Smart Tags with Multiple Interactions

ABSTRACT

A method for Near Field Communication (NFC) based interactions can be implemented by a device when it is placed near an NFC tag and receives an electromagnetic signal associated with the NFC tag. The device retrieves the identifier of the NFC tag from the electromagnetic signal and, based on the identifier, the device can generate a first command. Furthermore, the device can identify a qualifying event, such as a predetermined orientation of the device. The device then generates a second command in response to the identification of the qualifying event. Each of the first and second command can cause a change in settings of the device, switching an operating mode of the device, activating/deactivating an application, enabling/disabling a feature of an application, and sending an instruction to a remote electronic device.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 15/697,126, filed on Sep. 6, 2017 and titled “Smart Tags withMultiple Interactions,” which is hereby incorporated by reference hereinin its entirety, including all references and appendices cited therein.

BACKGROUND Technical Field

This disclosure generally relates to interactions of Near FieldCommunication (NFC) tags with devices (e.g., mobile devices). Moreparticularly, this disclosure relates to devices and method forNFC-based interactions that involve generating one or more commands bythe devices based on detecting one or more NFC tags by the devices anddetermining one or more qualifying events by the devices.

Description of Related Art

The use of NFC tags, such as those that interact with smartphones, havebecome common in many aspects of human life as they enhance thefunctionality of a device (e.g., a mobile device). For example, NFC tagscan be used to gain access to a building, grant an entitlement, direct auser to a website, make a payment, open an application, etc. An NFC tagis typically write protected and includes unique information thatdetermines the action performed when a mobile device or reader interactswith the tag. Devices will typically read an NFC tag once and performone action, limiting the functionality of the NFC tag. In addition, NFCchips are being built into an increasing number of devices and can alsobe implanted into individuals. Thus, improvements to interactions withNFC tags and NFC chips are needed.

SUMMARY

This section is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription section. This summary is not intended to identify keyfeatures or essential features of the claimed subject matter, nor is itintended to be used as an aid in determining the scope of the claimedsubject matter. The following concepts and aspect of the disclosure aredesigned to solve at least some drawbacks known in the art. Thediscussion of devices include mobile devices, and the discussion ofapplications include mobile applications.

In one embodiment of this disclosure, there is provided a method forNFC-based interactions. The method can comprise receiving, by a device,an electromagnetic signal of a NFC tag when the device is within a firstpredetermined distance from the NFC tag, retrieving, by the device, anidentifier of the NFC tag from the electromagnetic signal of the NFCtag, and, based on the identifier, generating, by the device, a firstcommand, wherein the first command is configured to cause performing oneor more of the following: change at least one setting of the device,switch at least one of operating modes of the device, activate at leastone application, deactivate at least one application, enable at leastone feature of at least one application, disable at least one feature ofat least one application, and send a first instruction to at leastremote electronic device.

The method can further include identifying, by the device, a qualifyingevent before or after the first command is generated, and, based on theidentification of the qualifying event, generating, by the device, asecond command, wherein the second command is generated after the firstcommand, and wherein the second command is configured to causeperforming one or more of the following: change at least one of thesettings of the device, switch at least one of the operating modes ofthe device, activate at least one of the applications, deactivate atleast one of the applications, enable at least one feature of at leastone of the applications, disable at least one feature of at least one ofthe applications, and send a second instruction to at least one of theremote electronic devices.

In certain embodiments, the method may further comprise suppressing, bythe device, the generation or use of the first command when thequalifying event is identified. In some embodiments, the identificationof the qualifying event includes determining, by the device, that thedevice is located within the first predetermined distance from the NFCtag for a predetermined period. In other embodiments, the identificationof the qualifying event can include determining, by the device, that thedevice is orientated substantially upside down such that a display ofthe device is substantially parallel to the ground and faces the ground.

In yet other embodiments, the identification of the qualifying event caninclude determining, by the device, that the device is locked. In yetother embodiments, the identification of the qualifying event caninclude determining, by the device, that the device is unlocked. In yetother embodiments, the identification of the qualifying event caninclude determining, by the device, that the device is located within asecond predetermined distance from a predetermined geographical locationassociated with the identifier of the NFC tag.

In certain embodiments, the method may further comprise providing, bythe device, a first notification to a user when the first command isgenerated or to be generated by the device. In certain embodiments, themethod may further comprise providing, by the device, a secondnotification to the user when the second command is generated or aboutto be generated by the device. Moreover, in some embodiments, the firstnotification is a vibrational notification generated by the device, andthe second notification is a doubled vibrational notification generatedby the device.

In another aspect of this disclosure, there is provided a device. Thedevice comprises an NFC communication module configured to wirelesslycommunicate with one or more NFC tags, a processor, and a memory storingprocessor-executable codes. The processor can be configured to implementthe following operations upon executing the processor-executable codesstored by the memory: cause reading of an electromagnetic signal of oneof the NFC tags when the device is within a first predetermined distancefrom the NFC tag, cause retrieving an identifier of the NFC tag from theelectromagnetic signal of the NFC tag, based on the identifier, causegenerating a first command, wherein the first command is configured tocause performing one or more of the following: change at least onesetting of the device, switch at least one of operating modes of thedevice, activate at least one of applications, deactivate at least oneof the applications, enable at least one feature of at least one of theapplications, disable at least one feature of at least one of theapplications, and send a first instruction to at least one of remoteelectronic devices; cause identifying a qualifying event before or afterthe first command is generated; and, based on the identification of thequalifying event, cause generating a second command, wherein the secondcommand is generated after the first command, and wherein the secondcommand is configured to cause performing one or more of the following:change at least one of the settings of the device, switch at least oneof the operating modes of the device, activate at least one of theapplications, deactivate at least one of the applications, enable atleast one feature of at least one of the applications, disable at leastone feature of at least one of the applications, and send a secondinstruction to at least one of the remote electronic devices.

In other embodiments, an NFC chip can be on the person, as an adhesiveor wearable device. An NFC chip can be implanted within a person. An NFCtag can also be used to control certain actions within a video game,depending on the location of a controller relative to the user with theNFC tag, as well as on the manner in which the controller is beinghandled by the user.

In another embodiment, the implanted or wearable NFC chip can be used asan authentication device for a laptop, a device, a door lock, or aportable lock such as one for a bicycle or locker, in combination with aseries of interactions that can be used to enforce dual factorauthentication.

In yet another aspect of the disclosure, there is provided anon-transitory processor-readable medium having instructions storedthereon, which when executed by one or more processors, cause the one ormore processors to implement the above-outlined method for NFC-basedinteraction.

Additional objects, advantages, and novel features of the examples willbe set forth in part in the description, which follows, and in part willbecome apparent to those skilled in the art upon examination of thefollowing description and the accompanying drawings or may be learned byproduction or operation of the examples. The objects and advantages ofthe concepts may be realized and attained by means of the methodologies,instrumentalities and combinations particularly pointed out in theappended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments are illustrated by way of example and not limitation in thefigures of the accompanying drawings, in which like references indicatesimilar elements.

FIG. 1 shows a block diagram illustrating a system for providingNFC-based interactions.

FIG. 2 is a process flow diagram showing a method for NFC-basedinteractions.

FIG. 3 shows an example computer system that can be used to implement atleast some operations of a method for NFC-based interactions.

Corresponding reference characters indicate corresponding componentsthroughout the several views of the drawings. Skilled artisans willappreciate that elements in the figures are illustrated for simplicityand clarity and have not necessarily been drawn to scale. For example,the dimensions of some of the elements in the figures may be exaggeratedrelative to other elements to help to improve understanding of variousembodiments of the present disclosure. In addition, common butwell-understood elements that are useful or necessary in a commerciallyfeasible embodiment are often not depicted in order to facilitate a lessobstructed view of these various embodiments of the present disclosure.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS

The present disclosure generally relates to systems and methods forproviding or improving interaction with a device based on NFC tags. NFCtags can be also referred to as “smart tags” or Radio-FrequencyIdentification (RFID) tags, and the like. NFC tags can be implemented asstickers, key fobs, or in any other similar manner so that they can befixed, mounted, connected, or otherwise coupled to certain items indoorsor outdoors. For example, NFC stickers can be placed near a bed, on akitchen table, door, inside vehicle, and the like. A device includesmobile devices, and an application includes mobile applications.

To interact with NFC tags, a user can use a device, such as asmartphone, which has a NFC communication module configured towirelessly communicate with one or more NFC tags when the device is in avicinity of NFC tags (e.g., at a distance less than about 2 inches).Each NFC tag can be uniquely identified as it bears a unique identifier.When the device reads an electromagnetic signal generated by the NFCtag, the device can detect or retrieve the unique identifier of the NFCtag. Furthermore, as a response to the identification of the uniqueidentifier of the NFC tag, the device can perform pre-programmedoperations associated with the unique identifier. The pre-programmedoperations can cause a change in settings of the device, cause switchingbetween operating modes of the device, cause activating/deactivating ofan application, cause enabling/disabling a feature of the application,or cause sending an instruction to a remote electronic device. Forexample, placing the device in a vicinity of one of the NFC tags coupledto a couch, could activate a remote control application on the device toenable a remote control application to control a television (TV) deviceby the user. In another example, placing the device close to another NFCtag attached to a refrigerator can activate a tracking feature of thedevice or application to track amount of water that the user drinks.

Each NFC tag includes a passively emitting device not requiringelectrical power as it emits signals in response to a wireless signalreceived from the device. In some example embodiments, the longest sideof the NFC tag can be, optionally, of about one inch or less. NFC tagscan be of different colors such as white, black, red, blue, green,yellow, metallic, transparent, and so forth. Furthermore, each tag caninclude a chip and a communication module having a coil or an antenna.The chip can be configured to cause the communication module to emit acertain electromagnetic signal bearing a unique identifier of an NFCtag, for example, as a response to a received signal from a device. EachNFC tag can include an adhesive layer so that it can be used as asticker. Moreover, users can secure NFC tags with magnets, pins, orclips so that they can be easily transportable from one location toanother.

The device can be programmed before it can interact with NFC tags. Tothese ends, after placing the NFC tag at a desired location, the usercan open a certain application and place the device near the NFC tag.The user would need to pre-program and indicate what actions oroperations the device is to perform upon sensing the electromagneticsignal bearing the unique identifier of the NFC tag. For example, theuser can set up IFTTT (If This Then That) commands to be executed uponsensing the electromagnetic signal bearing the unique identifier of theNFC tag. The user can also set up the device such that the presence ofthe NFC tag would open and perform actions by one or more specificapplications of the device. Moreover, two or more actions can beavailable for every NFC tag. For example, a first action can initiatewith a tap or placement of the device in a vicinity of an NFC tag. Thedevice can send a notification such as a vibrational notification whenthe first action is successfully initiated or completed or about to beinitiated.

Furthermore, upon detection of certain qualifying event, a second actioncan be initiated by the device. For instance, if the user holds thedevice over the NFC tag after the first notification for a predeterminedperiod, the first action can be suppressed and the second action can beinitiated instead of the first action. In this case, the device cannotify the user with a second notification such as a double vibration.Confirmations (vibrations or audible beeps) can be enabled or disabledfor each NFC tag individually. After the NFC tag is registered with theuser's device, the user can move the NFC tag and/or set it to performother operations without the need to re-register the NFC tag with thedevice. In some embodiments, the users can also initiate actionsdirectly on the application for all of their registered NFC tags.

The following describes some example scenarios of using NFC tags tocause implementations of certain predetermined actions by a device. Inone example, an NFC tag can be added to a magnet to be placed on arefrigerator. When a user taps a device on the NFC tag, it causes afitness tracking application or nutrition tracking application to add upa cup of water to a user's account. However, if the user holds thedevice near the NFC tag for a predetermined period, the device causesthe opening of a food tracking form of the nutritional applicationinstead of adding a cup of water. In another example, an NFC tag can beadded to a pin to be placed on a shirt of a user such that when the userplaces his mobile device close to the NFC tag, it causes the opening ofa favorite mobile game or another application.

In an alternative embodiment, when the NFC tag is placed on a couch, thedevice can open a remote control application if the device comes intoclose contact with the NFC tag. In yet additional example, a NFC tag canbe glued to a clip. The clip can be attached to food packaging such as asnack box. When the user taps the mobile device over the NFC tag, thedevice can automatically record the number of snacks the user eats. Ifthe NFC tag is placed inside a car, the application can automaticallycause opening a garage door when the device comes into a close proximityof the NFC tag.

According to some embodiments, there can be some additional ways tointeract with NFC tags, which can cause implementation of one or moreactions upon detecting NFC tags by a device and upon identifying one ofa plurality of qualifying events. The qualifying events can be asfollows: a device taps a NFC tag (e.g., a brief touch of the NFC tag bythe device), an orientation of the device (e.g., upside down), a stateof the device (e.g., locked or unlocked), a period of holding the deviceclose to the NFC tag, a geographical location of the device (e.g., itcan be determined if the device is close to a predetermined location oritem).

The following detailed description of embodiments includes references tothe accompanying drawings, which form a part of the detaileddescription. Approaches described in this section are not prior art tothe claims and are not admitted to be prior art by inclusion in thissection. Reference throughout this specification to “one embodiment,”“an embodiment,” “some embodiments,” “some implementations” or similarlanguage means that a particular feature, structure, or characteristicdescribed in connection with an example implementation is included in atleast one embodiment of the present disclosure. Thus, appearances of thephrases “in one embodiment,” “in an embodiment,” “in some embodiments,”and similar language throughout this specification may, but do notnecessarily, all refer to the same embodiment.

Furthermore, the described features, structures, or characteristics ofembodiments may be combined in any suitable manner in one or moreimplementations. In the following description, numerous specific detailsare provided, such as examples of programming, software modules, userselections, network transactions, hardware modules, hardware circuits,hardware chips, etc., to provide a thorough understanding ofembodiments. One skilled in the relevant art will recognize, however,that the embodiments can be practiced without one or more of thespecific details, or with other methods, components, materials, and soforth. In other instances, well-known structures, materials, oroperations are not shown or described in detail to avoid obscuringaspects of the disclosure.

Aspects of the embodiments of this disclosure will now be presented withreference to accompanying drawings which show blocks, components,circuits, steps, operations, processes, algorithms, and the like,collectively referred to as “elements” for simplicity. These elementsmay be implemented using electronic hardware, computer software, or anycombination thereof. Whether such elements are implemented as hardwareor software depends upon the particular application and designconstraints imposed on the overall system. By way of example, anelement, or any portion of an element, or any combination of elementsmay be implemented with a “processing system” that includes one or moreprocessors. Examples of processors include microprocessors,microcontrollers, Central Processing Units (CPUs), digital signalprocessors (DSPs), field programmable gate arrays (FPGAs), programmablelogic devices (PLDs), state machines, gated logic, discrete hardwarecircuits, and other suitable hardware configured to perform variousfunctions described throughout this disclosure. One or more processorsin the processing system may execute software, firmware, or middleware(collectively referred to as “software”). The term “software” shall beconstrued broadly to mean processor-executable instructions, instructionsets, code segments, program code, programs, subprograms, softwarecomponents, applications, software applications, software packages,routines, subroutines, objects, executables, threads of execution,procedures, functions, and the like, whether referred to as software,firmware, middleware, microcode, hardware description language, orotherwise.

Accordingly, in one or more embodiments, the functions described hereinmay be implemented in hardware, software, or any combination thereof. Ifimplemented in software, the functions may be stored on or encoded asone or more instructions or code on a non-transitory computer-readablemedium. Computer-readable media includes computer storage media. Storagemedia may be any available media that can be accessed by a computer. Byway of example, and not limitation, such computer-readable media cancomprise a random-access memory (RAM), a read-only memory (ROM), anelectrically erasable programmable ROM (EEPROM), compact disk ROM(CD-ROM) or other optical disk storage, magnetic disk storage, solidstate memory, or any other data storage devices, combinations of theaforementioned types of computer-readable media, or any other mediumthat can be used to store computer executable code in the form ofinstructions or data structures that can be accessed by a computer.

For purposes of this patent document, the terms “or” and “and” shallmean “and/or” unless stated otherwise or clearly intended otherwise bythe context of their use. The term “a” shall mean “one or more” unlessstated otherwise or where the use of “one or more” is clearlyinappropriate. The terms “comprise,” “comprising,” “include,” and“including” are interchangeable and not intended to be limiting. Forexample, the term “including” shall be interpreted to mean “including,but not limited to.”

The term “mobile device” shall be construed to mean any electronicdevice configured to process digital data and wirelessly communicatewith one or more NFC tags using NFC or similar technology. By way ofexample, and not limitation, some examples of mobile devices include auser device, cellular phone, user equipment, terminal, mobile phone,smart phone, Internet phone, tablet computer, laptop computer, personaldigital assistant, music player, multimedia player, gaming device, gameconsole, and so forth.

The term “remote electronic device” shall be construed to mean anyelectronic device configured to implement one or more actions based oninstructions or commands generated by a mobile device. By way ofexample, and not limitation, some examples of remote electronic devicesinclude a computing device, navigation system, television (TV) device,set-top box, multimedia system, multimedia player, display, speaker,network device, modem, network router, network hub, home gateway,broadband gateway, network appliance, access gateway, networking switch,entertainment system, infotainment system, in-vehicle computer, homeappliance (e.g., a dish washing machine, refrigerator, oven, etc.),“smart” appliance, electronically operated door, access control system,security system, programmable electrical socket, programmable electricalswitch, dimmer, intercom, telephone, fax machine, server, web service,online service, electrical elements of “smart” home, Internet-of-Thingsdevices, and the like.

The term “NFC tag” shall be construed to mean an electronic apparatusconfigured to actively or passively emit an electromagnetic signalbearing a unique identifier of NFC tag and, optionally, otherinformation. Passive NFC tags are powered by and read at short rangesvia magnetic fields so that they emit electromagnetic waves conveyingcertain information. In other words, the passive NFC tag, when powered,emits an electromagnetic signal. The passive NFC tag can be powered byelectromagnetic field generated by a mobile device. Active NFC tags arepowered by a local power source, such as a battery, and repeatedly emitan electromagnetic signal bearing a unique identifier of NFC tag and,optionally, other information. Some examples of NFC tags can include,but not limited to, RFID tags, RFID labels, transponders, Wi-Fi emittertags, Bluetooth emitter tags, Wi-Fi beacons, Bluetooth beacons, and soforth.

Referring now to the drawings, example embodiments are described. Thedrawings are schematic illustrations of idealized example embodiments.Thus, the example embodiments discussed herein should not be construedas limited to the particular illustrations presented herein, ratherthese example embodiments can include deviations and differ from theillustrations presented herein.

FIG. 1 shows a block diagram illustrating a system 100 for providingNFC-based interactions according to one example embodiment. System 100includes a device 105, such as a smart phone, which can interact withone or more NFC tags 110. Each NFC tag 110 can include at least a chip115, such as a microcontroller, microprocessor, circuit, logic, and thelike. Each NFC tag 110 can also include a communication module 120including, for example, an antenna or coil. The NFC tag 110 may also notinclude the communication module 120. If the NFC tag 110 does containthe communication module 120, the communication module 120 can beconfigured to receive a first electromagnetic signal originated fromdevice 105 (e.g., a signal to power NFC tag 110 and request a response).Communication module 120 can be also configured to transmit or emit asecond electromagnetic signal for further reception by device 105. Thesecond electromagnetic signal can be generated as a response to thefirst electromagnetic signal. The second electromagnetic signal caninclude a unique identifier of NFC tag 110 and, optionally, otherinformation such as predetermined commands, instructions, locationinformation, and so forth. The elements of NFC tag 110, including chip115 and communication module 120, can be arranged in a housing orsubstrate 125. Substrate 125 can be rigid or flexible. Each of NFC tags110 can be also equipped with an adhesive layer 130 attached to anexternal side of housing or substrate 125. NFC tags 110 can be of anydesired color and shape. For example, NFC tags 110 can be implemented asstickers or key fobs. NFC tags 110 can be placed, mounted, fixed, glued,attached, pinned, or otherwise connected to various items indoors oroutdoors. For example, NFC tags 110 can be attached to apparel,furniture, vehicle, computer, building elements, and so forth.

Device 105 includes at least a NFC communication module 135, a processor140, and a memory 145 for storing processor-executable instructions.Other elements of device 105 shall be evident from FIG. 3 and itsrespective description which follows. NFC communication module 135 isconfigured to communicate with NFC tag 110 for, at least, receiving thesecond electromagnetic signal. Communication between NFC communicationmodule 135 and NFC tag 110 can be successful only when NFC tag 110 iswithin a predetermined distance from NFC communication module 135, suchas, less than ten inches, preferably less than two inches. NFCcommunication module 135 can also generate the first electromagneticsignal and emit it for further receipt by NFC tags 110. Upon receipt ofthe second electromagnetic signal by device 105, the secondelectromagnetic signal can be processed by processor 140 to retrieve theunique identifier of NFC tag 110. Further, processor 140 can executeprocessor-executable instructions stored in memory 145 to causeimplementation of one or more predetermined or preprogrammed actionsassociated with the unique identifier as a response to receipt of thesecond electromagnetic signal.

Processor 140 can also identify one or more identifying events, such asa period of presence of device 105 near a particular NFC tag 110,determination of a current geographical location of device 105,determination of a current orientation of device 105, determination of acurrent status of device 105 (e.g., if it is locked or unlocked), and soforth. The determination of geographical location of device 105 can beimplemented with the help of a Global Positioning System (GPS) module oranother common device for determining a geographical location, which canbe installed in device 105. The determination of current orientation ofdevice 105 can be determined with the help of inertial sensors,gyroscopes, or motion sensors, which can be installed in device 105.Determination of a period indicating how long device 105 is located neara particular NFC tag 110 can be executed with the help of a clock, whichcan be installed in device 105.

As indicated above, device 105 can execute one or more actions asresponse to detection of NFC tag 110 or detection of one of qualifyingevent. Some examples of these “actions” include, but not limited to,causation of changing a setting of the device, causation of switching anoperating mode of the device, causation of activating/deactivating theapplication, causation of enabling/disabling a feature of theapplication, and the like. In some embodiments, an action can be acausation of sending a predetermined instruction to one or more remoteelectronic device 150. The instruction can be sent via a communicationsnetwork 155. Communications network 155 can refer to any wired,wireless, or optical networks including, for example, the Internet,intranet, local area network (LAN), Personal Area Network (PAN), WideArea Network (WAN), Virtual Private Network (VPN), cellular phonenetworks (e.g., packet switching communications network, circuitswitching communications network), Bluetooth radio, Ethernet network, anIEEE 802.11-based radio frequency network, IP communications network, orany other data communication network utilizing physical layers, linklayer capability, or network layer to carry data packets, or anycombinations of the above-listed data networks.

FIG. 2 is a process flow diagram showing a method 200 for NFC-basedinteraction according to an example embodiment. Method 200 may beperformed by processing logic that may comprise hardware (e.g.,decision-making logic, dedicated logic, programmable logic,application-specific integrated circuit (ASIC)), software (such assoftware run on a general-purpose computer system or a dedicatedmachine), or a combination of both. In one example embodiment, theprocessing logic refers to one or more elements of device 105 of FIG. 1.Below recited operations of method 200 may be implemented in an orderdifferent than described and shown in the figure. Moreover, method 200may have additional operations not shown herein, but which can beevident for those skilled in the art from the present disclosure. Method200 may also have fewer operations than outlined below and shown in FIG.2.

At operation 205, device 105 receives an electromagnetic signal of NFCtag 110 when device 105 is within a first predetermined distance fromthe NFC tag (e.g., less than two inches). The electromagnetic signal ofNFC tag 110 can be received in response to another electromagneticsignal generated by device 105.

At operation 210, device 105 retrieves an identifier of NFC tag 110 fromthe electromagnetic signal received at operation 205. The identifier canuniquely identify NFC tag 110. Device 105 can include one or moresettings associated with the identifier of NFC tag 110.

At operation 215, device 105 generates a first command based on theidentifier. The first command is configured to cause performing one ormore of the following: change at least one setting of device 105, switchat least one of operating modes of device 105, activate at least one ofthe applications of device 105, deactivate at least one of theapplications of device 105, enable at least one feature of at least oneof the applications of device 105, disable at least one feature of atleast one of the applications of device 105, and send a firstinstruction to at least one of remote electronic devices 150. Further,at operation 215, device 105 can generate a first notification (such asan audio alert, displayable message, or vibration alert) and deliver itto the user prior to or after the generation of first command.

At operation 220, device 105 identifies a qualifying event before orafter the first command is generated. In some embodiments, theidentification of the qualifying event can include determining, bydevice 105, that device 105 is located within the first predetermineddistance from NFC tag 110 for a predetermined period (e.g., 1, 2, 3, 4,5 or more seconds). In some embodiments, the identification of thequalifying event can include determining, by device 105, that device 105is orientated substantially upside down such that a display of device105 is substantially parallel to and faces the ground. In someembodiments, the identification of the qualifying event can includedetermining, by device 105, that device 105 is locked. In someembodiments, the identification of the qualifying event can includedetermining, by device 105, that device 105 unlocked. In someembodiments, the identification of the qualifying event can includedetermining, by device 105, that device 105 is located within a secondpredetermined distance (e.g., less than 5 feet) from a predeterminedgeographical location associated with the identifier of NFC tag 110.This predetermined geographical location associated with the identifiercan be, for example, a garage door, piece of furniture, a particularroom or office in a building, outdoor location, vehicle, and so forth.

At operation 225, device 105 generates a second command based on theidentification of the qualifying event. In one embodiment, the secondcommand is generated after the first command is generated. In anotherembodiment, the second command is generated and the first command issuppressed upon identification of the qualifying event. The secondcommand can be configured to cause performing one or more of thefollowing: change at least one setting of device 105, switch at leastone of operating modes of device 105, activate at least one of theapplications of device 105, deactivate at least one of the applicationsof device 105, enable at least one feature of at least one of theapplications of device 105, disable at least one feature of at least oneof the applications of device 105, authenticate the identity of anindividual, enable at least one or more additional immersiveinteractions with the at least one application, and send a secondinstruction to at least one of remote electronic devices 150. Further,at operation 225, device 105 can generate a second notification (such asan audio alert, displayable message, or a double vibration notification)and deliver it to the user prior to or after the generation of secondcommand.

FIG. 3 is a high-level block diagram illustrating a computing device 300suitable for implementing the methods described herein. In particular,computing device 300 may be used for implementing the methods forNFC-based interaction as described above. Computing device 300 mayinclude, be, or be an integral part of one or more of a variety of typesof devices, such as a mobile device, among others. In some embodiments,computing device 300 can be regarded as an instance of device 105.

As shown in FIG. 3, computing device 300 includes one or more processors310, memory 320, one or more mass storage devices 330, one or moreoutput devices 350, one or more input devices 360, one or more networkinterfaces 370, one or more optional peripheral devices 380, and acommunication bus 390 for operatively interconnecting the above-listedelements. Processor(s) 310 can be configured to implement functionalityand/or process instructions for execution within computing device 300.For example, processor(s) 310 may process instructions stored in memory320 or instructions stored on mass storage devices 330. Suchinstructions may include components of an operating system or softwareapplications.

Memory 320, according to one example, is configured to store informationwithin computing device 300 during operation. For example, memory 320can store settings or pre-programmed commands associated with one ormore NFC tags 110. Memory 320, in some example embodiments, may refer toa non-transitory computer-readable storage medium or a computer-readablestorage device. In some examples, memory 320 is a temporary memory,meaning that a primary purpose of memory 320 may not be long-termstorage. Memory 320 may also refer to a volatile memory, meaning thatmemory 320 does not maintain stored contents when memory 320 is notreceiving power. Examples of volatile memories include RAM, dynamicrandom access memories (DRAM), static random access memories (SRAM), andother forms of volatile memories known in the art. In some examples,memory 320 is used to store program instructions for execution byprocessor(s) 310. Memory 320, in one example, is used by softwareapplications or mobile applications. Generally, software or mobileapplications refer to software applications suitable for implementing atleast some operations of the methods as described herein.

Mass storage devices 330 can also include one or more transitory ornon-transitory computer-readable storage media or computer-readablestorage devices. For example, memory 320 can store instructions forprocessor 310, settings or pre-programmed commands associated with oneor more NFC tags 110. In some embodiments, mass storage devices 330 maybe configured to store greater amounts of information than memory 320.Mass storage devices 330 may be also configured for long-term storage ofinformation. In some examples, mass storage devices 330 includenon-volatile storage elements. Examples of such non-volatile storageelements include magnetic hard discs, optical discs, solid-state discs,flash memories, forms of electrically programmable memories (EPROM) orelectrically erasable and programmable memories, and other forms ofnon-volatile memories known in the art.

Computing device 300 may also include one or more optional inputdevice(s) 360. Input device(s) 360 may be configured to receive inputfrom a user through tactile, audio, video, or biometric channels.Examples of input devices 360 may include a keyboard, keypad, mouse,trackball, touchscreen, touchpad, microphone, video camera, imagesensor, fingerprint sensor, or any other device capable of detecting aninput from a user or other source, and relaying the input to computingdevice 300 or components thereof.

Optional output device(s) 350 may be configured to provide output to auser through visual or auditory channels. Output device(s) 350 mayinclude a video graphics adapter card, display, such as liquid crystaldisplay (LCD) monitor, light emitting diode (LED) monitor, or organicLED monitor, sound card, speaker, lighting device, projector, or anyother device capable of generating output that may be intelligible to auser. Output device(s) 350 may also include a touchscreen,presence-sensitive display, or other input/output capable displays knownin the art.

Computing device 300 can also include network interface(s) 370. Networkinterface(s) 370 can be utilized to communicate with external devicesvia one or more communications networks such as communications network155 or any other wired, wireless, or optical networks. Networkinterface(s) 370 may be a network interface card, such as an Ethernetcard, an optical transceiver, a radio frequency transceiver, or anyother type of device that can send and receive information. Networkinterface(s) 370 can also include a NFC communication module 135 forcommunicating, sensing, or receiving data from NFC tags 110.

An operating system of computing device 300 may control one or morefunctionalities of computing device 300 or components thereof. Forexample, the operating system may interact with the software or mobileapplications and may facilitate one or more interactions between thesoftware/mobile applications and processor(s) 310, memory 320, massstorage devices 330, input device(s) 360, output device(s) 350, andnetwork interface(s) 370. The operating system may interact with or beotherwise coupled to software applications or components thereof. Insome embodiments, software or mobile applications may be included in theoperating system.

Thus, methods and systems for NFC-based interactions have beendescribed. Although embodiments have been described with reference tospecific example embodiments, it will be evident that variousmodifications and changes can be made to these example embodimentswithout departing from the broader spirit and scope of the presentapplication. Accordingly, the specification and drawings are to beregarded in an illustrative rather than a restrictive sense.

What is claimed is:
 1. A method for Near Field Communication (NFC) basedinteraction, the method comprising: receiving, by a device, anelectromagnetic signal of a NFC tag; retrieving, by the device, anidentifier of the NFC tag from the electromagnetic signal of the NFCtag; based on the identifier, generating, by the device, a firstcommand, wherein the first command is configured to cause performing oneor more of the following: change at least one setting of the device,switch at least one of operating modes of the device, activate at leastone of applications, deactivate at least one of the applications, enableat least one feature of at least one of the applications, disable atleast one feature of at least one of the applications, and send a firstinstruction to at least one of remote electronic devices; identifying,by the device, a qualifying event; and based on the identification ofthe qualifying event, generating, by the device, a second command,wherein the first command is suppressed based on the identification ofthe qualifying event, and wherein the second command is configured tocause performing one or more of the following: change at least one ofthe settings of the device, switch at least one of the operating modesof the device, activate at least one of the applications, deactivate atleast one of the applications, enable at least one feature of at leastone of the applications, disable at least one feature of at least one ofthe applications, and send a second instruction to at least one of theremote electronic devices.
 2. The method of claim 1, wherein the firstcommand and the second command are configured by the user prior toreceiving the electromagnetic signal of the NFC tag.
 3. The method ofclaim 1, wherein the identifying of the qualifying event includesdetermining, by the device, that the device is located within a firstpredetermined distance from the NFC tag for a predetermined period. 4.The method of claim 1, wherein the identifying of the qualifying eventincludes determining, by the device, that the device is orientatedsubstantially upside down such that a display of the device issubstantially parallel to a ground and faces the ground.
 5. The methodof claim 1, wherein the identifying of the qualifying event includesdetermining, by the device, that the device is locked.
 6. The method ofclaim 1, wherein the identifying of the qualifying event includesdetermining, by the device, that the device is unlocked.
 7. The methodof claim 1, wherein the identifying of the qualifying event includesdetermining, by the device, that the device is located within a secondpredetermined distance from a predetermined geographical locationassociated with the identifier of the NFC tag.
 8. The method of claim 1,further comprising providing, by the device, a first notification to auser when the first command is generated or is to be generated by thedevice.
 9. The method of claim 8, further comprising providing, by thedevice, a second notification to the user when the second command isgenerated or is to be generated by the device.
 10. The method of claim9, wherein the first notification is a vibrational notificationgenerated by the device, and the second notification is a doubledvibrational notification generated by the device.
 11. A device,comprising: a NFC communication module configured to wirelesslycommunicate with one or more NFC tags; a processor; and a memory storingprocessor-executable codes, wherein the processor is configured toimplement the following operations upon executing theprocessor-executable codes stored by the memory: cause reading anelectromagnetic signal of one of the NFC tags; cause retrieving anidentifier of the NFC tag from the electromagnetic signal of the NFCtag; based on the identifier, cause generating a first command, whereinthe first command is configured to cause performing one or more of thefollowing: change at least one setting of the device, switch at leastone of operating modes of the device, activate at least one ofapplications, deactivate at least one of the applications, enable atleast one feature of at least one of the applications, disable at leastone feature of at least one of the applications, and send a firstinstruction to at least one of remote electronic devices; causeidentifying a qualifying event; and based on the identification of thequalifying event, cause generating a second command, wherein the firstcommand is suppressed based on the identification of the qualifyingevent, and wherein the second command is configured to cause performingone or more of the following: change at least one of the settings of thedevice, switch at least one of the operating modes of the device,activate at least one of the applications, deactivate at least one ofthe applications, enable at least one feature of at least one of theapplications, disable at least one feature of at least one of theapplications, and send a second instruction to at least one of theremote electronic devices.
 12. The device of claim 11, wherein thequalifying event is identified when it is determined that the device islocated within a first predetermined distance from the NFC tag for apredetermined period.
 13. The device of claim 11, wherein the qualifyingevent is identified when it is determined that the device is orientatedsubstantially upside down such that a display of the device issubstantially parallel to a ground and faces the ground.
 14. The deviceof claim 11, wherein the qualifying event is identified when it isdetermined that the device is locked.
 15. The device of claim 11,wherein the qualifying event is identified when it is determined thatthe device is unlocked.
 16. The device of claim 11, wherein thequalifying event is identified when it is determined that the device islocated within a second predetermined distance from a predeterminedgeographical location associated with the identifier of the NFC tag. 17.The device of claim 11, wherein the processor is further configured toimplement the following operations upon executing theprocessor-executable codes stored by the memory: cause providing a firstnotification to a user when the first command is generated or is to begenerated by the device.
 18. The device of claim 17, wherein theprocessor is further configured to implement the following operationsupon executing the processor-executable codes stored by the memory:cause providing a second notification to the user when the secondcommand is generated or is to be generated by the device.
 19. The deviceof claim 18, wherein the first notification is a vibrationalnotification generated by the device, and the second notification is adoubled vibrational notification generated by the device.
 20. Anon-transitory processor-readable medium having instructions storedthereon, which when executed by one or more processors, cause the one ormore processors to implement a method for NFC based interaction, themethod comprising: receiving, by a device, an electromagnetic signal ofa NFC tag; retrieving, by the device, an identifier of the NFC tag fromthe electromagnetic signal of the NFC tag; based on the identifier,generating, by the device, a first command, wherein the first command isconfigured to cause performing one or more of the following: change atleast one setting of the device, switch at least one of operating modesof the device, activate at least one of applications, deactivate atleast one of the applications, enable at least one feature of at leastone of the applications, disable at least one feature of at least one ofthe applications, and send a first instruction to at least one of remoteelectronic devices; identifying, by the device, a qualifying event; andbased on the identification of the qualifying event, generating, by thedevice, a second command, wherein the first command is suppressed basedon the identification of the qualifying event, and wherein the secondcommand is configured to cause performing one or more of the following:change at least one of the settings of the device, switch at least oneof the operating modes of the device, activate at least one of theapplications, deactivate at least one of the applications, enable atleast one feature of at least one of the applications, disable at leastone feature of at least one of the applications, and send a secondinstruction to at least one of the remote electronic devices.