine-readable medium, the machine-readable medium comprisinginstructions executable by one or more processors to perform a methodassociated with any one of the foregoing clauses.

In one aspect, any of the clauses herein may depend from any one of theindependent clauses or any one of the dependent clauses. In one aspect,any of the clauses (e.g., dependent or independent clauses) may becombined with any other clauses (e.g., dependent or independentclauses). In one aspect, a claim may include some or all of the words(e.g., steps, operations, means or components) recited in a clause, asentence, a phrase or a paragraph. In one aspect, a claim may includesome or all of the words recited in one or more clauses, sentences,phrases or paragraphs. In one aspect, some of the words in each of theclauses, sentences, phrases or paragraphs may be removed. In one aspect,additional words or elements may be added to a clause, a sentence, aphrase or a paragraph. In one aspect, the subject technology may beimplemented without utilizing some of the components, elements,functions or operations described herein. In one aspect, the subjecttechnology may be implemented utilizing additional components, elements,functions or operations.

In one aspect, any methods, instructions, code, means, logic,components, blocks, modules and the like (e.g., software or hardware)described or claimed herein can be represented in drawings (e.g., flowcharts, block diagrams), such drawings (regardless of whether explicitlyshown or not) are expressly incorporated herein by reference, and suchdrawings (if not yet explicitly shown) can be added to the disclosurewithout constituting new matter. For brevity, some (but not necessarilyall) of the clauses/descriptions/claims are explicitly represented indrawings, but any of the clauses/descriptions/claims can be representedin drawings in a manner similar to those drawings explicitly shown. Forexample, a flow chart can be drawn for any of the clauses, sentences orclaims for a method such that each operation or step is connected to thenext operation or step by an arrow. In another example, a block diagramcan be drawn for any of the clauses, sentences or claims havingmeans-for elements (e.g., means for performing an action) such that eachmeans-for element can be represented as a module for element (e.g., amodule for performing an action).

Those of skill in the art would appreciate that items such as thevarious illustrative blocks, modules, elements, components, methods,operations, steps, and algorithms described herein (e.g., components of,or operations on, client 102 or server 104/304) may be implemented ashardware, computer software, or a combination of both.

To illustrate the interchangeability of hardware and software, itemssuch as the various illustrative blocks, modules, elements, components,methods, operations, steps, and algorithms have been described generallyin terms of their functionality. Whether such functionality isimplemented as hardware or software depends upon the particularapplication and design constraints imposed on the overall system.Skilled artisans may implement the described functionality in varyingways for each particular application.

In one aspect, “means,” a block, a module, an element, a component or aprocessor may be an item (e.g., one or more of blocks, modules,elements, components or processors) for performing one or more functionsor operations. In one aspect, such an item may be an apparatus,hardware, or a portion thereof. In one example, an item may have astructure in the form of, for example, an instruction(s) for performingthe function(s) or operation(s), where the instruction(s) are encoded orstored on a machine-readable medium, on another device, or on a portionthereof, where an instruction(s) may be software, an application(s), asubroutine(s), or a portion thereof. In an example, an item may beimplemented as one or more circuits configured to perform thefunction(s) or operation(s). A circuit may include one or more circuitsand/or logic. A circuit may be analog and/or digital. A circuit may beelectrical and/or optical. A circuit may include transistors. In anexample, one or more items may be implemented as a processing system(e.g., a digital signal processor (DSP), an application specificintegrated circuit (ASIC), a field programmable gate array (FPGA),etc.). Those skilled in the art will recognize how to implement theinstructions, circuits, and processing systems.

A reference to an element in the singular is not intended to mean “oneand only one” unless specifically so stated, but rather “one or more.”For example, a client may refer to one or more clients, a server mayrefer to one or more servers, an operation may refer to one or moreoperations, and a signal, message, or communication may refer to one ormore signals, messages, or communications.

Unless specifically stated otherwise, the term “some” refers to one ormore. Pronouns in the masculine (e.g., his) include the feminine andneuter gender (e.g., her and its) and vice versa. Headings andsubheadings, if any, are used for convenience only and do not limit theinvention.

The word “exemplary” is used herein to mean “serving as an example orillustration.” Any aspect or design described herein as “exemplary” isnot necessarily to be construed as preferred or advantageous over otheraspects or designs. In one aspect, various alternative configurationsand operations described herein may be considered to be at leastequivalent.

A phrase such as an “aspect” does not imply that such aspect isessential to the subject technology or that such aspect applies to allconfigurations of the subject technology. A disclosure relating to anaspect may apply to all configurations, or one or more configurations.An aspect may provide one or more examples. A phrase such as an aspectmay refer to one or more aspects and vice versa. A phrase such as an“embodiment” does not imply that such embodiment is essential to thesubject technology or that such embodiment applies to all configurationsof the subject technology. A disclosure relating to an embodiment mayapply to all embodiments, or one or more embodiments. An embodiment mayprovide one or more examples. A phrase such an embodiment may refer toone or more embodiments and vice versa. A phrase such as a“configuration” does not imply that such configuration is essential tothe subject technology or that such configuration applies to allconfigurations of the subject technology. A disclosure relating to aconfiguration may apply to all configurations, or one or moreconfigurations. A configuration may provide one or more examples. Aphrase such a configuration may refer to one or more configurations andvice versa.

In one aspect of the disclosure, when actions or functions are describedas being performed by an item (e.g., modifying, intercepting,redirecting, determining, obtaining, creating, operating, deleting,removing, receiving, providing, generating, converting, displaying,notifying, accepting, selecting, controlling, transmitting, reporting,sending, or any other action or function), it is understood that suchactions or functions may be performed by the item directly orindirectly. In one aspect, when a module is described as performing anaction, the module may be understood to perform the action directly. Inone aspect, when a module is described as performing an action, themodule may be understood to perform the action indirectly, for example,by facilitating, enabling or causing such an action.

In one aspect, unless otherwise stated, all measurements, values,ratings, positions, magnitudes, sizes, and other specifications that areset forth in this specification, including in the claims that follow,are approximate, not exact. In one aspect, they are intended to have areasonable range that is consistent with the functions to which theyrelate and with what is customary in the art to which they pertain.

In one aspect, the term “coupled” or the like may refer to beingdirectly coupled. In another aspect, the term “coupled” or the like mayrefer to being indirectly coupled.

Various items may be arranged differently (e.g., arranged in a differentorder, or partitioned in a different way) all without departing from thescope of the subject technology. In one aspect of the disclosure, theelements recited in the accompanying claims may be performed by one ormore modules or sub-modules.

It is understood that the specific order or hierarchy of steps,operations or processes disclosed are an illustration of exemplaryapproaches. Based upon design preferences, it is understood that thespecific order or hierarchy of steps, operations or processes may berearranged. Some of the steps, operations or processes may be performedsimultaneously. Some or all of the steps, operations, or processes maybe performed automatically, without the intervention of a user. Theaccompanying method claims, if any, present elements of the varioussteps, operations or processes in a sample order, and are not meant tobe limited to the specific order or hierarchy presented.

The disclosure is provided to enable any person skilled in the art topractice the various aspects described herein. The disclosure providesvarious examples of the subject technology, and the subject technologyis not limited to these examples. Various modifications to these aspectswill be readily apparent to those skilled in the art, and the genericprinciples defined herein may be applied to other aspects.

All structural and functional equivalents to the elements of the variousaspects described throughout this disclosure that are known or latercome to be known to those of ordinary skill in the art are expresslyincorporated herein by reference and are intended to be encompassed bythe claims. Moreover, nothing disclosed herein is intended to bededicated to the public regardless of whether such disclosure isexplicitly recited in the claims. No claim element is to be construedunder the provisions of 35 U.S.C. §112, sixth paragraph, unless theelement is expressly recited using the phrase “means for” or, in thecase of a method claim, the element is recited using the phrase “stepfor.” Furthermore, to the extent that the term “include,” “have,” or thelike is used, such term is intended to be inclusive in a manner similarto the term “comprise” as “comprise” is interpreted when employed as atransitional word in a claim.

The Title, Background, Summary, Brief Description of the Drawings andAbstract of the disclosure are hereby incorporated into the disclosureand are provided as illustrative examples of the disclosure, not asrestrictive descriptions. It is submitted with the understanding thatthey will not be used to limit the scope or meaning of the claims. Inaddition, in the Detailed Description, it can be seen that thedescription provides illustrative examples and the various features aregrouped together in various embodiments for the purpose of streamliningthe disclosure. This method of disclosure is not to be interpreted asreflecting an intention that the claimed subject matter requires morefeatures than are expressly recited in each claim. Rather, as thefollowing claims reflect, inventive subject matter lies in less than allfeatures of a single disclosed configuration or operation. The followingclaims are hereby incorporated into the Detailed Description, with eachclaim standing on its own as a separately claimed subject matter.

The claims are not intended to be limited to the aspects describedherein, but is to be accorded the full scope consistent with thelanguage claims and to encompass all legal equivalents. Notwithstanding,none of the claims are intended to embrace subject matter that fails tosatisfy the requirement of 35 U.S.C. §101, 102, or 103, nor should theybe interpreted in such a way. Any unintended embracement of such subjectmatter is hereby disclaimed.

What is claimed is:
 1. A non-transitory machine-readable mediumcomprising instructions stored therein, the instructions executable byone or more processors to facilitate performing a method forfacilitating sharing source data, the method comprising: supportingcommunication based on a first communication protocol between a firstdevice and a remote device, wherein the communication is associated witha source data, and the communication is based on detection of presenceof a second device within five feet of the first device; facilitatingreceiving a first token, associated with the source data; facilitatingencoding the first token to enable communication using a near proximitycommunication (NPC) protocol; and providing for communication to thesecond device, located within five feet of the first device, the firsttoken using the NPC protocol to enable the second device to access thesource data utilizing a second communication protocol, wherein thesecond device is unable to access the source data without using thefirst token, wherein the NPC protocol is different from the first andsecond communication protocols, wherein the first communication protocolis the same or different from the second communication protocol, whereinthe NPC protocol supports a data transfer rate that is not greater thana data transfer rate supported by the first communication protocol or adata transfer rate supported by the second communication protocol,wherein the NPC protocol is a wireless communication protocol thatsupports automatic connection between at least two devices locatedwithin five feet, wherein the first device is an NPC-enabled deviceadapted to detect presence of the second device within five feet of thefirst device, wherein the first device is a communication end pointdevice.
 2. The non-transitory machine-readable medium of claim 1,wherein the method comprises identifying the source data, to initiatesharing of the source data, based on a user action at the first device.3. The non-transitory machine-readable medium of claim 1, wherein themethod comprises identifying, at the first device, the source data forsharing, wherein the supporting communication comprises providing forcommunication, from the first device utilizing the first communicationprotocol to the remote device through a proxy server, identificationinformation of the source data based on the identifying the source data,wherein the NPC protocol comprises a near field communication (NFC)protocol.
 4. The non-transitory machine-readable medium of claim 1,wherein the method comprises identifying the source data for sharing,wherein the supporting communication comprises providing forcommunication, to the remote device, identification information of thesource data, wherein the identification information comprises at leastone of an identifier of the remote device, a path in a file system ofthe remote device, or a file name, wherein the supporting communicationcomprises providing for communication, to the remote device, a requestfor the first token, wherein the facilitating receiving comprisesfacilitating receiving the first token in response to the request. 5.The non-transitory machine-readable medium of claim 1, wherein themethod comprises identifying the source data for sharing, wherein thesupporting communication comprises facilitating providing identificationinformation of the source data to the remote device to enable generationof the first token in real time in response to the facilitatingproviding identification information of the source data, wherein thefacilitating receiving the first token comprises facilitating receivingthe first token, at the first device, utilizing the first communicationprotocol, from the remote device via a proxy server, in response to thefacilitating providing identification information of the source data,wherein the method comprises, prior to the encoding, decoding the firsttoken received utilizing the first communication protocol, wherein theproviding for communication to the second device the first tokencomprises providing for communication from the first device to thesecond device the first token, wherein the method comprises providingfor communication from the first device to the second device otherinformation for accessing the source data, wherein the other informationcomprises location of the source data, wherein a size of the first tokenand the other information for communication to the second device is lessthan a size of the source data, wherein the source data comprises morethan one mega bytes, wherein the encoding comprises encoding of thefirst token at the first device.
 6. The non-transitory machine-readablemedium of claim 1, wherein the method comprises at least one of a firstsecurity measure and a second security measure, wherein the firstsecurity measure comprises: facilitating receiving, from the remotedevice, information identifying at least one of the second device or auser of the second device, in response to the second device attemptingto access the source data; and providing for communication to the remotedevice, an approval following validation of the received information bya user of the first device, wherein the second security measurecomprises: providing for communication to the remote device, informationidentifying at least one of the second device or the user of the seconddevice, to enable the remote device to authenticate the second device orthe user of the second device when the second device attempts to accessthe source data.
 7. The non-transitory machine-readable medium of claim1, wherein the method comprises one or more of a first method, a secondmethod, a third method or a fourth method, wherein the first methodcomprises: providing a request, directed to the remote device, totransmit the source data to a first server comprising a cloud server toenable the second device to access the source data via the first server;wherein the second method comprises: providing a request, directed tothe remote device, to transmit the source data to a second servercomprising a cloud server and to send a second token to the firstdevice; providing for communication to the second device, located withinfive feet of the first device, the second token using the NPC protocolto enable the second device to access the source data transmitted to thesecond server; wherein the third method comprises: facilitatingtransmitting the source data to a third server comprising a cloud serverto enable the second device to access the source data via the thirdserver; wherein the fourth method comprises: facilitating generating athird token; facilitating transmitting the source data from the firstdevice to a fourth server; providing for communication to the seconddevice, located within five feet of the first device, the third tokenusing the NPC protocol to enable the second device to access the sourcedata via the fourth server.
 8. The non-transitory machine-readablemedium of claim 1, wherein the first token comprises a metadatacomprising at least some of an identifier of a source device,authentication information associated with the source device, anidentifier of the source data, or a path of the source data, wherein thesource device is a device where the source data is stored, wherein thesource device is the first device or the remote device.
 9. Thenon-transitory machine-readable medium of claim 1, wherein the sourcedata comprises at least one of a media file, a document, remote pathinformation, remote desktop connection information, securityinformation, device management information, or device configurationinformation.
 10. The non-transitory machine-readable medium of claim 9,wherein: the media file comprises at least one of an audio file, a videofile, an audio-video file, or an image, the remote path informationcomprises at least one of a directory name, a folder name, a sub-foldername, or a file name, the remote desktop connection informationcomprises at least one of an Internet Protocol (IP) address, a username,or a password, the security information comprises at least one ofnetwork security information or security coding information, the devicemanagement information comprises at least one of a color depth, aresolution, or a desktop setting, and the device configuration comprisesat least one of a network configuration, a peripheral deviceconfiguration, or a client-server configuration.
 11. The non-transitorymachine-readable medium of claim 1, wherein the first token is expirableand is a representation unique to one or more of the following: thesource data, the second device, a user of the second device, and a timerelated to creation or usage of the first token, wherein the methodcomprises at least one of a first method and a second method, whereinthe first method comprises: facilitating receiving a second tokenassociated with second source data; encoding the second token to enablecommunication using the NPC protocol; and providing for communication toa third device, located within five feet of the first device, the secondtoken using the NPC protocol, to enable the third device to access thesecond source data utilizing a third communication protocol, wherein thefirst communication protocol is the same or different from the thirdcommunication protocol, wherein the second token is a representationunique to one or more of the following: the second data, the thirddevice and time related to creation or usage of the second token,wherein the second method comprises: facilitating receiving, at thefirst device, a third token associated with the source data; encoding,at the first device, the third token to enable communication using theNPC protocol; and providing for communication to a fourth device,located within five feet of the first device, the third token using theNPC protocol, to enable the fourth device to access the source datautilizing a fourth communication protocol, wherein the firstcommunication protocol is the same or different from the fourthcommunication protocol, wherein the third token is a representationunique to one or more of the following: the source data, the thirddevice, a user of the third device, and time related to creation orusage of the third token.
 12. The non-transitory machine-readable mediumof claim 1, wherein the first device is a mobile device comprising oneor more displays, one or more processors, one or more networkinterfaces, and the non-transitory machine-readable medium, wherein afirst one of the one or more network interfaces is configured to supportcommunication based on the first communication protocol, wherein asecond one of the one or more network interfaces is configured tosupport communication based on the NPC protocol, wherein the seconddevice is a mobile device, wherein the remote device is a computingdevice behind a firewall, wherein the first token does not exist priorto identifying the source data to be shared, wherein the first token iscreatable in real time and expirable, wherein each of the first andsecond communication protocols comprises one or more communicationprotocols.
 13. A non-transitory machine-readable medium comprisinginstructions stored therein, the instructions executable by one or moreprocessors to facilitate performing a method for facilitating sharingsource data, the method comprising: facilitating receiving a tokenassociated with the source data; facilitating encoding the token toenable communication using a near proximity communication (NPC)protocol; and providing for communication to a second device, locatedwithin five feet of a first device, the token using the NPC protocol toenable the second device to access the source data utilizing acommunication protocol, wherein the second device is unable to accessthe source data without using the token, wherein the NPC protocol is awireless communication protocol that supports automatic connectionbetween at least two devices located within five feet, wherein the firstdevice is an NPC-enabled device adapted to detect presence of the seconddevice within five feet of the first device, wherein the token isnon-public.
 14. The non-transitory machine-readable medium of claim 13,wherein the method comprises identifying the source data, to initiatesharing of the source data, based on a user action at the first device,wherein the NPC protocol is different from the communication protocol,wherein the NPC protocol supports a data transfer rate that is notgreater than a data transfer rate supported by the communicationprotocol.
 15. The non-transitory machine-readable medium of claim 13,wherein the source data is stored in the first device, wherein themethod comprises facilitating generating the token associated with thesource data stored on the first device, wherein the facilitatingencoding facilitates receiving the token prior to encoding.
 16. Thenon-transitory machine-readable medium of claim 13, wherein thecommunication protocol comprises at least one of a peer-to-peerprotocol, an interactive connectivity establishment protocol, a sessioninitiation protocol, the NPC protocol, a bluetooth protocol, a wirelessfidelity (WiFi) protocol, an extendable messaging and presence protocol(XMPP), a push protocol, or a non-industry standard communicationprotocol.
 17. The non-transitory machine-readable medium of claim 13,wherein the facilitating encoding the token comprises facilitatingencoding the token in a form of a uniform resource locator (URL) toallow the second device to access the source data via a websiterepresented by the URL of the token.
 18. The non-transitorymachine-readable medium of claim 13, wherein the method comprises asecurity measure comprising: facilitating receiving informationidentifying at least one of the second device or a user of the seconddevice, in response to the second device attempting to access the sourcedata; validating the received information by a user of the first device;and authenticating the second device or the user of the second devicebefore allowing the second device to access the source data.
 19. Thenon-transitory machine-readable medium of claim 13, wherein theproviding for communication allows the second device to access thesource data via a third device, wherein the first device supportscommunication between the first device and the third device tofacilitate receiving the token from the third device or to facilitatethe second device to access the source data, wherein the token comprisesa metadata comprising at least some of an identifier of the firstdevice, authentication information associated with the first device, anidentifier of the source data, a path of the source data, wherein thetoken enables downloading the source data, wherein the source data isfor at least setup, configuration, or management of the second device orone or more computers.
 20. An apparatus for facilitating sharing sourcedata, the apparatus comprising: a first network interface configured tosupport communication based on a first communication protocol betweenthe apparatus and a remote device; an encoder configured to facilitatereceiving a first token associated with a source data; the encoderconfigured to facilitate encoding the first token to enablecommunication using a near proximity communication (NPC) protocol; andan NPC interface configured to provide for communication, using the NPCprotocol, to a first device located within five feet of the apparatus,the first token to enable the first device to access the source datautilizing a second communication protocol, wherein the first device isunable to access the source data without using the first token, whereinthe NPC protocol is different from the first and second communicationprotocols, wherein the first communication protocol is the same ordifferent from the second communication protocol, wherein the NPCprotocol supports a data transfer rate that is not greater than a datatransfer rate supported by the first communication protocol or a datatransfer rate supported by the second communication protocol, whereinthe NPC protocol is a wireless communication protocol that supportsautomatic connection between at least two devices located within fivefeet.
 21. The apparatus of claim 20, further comprising: anidentification module configured to identify the source data and toprovide an identification information of the source data, to facilitatesharing of the source data, based on a user action at the apparatus; anda second network interface configured to support communication, based onthe first communication protocol, from the apparatus to the remotedevice through a proxy server, the identification information, whereinthe first communication protocol comprises an extendable messaging andpresence protocol (XMPP), wherein the NPC protocol comprises a nearfield communication (NFC) protocol, wherein the identificationinformation comprises at least one of an identifier of the remotedevice, a path in a file system of the remote device, or a file name.22. The apparatus of claim 20, further comprising an identificationmodule configured to identify the source data and provide anidentification information of the source data, to facilitate sharing ofthe source data, based on a user action at the apparatus, wherein thefirst network interface is further configured to support communication,based on the first communication protocol, from the apparatus to theremote device, of the identification information, wherein theidentification information comprises at least one of an identifier ofthe remote device, a path in a file system of the remote device, or afile name.
 23. The apparatus of claim 20, further comprising anidentification module configured to identify the source data and tofacilitate providing of an identification information of the sourcedata, to support sharing of the source data, based on a user action atthe apparatus, wherein the first network interface is configured tosupport communication for providing the identification information ofthe source data to the remote device to enable generation of the firsttoken in real time in response to the communication for providingidentification information of the source data, wherein the first networkinterface is further configured to facilitate receiving the first token,at the apparatus from the remote device via a proxy server, utilizingthe first communication protocol, in response to the communication forproviding identification information of the source data, wherein theapparatus comprises, a decoder to decode, prior to the encoding, thefirst token received utilizing the first communication protocol, whereinthe first network interface is further configured to provide forcommunication from the apparatus to the first device the first token,wherein the first network interface is further configured to provide forcommunication from the apparatus to the first device other informationfor accessing the source data, wherein the other information compriseslocation of the source data, wherein a size of the first token and theother information for communication to the first device is less than asize of the source data, wherein the source data comprises more than onemega bytes, wherein the encoder is further configured to encode thefirst token at the apparatus.
 24. The apparatus of claim 20, furthercomprising a security module configured to facilitate at least one of afirst security measure and a second security measure, wherein the firstsecurity measure comprises: facilitating receiving, via the firstnetwork interface, from the remote device, information identifying atleast one of the first device or a user of the first device, in responseto the first device attempting to access the source data; and providingfor communication, via the first network interface, to the remotedevice, an approval following validation of the received information bya user of the apparatus, wherein the second security measure comprises:providing for communication, via the first network interface, to theremote device, information identifying at least one of the first deviceor the user of the first device, to enable the remote device toauthenticate the first device or the user of the first device when thefirst device attempts to access the source data.
 25. The apparatus ofclaim 20, wherein the first network interface is further configured tofacilitate providing a request, directed to the remote device, totransmit the source data to a server comprising a cloud server and tosend a second token to the apparatus, and wherein the NPC interface isfurther configured to provide for communication to the first device,located within five feet of the apparatus, the second token using theNPC protocol, to enable the first device to access the source datatransmitted to the server.
 26. The apparatus of claim 25, wherein thefirst or the second token comprises a metadata comprising at least someof an identifier of the remote device, an identifier of the server,authentication information associated with the remote device,authentication information associate with the server, an identifier ofthe source data stored in the remote device, a path of the source datastored in the remote device, an identifier of the source datatransmitted to the server, or a path of the source data transmitted tothe server.
 27. The apparatus of claim 25, wherein the source datacomprises at least one of a media file, a document, remote pathinformation, remote desktop connection information, securityinformation, device management information, or device configurationinformation, and wherein: the media file comprises at least one of anaudio file, a video file, an audio-video file, or an image, the remotepath information comprises at least one of a directory name, a foldername, a sub-folder name, or a file name, the remote desktop connectioninformation comprises at least one of an Internet Protocol (IP) address,a username, or a password, the security information comprises at leastone of network security information or security coding information, thedevice management information comprises at least one of a color depth, aresolution, or a desktop setting, and the device configuration comprisesat least one of a network configuration, a peripheral deviceconfiguration, or a client-server configuration.
 28. The apparatus ofclaim 20, wherein the first token is expirable and is a representationunique to one or more of the following: the source data, the firstdevice, a user of the first device, and time related to creation orusage of the first token, and wherein the apparatus is configured tosupport a plurality of first devices, by providing for receiving fromthe remote device a plurality of first tokens, and providing forcommunicating, using the NPC protocol, each token of the plurality offirst tokens to one of the plurality of the first devices, wherein eachtoken of the plurality of first tokens is a representation unique to oneor more of the following: the source data, the one of the plurality ofthe first devices, a user of the one of the plurality of the firstdevices, and a time related to creation or usage of the token of theplurality of first tokens.
 29. The apparatus of claim 20, wherein theapparatus is a mobile device and further comprises one or more displays,one or more processors, one or more non-transitory machine-readablemedium, wherein the first device is another mobile device, wherein theremote device is a computing device behind a firewall, wherein the firsttoken does not exist prior to identifying the source data to be shared,wherein the first token is creatable in real time and expirable, whereineach of the first and second communication protocols comprises one ormore communication protocols.
 30. An apparatus for facilitating sharingsource data, the apparatus comprising: a processor operable tofacilitate receiving a token associated with the source data stored inthe apparatus or another device; a processor operable to facilitateencoding a token to enable communication using a near proximitycommunication (NPC) protocol; and an NPC interface operable to providefor communication, using the NPC protocol, to a first device locatedwithin five feet of the apparatus, the token to enable the first deviceto access the source data utilizing a communication protocol, whereinthe first device is unable to access the source data without using thetoken, wherein the NPC protocol supports a data transfer rate that isnot greater than a data transfer rate supported by the communicationprotocol, wherein the NPC protocol is a wireless communication protocolthat supports automatic connection between at least two devices locatedwithin five feet, wherein the apparatus comprises an NPC-enabled deviceadapted to detect presence of the first device within five feet of theapparatus, wherein the source data is non-public.
 31. The apparatus ofclaim 30, further comprising an identification module operable toidentify the source data, to initiate sharing of the source data, basedon a user action at the apparatus, wherein the NPC protocol is differentfrom the communication protocol.
 32. The apparatus of claim 30, whereinthe source data is stored in the apparatus, wherein the processor isoperable to facilitate generating the token associated with the sourcedata prior to facilitating encoding the token.
 33. The apparatus ofclaim 30, wherein the communication protocol comprises at least one of apeer-to-peer protocol, an interactive connectivity establishmentprotocol, a session initiation protocol, a bluetooth protocol, awireless fidelity (WiFi) protocol, an extendable messaging and presenceprotocol (XMPP), a push protocol, or a non-industry standardcommunication protocol.
 34. The apparatus of claim 30, wherein theprocessor is operable to facilitate encoding the token in a form of auniform resource locator (URL) to allow the first device to access thesource data via a website represented by the URL of the token.
 35. Theapparatus of claim 30, wherein the NPC interface is operable to providefor communication to the first device the token to allow the firstdevice to access the source data via a second device, wherein theapparatus supports communication between the apparatus and the seconddevice to facilitate receiving the token from the second device or tofacilitate the first device to access the source data, wherein the tokencomprises a metadata comprising at least some of an identifier of theapparatus, authentication information associated with the apparatus, anidentifier of the source data, a path of the source data, wherein thetoken enables downloading the source data, wherein the source data isfor at least setup, configuration, or management of the first device orone or more computers.
 36. A method for facilitating sharing sourcedata, the method comprising: supporting communication based on a firstcommunication protocol between a first device and a remote device,wherein the communication is associated with a source data, and thecommunication is based on detection of presence of a second devicewithin five feet of the first device; facilitating receiving a firsttoken associated with the source data; facilitating encoding the firsttoken to enable communication using a near proximity communication (NPC)protocol; and providing for communication to the second device, locatedwithin five feet of the first device, the first token using the NPCprotocol to enable the second device to access the source data utilizinga second communication protocol, wherein the second device is unable toaccess the source data without using the first token, wherein the NPCprotocol is different from the first and second communication protocols,wherein the first communication protocol is the same or different fromthe second communication protocol, wherein the NPC protocol supports adata transfer rate that is not greater than a data transfer ratesupported by the first communication protocol or a data transfer ratesupported by the second communication protocol, wherein the NPC protocolis a wireless communication protocol that supports automatic connectionbetween at least two devices located within five feet, wherein the firstdevice is an NPC-enabled device adapted to detect presence of the seconddevice within five feet of the first device, wherein the first device isa communication end point device.
 37. The method of claim 36, whereinthe method comprises identifying the source data, to initiate sharing ofthe source data, based on a user action at the first device.
 38. Themethod of claim 36, wherein the method comprises identifying, at thefirst device, the source data for sharing, wherein the supportingcommunication comprises providing for communication, from the firstdevice utilizing the first communication protocol to the remote devicethrough a proxy server, identification information of the source databased on the identifying the source data, wherein the firstcommunication protocol comprises an extendable messaging and presenceprotocol (XMPP), wherein the NPC protocol comprises a near fieldcommunication (NFC) protocol.
 39. The method of claim 36, wherein themethod comprises identifying the source data for sharing, wherein thesupporting communication comprises providing for communication, to theremote device, identification information of the source data, whereinthe identification information comprises at least one of an identifierof the remote device, a path in a file system of the remote device, or afile name, wherein the supporting communication comprises providing forcommunication, to the remote device, a request for the first token,wherein the facilitating receiving comprises facilitating receiving thefirst token in response to the request.
 40. The method of claim 36,wherein the method comprises identifying the source data for sharing,wherein the supporting communication comprises facilitating providingidentification information of the source data to the remote device toenable generation of the first token in real time in response to thefacilitating providing identification information of the source data,wherein the facilitating receiving the first token comprisesfacilitating receiving the first token, at the first device, utilizingthe first communication protocol, from the remote device via a proxyserver, in response to the facilitating providing identificationinformation of the source data, wherein the method comprises, prior tothe encoding, decoding the first token received utilizing the firstcommunication protocol, wherein the providing for communication to thesecond device the first token comprises providing for communication fromthe first device to the second device the first token, wherein themethod comprises providing for communication from the first device tothe second device other information for accessing the source data,wherein the other information comprises location of the source data,wherein a size of the first token and the other information forcommunication to the second device is less than a size of the sourcedata, wherein the source data comprises more than one mega bytes,wherein the first communication protocol comprises an extendablemessaging and presence protocol (XMPP), wherein the encoding comprisesencoding of the first token at the first device.
 41. The method of claim36, wherein the method comprises at least one of a first securitymeasure and a second security measure, wherein the first securitymeasure comprises: facilitating receiving, from the remote device,information identifying at least one of the second device or a user ofthe second device, in response to the second device attempting to accessthe source data; and providing for communication to the remote device,an approval following validation of the received information by a userof the first device, wherein the second security measure comprises:providing for communication to the remote device, informationidentifying at least one of the second device or the user of the seconddevice, to enable the remote device to authenticate the second device orthe user of the second device when the second device attempts to accessthe source data.
 42. The method of claim 36, wherein the methodcomprises: providing a request, directed to the remote device, totransmit the source data to a server comprising a cloud server and tosend a second token to the first device; providing for communication tothe second device, located within five feet of the first device, thesecond token using the NPC protocol to enable the second device toaccess the source data transmitted to the server.
 43. The method ofclaim 42, wherein the first or the second token comprises a metadatacomprising at least some of an identifier of the remote device, anidentifier of the server, authentication information associated with theremote device, authentication information associate with the server, anidentifier of the source data, a path of the source data, an identifierof the source data transmitted to the server, or a path of the sourcedata transmitted to the server, and wherein the first and the secondtoken enable downloading the source data, wherein the source data is forat least setup, configuration, or management of one or more computers.44. The method of claim 36, wherein the source data comprises at leastone of a media file, a document, remote path information, remote desktopconnection information, security information, device managementinformation, or device configuration information.
 45. The method ofclaim 44, wherein: the media file comprises at least one of an audiofile, a video file, an audio-video file, or an image, the remote pathinformation comprises at least one of a directory name, a folder name, asub-folder name, or a file name, the remote desktop connectioninformation comprises at least one of an Internet Protocol (IP) address,a username, or a password, the security information comprises at leastone of network security information or security coding information, thedevice management information comprises at least one of a color depth, aresolution, or a desktop setting, and the device configuration comprisesat least one of a network configuration, a peripheral deviceconfiguration, or a client-server configuration.
 46. The method of claim36, wherein the first token is expirable and is a representation uniqueto one or more of the following: the source data, the second device, auser of the second device, and a time related to creation or usage ofthe first token, wherein the method comprises at least one of a firstmethod and a second method, wherein the first method comprises:facilitating receiving a second token associated with second sourcedata; encoding the second token to enable communication using the NPCprotocol; and providing for communication to a third device, locatedwithin five feet of the first device, the second token using the NPCprotocol, to enable the third device to access the second source datautilizing a third communication protocol, wherein the firstcommunication protocol is the same or different from the thirdcommunication protocol, wherein the second token is a representationunique to one or more of the following: the second data, the thirddevice and time related to creation or usage of the second token,wherein the second method comprises: facilitating receiving, at thefirst device, a third token associated with the source data; encoding,at the first device, the third token to enable communication using theNPC protocol; and providing for communication to a fourth device,located within five feet of the first device, the third token using theNPC protocol, to enable the fourth device to access the source datautilizing a fourth communication protocol, wherein the firstcommunication protocol is the same or different from the fourthcommunication protocol, wherein the third token is a representationunique to one or more of the following: the source data, the thirddevice, a user of the third device, and time related to creation orusage of the third token.
 47. The method of claim 36, wherein the firstdevice is a mobile device comprising one or more displays, one or moreprocessors, one or more network interfaces, and the method, wherein afirst one of the one or more network interfaces is configured to supportcommunication based on the first communication protocol, wherein asecond one of the one or more network interfaces is configured tosupport communication based on the NPC protocol, wherein the seconddevice is a mobile device, wherein the remote device is a computingdevice behind a firewall, wherein the first token does not exist priorto identifying the source data to be shared, wherein the first token iscreatable in real time and expirable, wherein each of the first andsecond communication protocols comprises one or more communicationprotocols.
 48. A method for facilitating sharing source data,comprising: facilitating receiving a token associated with the sourcedata; facilitating encoding the token to enable communication using anear proximity communication (NPC) protocol; and providing forcommunication to a second device, located within five feet of a firstdevice, the token using the NPC protocol to enable the second device toaccess the source data utilizing a communication protocol, wherein thesecond device is unable to access the source data without using thetoken, wherein the NPC protocol is a wireless communication protocolthat supports automatic connection between at least two devices locatedwithin five feet, wherein the first device is an NPC-enabled deviceadapted to detect presence of the second device within five feet of thefirst device, wherein the token is non-public.
 49. The method of claim48, wherein the method comprises identifying the source data, toinitiate sharing of the source data, based on a user action at the firstdevice, wherein the NPC protocol is different from the communicationprotocol, wherein the NPC protocol supports a data transfer rate that isnot greater than a data transfer rate supported by the communicationprotocol.
 50. The method of claim 48, wherein the source data is storedin the first device, wherein the method comprises facilitatinggenerating the token associated with the source data stored on the firstdevice, wherein the facilitating encoding facilitates receiving thetoken prior to encoding.
 51. The method of claim 48, wherein thefacilitating encoding the token comprises facilitating encoding thetoken in a form of a uniform resource locator (URL) to allow the seconddevice to access the source data via a website represented by the URL ofthe token.
 52. The method of claim 48, wherein the providing forcommunication allows the second device to access the source data via athird device which is a remote device, wherein the first device supportscommunication between the first device and the third device tofacilitate receiving the token from the third device or to facilitatethe second device to access the source data.
 53. The method of claim 48,wherein the method for facilitating sharing allows a distance betweenthe first device and the second device to be more than five feet afterthe operation of providing for communication to the second device thetoken, and the method allows the access to the source data regardless ofthe distance.