Computing system with detection mechanism and method of operation thereof

ABSTRACT

A computing system includes: a context module configured to determine a transfer context for invoking a state transfer between a source device and a target device; a modulation module, coupled to the context module, configured to generate a transfer modulation based on the transfer context for adjusting to a modulation scheme suited for the transfer context; and a transmission module, coupled to the modulation module, configured to send a communication packet based on the transfer modulation for detecting the source device and the target device.

TECHNICAL FIELD

An embodiment of the present invention relates generally to a computingsystem, and more particularly to a system for detection mechanism.

BACKGROUND

Modern portable consumer and industrial electronics, especially clientdevices such as navigation systems, cellular phones, portable digitalassistants, and combination devices are providing increasing levels offunctionality to support modern life including information sharingservices. Research and development in the existing technologies can takea myriad of different directions.

As users become more empowered with the growth of mobile location basedservice devices, new and old paradigms begin to take advantage of thisnew device space. There are many technological solutions to takeadvantage of this new device location opportunity. One existing approachis to use location information to provide personalized content through amobile device, such as a cell phone, smart phone, or a personal digitalassistant.

Personalized content services allow users to create, transfer, store,and/or consume information in order for users to create, transfer,store, and consume in the “real world.” One such use of personalizedcontent services is to efficiently transfer or guide users to thedesired product or service.

Thus, a need still remains for a computing system with detectionmechanism for aiding the management of task and information. In view ofthe ever-increasing commercial competitive pressures, along with growingconsumer expectations and the diminishing opportunities for meaningfulproduct differentiation in the marketplace, it is increasingly criticalthat answers be found to these problems. Additionally, the need toreduce costs, improve efficiencies and performance, and meet competitivepressures adds an even greater urgency to the critical necessity forfinding answers to these problems.

Solutions to these problems have been long sought but prior developmentshave not taught or suggested any solutions and, thus, solutions to theseproblems have long eluded those skilled in the art.

SUMMARY

An embodiment of the present invention provides a computing systemincluding: a context module configured to determine a transfer contextfor invoking a state transfer between a source device and a targetdevice; a modulation module, coupled to the context module, configuredto generate a transfer modulation based on the transfer context foradjusting to a modulation scheme suited for the transfer context; and atransmission module, coupled to the modulation module, configured tosend a communication packet based on the transfer modulation fordetecting the source device and the target device.

An embodiment of the present invention provides a method of operation ofa computing system including: determining a transfer context forinvoking a state transfer between a source device and a target device;generating a transfer modulation with a control unit based on thetransfer context for adjusting to a modulation scheme suited for thetransfer context; and sending a communication packet based on thetransfer modulation for detecting the source device and the targetdevice.

An embodiment of the present invention provides a non-transitorycomputer readable medium including: determining a transfer context forinvoking a state transfer between a source device and a target device;generating a transfer modulation based on the transfer context foradjusting to a modulation scheme suited for the transfer context;sending a communication packet based on the transfer modulation fordetecting the source device and the target device; and determining adevice authorization based on the communication packet for executing thestate transfer between the source device and the target device.

Certain embodiments of the invention have other steps or elements inaddition to or in place of those mentioned above. The steps or elementswill become apparent to those skilled in the art from a reading of thefollowing detailed description when taken with reference to theaccompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a computing system with detection mechanism in an embodimentof the present invention.

FIG. 2 is an example of a service architecture of the computing system.

FIG. 3 is a detailed example of the service architecture described inFIG. 2.

FIG. 4 is an example of a three-way handshake acoustic signaling for apresence detection.

FIG. 5 is an exemplary block diagram of the computing system.

FIG. 6 is a control flow of the computing system.

FIG. 7 is a flow chart of a method of operation of a computing system inan embodiment of the present invention.

DETAILED DESCRIPTION

An embodiment of the present invention generates a transfer modulationand determines a packet type to detect a source device and a targetdevice for invoking a state transfer between the two devices. A transfercontext can be determined to generate the transfer modulation anddetermine the packet type best suited to detect the source device andthe target device. As a result, a device authorization can be determinedto execute a state transfer between the source device and the targetdevice.

The following embodiments are described in sufficient detail to enablethose skilled in the art to make and use the invention. It is to beunderstood that other embodiments would be evident based on the presentdisclosure, and that system, process, or mechanical changes may be madewithout departing from the scope of the present invention.

In the following description, numerous specific details are given toprovide a thorough understanding of the invention. However, it will beapparent that the invention may be practiced without these specificdetails. In order to avoid obscuring the embodiment of the presentinvention, some well-known circuits, system configurations, and processsteps are not disclosed in detail.

The drawings showing embodiments of the system are semi-diagrammatic,and not to scale and, particularly, some of the dimensions are for theclarity of presentation and are shown exaggerated in the drawingfigures. Similarly, although the views in the drawings for ease ofdescription generally show similar orientations, this depiction in thefigures is arbitrary for the most part. Generally, the invention can beoperated in any orientation.

The term “module” referred to herein can include software, hardware, ora combination thereof in the embodiment of the present invention inaccordance with the context in which the term is used. For example, thesoftware can be machine code, firmware, embedded code, and applicationsoftware. Also for example, the hardware can be circuitry, processor,computer, integrated circuit, integrated circuit cores, a pressuresensor, an inertial sensor, a microelectromechanical system (MEMS),passive devices, or a combination thereof.

Referring now to FIG. 1, therein is shown a computing system 100 withdetection mechanism in an embodiment of the present invention. Thecomputing system 100 includes a first device 102, such as a client or aserver, connected to a second device 106, such as a client or server.The first device 102 can communicate with the second device 106 with acommunication path 104, such as a wireless or wired network. Thecomputing system 100 can also include a third device 108 connected tothe first device 102, the second device 106, or a combination thereofwith the communication path 104. The third device 108 can be a client orserver.

For example, the first device 102 or the third device 108 can be of anyof a variety of display devices, such as a cellular phone, personaldigital assistant, wearable digital device, tablet, notebook computer,television (TV), automotive telematic communication system, or othermulti-functional mobile communication or entertainment device. The firstdevice 102 or the third device 108 can be a standalone device, or can beincorporated with a vehicle, for example a car, truck, bus, aircraft,boat/vessel, or train. The first device 102 or the third device 108 cancouple to the communication path 104 to communicate with the seconddevice 106.

For illustrative purposes, the computing system 100 is described withthe first device 102 or the third device 108 as a mobile device,although it is understood that the first device 102 or the third device108 can be different types of devices. For example, the first device 102or the third device 108 can also be a non-mobile computing device, suchas a server, a server farm, or a desktop computer.

The second device 106 can be any of a variety of centralized ordecentralized computing devices. For example, the second device 106 canbe a computer, grid computing resources, a virtualized computerresource, cloud computing resource, routers, switches, peer-to-peerdistributed computing devices, or a combination thereof.

The second device 106 can be centralized in a single computer room,distributed across different rooms, distributed across differentgeographical locations, embedded within a telecommunications network.The second device 106 can have a means for coupling with thecommunication path 104 to communicate with the first device 102 or thethird device 108. The second device 106 can also be a client type deviceas described for the first device 102 or the third device 108.

In another example, the first device 102, the second device 106, or thethird device 108 can be a particularized machine, such as a mainframe, aserver, a cluster server, a rack mounted server, or a blade server, oras more specific examples, an IBM System z10™ Business Class mainframeor a HP ProLiant ML™ server. Yet another example, the first device 102,the second device 106, or the third device 108 can be a particularizedmachine, such as a portable computing device, a thin client, a notebook,a netbook, a smartphone, personal digital assistant, or a cellularphone, and as specific examples, an Apple iPhone™, Android™ smartphone,or Windows™ platform smartphone.

For illustrative purposes, the computing system 100 is described withthe second device 106 as a non-mobile computing device, although it isunderstood that the second device 106 can be different types ofcomputing devices. For example, the second device 106 can also be amobile computing device, such as notebook computer, another clientdevice, or a different type of client device. The second device 106 canbe a standalone device, or can be incorporated with a vehicle, forexample a car, truck, bus, aircraft, boat/vessel, or train.

Also for illustrative purposes, the computing system 100 is shown withthe second device 106 and the first device 102 or the third device 108as end points of the communication path 104, although it is understoodthat the computing system 100 can have a different partition between thefirst device 102, the second device 106, the third device 108, and thecommunication path 104. For example, the first device 102, the seconddevice 106, the third device 108 or a combination thereof can alsofunction as part of the communication path 104.

The communication path 104 can be a variety of networks. For example,the communication path 104 can include wireless communication, wiredcommunication, optical, ultrasonic, or the combination thereof.Satellite communication, cellular communication, Bluetooth, wirelessHigh-Definition Multimedia Interface (HDMI), Near Field Communication(NFC), Infrared Data Association standard (IrDA), wireless fidelity(WiFi), and worldwide interoperability for microwave access (WiMAX) areexamples of wireless communication that can be included in thecommunication path 104. Ethernet, HDMI, digital subscriber line (DSL),fiber to the home (FTTH), and plain old telephone service (POTS) areexamples of wired communication that can be included in thecommunication path 104.

Further, the communication path 104 can traverse a number of networktopologies and distances. For example, the communication path 104 caninclude direct connection, personal area network (PAN), local areanetwork (LAN), metropolitan area network (MAN), wide area network (WAN)or any combination thereof.

Referring now to FIG. 2, therein is shown an example of a servicearchitecture of the computing system 100. For clarity and brevity, thediscussion of an embodiment of the present invention will focus on thefirst device 102 of FIG. 1 representing a source device 202, the seconddevice 106 of FIG. 1 representing a data shadow server 204, and thethird device 108 of FIG. 1 representing a target device 206. However,the first device 102, the second device 106, and the third device 108can be discussed interchangeably.

The computing system 100 can include a device sensing module 208. Thedevice sensing module 208 detects a presence of the source device 202,the target device 206, or a combination thereof for invoking a statetransfer 210. The source device 202 is a device initiating the statetransfer 210. The target device 206 is a recipient device of the statetransfer 210. The data shadow server 204 authorizes the state transfer210 between the source device 202 and the target device 206. The datashadow server 204 can also receive the state transfer 210 from thesource device 202 and the target device 206 can receive the statetransfer 210 from the data shadow server 204. The source device 202 andthe target device 206 can each include an instance of the device sensingmodule 208.

The state transfer 210 is a transfer of an object 212 with an objectstate 214 from the source device 202 to the target device 206. Theobject can represent a variable, function, a data structure, or acombination thereof. The object 212 can include an object type 216. Theobject type 216 is a categorization of the object 212. The object type216 can include an application 218, a data 220, or a combinationthereof.

The object state 214 is a present operating condition of the object 212.For example, the object state 214 can include an application state 222,a data state 224, or a combination thereof. The application 218 is acomputer function, which can be implemented in hardware or software. Forexample, the application 218 can run on the source device 202, the datashadow server 204, the target device 206, or a combination thereof. Anapplication type 246 is a categorization of the application 218. Theapplication state 222 is a present operating condition of theapplication 218. The data 220 is a value used by the application 218,the source device 202, the data shadow server 204, the target device206, or a combination thereof. A data type 248 is a categorization ofthe data 220. The data state 224 is a present operating condition of thedata 220.

The computing system 100 can include an identification module 226. Theidentification manager module 226 handles session management. Forexample, the identification manager module 226 can provide a useridentification 228, a device identification 230, a group identification232, or a combination thereof. The user identification 228 can representthe information regarding the identity of the user of the computingsystem 100. The device identification 230 can represent the informationregarding the identity of the source device 202, the target device 206,or a combination thereof. The group identification 232 can represent theassemblage of a plurality of a device based on a categorization. Forexample, the source device 202 and the target device 206 can belong in asame group or have the same instance of the group identification 232based on sharing the user identification 228 as a user of the sourcedevice 202 and the target device 206. The source device 202 and thetarget device 206 can each include an instance of the identificationmanager module 226.

The computing system 100 can include a service coordinator module 234.The service coordinator module 234 performs the state transfer 210. Forexample, the service coordinator module 234 for the source device 202can transfer the object state 214 to the data shadow server 204. Theservice coordinator module 234 for the target device 206 can retrievethe object state 214 from the data shadow server 204.

The computing system 100 can include an access manager module 236. Theaccess manager module 236 determines a device authorization 238. Thedevice authorization 238 is permission to allow the state transfer 210.For example, the access manager module 236 can authenticate the sourcedevice 202 and the target device 206 based on the user identification228, the device identification 230, the group identification 232, or acombination thereof. The access manager module 236 can determine thedevice authorization 238 based on the result of the authentication. Thedata shadow server 204 can include the access manager module 236.

The computing system 100 can include a database manager module 240. Thedatabase manager module 240 can support tasks related to registering,storing, and retrieving the object 212 to the database in the datashadow server 204. The data shadow server 204 can include the databasemanager module 240.

The computing system 100 can include a synchronization module 242. Thesynchronization module 242 can synchronize the object 212 between thesource device 202 and the data shadow server 204. The synchronizationmodule 242 can also synchronize the object 212 between the target device206 and the data shadow server 204. The data shadow server 204 caninclude the synchronization module 242.

The computing system 100 can include a data shadow module 244. The datashadow module 244 can generate a data shadow user interface that ishomogeneous across heterogeneous operating systems existing overmultiple devices. For example, the data shadow module 244 can generatethe data shadow user interface for the source device 202 and the targetdevice 206. The data shadow user interface can include clipboard,collection, timeline, or a combination thereof. The data shadow server204 can include the data shadow module 244.

Referring now to FIG. 3, therein is shown a detailed example of theservice architecture described in FIG. 2. The device sensing module 208can include a device discovery module 302. The device discovery module302 enables the source device 202 to discover the target device 206. Forexample, the device discovery module 302 can send a communication packet304 to detect the presence of the target device 206. The communicationpacket 304 is information sent between the source device 202 and thetarget device 206. The communication packet 304 can represent anacoustic signal such as a sound wave. The communication packet 304 canalso represent an electromagnetic spectrum, such as a radio frequency,infrared, or a combination thereof. The communication packet 304 canrepresent an optical signal. The device discovery module 302 candiscover the target device 206 by using presence technologies such asacoustic signaling, WiFi Direct/Vendor Specific Information Element(VSIE), NFC, Bluetooth, or a combination thereof.

The device sensing module 208 can include a trigger signaling module306. The trigger signaling module 306 can generate a trigger signal 308for sending the trigger signal 308 to a clip manager module 310 of theservice coordinator module 234 for initiating the state transfer 210 ofFIG. 2. Details regarding the clip manager module 310 will be discussedbelow.

The identification manager module 226 can include a recognition module312. The recognition module 312 manages the login and instantrecognition of the user identification 228 of FIG. 2 across the sourcedevice 202, the target device 206, or a combination thereof. Forexample, the user of the computing system 100 can login to the sourcedevice 202 and automatically login to the target device 206 via a cloudbased automatic identification. The cloud based automatic identificationcan represent a seamless identification of the user identification 228across multiple devices, such as the source device 202, the targetdevice 206, or a combination thereof.

The identification manager module 226 can include a session module 314.The session module 314 can manage session information such as startingthe session, running the session, and ending the session. The servicecoordinator module 234 can query the session module 314 for the sessioninformation for performing tasks, such as performing the state transfer210, retrieving and/or synchronizing the object 212 of FIG. 2, launchingthe application 218 of FIG. 2, generating the data shadow userinterface, or a combination thereof.

The identification manager module 226 can include a registrar module316. The registrar module 316 can register the user identification 228,the device identification 230 of FIG. 2, the group identification 232 ofFIG. 2, or a combination thereof. The registrar module 316 can providethe user identification 228, the device identification 230, the groupidentification 232, or a combination thereof to the device sensingmodule 208 for detecting the source device 202, the target device 206,or a combination thereof. The service coordinator module 234 can querythe user identification 228, the device identification 230, and thegroup identification 232, or a combination thereof from the registrarmodule 316.

The service coordinator module 234 can include a clip launcher module318. The clip launcher module 318 can launch the object 212 at theobject state 214 of FIG. 2 stored in the clip manager module 310. Stateddifferently, the clip launcher module 318 can launch a clip of theobject 212 at the object state 214. The clip can represent theapplication 218, the data 220 of FIG. 2, or a combination thereof storedat the given instance of the application state 222 of FIG. 2, the datastate 224 of FIG. 2, or a combination thereof.

The service coordinator module 234 can include the clip manager module310. The clip manager module 310 can store or retrieve the object state214 based on the trigger signal 308 from the trigger signaling module306 or a request from the clip launcher module 318. Details regardingthe clip manager module 310 will be discussed below.

The service coordinator module 234 can include a data manager module320. The data manager module 320 can synchronize the object 212 and canupdate the service with the synchronization module 242. Detailsregarding the data manager module 320 will be discussed below.

The service coordinator module 234 can include a user interface managermodule 322. The user interface manager module 322 works with the datashadow module 244 to provide the data shadow user interface acrossmultiple devices, such as the source device 202, the target device 206,or a combination thereof.

The source device 202, the target device 206, and the data shadow server204 can include a transfer manager module 324. The transfer managermodule 324 can handle the communication between the source device 202,the target device 206, the data shadow server 204, or a combinationthereof. For example, the source device 202 can send the object 212 withthe object state 214 for the state transfer 210 to the data shadowserver 204 via the transfer manager module 324.

The access manager module 236 can include an authentication module 326.The authentication module 326 can provide the evidence for a digitalidentity, such as an identifier or a corresponding credential, for theuser identification 228, the device identification 230, the groupidentification 232 or a combination thereof. The access manager module236 can include an authorization module 328 to determine the deviceauthorization 238 to permit the state transfer 210.

For a specific example, the identification manager module 226 of thesource device 202 can query the access manager module 236 to beauthenticated to initiate the state transfer 210. The target device 206can query the access manager module 236 to be authenticated to retrievethe state transfer 210. If the source device 202 and the target device206 share the user identification 228, the group identification 232, ora combination thereof, the authentication module 326 can authenticatethat the source device 202 and the target device 206 to transact for thestate transfer 210. Moreover, the authorization module 328 can determinethe device authorization 238 to permit the state transfer 210.

The database manager module 240 can include a user registry module 330for storing the user identification 228. The database manager module 240can include a device registry module 332 for storing the deviceidentification 230. The database manager module 240 can include aservice registry module 334 for storing a service identification relatedto running the application 218 across multiple devices, such as thesource device 202, the target device 206, or a combination thereof. Theservice identification can include an object activity 336 related touser's service, user's service credential, instantiation information forrunning the application 218, or a combination thereof. The objectactivity 336 can represent a log for executing, instantiating, or acombination thereof by the source device 202, the target device 206, thedata shadow server 204, or a combination thereof.

The database manager module 240 can include a content registry module338 for storing metadata for the object 212. The database manager module240 can include a clip repository module 340 for storing the objectstate 214 of the object 212. The database manager module 240 can includean organizing scheme module 342 for storing the data 220 representing aninformation architecture for the source device 202, the target device206, or a combination thereof.

The synchronization module 242 can include a clip server manager module344. The clip server manager module 344 can transact with the clipmanager module 310 to store metadata related to log for the clip to theclip repository module 340. The synchronization module 242 can include acontent mapper module 346. The content mapper module 346 can store orretrieve the object 212 from or to the database manager module 240. Thecontent mapper module 346 can work with a service manager 348 to provideseamless access privilege to the object 212. The synchronization module242 can include the service manager 348. The service manager 348 canlaunch the application 218 interacting with the authorization module328.

The data shadow module 244 can include a priority organization module350. The priority organization module 350 can work with a smartinformation architecture engine 352 to identify the informationhierarchy of the object 212 for the source device 202, the target device206, or a combination thereof.

The data shadow server 204 can include a relation manager module 354.The relation manager module 354 can manage a task related to interactionwith social network graph defined in the social service framework. Thesocial network graph can represent a user profile based on contextawareness mechanism and relationship with other users within a socialnetwork site.

Referring now to FIG. 4, therein is shown an example of a three-wayhandshake acoustic signaling for a presence detection. The three-wayhandshake acoustic signaling can occur between the device sensing module208 of the source device 202 and the device sensing module 208 of thetarget device 206. More specifically, the source device 202 can detectthe presence of the target device 206 after detecting a transfer intent402 and a device state 404 of the source device 202 reaches an inertialstability 406.

The transfer intent 402 is a desire to conduct the state transfer 210.For example, the user of the computing system 100 can disclose thetransfer intent 402 based on a user's behavior 408. The user's behavior408 can be disclosed by a gesture type 410. The gesture type 410 is anaction performed on the source device 202, the target device 206, or acombination thereof. For example, the gesture type 410 can include apress gesture, a select gesture, a shake gesture, a pointing gesture, ora combination thereof. For a specific example, the user of the computingsystem 100 can perform the gesture type 410 of the press gesture on adisplay interface 412 of the source device 202. Details regarding thegesture type 410 will be discussed below.

The device state 404 is a present operating condition of the sourcedevice 202, the target device 206, or a combination thereof. Forexample, the device state 404 can represent the source device 202running the application 218 of FIG. 2. The inertial stability 406 is apresent condition of the source device 202 or the target device 206where no physical movement towards three-dimensional Cartesiancoordinate is detected.

A transfer context 414 is a situation, circumstance, or a combinationthereof surrounding the source device 202, the target device 206, or acombination thereof. The transfer context 414 can be determined based ona transfer condition 416. The transfer condition 416 can include atransfer location 418, an urgency level 420, a sensitivity level 422, atransfer proximity 424, a reliability level 426, a security level 454,or a combination thereof.

The transfer location 418 is a physical location where the presencedetection between the source device 202 and the target device 206 isconducted. The urgency level 420 is a level of imperativeness,imminence, or a combination thereof. The sensitivity level 422 is alevel of averseness towards disclosure. The reliability level 426 is alevel of assuredness for completing the state transfer 210. The securitylevel 454 is a level of protection placed on the object 212 of FIG. 2.

The transfer proximity 424 is a minimum level of nearness between thesource device 202 and the target device 206 to invoke the state transfer210. For example, the transfer proximity 424 can represent a physicaldistance between the source device 202 and the target device 206. Atransfer type 428 is a categorization of the state transfer 210. Forexample, the transfer type 428 can include the state transfer 210involving one instance of the source device 202 to a plurality of thetarget device 206 or to one instance of the target device 206. Thesource device 202 can transfer the object state 214 to the data shadowserver 204. The target device 206 can retrieve the object state 214 fromthe data shadow server 204.

A packet type 430 is a categorization of the communication packet 304. Atransfer modulation 432 is an arrangement of a modulation scheme 434 ofthe communication packet 304. The modulation scheme 434 is a property ofthe communication packet 304. For example, the modulation scheme 434 caninclude a modulation frequency 436, a modulation amplitude 438, or acombination thereof. The modulation frequency 436 is a number of cyclesper unit time of the communication packet 304. For example, themodulation frequency 436 can represent a radio frequency with a rate ofoscillation in the range of about 3 kilohertz (KHz) to 300 gigahertz(GHz). The modulation amplitude 438 is a height and depth of a wave ofthe communication packet 304.

The source device 202 and the target device 206 can send a variety of anotification type 440 between one another to determine the presence ofeach other. The notification type 440 can include an initiationnotification 442, a reply notification 444, and a confirmationnotification 446. The initiation notification 442 is the communicationpacket 304 sent by the source device 202 to initiate a detection of thetarget device 206. The reply notification 444 is the communicationpacket 304 sent by the target device 206 in response to receiving theinitiation notification 442. The confirmation notification 446 is thecommunication packet 304 sent by the source device 202 in response toreceiving the reply notification 444.

A communication proximity 448 is a level of nearness between the sourcedevice 202 and the target device 206 calculated based on exchanging thenotification type 440. A transmission time 450 is amount of time takento send the communication packet 304 from one device to another. Forexample, the transmission time 450 can represent the amount of time forthe source device 202 to send the initiation notification 442 to thetarget device 206. A transmission speed 452 is a magnitude of velocityof the communication packet 304 transmitted from one device to another.For example, the transmission speed 452 can represent the magnitude ofvelocity for sending the reply notification 444 from the target device206 to the source device 202.

Referring now to FIG. 5, therein is shown an exemplary block diagram ofthe computing system 100. The computing system 100 can include the firstdevice 102, the third device 108, the communication path 104, and thesecond device 106. The first device 102 or the third device 108 can sendinformation in a first device transmission 508 over the communicationpath 104 to the second device 106. The second device 106 can sendinformation in a second device transmission 510 over the communicationpath 104 to the first device 102 or the third device 108.

For illustrative purposes, the computing system 100 is shown with thefirst device 102 or the third device 108 as a client device, although itis understood that the computing system 100 can have the first device102 or the third device 108 as a different type of device. For example,the first device 102 or the third device 108 can be a server having adisplay interface.

Also for illustrative purposes, the computing system 100 is shown withthe second device 106 as a server, although it is understood that thecomputing system 100 can have the second device 106 as a different typeof device. For example, the second device 106 can be a client device.

For brevity of description in this embodiment of the present invention,the first device 102 or the third device 108 will be described as aclient device and the second device 106 will be described as a serverdevice. The embodiment of the present invention is not limited to thisselection for the type of devices. The selection is an example of thepresent invention.

The first device 102 can include a first control unit 512, a firststorage unit 514, a first communication unit 516, a first user interface518, and a location unit 520. The first control unit 512 can include afirst control interface 522. The first control unit 512 can execute afirst software 526 to provide the intelligence of the computing system100.

The first control unit 512 can be implemented in a number of differentmanners. For example, the first control unit 512 can be a processor, anapplication specific integrated circuit (ASIC) an embedded processor, amicroprocessor, a hardware control logic, a hardware finite statemachine (FSM), a digital signal processor (DSP), or a combinationthereof. The first control interface 522 can be used for communicationbetween the first control unit 512 and other functional units in thefirst device 102. The first control interface 522 can also be used forcommunication that is external to the first device 102.

The first control interface 522 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate from to the first device 102.

The first control interface 522 can be implemented in different ways andcan include different implementations depending on which functionalunits or external units are being interfaced with the first controlinterface 522. For example, the first control interface 522 can beimplemented with a pressure sensor, an inertial sensor, amicroelectromechanical system (MEMS), optical circuitry, waveguides,wireless circuitry, wireline circuitry, or a combination thereof.

The location unit 520 can generate location information, currentheading, and current speed of the first device 102, as examples. Thelocation unit 520 can be implemented in many ways. For example, thelocation unit 520 can function as at least a part of a globalpositioning system (GPS), an inertial navigation system, acellular-tower location system, a pressure location system, or anycombination thereof.

The location unit 520 can include a location interface 532. The locationinterface 532 can be used for communication between the location unit520 and other functional units in the first device 102. The locationinterface 532 can also be used for communication that is external to thefirst device 102.

The location interface 532 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate from the first device 102.

The location interface 532 can include different implementationsdepending on which functional units or external units are beinginterfaced with the location unit 520. The location interface 532 can beimplemented with technologies and techniques similar to theimplementation of the first control interface 522.

The first storage unit 514 can store the first software 526. The firststorage unit 514 can also store the relevant information, such asadvertisements, points of interest (POI), navigation routing entries, orany combination thereof. The relevant information can also include news,media, events, or a combination thereof from the third party contentprovider.

The first storage unit 514 can be a volatile memory, a nonvolatilememory, an internal memory, an external memory, or a combinationthereof. For example, the first storage unit 514 can be a nonvolatilestorage such as non-volatile random access memory (NVRAM), Flash memory,disk storage, or a volatile storage such as static random access memory(SRAM).

The first storage unit 514 can include a first storage interface 524.The first storage interface 524 can be used for communication betweenand other functional units in the first device 102. The first storageinterface 524 can also be used for communication that is external to thefirst device 102.

The first storage interface 524 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate from the first device 102.

The first storage interface 524 can include different implementationsdepending on which functional units or external units are beinginterfaced with the first storage unit 514. The first storage interface524 can be implemented with technologies and techniques similar to theimplementation of the first control interface 522.

The first communication unit 516 can enable external communication toand from the first device 102. For example, the first communication unit516 can permit the first device 102 to communicate with the first device102 of FIG. 1, an attachment, such as a peripheral device or a computerdesktop, and the communication path 104.

The first communication unit 516 can also function as a communicationhub allowing the first device 102 to function as part of thecommunication path 104 and not limited to be an end point or terminalunit to the communication path 104. The first communication unit 516 caninclude active and passive components, such as microelectronics or anantenna, for interaction with the communication path 104.

The first communication unit 516 can include a first communicationinterface 528. The first communication interface 528 can be used forcommunication between the first communication unit 516 and otherfunctional units in the first device 102. The first communicationinterface 528 can receive information from the other functional units orcan transmit information to the other functional units.

The first communication interface 528 can include differentimplementations depending on which functional units are being interfacedwith the first communication unit 516. The first communication interface528 can be implemented with technologies and techniques similar to theimplementation of the first control interface 522.

The first user interface 518 allows a user (not shown) to interface andinteract with the first device 102. The first user interface 518 caninclude an input device and an output device. Examples of the inputdevice of the first user interface 518 can include a keypad, a touchpad,soft-keys, a keyboard, a microphone, an infrared sensor for receivingremote signals, or any combination thereof to provide data andcommunication inputs.

The first user interface 518 can include a first display interface 530.The first display interface 530 can include a display, a projector, avideo screen, a speaker, or any combination thereof.

The first control unit 512 can operate the first user interface 518 todisplay information generated by the computing system 100. The firstcontrol unit 512 can also execute the first software 526 for the otherfunctions of the computing system 100, including receiving locationinformation from the location unit 520. The first control unit 512 canfurther execute the first software 526 for interaction with thecommunication path 104 via the first communication unit 516.

The second device 106 can be optimized for implementing the embodimentof the present invention in a multiple device embodiment with the seconddevice 106. The second device 106 can provide the additional or higherperformance processing power compared to the first device 102. Thesecond device 106 can include a second control unit 534, a secondcommunication unit 536, and a second user interface 538.

The second user interface 538 allows a user (not shown) to interface andinteract with the second device 106. The second user interface 538 caninclude an input device and an output device. Examples of the inputdevice of the second user interface 538 can include a keypad, atouchpad, soft-keys, a keyboard, a microphone, or any combinationthereof to provide data and communication inputs. Examples of the outputdevice of the second user interface 538 can include a second displayinterface 540. The second display interface 540 can include a display, aprojector, a video screen, a speaker, or any combination thereof.

The second control unit 534 can execute a second software 542 to providethe intelligence of the second device 106 of the computing system 100.The second software 542 can operate in conjunction with the firstsoftware 526. The second control unit 534 can provide additionalperformance compared to the first control unit 512.

The second control unit 534 can operate the second user interface 538 todisplay information. The second control unit 534 can also execute thesecond software 542 for the other functions of the computing system 100,including operating the second communication unit 536 to communicatewith the second device 106 over the communication path 104.

The second control unit 534 can be implemented in a number of differentmanners. For example, the second control unit 534 can be a processor, anembedded processor, a microprocessor, hardware control logic, a hardwarefinite state machine (FSM), a digital signal processor (DSP), or acombination thereof.

The second control unit 534 can include a second control interface 544.The second control interface 544 can be used for communication betweenthe second control unit 534 and other functional units in the seconddevice 106. The second control interface 544 can also be used forcommunication that is external to the second device 106.

The second control interface 544 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate from the second device 106.

The second control interface 544 can be implemented in different waysand can include different implementations depending on which functionalunits or external units are being interfaced with the second controlinterface 544. For example, the second control interface 544 can beimplemented with a pressure sensor, an inertial sensor, amicroelectromechanical system (MEMS), optical circuitry, waveguides,wireless circuitry, wireline circuitry, or a combination thereof.

A second storage unit 546 can store the second software 542. The secondstorage unit 546 can also store the relevant information, such asadvertisements, points of interest (POI), navigation routing entries, orany combination thereof. The second storage unit 546 can be sized toprovide the additional storage capacity to supplement the first storageunit 514.

For illustrative purposes, the second storage unit 546 is shown as asingle element, although it is understood that the second storage unit546 can be a distribution of storage elements. Also for illustrativepurposes, the computing system 100 is shown with the second storage unit546 as a single hierarchy storage system, although it is understood thatthe computing system 100 can have the second storage unit 546 in adifferent configuration. For example, the second storage unit 546 can beformed with different storage technologies forming a memory hierarchalsystem including different levels of caching, main memory, rotatingmedia, or off-line storage.

The second storage unit 546 can be a volatile memory, a nonvolatilememory, an internal memory, an external memory, or a combinationthereof. For example, the second storage unit 546 can be a nonvolatilestorage such as non-volatile random access memory (NVRAM), Flash memory,disk storage, or a volatile storage such as static random access memory(SRAM).

The second storage unit 546 can include a second storage interface 548.The second storage interface 548 can be used for communication betweenother functional units in the second device 106. The second storageinterface 548 can also be used for communication that is external to thesecond device 106.

The second storage interface 548 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate from the second device 106.

The second storage interface 548 can include different implementationsdepending on which functional units or external units are beinginterfaced with the second storage unit 546. The second storageinterface 548 can be implemented with technologies and techniquessimilar to the implementation of the second control interface 544.

The second communication unit 536 can enable external communication toand from the second device 106. For example, the second communicationunit 536 can permit the second device 106 to communicate with the firstdevice 102 over the communication path 104.

The second communication unit 536 can also function as a communicationhub allowing the second device 106 to function as part of thecommunication path 104 and not limited to be an end point or terminalunit to the communication path 104. The second communication unit 536can include active and passive components, such as microelectronics oran antenna, for interaction with the communication path 104.

The second communication unit 536 can include a second communicationinterface 550. The second communication interface 550 can be used forcommunication between the second communication unit 536 and otherfunctional units in the second device 106. The second communicationinterface 550 can receive information from the other functional units orcan transmit information to the other functional units.

The second communication interface 550 can include differentimplementations depending on which functional units are being interfacedwith the second communication unit 536. The second communicationinterface 550 can be implemented with technologies and techniquessimilar to the implementation of the second control interface 544.

The first communication unit 516 can couple with the communication path104 to send information to the second device 106 in the first devicetransmission 508. The second device 106 can receive information in thesecond communication unit 536 from the first device transmission 508 ofthe communication path 104.

The second communication unit 536 can couple with the communication path104 to send information to the first device 102 in the second devicetransmission 510. The first device 102 can receive information in thefirst communication unit 516 from the second device transmission 510 ofthe communication path 104. The computing system 100 can be executed bythe first control unit 512, the second control unit 534, or acombination thereof.

For illustrative purposes, the second device 106 is shown with thepartition having the second user interface 538, the second storage unit546, the second control unit 534, and the second communication unit 536,although it is understood that the second device 106 can have adifferent partition. For example, the second software 542 can bepartitioned differently such that some or all of its function can be inthe second control unit 534 and the second communication unit 536. Also,the second device 106 can include other functional units not shown inFIG. 5 for clarity.

The third device 108 can include a third control unit 552, a thirdstorage unit 554, a third communication unit 556, a third user interface558, and a location unit 560. The third control unit 552 can include athird control interface 562. The third control unit 552 can execute athird software 566 to provide the intelligence of the computing system100. The third control unit 552 can be implemented in a number ofdifferent manners. For example, the third control unit 552 can be aprocessor, an embedded processor, a microprocessor, a hardware controllogic, a hardware finite state machine (FSM), a digital signal processor(DSP), or a combination thereof. The third control interface 562 can beused for communication between the third control unit 552 and otherfunctional units in the third device 108. The third control interface562 can also be used for communication that is external to the thirddevice 108.

The third control interface 562 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate to the third device 108.

The third control interface 562 can be implemented in different ways andcan include different implementations depending on which functionalunits or external units are being interfaced with the third controlinterface 562. For example, the third control interface 562 can beimplemented with a pressure sensor, an inertial sensor, amicroelectromechanical system (MEMS), optical circuitry, waveguides,wireless circuitry, wireline circuitry, or a combination thereof.

The location unit 560 can generate location information, currentheading, and current speed of the third device 108, as examples. Thelocation unit 560 can be implemented in many ways. For example, thelocation unit 560 can function as at least a part of a globalpositioning system (GPS), an inertial navigation system, acellular-tower location system, a pressure location system, or anycombination thereof.

The location unit 560 can include a location interface 572. The locationinterface 572 can be used for communication between the location unit560 and other functional units in the third device 108. The locationinterface 572 can also be used for communication that is external to thethird device 108.

The location interface 572 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate to the third device 108.

The location interface 572 can include different implementationsdepending on which functional units or external units are beinginterfaced with the location unit 560. The location interface 572 can beimplemented with technologies and techniques similar to theimplementation of the third control interface 562.

The third storage unit 554 can store the third software 566. The thirdstorage unit 554 can also store the relevant information, such asadvertisements, points of interest (POI), navigation routing entries, orany combination thereof.

The third storage unit 554 can be a volatile memory, a nonvolatilememory, an internal memory, an external memory, or a combinationthereof. For example, the third storage unit 554 can be a nonvolatilestorage such as non-volatile random access memory (NVRAM), Flash memory,disk storage, or a volatile storage such as static random access memory(SRAM).

The third storage unit 554 can include a third storage interface 564.The third storage interface 564 can be used for communication betweenthe location unit 560 and other functional units in the third device108. The third storage interface 564 can also be used for communicationthat is external to the third device 108.

The third storage interface 564 can receive information from the otherfunctional units or from external sources, or can transmit informationto the other functional units or to external destinations. The externalsources and the external destinations refer to sources and destinationsphysically separate to the third device 108.

The third storage interface 564 can include different implementationsdepending on which functional units or external units are beinginterfaced with the third storage unit 554. The third storage interface564 can be implemented with technologies and techniques similar to theimplementation of the third control interface 562.

The third communication unit 556 can enable external communication toand from the third device 108. For example, the third communication unit556 can permit the third device 108 to communicate with the seconddevice 106 of FIG. 1, an attachment, such as a peripheral device or acomputer desktop, and the communication path 104.

The third communication unit 556 can also function as a communicationhub allowing the third device 108 to function as part of thecommunication path 104 and not limited to be an end point or terminalunit to the communication path 104. The third communication unit 556 caninclude active and passive components, such as microelectronics or anantenna, for interaction with the communication path 104.

The third communication unit 556 can include a third communicationinterface 568. The third communication interface 568 can be used forcommunication between the third communication unit 556 and otherfunctional units in the third device 108. The third communicationinterface 568 can receive information from the other functional units orcan transmit information to the other functional units.

The third communication interface 568 can include differentimplementations depending on which functional units are being interfacedwith the third communication unit 556. The third communication interface568 can be implemented with technologies and techniques similar to theimplementation of the third control interface 562.

The third user interface 558 allows a user (not shown) to interface andinteract with the third device 108. The third user interface 558 caninclude an input device and an output device. Examples of the inputdevice of the third user interface 558 can include a keypad, a touchpad,soft-keys, a keyboard, a microphone, or any combination thereof toprovide data and communication inputs.

The third user interface 558 can include a third display interface 570.The third display interface 570 can include a display, a projector, avideo screen, a speaker, or any combination thereof.

The third control unit 552 can operate the third user interface 558 todisplay information generated by the computing system 100. The thirdcontrol unit 552 can also execute the third software 566 for the otherfunctions of the computing system 100, including receiving locationinformation from the location unit 560. The third control unit 552 canfurther execute the third software 566 for interaction with thecommunication path 104 via the third communication unit 556.

The functional units in the first device 102 can work individually andindependently of the other functional units. The first device 102 canwork individually and independently from the second device 106, thethird device 108, and the communication path 104.

The functional units in the second device 106 can work individually andindependently of the other functional units. The second device 106 canwork individually and independently from the first device 102, the thirddevice 108, and the communication path 104.

The functional units in the third device 108 can work individually andindependently of the other functional units. The third device 108 canwork individually and independently from the first device 102, thesecond device 106, and the communication path 104.

For illustrative purposes, the computing system 100 is described byoperation of the first device 102, the second device 106, and the thirddevice 108. It is understood that the first device 102, the seconddevice 106, the third device 108 can operate any of the modules andfunctions of the computing system 100. For example, the first device 102is described to operate the location unit 520, although it is understoodthat the second device 106 or the third device 108 can also operate thelocation unit 520.

Referring now to FIG. 6, therein is shown a control flow of thecomputing system 100. The computing system 100 can include an activitymodule 602. The activity module 602 determines the object activity 336of FIG. 3. For example, the activity module 602 can determine the objectactivity 336 of the object 212 of FIG. 2 invoked within the sourcedevice 202 of FIG. 2. For brevity and clarity, the first device 102 ofFIG. 1 can represent the source device 202 and the third device 108 ofFIG. 1 can represent the target device 206 of FIG. 2.

The activity module 602 can determine the object activity 336 in anumber of ways. For example, the activity module 602 can determine theobject activity 336 for the object 212 representing the application 218of FIG. 2 running on the source device 202. More specifically, theactivity module 602 can determine the object activity 336 of theapplication 218 based on determining the program counter for identifyingthe process being invoked for the application 218. If the application218 is running, the activity module 602 can determine the specific valueof the program counter to identify what process is being invoked by theapplication 218 of the source device 202.

For a different example, the activity module 602 can determine theobject activity 336 for the object 212 representing the data 220 of FIG.2 being passed by the application 218. More specifically, as discussed,the activity module 602 can track the object activity 336 foridentifying the process of the application 218 being invoked. Similarly,the activity module 602 can track the object activity 336 of the data220 based on identifying the value of the data 220 before the process isinvoked and the value of the data 220 after the process has beeninvoked. The activity module 602 can send the object activity 336 to acontext module 604.

The computing system 100 can include the context module 604, which cancouple to the activity module 602. The context module 604 determines thetransfer context 414 of FIG. 4. For example, the context module 604 candetermine the transfer context 414 based on the transfer condition 416of FIG. 4.

The context module 604 can determine the transfer context 414 in anumber of ways. For example, the context module 604 can determine thetransfer context 414 based on the transfer condition 416 representingthe transfer location 418 of FIG. 4, the object type 216 of FIG. 2, or acombination thereof. More specifically, the transfer location 418 canrepresent a hospital. The source device 202 can represent a tabletcarried by the doctor. The object type 216 that the doctor seeks totransfer can represent the data 220 representing medical informationprocessed by the application 218 within the source device 202. Based onthe transfer location 418, the object type 216, or a combinationthereof, the context module 604 can determine the transfer context 414to have the urgency level 420 of FIG. 4 of high.

In contrast, the transfer location 418 can represent the user's room athome. The object type 216 to be transferred can represent theapplication 218 for drafting an email. Based on the transfer location418, the object type 216, or a combination thereof, the context module604 can determine the transfer context 414 to have the urgency level 420of low. The context module 604 can send the transfer context 414 to asensitivity module 606.

The computing system 100 can include the sensitivity module 606, whichcan couple to the context module 604. The sensitivity module 606determines the sensitivity level 422 of FIG. 4. For example, thesensitivity module 606 can determine the sensitivity level 422 based onthe object type 216 of the object 212.

The sensitivity module 606 can determine the sensitivity level 422 in anumber of ways. For example, the sensitivity module 606 can determinethe sensitivity level 422 based on the object type 216 representing theapplication type 246 of FIG. 2, the data type 248 of FIG. 2, or acombination thereof. More specifically, the application type 246 canrepresent the application 218 for playing a video game on the sourcedevice 202. The sensitivity module 606 can determine the sensitivitylevel 422 for the application type 246 to be low based on theapplication type 246 being a category of a game. In contrast, theapplication type 246 can represent web-based personal financial service.The sensitivity module 606 can determine the sensitivity level 422 forthe application type 246 to be high based on high confidentiality of theuser's finance information.

For a different example, the sensitivity module 606 can determine thesensitivity level 422 based on the security level 454 of FIG. 4 of theobject 212. More specifically, the object 212 can represent theapplication 218 for writing an email. The email can include the datatype 248 of music file without any password on the data 220. Thus, thesecurity level 454 can represent low. The sensitivity module 606 candetermine the sensitivity level 422 of low based on the security level454 of low.

In contrast, the email can include the data type 248 representing taxinformation with password protection. Thus, the security level 454 canrepresent high. The sensitivity module 606 can determine the sensitivitylevel 422 of high based on the security level 454 of high.

For a different example, the sensitivity module 606 can determine thesensitivity level 422 based on the transfer context 414. As discussedabove, the transfer context 414 can have the urgency level 420 of highwhen the doctor seeks to transfer the object type 216 of medicalinformation. The sensitivity module 606 can determine the sensitivitylevel 422 of the medical information to be high based on the urgencylevel 420 of high. In contrast, the transfer context 414 can have theurgency level 420 of low when the user is planning to transfer theobject type 216 of personal email to a friend. The sensitivity module606 can determine the sensitivity level 422 of personal email to be lowbased on the urgency level 420 of low. The sensitivity module 606 cansend the sensitivity level 422 to an intent module 608.

The computing system 100 can include the intent module 608, which cancouple to the sensitivity module 606. The intent module 608 detects thetransfer intent 402 of FIG. 4. For example, the intent module 608 candetect the transfer intent 402 based on the user's behavior 408 of FIG.4, the transfer proximity 424 of FIG. 4, the device state 404 of FIG. 4,or a combination thereof.

The intent module 608 can detect the transfer intent 402 in a number ofways. For example, the intent module 608 can detect the transfer intent402 for the object type 216 based on the user's behavior 408 representedby the gesture type 410 of FIG. 4. More specifically, the gesture type410 can be predefined for invoking the source device 202 to initiate thestate transfer 210 of FIG. 2.

For example, the gesture type 410 can represent pressing the application218 displayed on the display interface 412 of FIG. 4 for more than twoseconds. For another example, the gesture type 410 can represent shakingthe source device 202 for invoking the state transfer 210 for the objecttype 216 of the application 218 in use currently. For a differentexample, the gesture type 410 can represent selecting the menu to invokethe state transfer 210 for the object type 216 of the data 220.

For further example, the intent module 608 can determine the transferintent 402 for the transfer type 428 of FIG. 4 based on the gesture type410. More specifically, the gesture type 410 of pointing with the sourcedevice 202 at the target device 206 can be preset to invoke the statetransfer 210 for the transfer type 428 of one-to-one transfer betweenthe source device 202 and the target device 206. In contrast, thegesture type 410 representing a motion for drawing a circle with thesource device 202 can be preset to invoke the state transfer 210 for thetransfer type 428 of one-to-many transfer between the source device 202and a plurality of the target device 206. Based on the gesture type 410of the user's behavior 408, the intent module 608 can determine thetransfer intent 402 of the object type 216 that the user of thecomputing system 100 intends to perform as the state transfer 210 with aspecific instance of the transfer type 428.

For a different example, the intent module 608 can determine thetransfer intent 402 based on locating the source device 202 within thetransfer proximity 424. The transfer proximity 424 can be predefined totrigger the state transfer 210 of the object 212 from the source device202 to the target device 206. For example, the transfer proximity 424can be set as a physical distance between the source device 202 and thetarget device 206. More specifically, the transfer proximity 424 canrepresent 30 centimeters. The intent module 608 can determine thetransfer intent 402 to invoke the state transfer 210 when the transferproximity 424 between the source device 202 and the target device 206 iswithin 30 centimeters. The intent module 608 can determine that thesource device 202 and the target device 206 are within the transferproximity 424 based on detecting the physical location of the sourcedevice 202 via the location unit 520 of FIG. 5 and the location unit 560of FIG. 5 of the target device 206.

For another example, the intent module 608 can determine the transferintent 402 based on the device state 404 of the source device 202, thetarget device 206, or a combination thereof. More specifically, theintent module 608 can determine the transfer intent 402 when the devicestate 404 reaches the inertial stability 406 of FIG. 4. For example, thesource device 202 can be placed on a flat surface, such as a table. Thedevice state 404 of the source device 202 can reach the inertialstability 406 based on the location unit 520 detecting no movement bythe source device 202. The device state 404 of the target device 206 canreach the inertial stability 406 based on the location unit 560detecting no movement by the target device 206. The source device 202and the target device 206 can be within the transfer proximity 424 of 30centimeters. Based on the inertial stability 406 and the two deviceswithin the transfer proximity 424, the intent module 608 can determinethe transfer intent 402 to invoke the state transfer 210 between thesource device 202 and the target device 206. The intent module 608 cansend the transfer intent 402 to a packet module 610.

For illustrative purposes, the computing system 100 is described withthe context module 604 determining the transfer context 414 based on thetransfer condition 416, although it is understood that the contextmodule 604 can operate differently. For example, the context module 604can determine the reliability level 426 of FIG. 4 of the transfercontext 414 based on the transfer type 428, the transfer proximity 424,or a combination thereof.

The context module 604 can determine the reliability level 426 of thetransfer context 414 in a number of ways. For example, the transferproximity 424 can represent a short physical distance of under 1 meter.The transfer type 428 can represent one-to-one transfer between thesource device 202 and the target device 206. The context module 604 candetermine the reliability level 426 of high for the transfer context 414between the source device 202 and the target device 206 based on theshort physical distance and the one-to-one transfer of the statetransfer 210.

For a different example, the transfer proximity 424 can represent withinthe physical distance greater than 1 meter. More specifically, thetransfer proximity 424 can represent that the source device 202 iswithin the same building as the target device 206. Furthermore, thetransfer type 428 can represent one-to-many for the state transfer 210between one instance of the source device 202 and the plurality of thetarget device 206. Based on the transfer proximity 424 and the transfertype 428, the context module 604 can determine the reliability level 426of the transfer context 414 to be low. The context module 604 can sendthe transfer context 414 to the packet module 610.

The computing system 100 can include the packet module 610, which cancouple to the intent module 608. The packet module 610 determines thepacket type 430 of FIG. 4. For example, the packet module 610 candetermine the packet type 430 with the transfer modulation 432 of FIG. 4for sending the communication packet 304 of FIG. 3 to detect the sourcedevice 202, target device 206, or a combination thereof. For anotherexample, the packet module 610 can determine the packet type 430 withthe transfer modulation 432 for detecting the source device 202, thetarget device 206, or a combination thereof to invoke the state transfer210.

The packet module 610 can include a type module 612. The type module 612determines the packet type 430. For example, the type module 612 candetermine the packet type 430 for sending the communication packet 304based on the transfer context 414, the transfer intent 402, the transferproximity 424, the sensitivity level 422, or a combination thereof.

The type module 612 can determine the packet type 430 in a number ofways. For example, the type module 612 can determine the packet type 430based on the transfer context 414 for detecting the source device 202and the target device 206. More specifically, the transfer context 414can represent a quiet surrounding with a sound pressure level below 50decibels. The type module 612 can determine the packet type 430 for thecommunication packet 304 to represent a sound wave based on the transfercontext 414 representing a quiet surrounding.

In contrast, the type module 612 can determine the packet type 430 forthe communication packet 304 to represent an infrared based on thetransfer context 414 representing a noisy surrounding. The noisysurrounding can represent the transfer condition 416 where the soundpressure level is above 90 decibels. Unlike the sound wave where thesound wave of the sound wave can be muffled in the noisy room, theinfrared can be detected by the target device 206 even in the noisyroom.

It has been discovered that the computing system 100 can determine thepacket type 430 based on the transfer context 414 to improve thedetection of the source device 202, the target device 206, or acombination thereof for invoking the state transfer 210. By factoringthe transfer context 414, the computing system 100 can select the packettype 430 best suited to be detected by the source device 202, the targetdevice 206, or a combination. As a result, the computing system 100 canimprove the efficiency for invoking the state transfer 210 for enhancingthe user experience for using the computing system 100, the sourcedevice 202, the target device 206, or a combination thereof.

For a different example, the type module 612 can determine the packettype 430 based on the transfer proximity 424 between the source device202 and the target device 206. For example, the transfer proximity 424can represent less than 1 meter in physical distance. Based on the shortrange of the transfer proximity 424, the type module 612 can determinethe packet type 430 of the communication packet 304 to represent a soundwave, an infrared, a light wave, or a combination thereof. In contrast,the transfer proximity 424 can represent greater than 50 meter. The typemodule 612 can determine the packet type 430 of the communication packet304 to represent a radio frequency, vibration, or a combination thereofbased on the long range of the transfer proximity 424. The type module612 can send the packet type 430 to a modulation module 614.

It has been discovered that the computing system 100 can determine thepacket type 430 based on the transfer proximity 424 to improve thedetection of the source device 202, the target device 206, or acombination thereof for invoking the state transfer 210. By factoringthe transfer proximity 424, the computing system 100 can select thepacket type 430 best suited to be detected by the source device 202, thetarget device 206, or a combination. As a result, the computing system100 can improve the efficiency for invoking the state transfer 210 forenhancing the user experience for using the computing system 100, thesource device 202, the target device 206, or a combination thereof.

The packet module 610 can include the modulation module 614, which cancouple to the type module 612. The modulation module 614 generates thetransfer modulation 432. For example, the modulation module 614 cangenerate the transfer modulation 432 based on the packet type 430 forsending the communication packet 304 from the source device 202 to thetarget device 206 or vice versa.

The modulation module 614 can generate the transfer modulation 432 in anumber of ways. For example, the modulation module 614 can generate thetransfer modulation 432 based on the modulation scheme 434 of FIG. 4.More specifically, the modulation scheme 434 can include the modulationfrequency 436 of FIG. 4, the modulation amplitude 438 of FIG. 4, or acombination thereof. Furthermore, the modulation module 614 can generatethe transfer modulation 432 having a various combination of themodulation frequency 436 and the modulation amplitude 438 for sendingthe communication packet 304 between the source device 202 and thetarget device 206.

For a specific example, the modulation module 614 can generate thetransfer modulation 432 based on the transfer context 414, the transferintent 402, or a combination thereof. More specifically, the modulationmodule 614 can generate the transfer modulation 432 having themodulation amplitude 438 for the transfer context 414 of a noisy settinggreater than the modulation amplitude 438 for the transfer context 414of a quiet setting. Further, the modulation module 614 can generate thetransfer modulation 432 having the modulation frequency 436 for thetransfer context 414 of a noisy setting less than the modulationfrequency 436 for the transfer context 414 of a quiet setting.

For a different example, the modulation module 614 can generate thetransfer modulation 432 based on the packet type 430, the transfercontext 414, or a combination thereof for adjusting to the modulationscheme 434 suited for the transfer context 414. For a specific example,the packet type 430 of sound wave with the modulation frequency 436 ofless than 5 kilohertz (KHz) can be more susceptible to noise and lessdetectable by the target device 206. The modulation module 614 cangenerate the transfer modulation 432 with the modulation frequency 436of greater than 5 KHz in a noisy surrounding. In contrast, themodulation module 614 can generate the transfer modulation 432 with themodulation frequency 436 of less than 5 KHz in a quiet surrounding.

It has been discovered that the computing system 100 can generate thetransfer modulation 432 based on the transfer context 414 to improve thedetection of the source device 202, the target device 206, or acombination thereof for invoking the state transfer 210. By factoringthe transfer context 414, the computing system 100 can select thetransfer modulation 432 best suited to be detected by the source device202, the target device 206, or a combination. As a result, the computingsystem 100 can improve the efficiency for invoking the state transfer210 for enhancing the user experience for using the computing system100, the source device 202, the target device 206, or a combinationthereof.

For a different example, the modulation module 614 can generate thetransfer modulation 432 based on the urgency level 420, the reliabilitylevel 426, the sensitivity level 422, or a combination thereof foradjusting the modulation scheme 434. More specifically, the modulationmodule 614 can increase the modulation amplitude 438, can decrease themodulation frequency 436, or a combination thereof if the reliabilitylevel 426 of the transfer context 414 is determined to be low. Withlower instance of the modulation frequency 436, the communication packet304 can be less susceptible to noise, thus, more reliable. Further, inthe transfer context 414 of a noisy setting, the higher instance of themodulation amplitude 438 can overcome the noise, thus, more reliable.

In contrast, the modulation module 614 can decrease the modulationamplitude 438, can increase the modulation frequency 436, or acombination thereof if the urgency level 420 of the transfer context 414is determined to be high, the sensitivity level 422 of the object 212 isdetermined to be high, or a combination thereof. More specifically, themodulation module 614 can generate the transfer modulation 432 with thehigher instance of the modulation frequency 436 when the urgency level420, the sensitivity level 422, or a combination thereof is high thanlow to improve security. Furthermore, the modulation module 614 cangenerate the transfer modulation 432 with lower instance of themodulation amplitude 438 when the urgency level 420, the sensitivitylevel 422, or a combination thereof is high than low to make thecommunication packet 304 less susceptible to eavesdropping.

It has been discovered that the computing system 100 can generate thetransfer modulation 432 based on the urgency level 420, the reliabilitylevel 426, the sensitivity level 422, or a combination thereof toimprove the detection of the source device 202, the target device 206,or a combination thereof for invoking the state transfer 210. Byfactoring the urgency level 420, the reliability level 426, thesensitivity level 422, or a combination thereof, the computing system100 can select the transfer modulation 432 best suited to be detected bythe source device 202, the target device 206, or a combination. As aresult, the computing system 100 can improve the efficiency for invokingthe state transfer 210 for enhancing the user experience for using thecomputing system 100, the source device 202, the target device 206, or acombination thereof.

For a different example, the modulation module 614 can generate thetransfer modulation 432 based on the transfer intent 402 by placing thesource device 202 within the transfer proximity 424 from the targetdevice 206. More specifically, the modulation scheme 434 can differbased on the transfer proximity 424. For example, an instance of thetransfer proximity 424 can represent 1 meter. Another instance of thetransfer proximity 424 can represent 100 meters. The modulation module614 can generate the transfer modulation 432 having the modulationamplitude 438 with a greater value when the transfer proximity 424 is100 meters than 1 meter can generate the transfer modulation 432 havingthe modulation amplitude 438 with a greater value when the transferproximity 424 is 100 meters than 1 meter for improving detectability bythe target device 206. In contrast, the modulation module 614 cangenerate the transfer modulation 432 having the modulation frequency 436with a lesser value when the transfer proximity 424 is 100 meters than 1meter for improving detectability of the communication packet 304 by thesource device 202, the target device 206, or a combination thereof.

It has been discovered that the computing system 100 can generate thetransfer modulation 432 based on the transfer proximity 424 to improvethe detection of the source device 202, the target device 206, or acombination thereof for invoking the state transfer 210. By factoringthe transfer proximity 424, the computing system 100 can select thetransfer modulation 432 best suited to be detected by the source device202, the target device 206, or a combination. As a result, the computingsystem 100 can improve the efficiency for invoking the state transfer210 for enhancing the user experience for using the computing system100, the source device 202, the target device 206, or a combinationthereof.

For a different example, the modulation module 614 can generate thetransfer modulation 432 based on the initiation notification 442 of FIG.4, the reply notification 444 of FIG. 4, the confirmation notification446 of FIG. 4, or a combination thereof. More specifically, eachinstances of the notification type 440 of FIG. 4 can have the transfermodulation 432 that is different from one another.

For example, the initiation notification 442 can have the transfermodulation 432 with three consecutive tones with the following instancesof the modulation frequency 436: 17 KHz; 18 KHz; and 19 KHz. Morespecifically, the transfer modulation 432 can represent the modulationfrequency 436 in an ascending order. The reply notification 444 can havethe transfer modulation 432 with three consecutive tones with thefollowing instances of the modulation frequency 436 in reverse order asthe initiation notification 442: 19 KHz; 18 KHz; and 17 KHz. Morespecifically, the transfer modulation 432 can represent the modulationfrequency 436 in a descending order.

The confirmation notification 446 can have the transfer modulation 432with three consecutive tones with the following instances of themodulation frequency 436: 20 KHz; 20 KHz; and 20 KHz. More specifically,the transfer modulation 432 can represent the modulation frequency 436having same value for the tones. Each of the notification type 440 canhave the transfer modulation 432 with the modulation scheme 434 withascending order, descending order, equal value, or a combinationthereof. More specifically, each of the notification type 440 can havethe modulation amplitude 438 in ascending order, descending order, equalvalue, or a combination thereof. The packet module 610 can send thepacket type 430 with the transfer modulation 432 to a transmissionmodule 616.

It has been discovered that the computing system 100 can generate thetransfer modulation 432 based on the notification type 440 to improvethe detection of the source device 202, the target device 206, or acombination thereof for invoking the state transfer 210. By tailoringthe transfer modulation 432 according to the notification type 440, thecomputing system 100 can select the transfer modulation 432 best suitedto be detected by the source device 202, the target device 206, or acombination. As a result, the computing system 100 can improve theefficiency for invoking the state transfer 210 for enhancing the userexperience for using the computing system 100, the source device 202,the target device 206, or a combination thereof.

The computing system 100 can include the transmission module 616, whichcan couple to the packet module 610. The transmission module 616 sendsthe communication packet 304 for the notification type 440. For example,the transmission module 616 can send the communication packet for thenotification type 440 according to the transfer modulation 432.

The transmission module 616 can include an initiation module 618. Theinitiation module 618 sends the initiation notification 442. Forexample, the initiation module 618 can send the initiation notification442 based on the object activity 336, the transfer intent 402, thedevice state 404, or a combination thereof.

The initiation module 618 can send the initiation notification 442 in anumber of ways. For example, the initiation module 618 can send theinitiation notification 442 based on the object activity 336 of havingthe application 218 running and displayed on the forefront of thedisplay interface 412. For another example, the initiation module 618can send the initiation notification 442 based on the determining thetransfer intent 402 to invoke the state transfer 210. More specifically,the transfer intent 402 can be determined based on the source device 202placed within the transfer proximity 424 to the target device 206. Theinitiation module 618 can send the initiation notification 442 once thesource device 202 and the target device 206 are within the transferproximity 424.

For another example, the initiation module 618 can send the initiationnotification 442 based on the device state 404 of the source device 202.More specifically, once the device state 404 reaches the inertialstability 406, the initiation module 618 can determine that theinitiation notification 442 can be sent. The initiation module 618 canreside on the source device 202. The initiation module 618 can send theinitiation notification 442 based on the packet type 430 according tothe transfer modulation 432 to a reply module 620. The reply module 620residing in the target device 206.

The transmission module 616 can include the reply module 620, which cancouple to the initiation module 618. The reply module 620 sends thereply notification 444. For example, the reply module 620 can send thereply notification 444 based on receiving the initiation notification442, the device state 404 of the target device 206, or a combinationthereof. More specifically, the reply module 620 can send the replynotification 444 based on the device state 404 of the target device 206reaching the inertial stability 406. The reply module 620 can send thereply notification to a confirmation module 622.

The transmission module 616 can include the confirmation module 622,which can couple to the reply module 620. The confirmation module 622sends the confirmation notification 446. For example, the confirmationmodule 622 can send the confirmation notification 446 based on theinitiation notification 442 sent and the reply notification 444 receivedby the source device 202. More specifically, the confirmation module 622can send the confirmation notification 446 to the target device 206. Thetransmission module 616 can send the confirmation notification 446 to anaccess authorization module 624. The device sensing module 208 of FIG. 2can include the packet module 610 and the transmission module 616.

For illustrative purposes, the computing system 100 is described withthe transmission module 616 sending the communication packet 304 of thenotification type 440, although it is understood that the transmissionmodule 616 can operate differently. For example, the transmission module616 can include a proximity module 626 for determining the communicationproximity 448 of FIG. 4.

The proximity module 626 determines the communication proximity 448. Forexample, the proximity module 626 can determine the communicationproximity 448 based on the packet type 430, the transmission time 450 ofFIG. 4, or a combination thereof. More specifically, the proximitymodule 626 can calculate the transmission time 450 for sending thecommunication packet 304 of the packet type 430. For a specific example,the packet type 430 can represent a sound wave. The source device 202can send the initiation notification 442 to the target device 206. Theproximity module 626 can calculate the transmission time 450 between theinitiation notification 442 sent to the initiation notification 442received. The proximity module 626 can also calculate the transmissiontime 450 for the reply notification 444 and the confirmationnotification 446 similarly.

The proximity module 626 can calculate the communication proximity 448based on the transmission time 450 for the packet type 430. For example,the transmission speed 452 of FIG. 4 for the packet type 430 of a soundwave can be 343.2 meters per second. Based on the transmission speed 452and the transmission time 450, the proximity module 626 can calculatefor the communication proximity 448. The proximity module 626 can sendthe communication proximity 448 to the intent module 608, the packetmodule 610, or a combination thereof.

For illustrative purposes, the computing system 100 is described withthe intent module 608 detecting the transfer intent 402, although it isunderstood that the intent module 608 can operate differently. Forexample, the intent module 608 can update the transfer intent 402 basedon the communication proximity 448. After determining the communicationproximity 448, the intent module 608 can determine that the sourcedevice 202 and the target device 206 are no longer within the transferproximity 424. As a result, the intent module 608 can determine that theuser of the computing system 100 has no longer the transfer intent 402to invoke the state transfer 210.

For illustrative purposes, the computing system 100 is described withthe modulation module 614 determining the transfer modulation 432,although it is understood that the modulation module 614 can operatedifferently. For example, the modulation module 614 can update thetransfer modulation 432 based on the communication proximity 448. Morespecifically, based on the communication proximity 448, the modulationmodule 614 can update the modulation scheme 434 to increase or decreasethe modulation frequency 436, the modulation amplitude 438, or acombination thereof to improve the detection between the source device202 and the target device 206 within the transfer context 414.

The computing system 100 can include the access authorization module624, which can couple to the transmission module 616. The accessauthorization module 624 determines the device authorization 238 of FIG.2. For example, the access authorization module 624 can determine thedevice authorization 238 for invoking the state transfer 210 between thesource device 202 and the target device 206 after receiving theconfirmation notification 446.

The access authorization module 624 can determine the deviceauthorization 238 in a number of ways. For example, the accessauthorization module 624 can determine the device authorization 238based on the user identification 228 of FIG. 2. More specifically, ifthe source device 202 and the target device 206 are registered on thesame instance of the user identification 228, the access authorizationmodule 624 can determine the device authorization 238 of “authorized” toinitiate the state transfer 210. If not, the access authorization module624 can determine the device authorization 238 of “unauthorized.”

For a different example, the access authorization module 624 candetermine the device authorization 238 based on the deviceidentification 230 of FIG. 2. More specifically, if the deviceidentification 230 for the source device 202 and the deviceidentification 230 for the target device 206 are both registered for thestate transfer 210, the access authorization module 624 can determinethe device authorization 238 of “authorized” to initiate the statetransfer 210. If not, the access authorization module 624 can determinethe device authorization 238 of “unauthorized.”

For a different example, the access authorization module 624 candetermine the device authorization 238 based on the group identification232 of FIG. 2. More specifically, if the source device 202 and thetarget device 206 are both registered within the same instance of thegroup identification 232, the access authorization module 624 candetermine the device authorization 238 of “authorized” to initiate thestate transfer 210. If not, the access authorization module 624 candetermine the device authorization 238 of “unauthorized.” The accessauthorization module 624 can send the device authorization 238 to astate module 628. The access manager module 236 of FIG. 2 can includethe access authorization module 624.

The computing system 100 can include the state module 628, which cancouple to the access authorization module 624. The state module 628executes the state transfer 210. For example, the state module 628 canexecute the state transfer 210 based on the device authorization 238 fortransferring the object state 214 from the source device 202 to thetarget device 206.

The physical transformation for calculating the communication proximity448 results in the movement in the physical world, such as people usingthe first device 102, based on the operation of the computing system100. As the movement in the physical world occurs, the movement itselfcreates additional information that is converted back into generatingthe transfer modulation 432 for the continued operation of the computingsystem 100 and to continue movement in the physical world.

The first software 526 of FIG. 5 of the first device 102 of FIG. 5 caninclude the computing system 100. For example, the first software 526can include the activity module 602, the context module 604, thesensitivity module 606, the intent module 608, the packet module 610,the transmission module 616, the access authorization module 624, andthe state module 628.

The first control unit 512 of FIG. 5 can execute the first software 526for the activity module 602 to determine the object activity 336. Thefirst control unit 512 can execute the first software 526 for thecontext module 604 to determine the transfer context 414. The firstcontrol unit 512 can execute the first software 526 for the sensitivitymodule 606 to determine the sensitivity level 422. The first controlunit 512 can execute the first software 526 for the intent module 608 todetect the transfer intent 402.

The first control unit 512 can execute the first software 526 for thepacket module 610 to determine the packet type 430, generate thetransfer modulation 432, or a combination thereof. The first controlunit 512 can execute the first software 526 for the transmission module616 to send the initiation notification 442, the reply notification 444,the confirmation notification 446, or a combination thereof. The firstcontrol unit 512 can execute the first software 526 for the accessauthorization module 624 to determine the device authorization 238. Thefirst control unit 512 can execute the first software 526 for the statemodule 628 to initiate the state transfer 210.

The second software 542 of FIG. 5 of the second device 106 of FIG. 5 caninclude the computing system 100. For example, the second software 542can include the activity module 602, the context module 604, thesensitivity module 606, the intent module 608, the packet module 610,the transmission module 616, the access authorization module 624, andthe state module 628.

The second control unit 534 of FIG. 5 can execute the second software542 for the activity module 602 to determine the object activity 336.The second control unit 534 can execute the second software 542 for thecontext module 604 to determine the transfer context 414. The secondcontrol unit 534 can execute the second software 542 for the sensitivitymodule 606 to determine the sensitivity level 422. The second controlunit 534 can execute the second software 542 for the intent module 608to detect the transfer intent 402.

The second control unit 534 can execute the second software 542 for thepacket module 610 to determine the packet type 430, generate thetransfer modulation 432, or a combination thereof. The second controlunit 534 can execute the second software 542 for the transmission module616 to send the initiation notification 442, the reply notification 444,the confirmation notification 446, or a combination thereof. The secondcontrol unit 534 can execute the second software 542 for the accessauthorization module 624 to determine the device authorization 238. Thesecond control unit 534 can execute the second software 542 for thestate module 628 to initiate the state transfer 210.

The third software 566 of FIG. 5 of the third device 108 of FIG. 5 caninclude the computing system 100. For example, the third software 566can include the activity module 602, the context module 604, thesensitivity module 606, the intent module 608, the packet module 610,the transmission module 616, the access authorization module 624, andthe state module 628.

The third control unit 552 of FIG. 5 can execute the third software 566for the activity module 602 to determine the object activity 336. Thethird control unit 552 can execute the third software 566 for thecontext module 604 to determine the transfer context 414. The thirdcontrol unit 552 can execute the third software 566 for the sensitivitymodule 606 to determine the sensitivity level 422. The third controlunit 552 can execute the third software 566 for the intent module 608 todetect the transfer intent 402.

The third control unit 552 can execute the third software 566 for thepacket module 610 to determine the packet type 430, generate thetransfer modulation 432, or a combination thereof. The third controlunit 552 can execute the third software 566 for the transmission module616 to send the initiation notification 442, the reply notification 444,the confirmation notification 446, or a combination thereof. The thirdcontrol unit 552 can execute the third software 566 for the accessauthorization module 624 to determine the device authorization 238. Thethird control unit 552 can execute the third software 566 for the statemodule 628 to initiate the state transfer 210.

The computing system 100 can be partitioned between the first software526, the second software 542, and the third software 566. For example,the second software 542 can include the activity module 602, the contextmodule 604, the sensitivity module 606, the intent module 608, and thepacket module 610. The second control unit 534 can execute modulespartitioned on the second software 542 as previously described.

The first software 526 can include the state module 628, the accessauthorization module 624, and the initiation module 618 and theconfirmation module 622 of the transmission module 616. Based on thesize of the first storage unit 514 of FIG. 5, the first software 526 caninclude additional modules of the computing system 100. The firstcontrol unit 512 can execute the modules partitioned on the firstsoftware 526 as previously described.

The third software 566 can include the reply module 620 of thetransmission module 616. Based on the size of the third storage unit554, the third software 566 can include additional modules of thecomputing system 100. The third control unit 552 can execute the modulespartitioned on the third software 566 as previously described.

The computing system 100 describes the module functions or order as anexample. The modules can be partitioned differently. For example, theaccess authorization module 624 and the state module 628 can becombined. Each of the modules can operate individually and independentlyof the other modules. Furthermore, data generated in one module can beused by another module without being directly coupled to each other. Forexample, transmission module 616 can receive the object activity 336from the activity module 602.

The modules described in this application can be hardware circuitry,hardware implementation, or hardware accelerators in the first controlunit 512, the third control unit 552, or in the second control unit 534.The modules can also be hardware circuitry, hardware implementation, orhardware accelerators within the first device 102, the second device106, or the third device 108 but outside of the first control unit 512,the second control unit 534, or the third control unit 552,respectively.

The modules described in this application can be stored in anon-transitory computer readable medium. The first storage unit 514 ofFIG. 5, the second storage unit 546 of FIG. 5, the third storage unit554 of FIG. 5, or a combination thereof can represent the non-transitorycomputer readable medium. The first storage unit 514, the second storageunit 546, the third storage unit 554, or a combination thereof or aportion thereof can be removable from the first device 102 of FIG. 5,the second device 106 of FIG. 5, or the third device 108 of FIG. 5.Examples of the non-transitory computer readable medium can be anon-volatile memory card or stick, an external hard disk drive, a tapecassette, or an optical disk.

Referring now to FIG. 7, therein is shown a flow chart of a method 700of operation of a computing system 100 in an embodiment of the presentinvention. The method 700 includes: determining a transfer context forinvoking a state transfer between a source device and a target device ina block 702; generating a transfer modulation with a control unit basedon the transfer context for adjusting to a modulation scheme suited forthe transfer context in a block 704; and sending a communication packetbased on the transfer modulation for detecting the source device and thetarget device in a block 706.

It has been discovered that the computing system 100 determining thetransfer context 414 of FIG. 4 for the state transfer 210 of FIG. 2 canimprove the efficiency of transferring the object state 214 of FIG. 2from the source device 202 of FIG. 2 to the target device 208 of FIG. 2.By determining the transfer context 414, the computing system 100 cangenerate the transfer modulation 432 of FIG. 4 for sending thecommunication packet 304 of FIG. 3 to detect the source device 202, thetarget device 206 of FIG. 2, or a combination thereof. As a result, thecomputing system 100 can determine the device authorization 238 of FIG.2 to invoke the state transfer 210 between the source device 202 and thetarget device 206.

The resulting method, process, apparatus, device, product, and/or systemis straightforward, cost-effective, uncomplicated, highly versatile,accurate, sensitive, and effective, and can be implemented by adaptingknown components for ready, efficient, and economical manufacturing,application, and utilization. Another important aspect of the embodimentof the present invention is that it valuably supports and services thehistorical trend of reducing costs, simplifying systems, and increasingperformance. These and other valuable aspects of the embodiment of thepresent invention consequently further the state of the technology to atleast the next level.

While the invention has been described in conjunction with a specificbest mode, it is to be understood that many alternatives, modifications,and variations will be apparent to those skilled in the art in light ofthe aforegoing description. Accordingly, it is intended to embrace allsuch alternatives, modifications, and variations that fall within thescope of the included claims. All matters set forth herein or shown inthe accompanying drawings are to be interpreted in an illustrative andnon-limiting sense.

What is claimed is:
 1. A computing system comprising: a context moduleconfigured to determine a transfer context for invoking a state transferbetween a source device and a target device; a modulation module,coupled to the context module, configured to generate a transfermodulation based on the transfer context for adjusting to a modulationscheme suited for the transfer context; and a transmission module,coupled to the modulation module, configured to send a communicationpacket based on the transfer modulation for detecting the source deviceand the target device.
 2. The system as claimed in claim 1 wherein thetransmission module includes an initiation module configured to send aninitiation notification with the transfer modulation different from thetransfer modulation of a reply notification, a confirmationnotification, or a combination thereof.
 3. The system as claimed inclaim 1 wherein the transmission module includes a reply moduleconfigured to send a reply notification with the transfer modulationdifferent from the transfer modulation of an initiation notification, aconfirmation notification, or a combination thereof.
 4. The system asclaimed in claim 1 wherein the transmission module includes aconfirmation module configured to send a confirmation notification withthe transfer modulation different from the transfer modulation of aninitiation notification, a reply notification, or a combination thereof.5. The system as claimed in claim 1 wherein the modulation module isconfigured to generate the transfer modulation based on a modulationfrequency, a modulation amplitude, or a combination thereof.
 6. Thesystem as claimed in claim 1 wherein the modulation module is configuredto generate the transfer modulation based on an urgency level of thetransfer context for adjusting the modulation scheme.
 7. The system asclaimed in claim 1 wherein the modulation module is configured togenerate the transfer modulation based on a reliability level of thetransfer context for adjusting the modulation scheme.
 8. The system asclaimed in claim 1 wherein the modulation module is configured togenerate the transfer modulation based on a sensitivity level of anobject for adjusting the modulation scheme.
 9. The system as claimed inclaim 1 further comprising an intent module, coupled to the contextmodule, configured to determine a transfer intent for a transfer typebased on a user's behavior for invoking the state transfer.
 10. Thesystem as claimed in claim 1 further comprising an intent module,coupled to the context module, configured to determine the transferintent based on a device state for invoking the state transfer.
 11. Amethod of operation of a computing system comprising: determining atransfer context for invoking a state transfer between a source deviceand a target device; generating a transfer modulation with a controlunit based on the transfer context for adjusting to a modulation schemesuited for the transfer context; and sending a communication packetbased on the transfer modulation for detecting the source device and thetarget device.
 12. The method as claimed in claim 11 wherein sending thecommunication packet includes sending an initiation notification withthe transfer modulation different from the transfer modulation of areply notification, a confirmation notification, or a combinationthereof.
 13. The method as claimed in claim 11 wherein sending thecommunication packet includes sending a reply notification with thetransfer modulation different from the transfer modulation of aninitiation notification, a confirmation notification, or a combinationthereof.
 14. The method as claimed in claim 11 wherein sending thecommunication packet includes sending a confirmation notification withthe transfer modulation different from the transfer modulation of aninitiation notification, a reply notification, or a combination thereof.15. The method as claimed in claim 11 wherein generating the transfermodulation includes generating the transfer modulation based on amodulation frequency, a modulation amplitude, or a combination thereof.16. A non-transitory computer readable medium comprising: determining atransfer context for invoking a state transfer between a source deviceand a target device; generating a transfer modulation based on thetransfer context for adjusting to a modulation scheme suited for thetransfer context; sending a communication packet based on the transfermodulation for detecting the source device and the target device; anddetermining a device authorization based on the communication packet forexecuting the state transfer between the source device and the targetdevice.
 17. The non-transitory computer readable medium as claimed inclaim 16 wherein generating the transfer modulation includes generatingthe transfer modulation based on an urgency level of the transfercontext for adjusting the modulation scheme.
 18. The non-transitorycomputer readable medium as claimed in claim 16 wherein generating thetransfer modulation includes generating the transfer modulation based ona reliability level of the transfer context for adjusting the modulationscheme.
 19. The non-transitory computer readable medium as claimed inclaim 16 wherein generating the transfer modulation includes generatingthe transfer modulation based on a sensitivity level of an object foradjusting the modulation scheme.
 20. The non-transitory computerreadable medium as claimed in claim 16 further comprising determining atransfer intent for a transfer type based on a user's behavior forinvoking the state transfer.