Explanation of the Method

Today, a practical solution is needed for fast and secure data transfer, especially between smartphones/tablets and electronic pens, as well as for purchases, sharing financial information and other security-requiring transactions.

The current options (LAN, RF, Wi-Fi, NFC, etc.) all have their own limitations and drawbacks.

The method provides data communication between devices via electricity signals by direct touch using capacitive touch panel without the need to identify and match devices with each other.

Device

In the method, when the electronic pen is contacted with the touch screen of a tablet or smartphone, the two devices exchange identities via electricity signals.Once the identities are confirmed, and the data to be transferred is defined, the data is transferred safely and quickly.

Since the method does not use radio frequency and works with direct contact, secure data communication can be achieved without the need for extra security steps.

Since the electronic pen can both receive and send data, it will provide a practical solution for copying the desired data and transferring it to the other device.

Adapting the method to today's technology is simple and low-cost, and will also enable widespread use of user-friendly applications.

The parent patent includes data communication between all devices that can produce and/or store data.

Due to the high demand for the use of Electronic Pens today, first of all the advantages of the method comparing with the current technology were mentioned:

Current Technologies

The use of Electronic Pens is becoming widespread and the development process continues. Leader technology companies utilizes different patented methods for electronic pen use. Major technologies are listed below:

Methot - 1

In the method, the device must have a solenoid coil layer under its screen. The pen is a passive pen and the technology is not accurate enough to determine the pen’s coordinates on the capacitive screen. On the capacitive screen, it is not possible to use both the pen and touch at the same time.

Methot - 2

The pen has become an active pen in this method and can work on the touch surface. There is no need for an under-screen solenoid layer. On the screen, it is possible to use both the pen and touch at the same time. There is still no communication between the pen and the device and extra features can not be added to the pen with the method itself.

Methot - 3

This method provides much more effective use compared to the other two methods. It’s an almost foolproof method for drawing and other operations on the touch screen. However, for active use of the Active Pencil, the pen and the touch screen must have the same sine frequency. For this reason, lags may occur at a small frequency difference. There is data communication between the pen and the device. However, it is necessary to use more extensive circuits to be able to use the ability of transferring data. Since this requires enlarging the size of the pen, companies do not use this feature.

Differences of the Method

In our invention: frequency is used only for sending and receiving data. When precise drawing will be made on the screen, it will be sufficient to cut off the data flow between the devices and only keep the electric current on the electronic pen in open position. Therefore, there is no reason that will cause “lag”.

Device

On the capacitive screen, it is possible to use both the pen and touch at the same time.

The parent patent includes data communication between all devices that can generate and/or store data, and the method can be used effectively in different areas.

Transferring a video from a mobile device to a tablet will be as easy as putting the mobile device on the tablet. The coordinates of the mobile device can be detected by the method and direction and position of the display screen can be adjusted according to the mobile device.

If long term and big sized data wanted to be transferred, the first matching and RF connection between devices can be provided without needing any passwords securely and in a short time.

Because the method works by direct contact, it will be preferred in applications where security is important, especially in mobile payment systems.

When the mobile device is placed on the table computer’s screen, the method determines the exact position of the mobile device on the screen and ensures that the data is encoded and sent to the opposite device at that exact point securely.