Micro-interactions with NFC-Enabled Mobile Phones
This paper coins the term micro-interactions to refer to the class of small exchanges between devices that occur almost instantaneously. For example, a mobile payment using near-field communication (NFC) is a micro-interaction. The arrival of NFC on smart phones makes possible a wide array of applications using micro-interactions, from sharing photos between a phone and a TV to checking a car into a valet parking service by touching two phones.
This paper addresses the challenge of how to create intuitive, frictionless micro-interactions that require no pre-configuration for a large class of applications. We deliver a consistent tap-and-share interface for many forms of micro-interactions through several concepts. We propose interaction manifests as universal descriptors of multi-party, cross-platform applications. Zero-click overheads are made possible by automatically using the foreground application as the context for the micro-interactions. We extend the concept of connection handovers to allow NFC-enabled applications to run unmodified on devices lacking NFC. We also show how these abstractions make it easy to create a variety of applications. All the application and library code is available as open source.
We demonstrate that by focusing on micro-interactions, our mobile phones can provide a single focal point that enables sharing of our digital identity, assets, applications, and personality with friends (with their mobile phones) as well as the larger-screen PCs and TVs all around us.
KeywordsMobile Phone Smart Phone Mobile Payment Remote Device Application Session
Unable to display preview. Download preview PDF.
- 2.Richard, A.: Bolt. “put-that-there:” voice and gesture at the graphics interface. In: Proceedings of the 7th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1980, pp. 262–270. ACM, New York (1980)Google Scholar
- 5.NFC Forum. Nfc forum technical specifications (2010), http://www.nfc-forum.org/specs/spec_list
- 7.Google. Near field communication (2011), http://developer.android.com/guide/topics/nfc/index.html#p2p
- 8.Junction, http://openjunction.org
- 10.Olsen, D.R., Travis Nielsen, S., Parslow, D.: Join and capture: A model for nomadic interaction. In: Proceedings of 14th Annual ACM Symposium on User Interface Software and Technology, pp. 131–140. Press (2001)Google Scholar
- 11.O’Neill, E., Thompson, P., Garzonis, S., Warr, A.: Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 19–36. Springer, Heidelberg (2007)CrossRefGoogle Scholar
- 12.Oulasvirta, A., Sumari, L.: Mobile kits and laptop trays: managing multiple devices in mobile information work. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 1127–1136. ACM, New York (2007)Google Scholar
- 15.Pierce, J.S., Nichols, J.: An infrastructure for extending applications’ user experiences across multiple personal devices. In: Proceedings of the 21st Annual ACM Symposium on User Interface Software and Technology, UIST 2008, pp. 101–110. ACM, New York (2008)Google Scholar
- 16.Juniper Research. 1 in 5 Smartphones will have NFC by 2014 (2011), http://www.msnbc.msn.com/id/42584660/ns/business-press_releases/
- 17.Saxena, N., Uddin, M.B., Voris, J.: Universal device pairing using an auxiliary device. In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, pp. 56–67. ACM, New York (2008)Google Scholar
- 19.Schmidt, D., Chehimi, F., Rukzio, E., Gellersen, H.: Phonetouch: a technique for direct phone interaction on surfaces. In: Proceedings of the 23rd Annual ACM Symposium on User Interface Software and Technology, UIST 2010, pp. 13–16. ACM, New York (2010)Google Scholar
- 21.Tang, J.C., Lin, J., Pierce, J., Whittaker, S., Drews, C.: Recent shortcuts: using recent interactions to support shared activities. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 1263–1272. ACM, New York (2007)Google Scholar
- 22.Bump Technologies, http://bu.mp
- 23.Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. Technical report. In Usable Security, USEC (2007)Google Scholar
- 24.Want, R., Fishkin, K.P., Gujar, A., Harrison, B.L.: Bridging physical and virtual worlds with electronic tags (1999)Google Scholar