Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PERIPHERAL DEVICE PAIRING
Document Type and Number:
WIPO Patent Application WO/2017/030584
Kind Code:
A1
Abstract:
Examples monitor a communication network to detect a peripheral device. Examples pair with the peripheral device responsive to detecting the peripheral device. Examples generate a peripheral application query corresponding to the peripheral device responsive to pairing with the peripheral device, and examples query a peripheral application server with the peripheral application query to retrieve a peripheral application corresponding to the peripheral device.

Inventors:
HANES DAVID H (US)
Application Number:
PCT/US2015/046007
Publication Date:
February 23, 2017
Filing Date:
August 20, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HEWLETT PACKARD DEVELOPMENT CO LP (US)
International Classes:
H04W76/02; G06F13/14; H04W8/00
Foreign References:
US20140222864A12014-08-07
US20130003630A12013-01-03
US8542834B12013-09-24
US20110098000A12011-04-28
KR20090124588A2009-12-03
Other References:
See also references of EP 3326425A4
Attorney, Agent or Firm:
MORRIS, Jordan E. et al. (US)
Download PDF:
Claims:
CLAIMS:

1. A non-transitory machine readable storage medium comprising tnstructtons executabie by a processing resource to cause a computing device to:

monitor a wireless communication network to detect a peripheral device; in response to detecting the peripheral device, pair with the peripheral device over the wireless communication network;

determine identification information associated with the peripheral device; in response to pairing with the peripheral device, generate a peripheral application query corresponding to the peripheral device based at least in part on the identification information; and

query a peripheral application server with the peripheral application query to retrieve a peripheral application corresponding to the peripheral device.

2. The non-transitory machine readable storage medium of claim 1 further comprising instructions to cause the computing device to:

determine whether a wireless communication network interface of the computing device is enabled,

wherein the instructions cause the computing device to monitor the wireless communication network, pair with the peripheral device, determine the identification information associated with the peripheral device, generate the peripheral application query, and query the peripheral application server responsive to determining that the wireless communication network interface of the computing device is enabled.

3. The non-transitory machine readable storage medium of claim 1 further comprising instructions to cause the computing device to:

generate a pairing prompt at the computing device responsive to detecting the peripheral device set to pairing mode,

wherein the instructions cause the computing device to pair with the peripheral device, generate the peripheral application query, and query the peripheral application server are responsive to receiving a pairing confirmation corresponding to the pairing prompt.

4. The non-transitory machine readable storage medium of claim , the instructions to monitor the wireless communication network comprise instructions to:

analyze peripheral device connection information associated with the peripheral device to determine whether the peripheral devtce is within a pairing proximity of the computing device,

wherein the instructions cause the computing device to pair with the peripheral device, generate the peripheral application query, and query the peripheral application server responsive to determining that the peripheral device is within a pairing proximity of the computing device.

5. The non-transitory machine readable storage medium of claim 1 , wherein the wireless communication network is a Bluetooth network.

8. The non-transitory machine readable storage medium of claim 1 , further comprising instructions to cause the computing device to:

in response to retrieving the peripheral application, execute the peripheral application.

7. The non-transitory machine readable storage medium of claim 1 , wherein the identification information comprises a manufacturer identifier and a product identifier, and the instructions to generate the peripheral application query comprise instructions to cause the computing device to:

generate a peripheral application identifier based at least in part on the manufacturer identifier and the product identifier. 8, A computing device comprising:

a peripheral device monitoring engine to monitor a wireless

communication network to detect a peripheral device;

a pairing engine to pair the computing device with the peripheral device responsive to detecting the peripheral device;

a peripheral application query engine to, responsive to pairing the computing device wit the peripheral device, generate a peripheral appiicatson query corresponding to the peripheral device, and the peripheral application query engine further to query a peripheral application server based on the peripherai application query to retrieve a peripheral appiicatson corresponding to the peripheral device; and

a processing engine to execute the peripheral application responsive to retrieving the peripheral application.

9. The computing device of claim 8, wherein the peripherai device monitoring engine to monitor the wireless communication network to detect the peripherai device comprises the peripheral device monitoring engine to:

detect a broadcast packet of the peripheral device communicated on the wireless communication network.

10, The computing device of claim 8, wherein the peripherai device monitoring engine monitors the wireless communication network based on a peripherai device scan interval.

11. The computing dev ce of claim 8, wherein the pairing engine is further to: determine identification information associated with the peripheral device; and

determine whether to pair the computing device with the peripheral device based at least in part on the identification information associated with the peripherai device.

12. The computing device of claim 8, further comprising;

a network interface device,

wherein the peripherai device monitoring engine is to monitor the wireiess communication network responsive to the network interface device being enabled.

13. A method comprising;

monitoring, with a processing resource of a computing device and according to a scan interval, a communication network to detect a peripheral device for pairing with the computing device;

in response to detecting the peripheral device for pairing with the computing device, determining identification information associated with the peripheral device;

determining whether to pair the peripheral device with the computing device based at least in part on the identification information associated with the peripherai device;

in response to determining to pair the peripherai device with the computing device:

dynamically generating a peripheral application query based at least in part on the identification information associated with the peripheral device;

querying a peripheral application server based on the peripheral application query to retrieve a peripheral application corresponding to the peripheral device; and

pairing the peripheral device with the computing device.

14. The method of claim 13, wherein the identification information associated with the peripheral device comprises a vendor identifier and a product identifier, and determining whether to pair the peripheral device with the computing device is based at least in part on the vendor identifier, the product identifier, and an approved device database associated with the computing device.

15. The method of ciaim 13, wherein determining whether to pair the periphera! device with the computing device is based at ieast in part on whether the peripheral device is set to a pairing mode, and

wherein the periphera! device has not been previously paired with the computing device.

Description:
PERIPHERAL DEVICE PAIRING

BACKGROUND

[0001] For some computing devices, peripheral devices may be used to facilitate interface with the computing device, in addition, some computing devices may communicate data with computing devices. Examples of a peripheraS device include, for examp!e, a keyboard, mouse, touchscreen, and/o other such devices.

DRAWINGS

[0002] FIG. 1 A is a block diagram of an example computing device, [0003] FIG. 1B is a block diagram of an example computing device.

[0004] FIG, 1C is a b!ock diagram of an example computing device.

[0005] FIG. 2 is a block diagram of an example computing device.

[0006] FIG, 3 is a block diagram of an example implementation of an example computing device, an example peripheral device, and an example peripheral application server.

[0007] FIG. 4 is a flowchart that illustrates an example sequence of operations that may be performed by an example computing device.

[0008] FIG. 5 is a flowchart that illustrates an example sequence of operations that may be performed by an example computing device.

[0009] FIG, 8 is a flowchart that illustrates an example sequence of operations thai may be performed by an example computing device.

[0010] Throughout the drawings, identical reference numbers designate similar, but not necessarily identical, elements. Moreover the drawings provide examples and/or impiemeniations consistent with the description; however, the description is not limited to the examples and/or implementations provided in the drawings. DESCRIPTION

[0011] Generally, a computing device may connect to one or more peripheral devices that facilitate interface with the computing device, Some example peripheral devices generally used with computing devices include a keyboard, a mouse, a speaker, a microphone, a headset, a touchscreen, an image scanner, a printing device, a projector, a graphic tablet, a smartphone, etc. As technoiogy improves, the connection between peripheral devices and a computing device have increasingly been implemented over wireless

communication networks. In addition, technological advances have led to the networking of various home-centric devices (ofte referred to as smart-home devices), such that examples of peripheral devices include appliances, fixtures, televisions, sensors, power outlets, light-bulbs, control panels, heating and cooling equipment, thermostats, solar panels, water filters, etc,

[001 ] In such examples, connecting a peripheral device and a

computing device may be referred to as pairing. Generally, pairing refers to establishing a connection between two devices, such as a computing device and a peripheral device. When a connection is established such that the two devices may communicate data therebetween, the devices may be referred to as being paired. As a particular example, a computing device may be paired with a wireless mouse, in this particular example, a user may input data to the computing device through operation of the wireless mouse, where the wireless mouse may translate movement of the mouse and actuation of one or more buttons into user input data that may be communicated to the computing device.

[0013] Another example ma be a smartphone (or other such portable computing device) that is paired to a wireless headset, where the wireless headset may receive audio data from the smartphone to output with a speaker of the headset. The wireless headset may capture audio with a microphone of the headset, encode the captured audio to generate audio input data, and communicate the encoded audio input data to the smartphone,

[0014] As another example, a tablet computing device (or other such portable computing device) may be paired with a smart home device, such as a networking capable light-bulb (a smart iight-buSb). in this example, the tablet computing device may interface with the smart home device to controi the smart home device via user input at the tablet computing device (e.g., turn the smart tight-buib on/off). Similarly, the smart home device may communicate relevant data to the tablet computing device (e.g., power usage data for the smart light- bulb exampie).

[0015] To operate with some peripheral devices that connect over wireless communication networks, a peripheral application corresponding to a peripheral device may be loaded/installed/executed on a computing device. As illustrated by the example peripheral devices described above, the types of data and the format of such data generally varies based on the type and

vendor/manufacturer of the peripheral device. Generaiiy, a corresponding peripheral application facilitates interface between the peripheral device and the computing device. For some examples of a peripheral device, a peripherai application may be distributed with the peripheral device by storing the peripherai application in a machine-readable medium, in other examples of a peripherai device, a user ma be provided with a resource Sink (such as a Universal Resource Locator) at which a peripherai application may be located for loading on a connected computing device, in these examples, further user action may be needed after pairing with a peripheral device before the peripheral device may be operable with the computing device.

[0018] Examples provided herein generaiiy facilitate dynamic pairing of a computing device with a peripheral device. In particular, examples may monitor a communication network to detect a peripheral device. The computing device may automatically pair with a detected peripheral device, and the computing device may dynamicall retrieve and execute a peripheral application corresponding to the peripheral device. Therefore, examples ma streamiine a pairing and configuration process for a computing device and a peripherai device. Generally, dynamic pairing generally refers to the automated implementation by which a particular peripherai device is paired to a computing device based on characteristics (such as a vendor and product type) of the peripherai device, in particular, examples may dynamically generate a peripheral device specific peripheral application query by which to facilitate retrieval of a peripheral device specific peripheral application. Dynamic

generation of the peripheral application query generally refers to the automated generation of the quer based on characteristics of the peripheral device, such as identification information associated with the peripheral device.

[0017] Turning now to FIGS. 1A-C, these figures provide block diagrams that illustrate examples of a computing device 100, Examples of a computing device as disclosed herein include a personal computer, a portable electronic device (e.g., a smart phone, a tablet, a laptop, a wearable device, etc.), a workstation, smart device, server, a processing node of a server, a data center comprising a plurality of servers, a printing device, and/or any other such data processing devices. In the examples, the computing device 100 comprises a processing resource 102 and a machine-readable storage medium 104, which may be referred to as a memory and/or a memory resource. In the examples described herein, a processing resource 102 may include at least one hardware-based processor. Furthermore, the processing resource 102 may include one processor or multiple processors, where the processors may be configured in a single computing device 100 or distributed across multiple computing devices connected locally and/or remotely. As will be appreciated, a processing resource 102 may comprise one or more general purpose data processors and/or one or more specialized data processors. For example, the processing resource 102 may comprise a central processing unit (CPU), a graphics processing unit (GPU), an application-specific integrated circuit (ASIC), and/or other such configurations of logical components for data processing.

[0018] The machine-readable storage medium 104 may represent the random access memory (RAM) devices comprising the main storage of the example computing device 100, as weii as any supplemental levels of memory, e.g., cache memories, non-volatile or backup memories (e.g., programmabie or flash memories), read-only memories, etc. In addition, machine-readable storage medium 104 may be considered to include memory storage physically located eisewhere, e.g., any cache memory in a microprocessor, as weii as any storage capacity used as a virtual memory, e.g., as stored on a mass storage device or on another computing device in communication with the example computing device 100. Furthermore, the machine-readable storage medium 104 may be non-transitory. In some examples, the processing resource 102 and machine-readable storage medium 104 may correspond to processing units and memory devices arranged in at ieast one server.

[0019] Generally, the machine-readable storage medium 104 may be encoded with and/or store instructions that may be executable by the processing resource 02, where execution of such instructions may cause the processing resource 102 and/or computing device 100 to perform the functionalities, processes, and/or sec-uences of operations described herein, in the example of FIGS, 1A-C, the machine-readable storage medium 104 comprises instructions to monitor a wireless communication network to detect a peripherai device 106; instructions to pair the computing device 00 with the peripheral device over the wireless communication network in response to detecting the peripherai device 108; instructions to determine identification information associated with the peripherai device 110; instructions to generate a peripherai appfication quer corresponding to the peripheral device based at least in part on the identification information in response to pairing with the peripherai device 112; and instructions to query a peripherai application server with the peripherai application query to retrieve a peripheral application corresponding to the peripheral device 1 14.

[0020] In addition, as shown in the example computing device 00 of

FiG. 18, the machine-readable storage medium 104 may further comprise instructions to determine whether a wireless communication network interface is enabled for the computing device 118, in some examples, the machine- readable storage medium 104 may comprise instructions to generate a pairing prompt responsive to detecting the peripheral device 1 18, Furthermore, as shown in the example of FiG. 1 C. the machine-readabie storage medium 104 may further comprise instructions to analyze peripheral device connection information to determine whether the peripheral device is within a pairing proximity 120.

[0021] While not shown in FIGS. 1A-C, for interface with a user or operator, some example computing devices may include a user Interface incorporating one or more user input output devices, e.g., one or more buttons, a display, a touchscreen, a speaker, etc. The user interface may therefore communicate data to the processing resource and receive data from the processing resource. For example, a user may input one or more selections via the user interface, and the processing resource may cause data to be output on a screen or other output device of the user interface, Furthermore, the computing device may comprise a network interface device. Generally, the network interface device comprises one or more hardware devices to communicate data over one or more communication networks, such as a network interface card,

[0022] FIG, 2 provides a block diagram of an example computing device 200. In the example, the computing device 200 comprises a system 202 including engines 204-210, Engines, as described herein, may be any combination of hardware and programming to implement the functionalities of the respective engines. In some examples described herein, the combinations of hardware and programming may be implemented in a number of different ways. For example, the programming for the engines may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the engines may inciude a processing resource to execute those instructions.

[0023] In thes examples, a computing device implementing such engines may include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separately stored and accessible by the computing device and the processing resource, in some examples, engines may be implemented in circuitry. Moreover, processing resources used to implement engines may comprise one or more central processing units (CPU), one or more graphics processing units (GPU), one or more application specific integrated circuits (ASICs), and/or other such types of logical components that may be implemented for data processing.

[0024] In the example computing device 200 of FIG. 2, the computing device 200 includes a peripheral device monitoring engine 204 to monitor a ireiess communication network to detect a peripheral device, in addition, the computing device 200 includes a pairing engine 206 to pair the computing device with the peripheral device responsive to detecting the peripherai device. The computing device 200 further comprises a peripheral application query engine 208 to, responsive to pairing the computing device to the peripheral device, generate a peripheral application query corresponding to the peripheral device. The peripherai application query engine is further to query a peripherai application server based on the peripherai application query to retrieve a peripheral appiication corresponding to the peripheral device. Furthermore, the computing device 200 includes a processing engine 210 to execute the peripherai appiication responsive to retrieving the peripheral application.

[0025] FIG, 3 provides a block diagram of an example implementation of an example computing device 300, an example peripherai device 302, and an example peripheral application server 304. in this example, the computing device 300, peripherai device 302, and peripherai appiication server 304 may be in communication over a communication network 306, Generally, the communication network 306 may comprise the Internet, a local area network (LAN), a wide area network {WAN), a ceiluiar voice/data network, a personal area network (PAN) (e.g., Bluetooth network, wireless USB network, IrDA network, ZigBee network, etc.), one or more high speed bus connections, and/o othe suc types of communication networks. As will be appreciated, in some examples the communication network 306 may generally comprise a combination of one or more types of communication networks. In some examples, the wireless communication network through which the computing device may pair with a peripheral device may comprise a wireless PAN (e.g., a Bluetooth network), a wireless LAN network (e.g., Wi-Fi network), and/or other such types of wireless communication networks.

[0026] In the example implementation shown in FIG, 3, the computing device 300 comprises a peripherai device monitoring engine 308 to monitor the communication network 306 to detect a peripheral device 302 for pairing. In response to detecting the peripherai device 302, a pairing engine 310 of the computing device 300 pairs the computing device 300 with the peripherai device 302, In response to pairing the computing device 300 and the peripheral device 302, a peripheral application query engine 312 of the computing device 300 generates a peripheral application query corresponding to the peripheral device 302. In addition, the peripheral application query engine 312 queries the peripheral application server 304 over the communication network 306 based at least in part on the peripheral application query to retrieve a peripheral application corresponding to the peripheral device 302, In response to retrieving the peripheral application, a processing engine 314 of the computing device 300 executes the peripheral applicatio such that interfacing between the paired computing device 300 and peripheral device 302 is facilitated.

[0027] As shown in the example of FIG. 3, the computing device 300 further includes a network interface device 318. Generally, the network interface device 316 comprises one or more hardware devices to communicate data over one or more communication networks, such as a network interface card. For example, the network interface device 318 comprises hardware devices for communication over a Bluetooth network (e.g., a Bluetooth network adapter), a wireless communication network (e.g., a Wi-Fi adapter), and/or communication over a wired communication network (e.g.. a LAN adapter). As will be appreciated, the network interface device 316 may comprise various implementations of hardware devices. I some examples, the network interface device 316 and/or some component hardware devices thereof may be enabled/disabled to turn on/off communication over the communication network 306,

[0028] In addition, the computing device 300 comprises a user interface 318. Generally, the user interface 318 incorporates one or more user input output devices, e.g., one or more buttons, a display, a touchscreen, a speaker, etc. The user interface may therefore communicate data to the processing resource and receive data from the processing resource. For example, a user may input one or more selections via the user interface, and the processing resource may cause data to be output on a screen or other output device of the user interface. In some examples, the computing device 300 may generate a pairing prompt at the computing device for output to a user with the user interface 318. In these examples, a user may be prompted to confirm pairing with the peripheral device 302 prior to pairing of the computing device 300 and the peripheral device 302. A user may input a pairing confirmation corresponding to the pairing prompt, and responsive to receiving the pairing confirmation, the computing device 300 may proceed with pairing the computing device 300 and peripheral device 302,

|0029] Furthermore, in this example, the computing device 300 comprises a memory resource 320 storing an approved device database 322. The memory resource 320 may comprise random access memory (RAM) devices comprising the main storage of the example computing device 300, as well as any supplemental levels of memory, e.g., cache memories, non-volatile or backup memories (e,g,, programmable or flash memories), read-only memories, etc. In addition, memory resource 320 may be considered to include memory storage physically located elsewhere, e.g., any cache memory in a microprocessor, as well as any storage capacity used as a virtual memory, e.g., as stored on a mass storage device or on another computing device in communication with the example computing device 300. Furthermore, the memory resource 320 may be non-transitory.

[0030] The approved device database 322 generally stores information regarding various peripheral devices approved for automatic/dynamic pairing and automatic execution of corresponding peripheral applications. In some examples, the approved device database 322 includes manufacturer/vendor information that indicates vendors of peripheral devices approved for streamlined pairing. In some examples, the approved device database 322 includes product information for various products approved fo streamlined pairing. Generally, the approved device database 322 may be arranged with any database organization and/or structure including, but not limited to, a relational database, a hierarchical database, a network database, and/or combinations thereof, A database management system in the form of a an application executing as instructions on a processing resource of the computing device 300 may be used to access the information or data stored in records of the database 322 in response to a query, where a query may be dynamically determined and executed by the computing device and/or an engine thereof.

[0031] For example, prior to pairing the peripheral device 302 with the computing device 300, the pairing engine 310 may generate a query for the approved device database 322 based at least in part on identification information associated with the peripheral device 302 to determine whether the peripheral device 302 is approved for pairing with the computing device 300. In such examples, the identification information may comprise a vendor identifier and a product identifier associated with the peripheral device 302. The pairing engine 310 may query the approved device database 322 based at least in part on the vendor identifier and the product identifier to determine whether the peripheral device 302 is approved for pairing and/or automatic retrieval and execution of a peripheral application corresponding to the peripheral device 302.

[0032] In addition, the example peripheral application server 304 comprises a peripheral application database 324 s where the peripheral application database 324 generally stores peripheral applications corresponding to various types of peripheral devices. In some examples, the peripheral application database may store peripheral applications based at least in part on a vendor identifier and/or a product identifier of peripheral devices. For example, the peripheral applications stored in the peripheral application database 324 may be stored with file names based at Ieast in part on the vendor identifier and/or the product identifier. As discussed, the peripheral application query engine 312 of the computing device 300 may generate a peripheral application query corresponding to the peripheral device 302 with which to query the peripheral application server 304 and the peripheral application database 324 thereof to retrieve a peripheral application

corresponding to the peripheral device 302, In some examples, the peripheral application query engine 312 may determine identification information (e.g., a vendor identifier and/or a product identifier) for the peripheral device 302, and the peripheral application query engine 312 may generate a file name based at least in part on the identification information. The peripheral application server 304 and the peripheral application database 324 thereof may be queried based at feast in part on the file name.

[0033] The example impiemeniation provided in FIG. 3 generally

illustrates one peripheral device 302 and one peripheral application server 304. However, it will be appreciated, that other examples may include one or more peripheral devices 302 and/or peripheral application servers 304, Therefore, the operations generally described with respect to the example implementation may be performed concurrently for a plurality of peripheral devices 302 via communication with a plurality of peripheral application servers 304.

[0034] For example, a Bluetooth mouse and a Bluetooth keyboard may be concurrently paired with a computing device. In this example, the peripheral application corresponding to the Bluetooth mouse and the peripheral application corresponding to the Bluetooth keyboard may be concurrently retrieved and executed as described herein. Similarly, in a smart home application, a plurality of smart home devices may be detected concurrently by a computing device over a communication network (such as a home network with Wi-Fi and/or Ethernet connections). The computing device may concurrently pair with each of the plurality of smart home devices. The computing device may generate a peripheral application query for each of the smart home devices. The computing device may query one or more respective peripheral application servers with the peripheral application queries to retrieve a peripheral application corresponding to each smart home device, and the computing device may execute each peripheral application for each smart home device concurrently.

[0035] FIGS. 4-6 provide flowcharts that provide example sequences of operations that may be performed by an example computing device and/or a processing resource thereof to perform example processes and methods. In some examples, the operations included in the flowcharts may be embodied in a memory resource (such as the example machine-readable storage mediums 104 of FIGS, 1A-C) in the form of instructions that may be executable by a processing resource to cause the computing device (e.g., the computing device 100 of FIGS. 1A-C, the computing devices 200, 300 of FIGS. 2-3, etc.) to perform the operations corresponding to the instructions. Additionally, the examples provided in FIGS. 4-6 may be embodied in computing devices, machine-readable storage mediums, processes, and/or methods, in some examples, the example processes and/or methods disclosed in the flowcharts of FIGS. 4-6 may be performed by one or more engines implemented in a computing device, such as the example engines 204-210, 308-314 of FIGS. 2 and 3.

[0036] Turning now to FIG, 4, this figure provides a flowchart 400 that illustrates an example sequence of operations that may be performed by an example computing device to pair a peripheral device with the computing device. The computing device monitors a communication network according to a scan interval to detect a peripheral device for pairing with the computing device (blocks 402-404). In some examples, a scan interval may be

implemented for the computing device such that the computing device is not constantly monitoring a communication network for peripheral devices (which may !ead to high energy usage and/or shortened battery life). The scan interval may be a defined time, such as 30 seconds, 1 minute, 5 minutes, etc.

Generally, the scan interval may be based at least in part on application of the computing device and/or peripheral devices. While the computing device does not detect any peripheral devices for pairing {"H" branch of block 404), the computing device continues monitoring the communication network according to the scan interval (block 402). in some examples, the computing device may detect a peripheral device by detecting a broadcast packet generated by the peripheral device and communicated on the communication network. In other examples, the computing device may detect the periphera! device connected to the communication network by scanning the network.

[0037] In response to detecting a peripheral device for pairing ("Y" branch of block 404), the computing device determines identification information associated with the periphera! device {block 406). As discussed previously, identification information may comprise a vendor identifier and/or a product identifier, The vendor and/or product identifiers may be unique alphanumeric identifiers that may be used to identify the type of peripheral device. Generally, identification information may be communicated from the peripheral device to the computing device upon detection of the periphera! device by the computing device. Based on the identification information, the computing system determines whether to pair the peripheral device with the computing system (block 408). In some examples, the computing system may query an approved device database based at least in part on the identification information to determine whether to pair the peripheral device with the computing system, [0038] in response to determining not to pair the peripheral device with the computing device fN" branch of block 408), the computing system may ignore the peripheral device (block 410), and the computing system may continue monitoring the communication network for other peripheral devices (block 402).

[0039] In response to determining to pair the periphera! device with the computing device (Ύ * branch of biock 408), the computing device generates a peripheral application query associated with the peripheral device based at least in part on the identification information (biock 412). For example, if a periphera! device has a vendor identifier of 0x3F0 and a product identifier of 0x064C, the computing device may determine that a periphera! application having a file name including 03F0084C should be retrieved, and the computing device may generate a peripheral application query associated with the file name. As will be appreciated, various correlations between a vendor identifier and/or product identifier may be implemented for retrieving a corresponding peripheral application.

[0040] The computing device queries a peripheral application server based on the periphera! application query to retrieve a periphera! application corresponding to the peripheral device (block 414), and the computing device pairs the peripheral device with the computing device (block 416). In some examples, the computing device may execute the periphera! application responsive to retrieving the periphera! application (block 418).

[0041] FIG. 5 provides a flowchart 500 that illustrates an example sequence of operations that may be performed by a computing device, in this example, the computing device starts (b!ock 502) the example sequence of operations by determin ing whether a network interface device of the computing device is enabled (block 504), in some example computing devices, a network interface device may be disabled, suc that pairing with a peripheral device may not occur. As will be appreciated, enabling/disabling a network interface device may reduce energy usage and/or increase battery life. Therefore, in some examples, if the network interface device Is disabled N" branch of block 504), the sequence of operations may end (block 506).

[0042] in response to determining that the network interface device is enabled ("Y" branch of block 504), the computing device may monitor a wireless communication network to detect a peripheral device set to a pairing mode (blocks 508-510). In some examples, a peripheral device may be set to a pairing mode, which may indicate that the peripheral device is available for connection/interface with a computing device. Furthermore, when a peripheral device is paired with a first computing device, some types of peripheral devices may not be available for pairing with a second computing device. Therefore, peripheral devices not set to a pairing mode may be ignored by the computing device in examples such as the example of FIG. 5,

[0043] if a peripheral device in pairing mode is not detected ("N" branch of block 510), the computing device may determine if a scan interval has been met (block 512). As discussed previously, a scan interval may be a defined time according to which the computing device may scan a communication network to detect peripheral devices for pairing, in this example, therefore, the computing device may not monitor the wireless communication network ("N" branch of block 512) until the scan interval is met. In response to determining that the scan interval has been met (Ύ 1 branch of block 512), the computing device may monitor the wireless communication network to detect a peripheral device for pairing (block 508).

[0044] In response to detecting a peripheral device set to pairing mode "Y" branch of block 510), the computing device may generate a peripheral application query associated with the peripheral device; query a peripheral application server with the peripheral application query to retrieve a peripheral application corresponding to the peripheral device; pair the peripheral device with the computing device; and execute the periphera! application as described herein (block 514).

[0045] Turning now to FIG. 6, this figure provides a flowchart 600 that illustrates an example sequence of operations that may be performed by a computing device, !n this example, a peripheral device is detected (block 602), and the computing device determines whether the peripheral device is within a pairing proximity (block 604), Generally, a pairing proximity may be a defined value and/or approximation set at the computing system, A pairing proximity may indicate an approximate distance from the computing device in which peripheral devices should be positioned.

[0046] As will be appreciated, however, locationa! information associated with the computing device and/or periphera! device may not be exact. In particular in some examples, ioeationai/positionai information for a computing device and/or periphera! device may be estimated based on other

characteristics (such as connection information of the computing device or peripheral device with the communication network). For example, a position of the computing device and/or periphera! device may be approximated based on a connection to a wireless communication network. In some examples, determining whether the periphera! device is within a pairing proximity may be based at least i part on periphera! device connection information associated with the peripheral device.

[0047] In some examples, the computing device may analyze a signal strength associated with the connection to the peripheral device over the communication network, in these examples, a peripheral device having a low signal strength and/or a weak connection may be determined to not be within a pairing proximity, in turn, a peripheral device having a high signal strength and/or a good connection may be determined to be within a pairing proximity. In some examples, based on communication network connection devices (such as routers, cellular data towers, etc.), a position of a computing device and/or peripheral device may be determined based at least in part on a position of the computing device and/or periphera! device relative to the network connection devices. For example, positional information for a computing device and a peripheral device may be determined by trianguiation based on a position of two or more Wi-Fi routers in a home. As wi!i be appreciated, based on

location/positional information determined from peripheral device connection information, examples may determine whether a peripheral device is within a pairing proximity of the computing device.

|0048] In response to determining that the peripheral device is not within the pairing proximity ("N" branch of block 604), the sequence of operations ends (b!ock 808). in response to determining that the peripheral device is within pairing proximity ( * branch of biock 804), the computing device determines identification information associated with the computing device {biock 608). As discussed, in some examples, identification information may comprise a vendor identifier and/or a product identifier. Based on the identification information, the computing device determines whether the peripheral device is an approved device for pairing with the computing device (block 610).

[0049] In response to determining that the peripheral device is not a device approved for pairing with the computing system ("N" branch of block 610), the sequence of operations ends (biock 606). In response to determining that the peripheral device is a device approved for pairing with the computing device ( " branch of biock 610), the computing device generates a pairing prompt at the computing device {block 612). Generating the pairing prompt may include outputting the pairing prompt with a user interface device (such as a display or touchscreen). Furthermore, generating the pairing prompt may be based at least i part o the identification information associated with the peripheral device. For example, the pairing prompt may be generated based at feast in pari on a vendor identifier and/or a product identifier of the peripheral device, in this example, the computing device waits for a response to the pairing prompt (block 614), In some examples, a user may confirm pairing with the peripheral device via a user interface device (e.g., a touchscreen, a mouse, a keyboard, etc.). Based on an input by a user, a pairing confirmation or a pairing rejection ma be received by the computing device for the pairing prompt. In response to not receiving a pairing confirmation (i.e., receiving a pairing rejection) (W branch of b!ock 814}, the example sequence of operations ends (block 608),

[0050] In response to receiving a pairing confirmation (Ύ' branch of block 614), the computing device may dynamically generate a peripheral appiication query based at ieast in part on the identification information associated with the peripheral device: query a peripheral application server based on the peripheral application query to retrieve a peripheral application corresponding to the peripheral device; pair the peripheral device with the computing device; and/or execute the peripheral application responsive to pairing the peripheral device with the computing device as described herein {block 616).

[0051] Accordingly, as described herein, examples may

dynamically/automatically pair a peripheral device with a computing device. In such examples, the computing device dynamically generates a peripheral application query for retrieving a corresponding peripheral application for a peripheral device, and the computing device may automatically execute a retrieved peripheral appiication for a peripheral device. As will be appreciated, the detection, pairing, and automatic execution of a peripheral application for a peripheral device may be referred to as streamlined pairing of a peripheral device. Examples provided herein generally reduce manual input needed from a user for pairing peripheral devices, retrieving corresponding peripheral applications, and executing corresponding peripheral applications. Moreover, examples provided herein may reduce peripheral application associated distribution and access issues. Furthermore, some examples may facilitate automated pairing and interfacing with one or more peripheral devices. In addition, examples provided herein facilitate automated pairing and interfacing with peripheral devices not previously paired with a computing device, in some examples, some peripheral devices may be approved for automated pairing and interfacing as described herein based at Ieast in part on a vendor and/or particular product of the peripheral device. For example, some specific

Bluetooth keyboards, Bluetooth mice, Wi-Fi devices, etc. may be approved for automated pairing and interfacing with a computing device upon detection of such devices. [0052] In addition, while various examples are described herein, eiements and/or combinations of elements may be combined and/or removed for various examples contemplated hereby. For example, the example operations provided herein in the flowcharts of FIGS. 4-6 may be performed sequentially, concurrently, or in a different order. Moreover, some example operations of the flowcharts may be added to other flowcharts, and/or some example operations may be removed from flowcharts. Furthermore, in some examples, various components of the example computing devices of FIGS. 1A- C and 2-3 may be removed, and/or other componenis may be added. Similarly, in some examples various instructions of the example memories and/or

machine-readable storage mediums of FIGS. 1 A-C may be removed, and/or other instructions may be added (such as Instructions corresponding to the example operations of FIGS. 4-8),

[0053] The preceding description has been presented to illustrate and describe examples of the principles described. This description is not intended to be exhaustive or to limit examples to any precise form disclosed. Many modifications and variations are possible in Sight of this description,