Micro-interactions with NFC-Enabled Mobile Phones

This paper coins the term micro-interactions to refer to the class of small exchanges between devices that occur almost instantaneously. For example, a mobile payment using near-field communication (NFC) is a micro-interaction. The arrival of NFC on smart phones makes possible a wide array of applications using micro-interactions, from sharing photos between a phone and a TV to checking a car into a valet parking service by touching two phones.

[1]  Ors Yalcin,et al.  Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers , 2010, RFIDSec.

[2]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[3]  Richard A. Bolt,et al.  “Put-that-there”: Voice and gesture at the graphics interface , 1980, SIGGRAPH '80.

[4]  Vibhor Sharma,et al.  Near Field Communication , 2013, Encyclopedia of Biometrics.

[5]  Jakob E. Bardram,et al.  Activity-based computing: support for mobility and collaboration in ubiquitous computing , 2005, Personal and Ubiquitous Computing.

[6]  Rafael Ballagas,et al.  Spontaneous marriages of mobile devices and interactive spaces , 2005, CACM.

[7]  Frank Vahid,et al.  Enabling nonexpert construction of basic sensor-based systems , 2009, TCHI.

[8]  Mark W. Newman,et al.  Experiences with recombinant computing: Exploring ad hoc interoperability in evolving digital networks , 2009, TCHI.

[9]  Roy Want,et al.  Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.

[10]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[11]  Nitesh Saxena,et al.  Universal device pairing using an auxiliary device , 2008, SOUPS '08.

[12]  Antti Oulasvirta,et al.  Mobile kits and laptop trays: managing multiple devices in mobile information work , 2007, CHI.

[13]  Dan R. Olsen,et al.  Join and capture: a model for nomadic interaction , 2001, UIST '01.

[14]  Andrew D. Wilson,et al.  BlueTable: connecting wireless mobile devices on interactive surfaces using vision-based handshaking , 2007, GI '07.

[15]  Eamonn O'Neill,et al.  Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices , 2007, Pervasive.

[16]  Bill N. Schilit,et al.  Looking across four system layers — link , network , data , and application — the authors survey the technologies , standards , and leading-edge research making device ensembles a reality , 2022 .

[17]  Gerhard P. Hancke,et al.  Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.

[18]  R. W. Peterson,et al.  OPTICAL INTERFEROMETRY OF SURFACES , 1991 .

[19]  Ersin Uzun,et al.  Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.

[20]  René Mayrhofer,et al.  Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.

[21]  John C. Tang,et al.  Recent shortcuts: using recent interactions to support shared activities , 2007, CHI.

[22]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[23]  A BoltRichard,et al.  Put-that-there , 1980 .

[24]  David Dearman,et al.  It's on my other computer!: computing with multiple devices , 2008, CHI.

[25]  Barbara Rosario,et al.  Enabling Pervasive Collaboration with Platform Composition , 2009, Pervasive.

[26]  Dominik Schmidt PhoneTouch: a technique for direct phone interaction on surfaces , 2010, ITS '10.

[27]  Jeffrey Nichols,et al.  An infrastructure for extending applications' user experiences across multiple personal devices , 2008, UIST '08.