WO2008153787A2 - Apparatuses, systems and methods for transmitting information - Google Patents

Apparatuses, systems and methods for transmitting information Download PDF

Info

Publication number
WO2008153787A2
WO2008153787A2 PCT/US2008/006715 US2008006715W WO2008153787A2 WO 2008153787 A2 WO2008153787 A2 WO 2008153787A2 US 2008006715 W US2008006715 W US 2008006715W WO 2008153787 A2 WO2008153787 A2 WO 2008153787A2
Authority
WO
WIPO (PCT)
Prior art keywords
secret key
document
sender
image file
cpu
Prior art date
Application number
PCT/US2008/006715
Other languages
French (fr)
Other versions
WO2008153787A3 (en
Inventor
Hoang Nhu
Van Nguu Jacques Tran
Tu-Thanh Nguyen
Original Assignee
Hoang Nhu
Van Nguu Jacques Tran
Tu-Thanh Nguyen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hoang Nhu, Van Nguu Jacques Tran, Tu-Thanh Nguyen filed Critical Hoang Nhu
Publication of WO2008153787A2 publication Critical patent/WO2008153787A2/en
Publication of WO2008153787A3 publication Critical patent/WO2008153787A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32502Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices
    • H04N1/32523Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices a plurality of output devices
    • H04N1/32529Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices a plurality of output devices of different type, e.g. internal and external devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0093Facsimile machine
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • H04N2201/3205Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • H04N2201/3207Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of an address

Definitions

  • the present invention relates generally to methods, systems and apparatuses that use a telecommunication network for sending, selectively receiving and storing documents.
  • a receiver apparatus automatically identifies a sender apparatus before accepting a document transmitted by the sender apparatus.
  • Other features of the present invention include:
  • the word "document” as used herein is intended to broadly mean a medium with recorded information, such as an invoice, a legal letter, a check, an image of a credit card, a manuscript, an agreement, an application, a resume, a video file, a voice file, a still image, etc., which, in one embodiment, may be represented digitally via digitization or saved as a voice data file or video data file.
  • aspects of the present invention relate to an apparatus for sending information, a document, or a message that includes a combination of one or more of the following: a central processing unit (CPU) with DDR memory, FLASH memory, a EEPROM, a hard disk and its interface, a real-time clock, a modem, a front panel, a TV and VGA output interface, a Liquid crystal display (LCD) screen, an USB interface, a smartcard controller, a SD/MMC/MS adapter, and an infra-red remote controller, an Ethernet interface and a front panel control.
  • the apparatus is usable with a telecommunication network.
  • Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
  • ISDN integrated service digital network
  • DSL digital subscriber lines
  • IP Internet protocol
  • the preferred apparatus may be used in a method that includes highly secured transmission with unique secret key for sending and receiving electronic documents. This allows the machine to identify the sender's machine or the sender so that the origin of the document received is known and intentional thus unsolicited documents may be avoided. By limiting transmissions between known senders and recipients, the spread of viruses and perpetration of fraud may be minimized.
  • the apparatus is configured to automatically store documents received in its storage unit for document management, for displaying documents on screen, and/or for printing documents on demand.
  • the apparatus include bidirectional capability. That is, when the apparatus sends a document to another apparatus, it becomes a sender apparatus (or sender system). When the apparatus (or system) receives a document from another apparatus (or from another system), it becomes a receiver apparatus (or receiver system).
  • GMT Time Greenwich date and time.
  • a first aspect of the invention is a secret key implemented in the apparatus:
  • the apparatus of the present invention When the apparatus of the present invention is in a sending mode, it is identified by a secret key, which is stored permanently into the memory of the apparatus and cannot be modified or deleted. Most preferably, each apparatus as its own unique secret key and is not shared by any other apparatuses in the system.
  • the secret key may have 128 bits and is unique to each apparatus, in specific format with particular checksum algorithm and is hidden.
  • the unique secret key is considered a "sender unique secret key”.
  • the identity of the owner of the apparatus which includes his name and his postal address stored in the memory of the apparatus, and can be sent with the "sender unique secret key" as a cross-reference.
  • the memory of the apparatus contains a list of unique secret keys for comparing against incoming "sender unique secret keys".
  • Each unique secret key in the list is associated with an access level, which in one embodiment may be adjusted by the receiving apparatus.
  • Exemplary access levels include: access level A for "official sender”, access level B for "authorized sender”, access level C for "sender waiting of authorisation", and access level R for "sender refused".
  • the number of levels can be extended, such as more than four levels, and the level designations can be other than letters, such as numbers or words.
  • the list of unique secret keys in the receiver apparatus is used to compare with the incoming "sender unique secret key" of the sender apparatus before the receiver apparatus accepts or stores an incoming document into its memory.
  • a second aspect of the invention is a method of auto-generating a real-time identification by the sender apparatus and comparing the real-time identification by the receiver apparatus:
  • the unique secret key and other static parameters such as the name of the apparatus (which may be the sender's name), the postal address of the owner and the time zone of the location where the apparatus is installed, are encrypted with the time and date taken from its internal real-time clock, just before the sender apparatus establishes communication with the receiver apparatus. Therefore, the identification of the sender apparatus is a real-time identification that is auto-generated. In a preferred embodiment, the sender apparatus sends out this real-time identification to the receiver apparatus as a way of asking for permission to send documents to the receiver apparatus. The receiver apparatus will compare the date-time of the real-time identification received with the date-time of the receiver apparatus at the moment it receives the real-time identification.
  • the receiver apparatus will consider the real-time identification of the sender apparatus to be old and, and in one embodiment, treats it as stolen data. If that is the case, the receiver apparatus may terminate the communication (or disconnect the apparatus from the telecommunication network). If the time comparison fails again or several times over a finite time period, the receiver apparatus can revert into auto- protection mode and may not answer incoming data signal for a predetermined time period. This method limits the number of times a sender apparatus can attempt-heck a receiver apparatus using a stolen real-time identification to thereby protect the receiver apparatus against intrusion.
  • a third aspect of the invention is a method for selectively receiving and auto-storing received documents:
  • the receiver apparatus may first decrypt the real-time identification that it received. After comparing the date-time, explained in the second aspect of the invention above, and if this comparison is satisfied, the receiver apparatus then compares the "sender unique secret key" with the list of secret keys stored in the receiver apparatus. If the "sender unique secret key" matches one of the unique secret keys with access level A ("official sender") or access level B ("authorized sender”), the receiver apparatus may then reply "authorizedauthorized” to the sender apparatus. The receiver apparatus then accepts the document from the sender apparatus, stores this document in the hard disk, and sends an acknowledgment to the sender apparatus before it terminates communication.
  • access level A official sender
  • access level B access level B
  • the receiver apparatus may send a "refused” reply, or other similar messages, to the sender system then it terminates communication.
  • the apparatus may send a "waiting for validation” reply to the sender system or apparatus then it terminates communication.
  • the receiver apparatus will take it to mean that the document was sent from an unknown sender apparatus, which may be attempting to send a document to the receiver apparatus for the first time.
  • the receiver apparatus will send a "temporary authorized" reply authorized to the sender apparatus then accepts and stores the incoming document into the hard disk.
  • the "sender unique secret key" of the sender is then written into the list with access level C for further verification.
  • the receiver apparatus will not accept another or different document from this sender apparatus until the user of the receiver apparatus views the document and changes the access level for this "sender unique secret key" to a level B ("authorized sender")and updating its list of secret keys.
  • the receiver may optionally change the status to access level R ("refused sender").
  • the received document is stored in memory with the identity of the sender (owner of the sender apparatus) associated with it.
  • An acknowledgment is then sent back to the sender apparatus that may include the identity of the receiver apparatus so that information about the receiver apparatus may be stored in the sender apparatus.
  • This method of the invention gives to the receiver apparatus an automatic process for accepting, refusing or receiving documents only one time from an unknown sender apparatus.
  • the sender's system can store the reply it received from the receiver apparatus so that it can automatically manage documents that it sends to the receiver apparatus in the future.
  • a fourth aspect of the invention is a method for searching a document and handling authorization of received documents from a sender apparatus or sender systems:
  • User of the apparatus can search and view on screen a document stored in the hard disk of the apparatus.
  • the list of documents received is sorted by sender name or by date and time of sending.
  • the receiver may also edit the saved document, using a keyboard (preferably wireless) or a remote controller, by giving it a title or a brief description for added file management and later retrieving and sorting.
  • the user of the apparatus can select a document in the list and display the content of this document and the postal address of sender on the screen for viewing, for printing or forwarding to another receiver system or an email server.
  • the user can also change the access level of unique secret keys in the list when viewing documents, except for access level A ("official sender"), which in the preferred embodiment cannot be changed.
  • the access level A is reserved for official organizations, like for example government offices.
  • Access level C (“sender waiting for validation") can be changed to access level B ("sender authorized") or to access level R ("sender refuse”).
  • Access level B (“sender authorized”) can be changed to access level R (“sender refused”).
  • Access level R (“refused sender”) can be changed to the access level B (“sender authorized”).
  • a user can press a button or a sequence of buttons on the remote controller or the keyboard when the document is displayed on screen.
  • the unique secret key is not displayed on screen but is represented by the sender's name so that the user of the apparatus will not know the sender's unique secret key.
  • the user also can delete a document with a specific button or sequence of buttons on the remote controller or keyboard when a document is displayed on screen.
  • a fifth aspect of the invention is a method for auto-forwarding a received document to another apparatus or to another receiver system:
  • User of the apparatus can configure the apparatus for automatically forwarding documents received to another apparatus or to another receiver system.
  • the period or frequency of forwarding documents can be selected by its user.
  • User of the apparatus can also configure it to auto-forward the type of documents received. For example, he can configure auto-forwarding only those documents that have the "sender unique secret keys" matched unique secret keys with access level A or B in the list of unique secret keys stored in the apparatus.
  • the receiver apparatus automatically becomes a sender apparatus when it establishes a new communication for forwarding the received documents to another receiver apparatus or to another receiver system.
  • another receiver system is an email server
  • the user may need an account with an Internet service provider.
  • This aspect of the invention allows the user of the apparatus to receive documents whenever he is away from the location where the apparatus is installed.
  • a sixth aspect of the invention is a method for remotely accessing the apparatus:
  • a user experienced with computer may read documents stored in its apparatus, such as internal or external memory, remotely if the apparatus and his computer are connected together via an Internet Protocol network or via other high-speed communication networks.
  • the screen of the computer may display all the functions of the remote controller and the screen of the computer can display documents selected from the hard disk of the apparatus.
  • a password is configured in the apparatus and the computer has to supply this password to gain access to the apparatus. This method allows owner of the apparatus remote access to his documents when he is away from the location where the apparatus is installed. Thus, the apparatus may become a personal secured mailbox.
  • a seventh aspect of the invention is a method of printing that involves a barcode containing information, such as the author's name, key search words, and the date the document was created: [0032]
  • the method comprises printer driver software for a sender system using a personal computer. Through the printer driver or software, this bar code is printed along with the content of the document, for example along the right margin of the document.
  • the barcode information allows the system to store the document into a sortable or retrieveable file or folder for later retrieval.
  • An example of a document printed by this method is further discussed below.
  • This method of the invention allows a user to print a document that has been stored in the apparatus of the invention.
  • An eighth aspect of the invention is a method of transferring a paper document and storing its image file into the apparatus:
  • the apparatus when the apparatus is in a searching mode, the stored document will be displayed as if it was received via the telecommunication network and the user of the apparatus can view, delete, print or forward the document. This method is useful and allows the user of the apparatus to centralize all documents in the apparatus for better document management.
  • a ninth aspect of the invention is a method for backing up the storage unit:
  • the apparatus may include options to automatically backup the internal memory by schedule or by manually backing up all the contents of the internal hard disk to an external storage unit, such as a remote server or external hard drive, or to a memory card connected to a USB interface of the apparatus. A password will be asked for this operation and this password is used for protecting data in the external storage unit.
  • the contents of the external storage unit can only be read by the original apparatus or optionally on another apparatus provided proper clearance is gained, such as with a correct password used during the backup operation. This method allows a user to safely keep his documents.
  • a tenth aspect of the invention is a method of sending a payment by check:
  • a user In using the apparatus, a user, such as the owner of the apparatus, can send an image of his signed check to another compatible apparatus through the communications network. After filling in a check with a beneficiary name, an amount to be tendered, and signing the check, the user can place the signed check into a scanner connected to the apparatus then push a button on the remote controller, or other command console or unit, to initiate the process.
  • a program included in the apparatus can then analyze the barcode printed on the check and converts that information into a useable form. In one exemplary embodiment, the information is translated into clear text for writing the check number and other information about the check, such as the amount and the beneficiary, onto a non- volatile memory of the apparatus.
  • the program included in the apparatus preferably will display the check's image onto a screen connected to the apparatus and then will ask the user to enter additional information about the beneficiary and user's security password.
  • the beneficiary's telephone number is added to the check image shown on the display using a remote controller.
  • the beneficiary's address, certain password or keyword associated with the beneficiary, or other information unique to the beneficiary may be added.
  • the program will compare information obtained by the check's barcode with a check database located in the apparatus.
  • the apparatus may connect to a remote database for checking and receiving reply from the remote database. If the completed check is verified or positively authenticated, the apparatus can then send out the image of this check to the beneficiary's apparatus through the communications network.
  • this tenth aspect of the invention is configured to provide a level of assurance or comfort to the beneficiary of the check when he or she receives the check knowing that it was sent by the owner of the check.
  • An eleventh aspect of the invention is a method for sending credit card payments using the apparatus of the present invention:
  • a user In using the apparatus, a user, such as an owner of the apparatus, can send an image of his credit card along with a signed payment statement or document to another compatible apparatus connected the communications network. After writing the amount to pay and signing an authorization form or statement, the user can put his credit card and the signed authorized statement into a scanner connected to the apparatus and pushes a button on a remote controller.
  • a program included in the apparatus will display an image of the credit card and an image of the authorized document, or a single of both items, on a screen connected to the apparatus. In one specific aspect of the present invention, the program then asks the user to enter a verification code printed on the back of the credit card.
  • this eleventh aspect of the invention is configured to provide a level of assurance or comfort to the beneficiary of the payment that the sender has the same name as the name printed on the credit card and that the user has the credit card on hand at the time he uses this credit card.
  • Another aspect of the present invention is a method for reducing or eliminating the risk that an unauthorized apparatus captures documents, documents bearing a check or credit card information.
  • Each apparatus provided in accordance with aspects of the present invention preferably has its own coordinate stored into a non-volatile memory of the apparatus, which is most preferably made not to be modifiable by the user of the apparatus.
  • the apparatus When in a sending mode, the apparatus encrypts the recipient's coordinate, for example the recipient's telephone number, into real time identification.
  • the receiver apparatus when in a receiving mode, the receiver apparatus first extracts the recipient's telephone number from the encrypted real time identification and compares the extracted number with the number stored in the receiver apparatus. If the comparison is not a match, the transmission is terminated and the document is not transmitted. If the comparison is a match, the transmission is allowed.
  • This aspect of the present invention is configured to prevent any apparatus from capturing a document that is not the intended recipient's apparatus.
  • Another aspect of the invention is two-way communications capability between two electronic devices through the communications network via the apparatus.
  • Electronic devices such as a biometric reader, a camera, a card reader- writer and other electronic devices may communicate with the apparatus through a local wire or wireless communication channel.
  • One or more programs included in the apparatus can catch data from any of the connected electronic devices and then send them to another apparatus through the communications network.
  • Programs loaded in the apparatus can also receive data from the communications network then write them onto the hard disk of the apparatus, display that information onto the screen connected to the apparatus, transfer them to any of the electronic devices connected to the apparatus.
  • this present aspect of the invention permits two-way communications between an electronic device and the apparatus. It also permits two-way communications between two electronic devices through the communications network via the apparatus.
  • Other aspects of the present invention include a method for sending a document comprising obtaining a combination secret key and personal identification, said personal identification comprising at least one of a zip code, a postal address, a telephone number, a time zone, and a sender name and associating an access level with the combination secret key and personal identification.
  • a method for sending a document comprising obtaining a combination secret key and personal identification, said personal identification comprising at least one of a zip code, a postal address, a telephone number, a time zone, and a sender name and associating an access level with the combination secret key and personal identification.
  • Still yet other aspects of the present invention include a system for communicating between two communication devices comprising a first communication device comprising a first secret key and a first telephone number; a second communication device comprising a list of secret keys; a network communication connecting the first communication device and the second communication device; and wherein the first secret key is one of a plurality of secret keys in said list of secret keys.
  • a still further novel and unobvious feature of the present invention is a method for selectively receiving image files over a communication line comprising receiving a first image file, said first image file linked to a first secret key; receiving a second image file, said second image file linked to a second secret key; comparing said first secret key and said second secret key to a list of secret keys; rejecting a third image file associated with said first secret key; accepting a fourth image file associated with said second secret key.
  • a method for generating revenue from an act of sending a document over a communication line comprising receiving a document to be sent over the communication line; providing a list of recipients, wherein each recipient is configured to receive an electronic copy of the document; associating each recipient with a secret key personal to said each recipient; and collecting a fee commensurate with at least one of a number of recipients receiving electronic copies of the document and a number of recipients in said list of recipients.
  • the concepts disclosed herein also include a communication device for document transmission and management comprising: a network connection; a sending mode; a receiving mode; a secret key unique to said device; a list of secret keys not unique to said device; a storage unit; and a remote controller, and wherein a document received comprises a sender secret key that is at least one of a secret key on said list of secret keys and not a secret key on said list of secret keys.
  • a method for generating revenue comprising associating a secret key with a document to be sent; receiving an electronic file linked to the secret key of the sent document; repeating the associating step for a second document; and paying a monetary value computed based on, at least in part, a number of documents sent.
  • a further method disclosed herein includes a method for sending a check to an apparatus linked to a pre-determined telephone number comprising the steps: digitizing an image of a check and displaying the image onto a screen; associating a payer information with the check; verifying the payer information with a check database; sending the image of the check to the apparatus linked to the pre-determined telephone number; and wherein the sending step includes combining a key unique to a sending apparatus with the image of the check.
  • a similar method involving a credit card includes a method for sending a credit card payment to an apparatus linked to a pre-determined telephone number comprising the steps: filing out a form with an amount to pay to a beneficiary of the payment; digitizing an image of a credit card and displaying the image onto a screen; entering a password and comparing the entered password with passwords saved in a database; sending the image of the credit card to a apparatus linked to the pre-determined telephone number; and wherein the sending step includes combining a secret key with the image of the credit card.
  • Another inventive aspect of the present invention involves a method for sending a payment to a beneficiary using a remote control.
  • the method comprising the steps: digitizing an image of a document; sending the image of the document with a secret key to a remote communication apparatus and over a communication line; having the secret key verified by the remote communication apparatus; and wherein at least one of the digitizing step, verifying step, and sending step involves pressing a button on a remote control.
  • Another unique feature of the present invention involves a method creating a chain of characters for security purposes. This method involves sending encrypted information to a receiver apparatus linked to a telephone number, which includes the steps of entering a recipient telephone number into a sender apparatus; creating a chain of characters that include the recipient telephone number, a unique secret key that is unique to the sender apparatus, and at least one of a date information and a time information; encrypting the chain of characters; and sending the encrypted chain of characters to a receiver apparatus, which is linked to the recipient telephone number.
  • a further method provided herein includes the steps of receiving an encrypted chain of characters; checking the encrypted chain of characters for acceptable format; decrypting the encrypted chain of characters and extracting a recipient telephone number from the chain of characters; and verifying the extracted telephone number with a telephone number associated with a receiving apparatus.
  • FIG.l is a diagrammatical representation of an apparatus provided in accordance with to the preferred embodiment of the invention.
  • FIG. 2 is the block diagram of the apparatus of FIG. 1 ;
  • FIG. 3 is a block diagram illustrating an example of implantation of secrets keys in the memory
  • FIG. 4 is a block diagram illustrating two systems, which includes the apparatus presented in FIG.l connected to a public telephone switched network;
  • FIG. 5 is a flowchart illustrating a method of creating a real-time identification (RTI) of the sender apparatus
  • FIG. 6 is a flowchart illustrating a method of sending a document through a telecommunication network
  • FIG. 7-A is a flowchart illustrating the method of comparing the real-time identification received
  • FIG. 7-B is a flowchart illustrating the method of selectively receiving and auto-storing the received document into memory
  • FIG. 8A-C are examples of menus displayed on a screen during search mode
  • FIG. 9A-B are flowcharts illustrating the method of handling the access level of a unique secret key included in the list of comparison
  • FIG.10 is a flowchart illustrating a method of auto-forwarding documents to an email server
  • FIG. H-A and FIG. H-B are flowcharts illustrating a method of selectively receiving document files attached to an email
  • FIG.12 is a diagrammatical representation of a personal computer connected to the apparatus via Internet Protocol for using remote access feature
  • FIG. 13 is an example of a document printed with a barcode
  • FIG. 14 is a flowchart illustrating a method of transferring a paper document in a compressed image file then storing it into the apparatus
  • FIG.15 is a diagrammatical representation of an apparatus with a liquid crystal display built-in according to a first alternative embodiment
  • FIG.16 is a diagrammatical representation of an apparatus integrated into a multifunction machine (printer/scanner/copier) according to a second alternative embodiment
  • FIG.17 is a diagrammatical representation of a laptop computer using methods of the invention according to a third alternative embodiment
  • FIG. 18 is a diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device
  • FIG. 19 is an alternative diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device
  • FIG. 20 is yet another alternative diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device;
  • FIG. 21 is a diagrammatical representation of a process or method for tendering payment, such as a check, using the apparatus in accordance with aspects of the present invention
  • FIG. 22 is a diagrammatical representation of an alternative process or method for tendering payment, such as a credit card, using the apparatus in accordance with aspects of the present invention
  • FIG. 23 is a diagrammatical representation of a process or method for creating real time identification data for verifying and authenticating
  • FIG. 24 is a diagrammatical representation of a process or method for processing the real time identification data of FIG. 23.
  • FIG. 25 is a diagrammatical representation of an accessory device useable with the apparatus of the present invention.
  • the word "document” used in the description is intended to broadly mean any paper medium containing information or images, such an invoice, a legal letter, a book report, a resume, a balance sheet, and all kinds of documents and images suitable for use with the apparatus of the present invention.
  • GMT Time Greenwich date and time.
  • FIG. 1 there is illustrated a communication device or standalone apparatus 10 provided in accordance with aspects of the present invention connected to a telecommunications network 14 (e.g. a public switched telephone network) by a communications line 16. Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
  • the telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20.
  • a multi-function-copier machine (MFC) which includes a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
  • the MFC is capable of separately printing, copying and scanning a document.
  • an infrared remote controller 12 is used for controlling the apparatus 10 of the present invention.
  • other control console or unit may be used, such as a wired or wireless keyboard or a voice recognition controller.
  • a TV screen 28 is connected to the apparatus 10 by a video signal cable 30.
  • the TV screen 28 could be a VGA monitor and the video signal cable 30 could be a VGA standard cable.
  • the system of FIG. 1 may represent a complete system of the preferred embodiment. [0086] Turning to FIG. 2, there is illustrated an exemplary block diagram of the circuitry of the apparatus 10 of FIG. 1.
  • the CPU 40 acts as the brain or nerve center of the system and it runs the operating system and applications software.
  • a real-time clock integrated circuitry with rechargeable battery built-in 42 provides the current date and current time to the CPU 40.
  • the CPU 40 provides a bus 44 for communicating between the CPU 40 and external memories such as EEPROM memory 50, Flash memory 52, SD/MMC/MS memory adapter 54, and hard disk interface 56.
  • the DDR memory 46 contains uncompressed code for applications software, temporary system data storage and temporary receiving data storage.
  • the EEPROM memory 50 is used to store data and parameters not subject to change or modification, for example the unique secret key of the apparatus, the name of owner of the apparatus, the owner's postal address and the time zone in the most preferred embodiment are not modifiable.
  • the Flash memory 52 is used to store data subject to change and data to be restored after powering up the apparatus.
  • the SD/MMC/MS memory interface 54 is used to read and write data from and to a removable memory card.
  • a hard disk 58 is connected to the CPU 40 via a hard disk interface 56.
  • the hard disk 58 is configured to store documents in compressed picture file format, list of events, and data subject to change.
  • Infrared receiver 62, Led display 64 and buttons 66 of the front panel are connected to the CPU 40 through the front panel interface 60.
  • the CPU 40 communicates with external telecommunication network through the LAN port 78 or through the modem 70 and the line out 72 may provide voice signals for external device (e.g. telephone handset).
  • the modem 70 may include a DSP chip TMS320C54xx and it may include International standard 33.6 Unified Data Pump (V.34 HD/FD, V.8), 14.4 Unified Data Pump (V.32/V.32bis/V.22/V.22bis, optional V.23, and V.17/V.21/V.27/V.29), V.42bis data compression, V.42 error correction, T.30 fax communication.
  • the CPU 40 provides two Universal Serial Bus (USB) channels 74 and 76. These two USBs 74 and 76 may connect with external devices such as MFC (Multi-function copier machine), USB Printer, USB Scanner, USB external hard disk, removable USB memory key and other USB devices that are compatible with the International standard USB 2.0.
  • MFC Multi-function copier machine
  • the Ethernet transceiver 78 provides a LAN port compatible with 10 Base 10/100 Base T and this LAN port 78 can be connected to the Internet Protocol network, to an Ethernet router, or alternatively it can be connected directly to a personal computer by a RJ45 cross cable.
  • the Smartcard controller and adapter 80 may be connected to the CPU 40.
  • a TV or VGA screen can be connected to the video display interface 82 and the video display interface 82 receives data from the CPU 40.
  • the modem 70 can be replaced by a Digital Subscriber Line modem (DSL modem) or other wire and wireless modem.
  • DSL modem Digital Subscriber Line modem
  • the hard disk 58 can be replaced by a big capacity memory card
  • the EEPROM memory 50 can be replace by a ROM
  • the DDR memory 46 can be replaced by DRAM
  • the LED 64 can be replaced by a small LCD.
  • buttons 66 can be replaced by a numeric keypad and functional buttons.
  • the EEPROM 50 includes a secret key 100 unique to the apparatus, the name of the owner 102 of the apparatus (e.g., the sender's name), the postal address of the owner 104 of the apparatus, and the time zone 106 of the location where the apparatus is delivered or transmits data.
  • the unique secret key 100 is programmed at the factory to ensure its unique identity. Once a particular apparatus is acquired by a user, the name of the owner 102, the postal address of the owner 104, and the time zone 106 where the apparatus is used can be downloaded to the apparatus from a maintenance managing center before the apparatus is delivered to the buyer.
  • the unique secret key 100 can be a 128 bit key and is secured with a specific format that cannot easily be modified or altered.
  • the apparatus checks information included in the EEPROM 50 before switching to operating mode.
  • a smartcard may be used with a smartcard adapter 80 and may contain information contained in the EEPROM 50.
  • the Flash memory 52 may include the Operating system and compressed code applications software 108, as well as system and user's parameters 110, a list of comparison of unique secrets keys 112, and a list of sender's names 114 that have been refused, as further discussed below.
  • the list of comparison of unique secrets keys 112 contains unique secret keys of different sender apparatuses.
  • the list is compiled over time and is gathered by compiling unique secret keys every time a transmission is received from a new sender apparatus.
  • the list 112 may be changed automatically or manually.
  • Each unique secret key in the list 112 is associated with an access level that can be changed by the user of apparatus to permit the sender apparatus linked with that unique secret key to transmit information to the receiving apparatus.
  • An access level grants certain sending privileges to a sender apparatus and instructs a receiver apparatus how to consider certain incoming documents.
  • four access levels are provided with different access levels contemplated, such as fewer than or greater than four access levels.
  • access level A is reserved for “Official sender”
  • access level B is reserved for “Authorized sender”
  • access level C is reserved for “sender waiting for validation”
  • access level R is reserved for "refused sender”.
  • all the contents of the EEPROM 50 and the contents of the FLASH Memory 52 may be included in the hard disk 58.
  • One system Al may be considered a sender system, which will send a document to the receiver system A2, through the public switched telephone network.
  • Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
  • ISDN integrated service digital network
  • DSL digital subscriber lines
  • IP Internet protocol
  • the unique realtime identification is auto-generated by the apparatus 10 of sender system Al before it calls the receiver system A2.
  • the CPU 40 opens a temporary file (TF) in the DDR memory 46 for stocking information received from the EEPROM 50 and from the FLASH Memory 52.
  • the CPU 40 writes the unique secret key 100, the sender's name 102, the postal address of owner 104, and the time zone 106 into a temporary file TF.
  • the CPU 40 writes a current date and a current time of the real-time clock 42 into the temporary file TF.
  • the temporary file TF now contains a chain of characters that include data of 100, 102, 104, 106 and current date-time.
  • the CPU 40 encrypts this chain of characters with an algorithm and temporarily stores this encrypted chain in the DDR memory 46 before terminating the process.
  • this encrypted chain of characters is a real-time identification (RTI) that permits a receiver system to identify a unique sender apparatus and therefore the origin of a document.
  • RTI real-time identification
  • FIG. 6 a flowchart illustrating a method of sending a document by an apparatus 10 is shown.
  • the user of the apparatus 10 in sender system Al wants to send a document to the receiver system A2 via the telecommunication network (e.g. public telephone switched network).
  • a paper document is inserted in a scanner 22 located at the sender system Al and then the user dials the telephone number of the receiver system A2 and then presses a specific button on the remote controller 12.
  • the CPU 40 sends instructions through the USB interface to instruct the scanner 22 to scan the paper document.
  • the CPU 40 then writes this document in compressed image file format into the DDR memory 46.
  • the CPU 40 can get the compressed image file from the memory card presented in the SD/MMC/MS 54.
  • a real-time identification (explained in FIG. 5) will be auto- generated at step 302 before the modem 70 dials the telephone number of the receiver system A2 at step 304.
  • the CPU 40 waits for the communication between the sender system Al and the receiver system A2 to be established. If the communication cannot be established for various reasons, such as a busy signal or the receiver system A2 is not connected to the network, at step 322, the CPU 40 will terminate the communication and the telephone line is released.
  • the process at step 322 may include instructions for redialling, which may be one or more times, and if communication cannot be established after this timeout, the process is terminated.
  • the process waits for a short period before repeating from step 302.
  • This process may include many features, such as timeouts, re-dialling a limited number of times, recording errors in an event register, and sending error messages to a screen or monitor to alert the user.
  • the CPU 40 sends out the real-time identification (RTI) then waits for a reply from the receiver system A2 at step 310.
  • RTI real-time identification
  • step 7B the process then proceeds to step 314 for terminating communication, releasing the telephone line, and erasing the RTI and the compressed image file from the DDR memory 46.
  • the reply from receiver system A2 can be memorized into the events register in the hard disk 58 for further use.
  • step 312 if the CPU 40 receives the reply "authorized" from the receiver system A2, at step 316, the CPU 40 will send out the compressed image file and waits for acknowledgment from the receiver system A2.
  • step 318 if acknowledgement is received, the process continues to step 320 to write the sent compressed image file and the acknowledgement into the hard disk 58.
  • the acknowledgement sent by the receiver apparatus may include the date and time the document is received, its sender's name and its owner's postal address.
  • the CPU 40 erases the RTI and the compressed image file then terminates the process.
  • the process then goes to step 322 and wait before redialling and retransmitting the document.
  • the process at step 322 may include instructions to write sending errors in the event register then terminating the communication and exiting the process after a limited number of attempted transmissions have failed.
  • FIG. 7-A a flowchart illustrating a method of comparing real-time identification is provided. This flowchart demonstrates a process in the receiver system A2 when it is connected with the sender system Al via a public telephone switched network.
  • the modem 70 of the receiver system A2 detects and analyzes an incoming call signal. If the incoming call signal is a voice call, the modem 70 switches the call to the voice circuitry, for example the telephone handset 18 then the process is terminated at step 414. If the incoming call signal is detected as a data signal at step 400, the CPU 40 will establish a communication with the sender system using the modem 70. At step 402, if the communication cannot be established for any reason, the CPU 40 will terminate the communication and disconnect the telephone line at step 416. For securing the apparatus 10 against hacker or other malicious acts, step 416 may include instructions to force the apparatus 10 into auto-protection mode, such as not replying to any data signal call for 30 minutes.
  • step 402 if the communication is established between the sender system Al and the receiver system A2 at step 404, the RTI will be received and stored in DDR memory 46 then the CPU 40 may analyze this RTI and verify its format at step 406. If the RTI format does not match a specified or recognized format, the CPU 40 will terminate communication and releases the telephone line at step 416. If the RTI matches the specific format, at step 408 the CPU 40 will decrypt the RTI with an internal algorithm and extract the unique secret key (i.e., sender unique secret key), along with other sender personal info (such as the sender's name, the owner's postal address, the date, the time and the time zone). The CPU 40 will combine the date and the time zone for obtaining a "sending GMT time".
  • unique secret key i.e., sender unique secret key
  • the RTI is auto-generated by the apparatus 10 (in the sender system Al) at the time it sends out the document and generally the RTI transmission over the telephone line should not take more than a few seconds. Therefore, to add further security, at step 410, this "sending GMT time" will be compared with the "receiving GMT time".
  • the "receiving GMT time" of the receiver apparatus is obtained by the current date- time from the real-time clock 42 and the time zone 106 of the receiver apparatus. If the "sending GMT time" has a difference of more than a few minutes, such as more than 3 minutes, from the "receiving GMT time", the RTI is considered incorrect and the process goes to step 416.
  • the CPU 40 will consider the RTI as correct.
  • the "window time” comparison of 3 minutes is not static and is only an example, which is subject to change, to more than or less than 3 minutes.
  • the CPU 40 will now check the specific format of the "sender unique secret key" extracted from the RTI. At step 412, if the format of the "sender unique secret key" does not match the specific format, the process is terminated at step 416.
  • Step 416 may include instructions to quickly disconnect and display an "alarm message" on the screen and forcing the apparatus 10 to go into auto-protection mode so that the apparatus 10 will not reply to any signal data call for some extended period, such as 30 minutes or some increment thereof.
  • the "sender unique secret key" matches a recognized format, the process will continue as provided in the flowchart of FIG. 7B.
  • FIG. 7-B a flowchart (continued from FIG. 7-A) illustrating a method of selectively accepting an incoming document for storage into memory, such as into the built-in hard disk drive, is provided.
  • the "sender unique secret key” extracted from the RTI at step 408 is compared with a list of unique secrets keys 112 stored in the receiver apparatus. If this "sender unique secret key" does not match one of the unique secrets keys identified in the list of secret keys 112, the process goes to step 422 for writing this "sender unique secret key” with access level C in the list 112.
  • the CPU 40 sends a "Authorized temporary" reply message to the sender system Al.
  • the CPU 40 is now ready to receive the compressed image file (document) from the sender system Al.
  • the CPU 40 writes the incoming compressed image file and the identity (name and postal address) of the sender into the hard disk 58 then the CPU 40 sends an acknowledgment to the sender system Al at step 434.
  • the acknowledgement may include the date and time the document was received, the name of the owner of the apparatus of receiver system A2 and the owner's postal address.
  • the CPU 40 terminates the communication and writes the receiving event into the events register then erases the RTI from the DDR memory 46.
  • the receiver apparatus when the receiver apparatus receives an inquiry from a sender system for sending document(s) for the first time (for example Al), the receiver apparatus can accept the compressed file format (document) from the sender system but the unique secret key of the sender system will be identified with a "waiting for validation" status. In one embodiment, this means that the receiver apparatus will not accept any further document(s) from this sender system until the user of the receiver apparatus reads the received document and decides to change the access level of the unique secret key of the sender apparatus, in list 112, to access level B ("sender authorized").
  • step 418 if the "sender unique secret key" matches one of the unique secrets keys identified in the list 112, the process continues to step 420 for analyzing the access level of the matched unique secret key in the list 112. If the access level is R, at step 426, the CPU 40 will send a "refused" reply to the sender then the process ends at step 438. The process in step 438 may disconnect and terminate communication, write this rejection event into the events register and erases the RTI from DDR memory. If the access level is C, the CPU 40 will send a "waiting for validation" reply at step 428 then ends the process at step 438.
  • the CPU 40 will send a "Authorized" reply to the sender system Al at step 430 then the CPU 40 will be ready to receive the compressed image file from the sender system Al.
  • the CPU 40 writes the incoming compressed image file into the hard disk 58 then at step 434, the CPU 40 sends an acknowledgment to the sender system Al before ending at step 436.
  • the received document may be auto-forwarded to another receiver system by a method explained in FIG. 10, as further discussed below.
  • Documents stored in the hard disk 58 can easily be searched by a user and the apparatus 10 can display documents stored in the hard drive, compressed in various image file formats such as TIFF, JPEG, PDF or others format, on a display screen 28.
  • a user of the apparatus can print these documents to an attached printer 24, forward them to another receiver system, or delete a document(s) that the user does not want to keep.
  • the user can also setup the apparatus 10 to automatically authorize or automatically refuse documents sent from a particular sender system.
  • the user can press a specific button on the infrared remote controller 12 then a menu will be displayed on the screen 28.
  • FIG. 8-A is an example of a menu displayed on the screen.
  • the user can select an option with the infrared remote controller 12.
  • the user may select option 3 to view unread stored documents.
  • the list of unread documents may be displayed like the example shown in FIG. 8-B.
  • the user can select an item in this list to view.
  • the access level of different unique secret keys is shown in the status column.
  • the contents of the document is displayed on the screen, like the example shown in FIG. 8-C.
  • the user can select an option to print this document, to delete this documents, or to change the access level of the sender system that has sent the document.
  • FIG. 9-A is a flowchart illustrating a method of controlling and changing access level of a unique secret key in the list of secret keys 112 by a user of the apparatus 10.
  • the user can select an option to delete the document, to delete the document and refuse future acceptance by the sender system of the document or to authorize the sender system by changing its status from a "waiting for validation" status. If a document is sent by a system with an access level A ("sender official"), that system may be permanently authorized and it cannot be changed.
  • the CPU 40 executes one of these steps 500 or 510 or 520 depending on the particular button pressed on the remote controller 12.
  • the CPU 40 may check the access level of the unique secret key (in the list 112) attached to the displayed document. At step 502, if the access level does not match access level B or level C, the CPU 40 terminates the process. If the level matches level B or level C, the CPU 40 will modify the access level of the unique secret key to level R at step 504 then at step 506, the CPU 40 writes the sender's name to the list of refused sender names 114 before the CPU 40 terminates the process.
  • aspects of the present invention include a process that starts at step 500 and allows a user to refuse a "sender authorized" or a "sender in waiting for validation" from sending future documents to the user's apparatus.
  • the CPU 40 may check the access level of the unique secret key (in list 112) associated with the displayed document. At step 512, if the access level does not match level B or level C, the CPU 40 terminates the process. But if the level matches level B or level C, at step 514 the CPU 40 modifies the access level of the unique secret key to level R then at step 516, the CPU 40 writes the sender's name of the displayed document to the list of refused sender names 114. At step 518, the CPU 40 erases the compressed image file (of the displayed document) stored in the hard disk 58 then ends the process. This process demonstrates that a user may refuse a document sent by a "sender authorized" apparatus or a "sender in waiting for validation" apparatus and documents received from these senders are deleted.
  • the CPU 40 may check the access level of the unique secret key (in list 112) associated with the displayed document. At step 522, if the access level does not match access level C, the CPU 40 terminates the process. If the level matches level C, at step 524, the CPU 40 can modify the access level of the unique secret key to level B then the CPU 40 terminates the process. After this process, the sender system, which has a "waiting for validation” status, has a "sender authorized" status and the receiver apparatus is configured to accept documents sent in the future from this sender system.
  • FIG. 9-B is a flowchart illustrating a method in accordance with aspects of the present invention of authorizing a sender system that has previously been refused.
  • a user may press a button on the remote controller 12 to command the CPU 40 to display on the screen the list of sender names that have been refused 114.
  • the user can select a sender name in the list to evaluate or change then at step 530 display the document by pushing a button on the remote controller 12, for example the button "RECALL".
  • the CPU 40 searches the list of secret keys 112 that matches the sender's name then the CPU 40 modifies the access level of this unique secret key to access level B.
  • the CPU 40 deletes this sender's name from the list of refused sender names 114 then the process ends. This method allows the receiver apparatus to accept documents sent from this sender system after previously denying the same.
  • FIG.10 is a flowchart illustrating a method of sending or auto-forwarding documents to an email server using a dial-up connection linked to an Internet Service Provider (ISP).
  • ISP Internet Service Provider
  • Connection with an the Internet network may be made with various alternative configurations including, but not limited to, a dial-up connection, a DSL connection or a wireless connection.
  • user of the receiver apparatus has stored the ISP telephone number, his email address, his user name, his password, the period and/or frequency for forwarding and the outgoing mail server (e.g. SMTP) into the system and user's parameters 110.
  • the outgoing mail server e.g. SMTP
  • the CPU 40 first gets the current date from the real-time clock 42 then the CPU 40 compares it with the period and/or frequency of forwarding stored in the parameters 110. At step 600, if the current date does not match the period and/or frequency of forwarding, the process is terminated. In another case, at step 602, the CPU 40 generates a real-time identification then continues to step 604 for creating an email file format with the RTI written in the subject of the email and the compressed image file (the document) gets attached to the email. At step 606, the apparatus calls the telephone number of the Internet Service Provider, sends the username and password of the Internet account then wait for the communication to be established.
  • Step 608 if the communication cannot be established for any number of reasons, the process goes to step 616 and wait before resending. Step 616 may have instructions to write the unsuccessful forwarding event to the events register and terminate the process after a limited number of unsuccessful attempts to establish communication.
  • the CPU 40 will send instructions to a modem 70 for connecting with the outgoing mail server (e.g. SMTP server) at step 610 then it sends out the email at step 612. Once the email is sent to the outgoing mail server at step 614, the CPU 40 terminates the communication, disconnects and erases the RTI from the DDR memory. This forwarding event is also written into the event register at step 614 before the process is finished.
  • the sender system may send a document by email using the method of FIG. 10. In this case, the sending process starts from step 602 and the compressed image file is provided by the CPU 40, which may be generated by a connected scanner 22.
  • FIG. H-A and FIG. H-B are flowcharts illustrating a method of selectively receiving documents in imaged file format attached to an email as provided in accordance with aspects of the present invention.
  • the apparatus 10 may be configured to periodically connect to a mail sever using an Internet Protocol.
  • the connection may be done through the modem 70 or via LAN port 78.
  • the connection to the mail server is made every 120 minutes.
  • the connection gives the user the ability to retrieve documents attached to emails, and other information such as the date-time that these emails arrived into the incoming mail server, from the incoming mail server (e.g. POP3).
  • each email retrieved from the POP3 server will be in accordance with the process described in FIG H-A and FIG. H-B.
  • the email is temporary stored into the DDR memory 46. If the size of the file attached to the email is too large, the email will be temporary stored in the hard disk 58.
  • the CPU 40 will extract the real-time identification (RTI) from the email to analyze and identify the sender system.
  • RTI real-time identification
  • the process finishes at step 712 and the email in DDR memory gets deleted.
  • the CPU 40 will decrypt the RTI with an internal algorithm and extracts information from the email, such as the unique secret key ("sender unique secret key"), the sender's name, the owner's postal address, the date, the time and the time zone.
  • the CPU 40 may combine the date, the time and the time zone for obtaining the "sending GMT time".
  • the RTI is auto-generated by the sender system at the time it sends out the document.
  • an email sent by a sender system will arrive to the recipient's incoming mail server within a few minutes and the "receiving GMT time" is attached with the email. Therefore, to increase security, at step 708, the "sending GMT time” will be compared with the "receiving GMT time". If the "receiving GMT time" has a difference of more than a few minutes, such as more than 5 minutes, like more than 10 minutes, compared to the "sending GMT time", the RTI is considered incorrect and the process goes to step 712.
  • the CPU 40 will consider the RTI to be correct.
  • the comparison time of 10 minutes is not static and it is only an example that is subject to change.
  • the CPU 40 will now check the specific format of the "sender unique secret key" extracted from the RTI.
  • the process is terminated at step 712.
  • the step 712 may include instructions to display an "alarm message" on the screen.
  • the process will continue to the flowchart of FIG. H-B.
  • the "sender unique secret key" extracted from the RTI at step 706 is compared with the list of unique secret keys 112 stored in the receiver apparatus.
  • the process goes to step 724 for writing this "sender unique secret key” with access level C in the list 112.
  • the CPU 40 may connect to the outgoing mail server for replying "Authorized Temporary" to the email address of the sender at step 736.
  • the process is terminated and the CPU 40 writes the attached image file of the email and the identity (name and postal address) of the sender into the hard disk 58.
  • the temporary stored email in the DDR memory 46 is also deleted.
  • the receiver apparatus when the receiver apparatus receives a document for the first time from a sender system, the receiver apparatus accepts the compressed file format (document) but the unique secret key of the sender system will be given a "waiting for validation" status, which means the receiver apparatus will not accept additional documents from the sender system until the user of the receiver apparatus reads the received document and changes the access level of the unique secret key of the sender apparatus, in list 112, to access level B ("sender authorized").
  • the "sender unique secret key" matches one of unique secret keys included in the list 112, the process continues to step 716 for analyzing the access level of the matched unique secret key in the list 112.
  • the CPU 40 may connect to the outgoing mail server and reply "Refused" to the email address of the sender at step 720 then terminates the process at step 722, which may include deleting the temporary stored email in the DDR memory. If the access level is C, the CPU 40 may connect to the outgoing mail server at step 726 and reply "Waiting for validation" to the email address of the sender at step 728 and then terminate the process at step 722. If the access level is A or B, the CPU 40 may connect to the outgoing mail server at step 730 for replying "Authorized" to the email address of the sender at step 732 then the process continues to step 738 to terminate.
  • aspects of the present invention include a process for identifying the sender of an email and then provide the receiving system with the ability to selectively receive documents attached to the email.
  • FIG. 12 a diagrammatical representation of a personal computer connected to an apparatus 10 via Internet Protocol is shown for demonstrating remote access capability.
  • the exemplary personal computer is shown as a laptop computer PCl running, for example, on Windows XP and is connected to the apparatus 10 via its Ethernet LAN port.
  • the network communication line 34 is preferably a CAT 5 cross network cable.
  • the communication between the laptop computer PCl and the apparatus 10 can be done through a wireless communication router or through a global Internet Protocol network.
  • the apparatus 10 has been configured with a static Internet Protocol address.
  • the remote access feature may use Internet browser software such as Internet Explorer, Firefox or Netscape for connecting to the apparatus 10 via its static IP address.
  • the communication is secured by a username and password.
  • the laptop computer PCl After the identification, the laptop computer PCl is logged in and the screen on the laptop computer PCl will display a menu, which in one embodiment has function buttons similar to the remote controller 12. Therefore, user of the laptop computer PCl can use all the features of the apparatus 10. In a search mode, documents can be displayed on the screen of the laptop computer PCl.
  • FIG. 13 an example of a document printed with a barcode according to a seventh aspect of the invention is shown.
  • the paper size is preferably standard, such as Letter, Legal, A4 or B5.
  • This method of printing uses a printer driver configured to print in accordance with the requirements of the apparatus.
  • the barcode is printed inside the right paper margin and includes information related to the date of the document and the name of author, for example.
  • the barcode format is preferably type code 128 but is not necessarily limited such barcode.
  • FIG. 14 a flowchart illustrating a method of transferring a paper document in a compressed image file then storing it into the apparatus of FIG. 1 is shown.
  • the paper document may be printed with the method described in FIG. 13 immediately above.
  • User of the apparatus puts a paper document in a scanner then presses a specific button or buttons on the remote controller 12 to initiate the process.
  • the CPU 40 sends instructions to the scanner 22 then the CPU 40 gets an image file into the DDR memory at step 800.
  • the process analyzes the picture file to retrieve information from the barcode.
  • the process will end at step 812 and an error message will be displayed on the screen.
  • step 804 if the barcode is recognized, the CPU 40 will translate the bar code to clear text then extract the author's name and the date of the document then the process continues to step 808 for compressing the image file.
  • step 810 the CPU 40 writes this compressed image file, the Author's name and the date of document into the hard disk 58 before the process is ended.
  • This method discloses a process for storing a paper document by pressing only one specific button. In other embodiments two or more buttons are pressed to initiate the same sequence of steps.
  • FIG. 15 shows a first alternative embodiment of the apparatus 10, which may be integrated into the body of the screen 28.
  • the screen 28 can be a TFT display and may be connected to a telecommunications network 14 via a communication cable 16.
  • the telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20.
  • the MFC which may include a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
  • the MFC is capable of separately printing, copying and scanning.
  • the infrared remote controller 12 may be used to control the apparatus 10.
  • FIG. 16 shows a second alternative embodiment of the apparatus 10, which is integrated into the body of an MFC (printer/scanner/copier) and the TFT screen is installed above the MFC.
  • the MFC has an auto sheet feeder for using multi-sheets operation.
  • the apparatus is connected to a telecommunications network 14 via a communication cable 16.
  • the telephone hand set may be integrated and the remote controller 12 is replaced by an integrated keypad located at the front panel of the MFC.
  • FIG.17 a diagrammatical representation of a laptop computer PC2 incorporating one or more methods or processes of the invention according to a third alternative embodiment is shown.
  • This laptop computer has a built-in modem capable sending and receiving data.
  • the modem meets International standard 33.6 Unified Data Pump (V.34 HD/FD, V.8), 14.4 Unified Data Pump (V.32/V.32bis/V.22/V.22bis, optionally V.23, and V.17/V.21/V.27/V.29), V.42bis data compression, V.42 error correction, and T.30 fax communication.
  • the laptop computer PC2 is connected to a communications network 14 by a communication cable 16.
  • Connection to the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
  • the MFC which may include a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
  • USB Universal Serial Bus
  • the MFC is capable of separately printing, copying and scanning.
  • the principles of the present invention are equally applicable to other computer platforms or architectures and the operating system of the computer may be Windows XP, Windows Vista, Linux, UNIX or other operating systems.
  • the software may be developed for using this computer with methods of the present invention.
  • FIG. 18 a diagrammatical depiction of a process for circulating documents to recipients having the communication device 10 of the present invention is shown, which is generally designated 900.
  • this device 10 can be a personal computer PC2 shown in FIG. 17 or other communication devices that use the method described in the present invention for sending a document.
  • the originator of the documents may be any number of entities, such as a governmental agency, a corporate entity, a bank, an advertising agency, an education institution, a homeowner association, that desires to transmit the documents to a plurality of recipients, such as more than 2, preferably more than 50, still preferably more than 500, and still yet preferably more than 5,000 recipients.
  • the documents may be an informational document, a registration form, an invoice, an ad, a campaign flyer, a special bulletin, a government notice, that are suitable for mass distribution to a plurality of recipients.
  • the mode of sending such documents are by mass mailing, which require printing, assembling and stamping the mail packages, and then mailing them. Not only is costs a significant factor in such undertaking, the "snail mail" process and the general apathy of most recipients to non-personal, non-essential documents cast doubts in the overall effectiveness the sender's mailing campaign.
  • a document originator or sender 902 may send a plurality of documents to a plurality of communication device users Ui -1 , by way of a service center, which has a device server 904.
  • the service center 904 will add a unique secret key associated to an access level and originator's information to the document before dispatching this document to the plurality of communication devices Ui -n .
  • Communication devices Ui -11 will check the access level before accepting the incoming document then send back an acknowledgement to inform the service center 904 whether the incoming document is accepted or denied.
  • the communication devices 10 (not shown) belonging to the users Ui -11 temporarily store the documents in each respective hard drive and will send a reply to the service center 904 acknowledging receipt of the document. If a particular user subsequently declines or rejects the originator 902, then the user that has exercised the refusal will not accept future mass mailing by the originator by flagging the secret key and the originator's personal information associated with the document. In contrast, if a user accepts the document and changes the sender's status to B for authorized sender, then the change in status can be taken as a positive feedback of the delivery method.
  • aspects of the present invention comprises a process for delivering documents through a secure, access-level verifiable process that allows end users to acknowledge receipt of the document, and also accepts or refuses future document delivery.
  • the end users may store, print, view, forward, search, reply, and manipulate the documents in any manner discussed above.
  • the service center 904 comprises a plurality of FAX servers and telephones, modems, or dialers, for simultaneously sending documents to a plurality of users.
  • the service center 904 comprises at least 2 dialers, more preferably at least 20 dialers, still more preferably at least 200 dialers, and yet more preferably at least 2,000 dialers to simultaneously dial, serially dial, or repeatedly dial, and send documents to a plurality of users U 1-0 .
  • Aspects of the present invention further includes provisions for multiple servers each utilizing a plurality of dialers for sending similar documents to different plurality of users.
  • each server may be configured to send a specific document type to targeted groups of communication device users, also called specific server call center.
  • a mega server center capable of sending documents to a large group of users, in the order of 500,000 or more users, may be used for mass document distribution.
  • Such mega server center is contemplated to have at least 10,000 dialers, more preferably at least 50,000 dialers, and yet more preferably at least 100,000 dialers.
  • fax over IP is used to mass distribute documents to a plurality of users of the communication device 10 of the present invention.
  • aspects of the present invention further include provisions for generating revenue from generator or initiator of sent documents.
  • a mass sender of documents is enticed to pay a fee for sending documents to a plurality of recipients.
  • the process comprising one or more of the following steps: (1) promoting the document sending service to potential senders, (2) pricing the service of sending documents by one or more of the following exemplary sending categories: by age, by income, by zip codes, by gender, by marital status, by numbers in a household, by education level, by total number of recipients, by frequency of sending, by the week or some time related interval, etc., (3) taking receipt of the document(s) to be sent from the generator of the document(s), and (4) sending the document(s) using the communication device server of the service center 904.
  • a further aspect of the present invention comprises the step of generating revenue from users of the communication device 10.
  • users can subscribe to specialty services that are delivered directly from the operator of the communication device server 904, which may in turn subscribe to the specialty services from one or more specialty service providers.
  • the service center 904 may permit the specialty service providers to send documents directly to the end users in return for a commission or a percentage of the service price.
  • the following exemplary specialty services are contemplated: news service, financial information service, home bankruptcy listing service, weather information, traffic information, entertainment listing, most frequently visited sites, entertainment news, etc.
  • Other existing subscriber based services may also be implemented with the service center 904 and communication device of the present invention.
  • FIG. 19 an alternative diagrammatical depiction of a process for circulating documents to recipients having the communication device 10 of the present invention is shown, which is generally designated 906.
  • this device 10 can be a personal computer PC2 shown in figure 17 or other communication devices, which sends a document as described in the present invention.
  • a first company 908 possesses one or more databases with unique secret keys associated with an access level as described elsewhere herein. Thus, access to the one or more databases will enable an initiator of a document to send to any one or more of the holders or users of the communication device.
  • the holder of the one or more databases 908 may, for a price or ongoing royalty or licensing fee, provide an initiator of a document 910 one or more secret keys to in turn send documents to the communication devices Ui. n .
  • the sender 910 can associate the purchased unique secret key with a document to be mass distributed to communication devices Ui -11 .
  • the originator of the document may send a plurality of documents using its own mail server 912 or through the services of a service center 904 (FIG. 18).
  • the number of documents sent to each recipient per time interval such as per day, per week, per month, etc., or the number of pages per delivery may be regulated by secret keys given to the sender 910, which may be embedded with security codes for regulating the frequency and contents of the documents.
  • a secret key associated with the originator of the document and personal information will be sent with each document.
  • a recipient sends a reply to the server to reject the document from the originator, the party that has refused acceptance, whether sent by the server or the originator, will not accept future documents associated with the originator by way of the originator's secret key.
  • FIG. 20 an alternative diagrammatical depiction of a process for circulating documents to recipients using the communication device 10 of the present invention is shown, which is generally designated 914.
  • this device 10 can be a personal computer PC2 shown in figure 17 or other communication devices that send documents in the same manner and way as described elsewhere herein.
  • the alternative process resembles the process of FIG. 19.
  • an accounting center 916 is incorporated to track the number of documents received by each communication device Ui -0 This may be implemented by causing the individual communication device 10 to memorize and send immediately or periodically a statement of documents received by sender initiators 910 to an accounting center 916.
  • the accounting center 916 can then send a bill to the initiator 910, which bill may be computed on a per document received by each communication device Ui -n .
  • the method provided herein is capable tying the fee or charge to the initiator of documents with an accurate count of the recipients that actually received the documents.
  • FIG. 21 there is shown a flowchart illustrating a method for sending a payment by check using an apparatus 10 as provided in accordance with aspects of the present invention, which has application software for processing a check, authenticating the check, and delivering the check to a beneficiary's apparatus for crediting.
  • the flowchart illustrates the steps that are carried out when a user of the apparatus 10, such as the one shown in FIG. 1, sends a check to a beneficiary's apparatus via a telecommunications network (e.g., a public telephone switched network).
  • a telecommunications network e.g., a public telephone switched network
  • the user After filling in a check with the beneficiary's name and an amount to be tendered and signing the check, the user places the signed check into the scanner 22 then presses a button on the remote controller 12.
  • the CPU 40 processes the signal from the remote controller and sends instructions through the USB interface to order the scanner 22 to scan an image of the check along with a barcode then writes the check in compressed image file format into the DDR memory 46.
  • the check's image file can be written onto the hard disk 58 (FIG. 2).
  • barcode means information, either alpha numeric, codes, bars, or other identification information, for identifying the account associated with the check, the bank associated with the check, the holder of the check, etc. For example, it could mean the check's account number, routing slip number, or the banking institution where the check originates.
  • the CPU 40 analyzes the saved compressed image file from memory then translates the barcode printed on the check into clear text information or information that the apparatus can understand and can manipulate.
  • the CPU 40 displays the check's image onto the screen 28 (FIG. 1) then the CPU 40 asks the user (i.e., the paying party) to enter the beneficiary's personal information, such as a telephone number.
  • the user enters the beneficiary's personal information using the remote controller 12.
  • Other personal information may include the beneficiary's email address, his social security number, his mailing address, etc. that the telecommunications net work can use to associate with the beneficiary.
  • the CPU 40 asks the user to enter a security password, which may be entered using the remote controller 12.
  • other electronic identification devices such as a fingerprint reader or card reader connected to the apparatus 10, can replace the security password.
  • the CPU 40 compares the security password entered at step 1010 with the security password memorized in the system and user's parameters 110. In one exemplary embodiment, if this comparison does not match, the CPU 40 moves to step 1030 to terminate the operation then display an error message on the screen 28 before writing this error into the events register. Back at step 1012, if the comparison matches, the CPU 40 moves to step 1014 to call a remote check database server and moves to step 1016 to send out the clear text information of the check.
  • the check database server can be a remote server or a local server.
  • the server can be located at a banking institution, a clearinghouse, a brokerage firm, a credit union, etc.
  • the apparatus gets a reply from the remote check's database server before disconnecting from the remote check's database server.
  • replies can include a positive reply, a yes reply, a clear signal reply, a verified reply, a decline reply, a negative reply, a retry reply, an account closed reply, a check stolen reply, a positive reply, etc., which are designed to provide a response to the inquiry.
  • the hard disk of the sender apparatus 10 may contain a local check's database and the CPU 40 can compare the clear text information of the check to this local check's database.
  • step 1020 if the reply from the check's database server is not positive, the CPU 40 moves to step 1030 to terminate the operation then display an error message on the screen 28 before writing this error into the events register.
  • step 1020 if the reply from the check's database server is positive, the CPU 40 will go to step 1022 to call the beneficiary's apparatus then moves to step 1024 to send out the check's image.
  • step 1026 it waits for acknowledgement from the beneficiary's apparatus. Once the acknowledgement is received, the CPU 40 moves to step 1028 to terminate communication with the beneficiary's apparatus, writes an acknowledgement into the events register, and writes an image of the check that was sent onto the hard disk of the apparatus 10.
  • FIG. 22 there is shown a flowchart illustrating a method for sending credit card payments using an apparatus 10 provided in accordance with aspects of the present invention, such as when a user of the apparatus 10 in FIG. 1 wants to send a credit card payment to a beneficiary's apparatus via a telecommunications network (e.g., a public telephone switched network).
  • a telecommunications network e.g., a public telephone switched network.
  • the user can initiate the payment by credit card process by first filling out an authorization form with information, such as the beneficiary's name, an amount to pay, a credit card number, and date information, and signing the form. The user then places his credit card and the signed authorization form into the scanner 22 and presses a button on the remote controller 12.
  • the CPU 40 sends instructions through a USB interface to order the scanner 22 to scan an image of the credit card and the signed authorization form then writes the image in compressed image file format into the DDR memory 46.
  • the image file of the credit card and signed authorization form can be written onto the hard disk of the apparatus 10.
  • the CPU 40 displays the image of the credit card and signed authorization form onto a screen 28 connected to the CPU and the moves to step 1106to ask the user to enter the verification code printed on the back of his credit card.
  • the user enters the beneficiary's telephone number using the remote controller 12.
  • the beneficiary's telephone number can be replaced by the beneficiary's email address or other unique information that the telecommunications network uses to associate with the beneficiary.
  • the CPU 40 asks the user to enter a security password.
  • the security password can be entered using the remote controller 12.
  • other electronic identification devices such as a fingerprint reader or card reader connected to the apparatus 10, can replace the security password.
  • the CPU 40 compares the security password entered at step 1110 with the security password stored in the system and user's parameter 110 data file or database. If this comparison does not yield a match, the CPU 40 moves to step 1124 to terminate the operation then display an error message on the screen 28 before writing this error into the events register. Referring again to step 1112, if the comparison matches, the CPU 40 moves to step 1114 and calls the beneficiary's apparatus using the previously entered telephone number, at step 1108. When the beneficiary's apparatus receives the call from the sender apparatus, the CPU of the sender apparatus forwards the credit card information along with the signed authorization form and the associated verification code at step 1116. At step 1118, the CPU 40 waits for acknowledgement from the beneficiary's apparatus. Once the acknowledgement is received, the CPU 40 moves to step 1120 to terminate communication with the beneficiary's apparatus, write the acknowledgement into the events register, and write the signed authorization form image onto the hard disk of the apparatus 10.
  • FIG. 23 a flowchart provided in accordance with aspects of the present invention illustrates a method for auto-generating a real time identification (RTI) of a recipient's apparatus, including the recipient's coordinate, to enhance system security.
  • this real-time identification protocol is auto-generated by an apparatus in accordance with aspects of the present invention, such as the apparatus 10 shown in FIG. 1, before it calls the recipient's apparatus.
  • a user will use the apparatus in FIG 1 for sending a document to a recipient who uses a similar apparatus with its own set of unique key or secret key and security features as discussed above through a public telephone network switch.
  • the CPU 40 In sending mode, after the user enters a recipient's telephone number and pushes a button on a remote controller, the CPU 40 opens a temporary file (TF) in the DDR memory 46 for stocking information received from the EEPROM 50 and from the FLASH Memory 52 at step 1200.
  • the CPU 40 writes the information into the temporary file TF, which preferably includes the unique secret key 100, the sender's name 102, the postal address of owner 104, and the time zone 106 (FIG. 3).
  • the CPU 40 writes the current date and the current time generated by the real-time clock 42 (FIG. 2) into the temporary file TF.
  • the CPU 40 retrieves the recipient's telephone number, which was previously entered by the user with the remote controller, and writes this number into the temporary file TF.
  • the temporary file TF now contains a chain of characters or data, including the current date-time and the recipient's telephone number.
  • the chain of characters can vary in contents, such as having fewer, more, or different information, and still provide the necessary security for providing a real time identification process.
  • the CPU 40 encrypts this chain of characters with an algorithm and temporarily stores this encrypted chain in the DDR memory 46 at step 1210 before continuing the sending process.
  • this method for auto-generating a real time identification procedure which includes a recipient's coordinate, will reduce or eliminate the risk that an unauthorized apparatus captures documents sent by the sender apparatus 10, such as documents bearing check information, credit card information, or other sensitive information that the sender does not wish to be captured by an unauthorized apparatus.
  • FIG. 24 there is a flowchart illustrating a method for reducing or eliminating the risk that an unauthorized apparatus captures documents sent by an apparatus 10 in accordance with aspects of the present invention.
  • the apparatus of FIG. 1 is used by a recipient and is set in receiving mode and receives an incoming call from another apparatus (i.e., a sender apparatus) on a telephone line, which provides a network between the two apparatuses.
  • the network connection may be made through other means, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP), and wireless communications.
  • ISDN integrated service digital network
  • DSL digital subscriber lines
  • IP Internet protocol
  • the CPU 40 of the receiving apparatus will terminate the communication and disconnect the telephone line at step 1320.
  • the RTI discussed above with reference to FIG. 23, will be received in DDR memory 46 of the receiving apparatus at step 1304.
  • the CPU 40 of the receiving apparatus analyzes this RTI and verifies its format. If the RTI' s format does not match the specific format programmed in the receiving apparatus' memory, the CPU 40 will terminate the communication and releases the telephone line at step 1320. If the RTI matches the specific format, at step 1308, the CPU 40 will decrypt the RTI with an internal algorithm and extracts the recipient's telephone number from the RTI.
  • step 1310 if the recipient's telephone number extracted from the RTI dos not match the telephone number memorized in the receiver apparatus, the CPU 40 will terminate the communication and disconnects the telephone line at step 1320. If the recipient's telephone number extracted from the RTI matches the telephone number memorized in the receiver apparatus, the CPU 40 will continue the receiving process.
  • FIG. 25 there is illustrated a stand-alone apparatus 10 connected to a telecommunications network 14 (e.g., the public switched telephone network) by a communications line 16. Connection with the network may be made through alternative means, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
  • the telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20.
  • a smaitcard reader-writer 22 is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
  • the smartcard reader-writer 22 is capable of bidirectional communications with the apparatus 10.
  • the remote controller 12, which may be IR or RF based, may be used to control the apparatus 10.
  • a TV screen 28 is connected to the apparatus 10 by a video signal cable 30.
  • the TV screen 28 could be a VGA monitor and the video signal cable 30 could be a VGA standard cable.
  • the system of FIG. 25 can send data read from a smartcard that has been inserted into the smartcard reader-writer 22 to another apparatus through the telecommunications network.
  • This system 10 may also receive data from another (i.e., sender) apparatus through the telecommunications network and then writes the received data onto the smartcard.

Abstract

Systems and apparatuses and methods for using the same are discussed involving a telecommunications network for sending, selectively receiving and storing documents. In one embodiment, a system involves at least one sender apparatus and one receiver apparatus in which the receiver apparatus identifies the sender apparatus before accepting document(s) transmitted by the sender apparatus. Other features of the systems and apparatuses include provisions for storing received documents in a storage unit for later viewing on a TV screen or for printing. Certain apparatuses of the invention can store and sort a paper document scanned by a scanner. In one particular aspect of the invention, the apparatus is a highly secured standalone unit.

Description

APPARATUSES, SYSTEMS AND METHODS FOR TRANSMITTING
INFORMATION
[0001] Apparatuses, systems and methods for transmitting information between two communication devices are generally discussed herein with particular discussions on methods, systems, and apparatuses in which communication devices can send, selectively receive, display, store, and forward documents.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0002] This is an ordinary application of Ser. No. 60/932,376, filed June 1 , 2007; of Ser. No. 60/962,684, filed July 31, 2007; and of Ser. No. 60/995,517, filed September 28, 2007. The contents of each of the foregoing references re expressly incorporated herein by reference as if set forth in full.
BACKGROUND
[0003] The present invention relates generally to methods, systems and apparatuses that use a telecommunication network for sending, selectively receiving and storing documents. In accordance with aspects of the present invention, a receiver apparatus automatically identifies a sender apparatus before accepting a document transmitted by the sender apparatus. Other features of the present invention include:
[0004] Storing of documents received in a storage unit of the apparatus for later viewing on a screen or a monitor for analyzing, reviewing, reading, printing, etc.
[0005] Scanning, storing and sorting paper documents scanned by a scanner or other digitization devices, such as a digital camera with adequate resolution.
[0006] User-friendly features in a standalone apparatus for use with similar apparatuses over a communications network, such as a public telephone switched network, which is highly secured through use of an identification key, which can be a unique or secret key assigned to the particular apparatus.
[0007] The word "document" as used herein is intended to broadly mean a medium with recorded information, such as an invoice, a legal letter, a check, an image of a credit card, a manuscript, an agreement, an application, a resume, a video file, a voice file, a still image, etc., which, in one embodiment, may be represented digitally via digitization or saved as a voice data file or video data file.
[0008] Description of Related Art [0009] In today's world, people generate a lot of documents, such electric bills, telephone bills, mobile phone bills, television service or cable bills, bank slips, medicine prescriptions, and a variety of other paper documents. Usually, a user receives these invoices, letters or documents as "hard" copies, which then force the user to organize and manage them or risk missing deadlines or losing them. Because people are not always efficient at organizing documents, they tend to lose or waste time locating old invoices or documents.
[0010] As a way to deliver documents, many companies and organizations choose to send them by faxes or by emails. However, recipients of faxes and emails cannot identify the sending machines or the origin of the documents all of the time to ascertain the authenticity of the documents. Presently, more and more fax machines and computers receive a lot of unsolicited documents for this reason, which is known as junk mail, junk faxes, or spam.
[0011] An exemplary prior art fax machine is disclosed in US Patent No. 6,721,059, which teaches a method and system for blocking unsolicited fax messages by identification of a CSID of the fax machine or the caller ID (CID). However, since a CSID is entered into a fax machine by its owner, he can fill in whatever number or information he desires, whether correctly or not. Moreover, with IP technology and VoIP, a telephone number given by this technology may not be tied up to a physical telephone line and sometime the caller ID service cannot identify this type of telephone number. Still further, ' the telephone number given by IP technology can easily be changed. For these and possibly other reasons, the identification of a sender telephone number or a sender machine may not be reliable and thus a receiving fax machine can still receive unsolicited documents despite being equipped with blocking technology.
[0012] Regarding emails, several commercially available software programs have been designed to distinguish unsolicited messages from solicited messages for eliminating those that are either infected with viruses or are themselves viruses. But users have to routinely update the software or run the risk at missing new viruses. Moreover, e- mail addresses of senders can easily be changed and viruses can mimic them so it is not possible to confidently identify a sender and the origin of a document when an email is received. Not surprisingly, novice email users often face the risks of virus attacks, theft of their online banking passwords, credit card numbers, and other personal information each and every time they surf the Internet. SUMMARY
[0013] Broadly speaking, aspects of the present invention relate to an apparatus for sending information, a document, or a message that includes a combination of one or more of the following: a central processing unit (CPU) with DDR memory, FLASH memory, a EEPROM, a hard disk and its interface, a real-time clock, a modem, a front panel, a TV and VGA output interface, a Liquid crystal display (LCD) screen, an USB interface, a smartcard controller, a SD/MMC/MS adapter, and an infra-red remote controller, an Ethernet interface and a front panel control. The apparatus is usable with a telecommunication network. Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications. The preferred apparatus may be used in a method that includes highly secured transmission with unique secret key for sending and receiving electronic documents. This allows the machine to identify the sender's machine or the sender so that the origin of the document received is known and intentional thus unsolicited documents may be avoided. By limiting transmissions between known senders and recipients, the spread of viruses and perpetration of fraud may be minimized.
[0014] In accordance with aspects of the present invention, the apparatus is configured to automatically store documents received in its storage unit for document management, for displaying documents on screen, and/or for printing documents on demand. Features of the apparatus include bidirectional capability. That is, when the apparatus sends a document to another apparatus, it becomes a sender apparatus (or sender system). When the apparatus (or system) receives a document from another apparatus (or from another system), it becomes a receiver apparatus (or receiver system).
[0015] As used herein, GMT Time means Greenwich date and time.
[0016] Exemplary features of the apparatuses, systems and methods of the present invention include:
[0017] A first aspect of the invention is a secret key implemented in the apparatus:
[0018] When the apparatus of the present invention is in a sending mode, it is identified by a secret key, which is stored permanently into the memory of the apparatus and cannot be modified or deleted. Most preferably, each apparatus as its own unique secret key and is not shared by any other apparatuses in the system. The secret key may have 128 bits and is unique to each apparatus, in specific format with particular checksum algorithm and is hidden. The unique secret key is considered a "sender unique secret key". Additionally, the identity of the owner of the apparatus, which includes his name and his postal address stored in the memory of the apparatus, and can be sent with the "sender unique secret key" as a cross-reference.
[0019] The memory of the apparatus contains a list of unique secret keys for comparing against incoming "sender unique secret keys". Each unique secret key in the list is associated with an access level, which in one embodiment may be adjusted by the receiving apparatus. Exemplary access levels include: access level A for "official sender", access level B for "authorized sender", access level C for "sender waiting of authorisation", and access level R for "sender refused". The number of levels can be extended, such as more than four levels, and the level designations can be other than letters, such as numbers or words. The list of unique secret keys in the receiver apparatus is used to compare with the incoming "sender unique secret key" of the sender apparatus before the receiver apparatus accepts or stores an incoming document into its memory.
[0020] A second aspect of the invention is a method of auto-generating a real-time identification by the sender apparatus and comparing the real-time identification by the receiver apparatus:
[0021] The unique secret key and other static parameters, such as the name of the apparatus (which may be the sender's name), the postal address of the owner and the time zone of the location where the apparatus is installed, are encrypted with the time and date taken from its internal real-time clock, just before the sender apparatus establishes communication with the receiver apparatus. Therefore, the identification of the sender apparatus is a real-time identification that is auto-generated. In a preferred embodiment, the sender apparatus sends out this real-time identification to the receiver apparatus as a way of asking for permission to send documents to the receiver apparatus. The receiver apparatus will compare the date-time of the real-time identification received with the date-time of the receiver apparatus at the moment it receives the real-time identification. If this comparison gives a difference that is much larger than the normal or average time that it takes to establish communication and transmission, the receiver apparatus will consider the real-time identification of the sender apparatus to be old and, and in one embodiment, treats it as stolen data. If that is the case, the receiver apparatus may terminate the communication (or disconnect the apparatus from the telecommunication network). If the time comparison fails again or several times over a finite time period, the receiver apparatus can revert into auto- protection mode and may not answer incoming data signal for a predetermined time period. This method limits the number of times a sender apparatus can attempt-heck a receiver apparatus using a stolen real-time identification to thereby protect the receiver apparatus against intrusion.
[0022] A third aspect of the invention is a method for selectively receiving and auto-storing received documents:
[0023] When the receiver apparatus receives a call or a message from a sender apparatus and communication between the two is established, the receiver apparatus may first decrypt the real-time identification that it received. After comparing the date-time, explained in the second aspect of the invention above, and if this comparison is satisfied, the receiver apparatus then compares the "sender unique secret key" with the list of secret keys stored in the receiver apparatus. If the "sender unique secret key" matches one of the unique secret keys with access level A ("official sender") or access level B ("authorized sender"), the receiver apparatus may then reply "authorizedauthorized" to the sender apparatus. The receiver apparatus then accepts the document from the sender apparatus, stores this document in the hard disk, and sends an acknowledgment to the sender apparatus before it terminates communication. Where the "sender unique secret key" matches one of the unique secret keys in the list with access level R ("refused sender"), the receiver apparatus may send a "refused" reply, or other similar messages, to the sender system then it terminates communication. In the event the "sender unique secret key" matches one of the unique secret keys in the list with an access level C ("sender waiting for authorisation"), the apparatus may send a "waiting for validation" reply to the sender system or apparatus then it terminates communication. Particularly, if the "sender unique secret key" does not match one of the unique secret keys in the list, the receiver apparatus will take it to mean that the document was sent from an unknown sender apparatus, which may be attempting to send a document to the receiver apparatus for the first time. In one embodiment, the receiver apparatus will send a "temporary authorized" reply authorized to the sender apparatus then accepts and stores the incoming document into the hard disk. The "sender unique secret key" of the sender is then written into the list with access level C for further verification. In one embodiment, the receiver apparatus will not accept another or different document from this sender apparatus until the user of the receiver apparatus views the document and changes the access level for this "sender unique secret key" to a level B ("authorized sender")and updating its list of secret keys. Alternatively, the receiver may optionally change the status to access level R ("refused sender"). The received document is stored in memory with the identity of the sender (owner of the sender apparatus) associated with it. An acknowledgment is then sent back to the sender apparatus that may include the identity of the receiver apparatus so that information about the receiver apparatus may be stored in the sender apparatus.
[0024] This method of the invention gives to the receiver apparatus an automatic process for accepting, refusing or receiving documents only one time from an unknown sender apparatus. In another embodiment, if the sender's system has advanced features, it can store the reply it received from the receiver apparatus so that it can automatically manage documents that it sends to the receiver apparatus in the future.
[0025] A fourth aspect of the invention is a method for searching a document and handling authorization of received documents from a sender apparatus or sender systems:
[0026] User of the apparatus can search and view on screen a document stored in the hard disk of the apparatus. The list of documents received is sorted by sender name or by date and time of sending. The receiver may also edit the saved document, using a keyboard (preferably wireless) or a remote controller, by giving it a title or a brief description for added file management and later retrieving and sorting. The user of the apparatus can select a document in the list and display the content of this document and the postal address of sender on the screen for viewing, for printing or forwarding to another receiver system or an email server. The user can also change the access level of unique secret keys in the list when viewing documents, except for access level A ("official sender"), which in the preferred embodiment cannot be changed. The access level A is reserved for official organizations, like for example government offices. Access level C ("sender waiting for validation") can be changed to access level B ("sender authorized") or to access level R ("sender refuse"). Access level B ("sender authorized") can be changed to access level R ("sender refused"). Access level R ("refused sender") can be changed to the access level B ("sender authorized"). To change the access level for any given document or sender, a user can press a button or a sequence of buttons on the remote controller or the keyboard when the document is displayed on screen. In one embodiment, the unique secret key is not displayed on screen but is represented by the sender's name so that the user of the apparatus will not know the sender's unique secret key. The user also can delete a document with a specific button or sequence of buttons on the remote controller or keyboard when a document is displayed on screen. This fourth aspect of the invention allows a user of the apparatus to easily manage documents received and filter unsolicited documents.
[0027] A fifth aspect of the invention is a method for auto-forwarding a received document to another apparatus or to another receiver system:
[0028] User of the apparatus can configure the apparatus for automatically forwarding documents received to another apparatus or to another receiver system. The period or frequency of forwarding documents can be selected by its user. User of the apparatus can also configure it to auto-forward the type of documents received. For example, he can configure auto-forwarding only those documents that have the "sender unique secret keys" matched unique secret keys with access level A or B in the list of unique secret keys stored in the apparatus. In this method, the receiver apparatus automatically becomes a sender apparatus when it establishes a new communication for forwarding the received documents to another receiver apparatus or to another receiver system. When another receiver system is an email server, the user may need an account with an Internet service provider. This aspect of the invention allows the user of the apparatus to receive documents whenever he is away from the location where the apparatus is installed.
[0029] A sixth aspect of the invention is a method for remotely accessing the apparatus:
[0030] A user experienced with computer may read documents stored in its apparatus, such as internal or external memory, remotely if the apparatus and his computer are connected together via an Internet Protocol network or via other high-speed communication networks. In this case, the screen of the computer may display all the functions of the remote controller and the screen of the computer can display documents selected from the hard disk of the apparatus. A password is configured in the apparatus and the computer has to supply this password to gain access to the apparatus. This method allows owner of the apparatus remote access to his documents when he is away from the location where the apparatus is installed. Thus, the apparatus may become a personal secured mailbox.
[0031] A seventh aspect of the invention is a method of printing that involves a barcode containing information, such as the author's name, key search words, and the date the document was created: [0032] The method comprises printer driver software for a sender system using a personal computer. Through the printer driver or software, this bar code is printed along with the content of the document, for example along the right margin of the document. When scanned into the apparatus, the barcode information allows the system to store the document into a sortable or retrieveable file or folder for later retrieval. An example of a document printed by this method is further discussed below. This method of the invention allows a user to print a document that has been stored in the apparatus of the invention.
[0033] An eighth aspect of the invention is a method of transferring a paper document and storing its image file into the apparatus:
[0034] When a document is put into a scanner connected to the apparatus and a user pushes a designated button on a remote controller, or other command console or unit, an image file of the document is temporarily memorized by the apparatus. A program included in the apparatus then analyzes this image to locate the area or region containing a barcode then the barcode is analyzed and translated to clear text for extracting the date of the document, the name of the author, and the subject of the document. After this step, the program included in the apparatus will compress and store the compressed image file into the correct or sortable folder in the hard disk. In one embodiment, the stored document would not be classified as document received by the apparatus via a telecommunication network. However, when the apparatus is in a searching mode, the stored document will be displayed as if it was received via the telecommunication network and the user of the apparatus can view, delete, print or forward the document. This method is useful and allows the user of the apparatus to centralize all documents in the apparatus for better document management.
[0035] A ninth aspect of the invention is a method for backing up the storage unit:
[0036] The apparatus may include options to automatically backup the internal memory by schedule or by manually backing up all the contents of the internal hard disk to an external storage unit, such as a remote server or external hard drive, or to a memory card connected to a USB interface of the apparatus. A password will be asked for this operation and this password is used for protecting data in the external storage unit. In one embodiment, the contents of the external storage unit can only be read by the original apparatus or optionally on another apparatus provided proper clearance is gained, such as with a correct password used during the backup operation. This method allows a user to safely keep his documents.
[0037] A tenth aspect of the invention is a method of sending a payment by check:
[0038] In using the apparatus, a user, such as the owner of the apparatus, can send an image of his signed check to another compatible apparatus through the communications network. After filling in a check with a beneficiary name, an amount to be tendered, and signing the check, the user can place the signed check into a scanner connected to the apparatus then push a button on the remote controller, or other command console or unit, to initiate the process. A program included in the apparatus can then analyze the barcode printed on the check and converts that information into a useable form. In one exemplary embodiment, the information is translated into clear text for writing the check number and other information about the check, such as the amount and the beneficiary, onto a non- volatile memory of the apparatus. After this step, the program included in the apparatus preferably will display the check's image onto a screen connected to the apparatus and then will ask the user to enter additional information about the beneficiary and user's security password. In one exemplary embodiment, the beneficiary's telephone number is added to the check image shown on the display using a remote controller. Alternatively, the beneficiary's address, certain password or keyword associated with the beneficiary, or other information unique to the beneficiary may be added. Once the user confirms the transaction, the program will compare information obtained by the check's barcode with a check database located in the apparatus. Moreover, the apparatus may connect to a remote database for checking and receiving reply from the remote database. If the completed check is verified or positively authenticated, the apparatus can then send out the image of this check to the beneficiary's apparatus through the communications network. Combined with the first and second above- referenced aspects of the invention, this tenth aspect of the invention is configured to provide a level of assurance or comfort to the beneficiary of the check when he or she receives the check knowing that it was sent by the owner of the check.
[0039] An eleventh aspect of the invention is a method for sending credit card payments using the apparatus of the present invention:
[0040] In using the apparatus, a user, such as an owner of the apparatus, can send an image of his credit card along with a signed payment statement or document to another compatible apparatus connected the communications network. After writing the amount to pay and signing an authorization form or statement, the user can put his credit card and the signed authorized statement into a scanner connected to the apparatus and pushes a button on a remote controller. In one exemplary embodiment, a program included in the apparatus will display an image of the credit card and an image of the authorized document, or a single of both items, on a screen connected to the apparatus. In one specific aspect of the present invention, the program then asks the user to enter a verification code printed on the back of the credit card. After this step, the user can enter the beneficiary's telephone number or other information, such as security information or otherwise, using a remote controller. Once the user confirms the transaction, the apparatus will send the image of the credit card and the authorized document, which contains an amount and a signature, to the beneficiary's apparatus through the communications network. Combined with the first and second aspects of the invention described above, this eleventh aspect of the invention is configured to provide a level of assurance or comfort to the beneficiary of the payment that the sender has the same name as the name printed on the credit card and that the user has the credit card on hand at the time he uses this credit card.
[0041] Another aspect of the present invention is a method for reducing or eliminating the risk that an unauthorized apparatus captures documents, documents bearing a check or credit card information.
[0042] Each apparatus provided in accordance with aspects of the present invention preferably has its own coordinate stored into a non-volatile memory of the apparatus, which is most preferably made not to be modifiable by the user of the apparatus. When in a sending mode, the apparatus encrypts the recipient's coordinate, for example the recipient's telephone number, into real time identification. In one exemplary embodiment when in a receiving mode, the receiver apparatus first extracts the recipient's telephone number from the encrypted real time identification and compares the extracted number with the number stored in the receiver apparatus. If the comparison is not a match, the transmission is terminated and the document is not transmitted. If the comparison is a match, the transmission is allowed. This aspect of the present invention is configured to prevent any apparatus from capturing a document that is not the intended recipient's apparatus. [0043] Another aspect of the invention is two-way communications capability between two electronic devices through the communications network via the apparatus.
[0044] Electronic devices such as a biometric reader, a camera, a card reader- writer and other electronic devices may communicate with the apparatus through a local wire or wireless communication channel. One or more programs included in the apparatus can catch data from any of the connected electronic devices and then send them to another apparatus through the communications network. Programs loaded in the apparatus can also receive data from the communications network then write them onto the hard disk of the apparatus, display that information onto the screen connected to the apparatus, transfer them to any of the electronic devices connected to the apparatus. Combined with the above aspects of present invention, this present aspect of the invention permits two-way communications between an electronic device and the apparatus. It also permits two-way communications between two electronic devices through the communications network via the apparatus.
[0045] Other aspects of the present invention include a method for sending a document comprising obtaining a combination secret key and personal identification, said personal identification comprising at least one of a zip code, a postal address, a telephone number, a time zone, and a sender name and associating an access level with the combination secret key and personal identification. Electronically sending a document linked with the combination secret key and personal identification to a recipient and electronically receiving a response to the sent document.
[0046] Still yet other aspects of the present invention include a system for communicating between two communication devices comprising a first communication device comprising a first secret key and a first telephone number; a second communication device comprising a list of secret keys; a network communication connecting the first communication device and the second communication device; and wherein the first secret key is one of a plurality of secret keys in said list of secret keys.
[0047] A still further novel and unobvious feature of the present invention is a method for selectively receiving image files over a communication line comprising receiving a first image file, said first image file linked to a first secret key; receiving a second image file, said second image file linked to a second secret key; comparing said first secret key and said second secret key to a list of secret keys; rejecting a third image file associated with said first secret key; accepting a fourth image file associated with said second secret key. [0048] In still yet another aspect of the present is a method for generating revenue from an act of sending a document over a communication line comprising receiving a document to be sent over the communication line; providing a list of recipients, wherein each recipient is configured to receive an electronic copy of the document; associating each recipient with a secret key personal to said each recipient; and collecting a fee commensurate with at least one of a number of recipients receiving electronic copies of the document and a number of recipients in said list of recipients.
[0049] The concepts disclosed herein also include a communication device for document transmission and management comprising: a network connection; a sending mode; a receiving mode; a secret key unique to said device; a list of secret keys not unique to said device; a storage unit; and a remote controller, and wherein a document received comprises a sender secret key that is at least one of a secret key on said list of secret keys and not a secret key on said list of secret keys.
[0050] In yet another aspect of the present invention, a method for generating revenue is provided comprising associating a secret key with a document to be sent; receiving an electronic file linked to the secret key of the sent document; repeating the associating step for a second document; and paying a monetary value computed based on, at least in part, a number of documents sent.
[0051] A further method disclosed herein includes a method for sending a check to an apparatus linked to a pre-determined telephone number comprising the steps: digitizing an image of a check and displaying the image onto a screen; associating a payer information with the check; verifying the payer information with a check database; sending the image of the check to the apparatus linked to the pre-determined telephone number; and wherein the sending step includes combining a key unique to a sending apparatus with the image of the check.
[0052] A similar method involving a credit card includes a method for sending a credit card payment to an apparatus linked to a pre-determined telephone number comprising the steps: filing out a form with an amount to pay to a beneficiary of the payment; digitizing an image of a credit card and displaying the image onto a screen; entering a password and comparing the entered password with passwords saved in a database; sending the image of the credit card to a apparatus linked to the pre-determined telephone number; and wherein the sending step includes combining a secret key with the image of the credit card.
[0053] Another inventive aspect of the present invention involves a method for sending a payment to a beneficiary using a remote control. The method comprising the steps: digitizing an image of a document; sending the image of the document with a secret key to a remote communication apparatus and over a communication line; having the secret key verified by the remote communication apparatus; and wherein at least one of the digitizing step, verifying step, and sending step involves pressing a button on a remote control.
[0054] Another unique feature of the present invention involves a method creating a chain of characters for security purposes. This method involves sending encrypted information to a receiver apparatus linked to a telephone number, which includes the steps of entering a recipient telephone number into a sender apparatus; creating a chain of characters that include the recipient telephone number, a unique secret key that is unique to the sender apparatus, and at least one of a date information and a time information; encrypting the chain of characters; and sending the encrypted chain of characters to a receiver apparatus, which is linked to the recipient telephone number.
[0055J A further method provided herein includes the steps of receiving an encrypted chain of characters; checking the encrypted chain of characters for acceptable format; decrypting the encrypted chain of characters and extracting a recipient telephone number from the chain of characters; and verifying the extracted telephone number with a telephone number associated with a receiving apparatus.
BRIEF DESCRIPTION OF THE DRAWINGS
[0056] The following drawings form part of the present specification and are included to further demonstrate certain aspects of the present invention. The present invention may be better understood by one or more of these drawings in combination with the detailed description of the specific embodiments presented herein.
[0057] FIG.l is a diagrammatical representation of an apparatus provided in accordance with to the preferred embodiment of the invention;
[0058] FIG. 2 is the block diagram of the apparatus of FIG. 1 ;
[0059] FIG. 3 is a block diagram illustrating an example of implantation of secrets keys in the memory;
[0060] FIG. 4 is a block diagram illustrating two systems, which includes the apparatus presented in FIG.l connected to a public telephone switched network;
[0061] FIG. 5 is a flowchart illustrating a method of creating a real-time identification (RTI) of the sender apparatus;
[0062] FIG. 6 is a flowchart illustrating a method of sending a document through a telecommunication network; [0063] FIG. 7-A is a flowchart illustrating the method of comparing the real-time identification received;
[0064] FIG. 7-B is a flowchart illustrating the method of selectively receiving and auto-storing the received document into memory;
[0065] FIG. 8A-C are examples of menus displayed on a screen during search mode;
[0066] FIG. 9A-B are flowcharts illustrating the method of handling the access level of a unique secret key included in the list of comparison;
[0067] FIG.10 is a flowchart illustrating a method of auto-forwarding documents to an email server;
[0068] FIG. H-A and FIG. H-B are flowcharts illustrating a method of selectively receiving document files attached to an email;
[0069] FIG.12 is a diagrammatical representation of a personal computer connected to the apparatus via Internet Protocol for using remote access feature;
[0070] FIG. 13 is an example of a document printed with a barcode;
[0071] FIG. 14 is a flowchart illustrating a method of transferring a paper document in a compressed image file then storing it into the apparatus;
[0072] FIG.15 is a diagrammatical representation of an apparatus with a liquid crystal display built-in according to a first alternative embodiment;
[0073] FIG.16 is a diagrammatical representation of an apparatus integrated into a multifunction machine (printer/scanner/copier) according to a second alternative embodiment;
[0074] FIG.17 is a diagrammatical representation of a laptop computer using methods of the invention according to a third alternative embodiment;
[0075] FIG. 18 is a diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device;
[0076] FIG. 19 is an alternative diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device;
[0077] FIG. 20 is yet another alternative diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device;
[0078] FIG. 21 is a diagrammatical representation of a process or method for tendering payment, such as a check, using the apparatus in accordance with aspects of the present invention; [0079] FIG. 22 is a diagrammatical representation of an alternative process or method for tendering payment, such as a credit card, using the apparatus in accordance with aspects of the present invention;
[0080] FIG. 23 is a diagrammatical representation of a process or method for creating real time identification data for verifying and authenticating;
[0081] FIG. 24 is a diagrammatical representation of a process or method for processing the real time identification data of FIG. 23; and
[0082] FIG. 25 is a diagrammatical representation of an accessory device useable with the apparatus of the present invention.
DETAILED DESCRIPTION
[0083] The word "document" used in the description is intended to broadly mean any paper medium containing information or images, such an invoice, a legal letter, a book report, a resume, a balance sheet, and all kinds of documents and images suitable for use with the apparatus of the present invention.
[0084] GMT Time means Greenwich date and time.
[0085] Referring first to FIG. 1, there is illustrated a communication device or standalone apparatus 10 provided in accordance with aspects of the present invention connected to a telecommunications network 14 (e.g. a public switched telephone network) by a communications line 16. Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications. The telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20. A multi-function-copier machine (MFC), which includes a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26. The MFC is capable of separately printing, copying and scanning a document. As is understood by a person of ordinary skill in the art, instead of a scanner, a digital camera with sufficient resolution may capture a digital image of a document. In one embodiment, an infrared remote controller 12 is used for controlling the apparatus 10 of the present invention. However, other control console or unit may be used, such as a wired or wireless keyboard or a voice recognition controller. A TV screen 28 is connected to the apparatus 10 by a video signal cable 30. Alternatively, the TV screen 28 could be a VGA monitor and the video signal cable 30 could be a VGA standard cable. The system of FIG. 1 may represent a complete system of the preferred embodiment. [0086] Turning to FIG. 2, there is illustrated an exemplary block diagram of the circuitry of the apparatus 10 of FIG. 1. The CPU 40 acts as the brain or nerve center of the system and it runs the operating system and applications software. A real-time clock integrated circuitry with rechargeable battery built-in 42 provides the current date and current time to the CPU 40. The CPU 40 provides a bus 44 for communicating between the CPU 40 and external memories such as EEPROM memory 50, Flash memory 52, SD/MMC/MS memory adapter 54, and hard disk interface 56. The DDR memory 46 contains uncompressed code for applications software, temporary system data storage and temporary receiving data storage. The EEPROM memory 50 is used to store data and parameters not subject to change or modification, for example the unique secret key of the apparatus, the name of owner of the apparatus, the owner's postal address and the time zone in the most preferred embodiment are not modifiable. The Flash memory 52 is used to store data subject to change and data to be restored after powering up the apparatus. The SD/MMC/MS memory interface 54 is used to read and write data from and to a removable memory card. A hard disk 58 is connected to the CPU 40 via a hard disk interface 56. The hard disk 58 is configured to store documents in compressed picture file format, list of events, and data subject to change. Infrared receiver 62, Led display 64 and buttons 66 of the front panel are connected to the CPU 40 through the front panel interface 60. The CPU 40 communicates with external telecommunication network through the LAN port 78 or through the modem 70 and the line out 72 may provide voice signals for external device (e.g. telephone handset). The modem 70 may include a DSP chip TMS320C54xx and it may include International standard 33.6 Unified Data Pump (V.34 HD/FD, V.8), 14.4 Unified Data Pump (V.32/V.32bis/V.22/V.22bis, optional V.23, and V.17/V.21/V.27/V.29), V.42bis data compression, V.42 error correction, T.30 fax communication. The CPU 40 provides two Universal Serial Bus (USB) channels 74 and 76. These two USBs 74 and 76 may connect with external devices such as MFC (Multi-function copier machine), USB Printer, USB Scanner, USB external hard disk, removable USB memory key and other USB devices that are compatible with the International standard USB 2.0. The Ethernet transceiver 78 provides a LAN port compatible with 10 Base 10/100 Base T and this LAN port 78 can be connected to the Internet Protocol network, to an Ethernet router, or alternatively it can be connected directly to a personal computer by a RJ45 cross cable. The Smartcard controller and adapter 80 may be connected to the CPU 40. A TV or VGA screen can be connected to the video display interface 82 and the video display interface 82 receives data from the CPU 40. [0087] Alternatively, the modem 70 can be replaced by a Digital Subscriber Line modem (DSL modem) or other wire and wireless modem. The hard disk 58 can be replaced by a big capacity memory card, the EEPROM memory 50 can be replace by a ROM, the DDR memory 46 can be replaced by DRAM, and the LED 64 can be replaced by a small LCD. Still furthermore, buttons 66 can be replaced by a numeric keypad and functional buttons.
[0088] Referring now to FIG. 3, there is illustrated an exemplary block diagram of an implementation of memories utilized by the apparatus of FIG 1. In one embodiment, the EEPROM 50 includes a secret key 100 unique to the apparatus, the name of the owner 102 of the apparatus (e.g., the sender's name), the postal address of the owner 104 of the apparatus, and the time zone 106 of the location where the apparatus is delivered or transmits data. In one embodiment, the unique secret key 100 is programmed at the factory to ensure its unique identity. Once a particular apparatus is acquired by a user, the name of the owner 102, the postal address of the owner 104, and the time zone 106 where the apparatus is used can be downloaded to the apparatus from a maintenance managing center before the apparatus is delivered to the buyer. The unique secret key 100 can be a 128 bit key and is secured with a specific format that cannot easily be modified or altered. During power up, the apparatus checks information included in the EEPROM 50 before switching to operating mode. Alternatively, a smartcard may be used with a smartcard adapter 80 and may contain information contained in the EEPROM 50. The Flash memory 52 may include the Operating system and compressed code applications software 108, as well as system and user's parameters 110, a list of comparison of unique secrets keys 112, and a list of sender's names 114 that have been refused, as further discussed below. In one embodiment, the list of comparison of unique secrets keys 112 contains unique secret keys of different sender apparatuses. The list is compiled over time and is gathered by compiling unique secret keys every time a transmission is received from a new sender apparatus. The list 112 may be changed automatically or manually. Each unique secret key in the list 112 is associated with an access level that can be changed by the user of apparatus to permit the sender apparatus linked with that unique secret key to transmit information to the receiving apparatus. An access level grants certain sending privileges to a sender apparatus and instructs a receiver apparatus how to consider certain incoming documents. In one embodiment, four access levels are provided with different access levels contemplated, such as fewer than or greater than four access levels. In one embodiment, access level A is reserved for "Official sender", access level B is reserved for "Authorized sender", access level C is reserved for "sender waiting for validation", and access level R is reserved for "refused sender". Alternatively, all the contents of the EEPROM 50 and the contents of the FLASH Memory 52 may be included in the hard disk 58.
[0089] Referring next to FIG. 4, two systems or apparatuses 10 connected to a public telephone switched network are illustrated. One system Al may be considered a sender system, which will send a document to the receiver system A2, through the public switched telephone network. Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
[0090] Turning now to FIG. 5, a flowchart illustrating a method of creating a real-time identification of the sender apparatus is shown. In one embodiment, the unique realtime identification is auto-generated by the apparatus 10 of sender system Al before it calls the receiver system A2. At step 200, the CPU 40 opens a temporary file (TF) in the DDR memory 46 for stocking information received from the EEPROM 50 and from the FLASH Memory 52. At step 202, the CPU 40 writes the unique secret key 100, the sender's name 102, the postal address of owner 104, and the time zone 106 into a temporary file TF. Similarly, at step 204, the CPU 40 writes a current date and a current time of the real-time clock 42 into the temporary file TF. The temporary file TF now contains a chain of characters that include data of 100, 102, 104, 106 and current date-time. At step 206, the CPU 40 encrypts this chain of characters with an algorithm and temporarily stores this encrypted chain in the DDR memory 46 before terminating the process. As provided by aspects of the present invention, this encrypted chain of characters is a real-time identification (RTI) that permits a receiver system to identify a unique sender apparatus and therefore the origin of a document.
[0091] Turning next to FIG. 6, a flowchart illustrating a method of sending a document by an apparatus 10 is shown. For example, the user of the apparatus 10 in sender system Al wants to send a document to the receiver system A2 via the telecommunication network (e.g. public telephone switched network). To initiate the process, in one embodiment, a paper document is inserted in a scanner 22 located at the sender system Al and then the user dials the telephone number of the receiver system A2 and then presses a specific button on the remote controller 12. At step 300, the CPU 40 sends instructions through the USB interface to instruct the scanner 22 to scan the paper document. The CPU 40 then writes this document in compressed image file format into the DDR memory 46. Alternatively, the CPU 40 can get the compressed image file from the memory card presented in the SD/MMC/MS 54. A real-time identification (explained in FIG. 5) will be auto- generated at step 302 before the modem 70 dials the telephone number of the receiver system A2 at step 304. At step 306, the CPU 40 waits for the communication between the sender system Al and the receiver system A2 to be established. If the communication cannot be established for various reasons, such as a busy signal or the receiver system A2 is not connected to the network, at step 322, the CPU 40 will terminate the communication and the telephone line is released. The process at step 322 may include instructions for redialling, which may be one or more times, and if communication cannot be established after this timeout, the process is terminated. In certain embodiments, the process waits for a short period before repeating from step 302. This process may include many features, such as timeouts, re-dialling a limited number of times, recording errors in an event register, and sending error messages to a screen or monitor to alert the user. Back at step 306, if communication is established between the sender system Al and the receiver system A2, at step 308 the CPU 40 sends out the real-time identification (RTI) then waits for a reply from the receiver system A2 at step 310. At step 312, if the CPU 40 receives a "refused" or "waiting for validation" reply, which may be for various reasons as further discussed below with reference to FIG. 7B, the process then proceeds to step 314 for terminating communication, releasing the telephone line, and erasing the RTI and the compressed image file from the DDR memory 46. The reply from receiver system A2 can be memorized into the events register in the hard disk 58 for further use. Turning back to step 312, if the CPU 40 receives the reply "authorized" from the receiver system A2, at step 316, the CPU 40 will send out the compressed image file and waits for acknowledgment from the receiver system A2. At step 318, if acknowledgement is received, the process continues to step 320 to write the sent compressed image file and the acknowledgement into the hard disk 58. The acknowledgement sent by the receiver apparatus may include the date and time the document is received, its sender's name and its owner's postal address. At step 314, the CPU 40 erases the RTI and the compressed image file then terminates the process. However, if the acknowledgment is not received at step 318 for various reasons, such as a cut-off or loss communication, the process then goes to step 322 and wait before redialling and retransmitting the document. The process at step 322 may include instructions to write sending errors in the event register then terminating the communication and exiting the process after a limited number of attempted transmissions have failed. [0092] Referring now to FIG. 7-A, a flowchart illustrating a method of comparing real-time identification is provided. This flowchart demonstrates a process in the receiver system A2 when it is connected with the sender system Al via a public telephone switched network. At step 400, the modem 70 of the receiver system A2 detects and analyzes an incoming call signal. If the incoming call signal is a voice call, the modem 70 switches the call to the voice circuitry, for example the telephone handset 18 then the process is terminated at step 414. If the incoming call signal is detected as a data signal at step 400, the CPU 40 will establish a communication with the sender system using the modem 70. At step 402, if the communication cannot be established for any reason, the CPU 40 will terminate the communication and disconnect the telephone line at step 416. For securing the apparatus 10 against hacker or other malicious acts, step 416 may include instructions to force the apparatus 10 into auto-protection mode, such as not replying to any data signal call for 30 minutes. Back now to step 402, if the communication is established between the sender system Al and the receiver system A2 at step 404, the RTI will be received and stored in DDR memory 46 then the CPU 40 may analyze this RTI and verify its format at step 406. If the RTI format does not match a specified or recognized format, the CPU 40 will terminate communication and releases the telephone line at step 416. If the RTI matches the specific format, at step 408 the CPU 40 will decrypt the RTI with an internal algorithm and extract the unique secret key (i.e., sender unique secret key), along with other sender personal info (such as the sender's name, the owner's postal address, the date, the time and the time zone). The CPU 40 will combine the date and the time zone for obtaining a "sending GMT time". As explained in FIG. 5 and FIG. 6, the RTI is auto-generated by the apparatus 10 (in the sender system Al) at the time it sends out the document and generally the RTI transmission over the telephone line should not take more than a few seconds. Therefore, to add further security, at step 410, this "sending GMT time" will be compared with the "receiving GMT time". The "receiving GMT time" of the receiver apparatus is obtained by the current date- time from the real-time clock 42 and the time zone 106 of the receiver apparatus. If the "sending GMT time" has a difference of more than a few minutes, such as more than 3 minutes, from the "receiving GMT time", the RTI is considered incorrect and the process goes to step 416. If the comparison of "sending GMT time" matches the "receiving GMT time, with a difference of less than 3 minutes, the CPU 40 will consider the RTI as correct. The "window time" comparison of 3 minutes is not static and is only an example, which is subject to change, to more than or less than 3 minutes. The CPU 40 will now check the specific format of the "sender unique secret key" extracted from the RTI. At step 412, if the format of the "sender unique secret key" does not match the specific format, the process is terminated at step 416. Step 416 may include instructions to quickly disconnect and display an "alarm message" on the screen and forcing the apparatus 10 to go into auto-protection mode so that the apparatus 10 will not reply to any signal data call for some extended period, such as 30 minutes or some increment thereof. Back to step 412, if the "sender unique secret key" matches a recognized format, the process will continue as provided in the flowchart of FIG. 7B.
[0093] Referring now to FIG. 7-B, a flowchart (continued from FIG. 7-A) illustrating a method of selectively accepting an incoming document for storage into memory, such as into the built-in hard disk drive, is provided. In one embodiment, the "sender unique secret key" extracted from the RTI at step 408 is compared with a list of unique secrets keys 112 stored in the receiver apparatus. If this "sender unique secret key" does not match one of the unique secrets keys identified in the list of secret keys 112, the process goes to step 422 for writing this "sender unique secret key" with access level C in the list 112. At step 424, the CPU 40 sends a "Authorized temporary" reply message to the sender system Al. The CPU 40 is now ready to receive the compressed image file (document) from the sender system Al. At step 432, the CPU 40 writes the incoming compressed image file and the identity (name and postal address) of the sender into the hard disk 58 then the CPU 40 sends an acknowledgment to the sender system Al at step 434. The acknowledgement may include the date and time the document was received, the name of the owner of the apparatus of receiver system A2 and the owner's postal address. At step 436, the CPU 40 terminates the communication and writes the receiving event into the events register then erases the RTI from the DDR memory 46. As explained in the summary of the invention, when the receiver apparatus receives an inquiry from a sender system for sending document(s) for the first time (for example Al), the receiver apparatus can accept the compressed file format (document) from the sender system but the unique secret key of the sender system will be identified with a "waiting for validation" status. In one embodiment, this means that the receiver apparatus will not accept any further document(s) from this sender system until the user of the receiver apparatus reads the received document and decides to change the access level of the unique secret key of the sender apparatus, in list 112, to access level B ("sender authorized"). Back at step 418, if the "sender unique secret key" matches one of the unique secrets keys identified in the list 112, the process continues to step 420 for analyzing the access level of the matched unique secret key in the list 112. If the access level is R, at step 426, the CPU 40 will send a "refused" reply to the sender then the process ends at step 438. The process in step 438 may disconnect and terminate communication, write this rejection event into the events register and erases the RTI from DDR memory. If the access level is C, the CPU 40 will send a "waiting for validation" reply at step 428 then ends the process at step 438. If the access level is A or B, the CPU 40 will send a "Authorized" reply to the sender system Al at step 430 then the CPU 40 will be ready to receive the compressed image file from the sender system Al. At step 432, the CPU 40 writes the incoming compressed image file into the hard disk 58 then at step 434, the CPU 40 sends an acknowledgment to the sender system Al before ending at step 436. The received document may be auto-forwarded to another receiver system by a method explained in FIG. 10, as further discussed below.
[0094] Documents stored in the hard disk 58 can easily be searched by a user and the apparatus 10 can display documents stored in the hard drive, compressed in various image file formats such as TIFF, JPEG, PDF or others format, on a display screen 28. A user of the apparatus can print these documents to an attached printer 24, forward them to another receiver system, or delete a document(s) that the user does not want to keep. The user can also setup the apparatus 10 to automatically authorize or automatically refuse documents sent from a particular sender system. For searching a stored document, the user can press a specific button on the infrared remote controller 12 then a menu will be displayed on the screen 28. FIG. 8-A is an example of a menu displayed on the screen. In this menu, the user can select an option with the infrared remote controller 12. For example, the user may select option 3 to view unread stored documents. The list of unread documents may be displayed like the example shown in FIG. 8-B. The user can select an item in this list to view. In one embodiment, the access level of different unique secret keys is shown in the status column. After selecting an item for viewing, the contents of the document is displayed on the screen, like the example shown in FIG. 8-C. The user can select an option to print this document, to delete this documents, or to change the access level of the sender system that has sent the document.
[0095] FIG. 9-A is a flowchart illustrating a method of controlling and changing access level of a unique secret key in the list of secret keys 112 by a user of the apparatus 10. After selecting a document in the list of documents displayed on the screen for reviewing, the user can select an option to delete the document, to delete the document and refuse future acceptance by the sender system of the document or to authorize the sender system by changing its status from a "waiting for validation" status. If a document is sent by a system with an access level A ("sender official"), that system may be permanently authorized and it cannot be changed. The CPU 40 executes one of these steps 500 or 510 or 520 depending on the particular button pressed on the remote controller 12.
[0096] If the user presses a button that corresponds to a "refused" option, at step 500, the CPU 40 may check the access level of the unique secret key (in the list 112) attached to the displayed document. At step 502, if the access level does not match access level B or level C, the CPU 40 terminates the process. If the level matches level B or level C, the CPU 40 will modify the access level of the unique secret key to level R at step 504 then at step 506, the CPU 40 writes the sender's name to the list of refused sender names 114 before the CPU 40 terminates the process. Thus, aspects of the present invention include a process that starts at step 500 and allows a user to refuse a "sender authorized" or a "sender in waiting for validation" from sending future documents to the user's apparatus.
[0097] If the user presses a button corresponding to "Delete and Refuse" options at step 510, the CPU 40 may check the access level of the unique secret key (in list 112) associated with the displayed document. At step 512, if the access level does not match level B or level C, the CPU 40 terminates the process. But if the level matches level B or level C, at step 514 the CPU 40 modifies the access level of the unique secret key to level R then at step 516, the CPU 40 writes the sender's name of the displayed document to the list of refused sender names 114. At step 518, the CPU 40 erases the compressed image file (of the displayed document) stored in the hard disk 58 then ends the process. This process demonstrates that a user may refuse a document sent by a "sender authorized" apparatus or a "sender in waiting for validation" apparatus and documents received from these senders are deleted.
[0098] If the user presses a button that corresponds to a "Authorize" command, at step 520, the CPU 40 may check the access level of the unique secret key (in list 112) associated with the displayed document. At step 522, if the access level does not match access level C, the CPU 40 terminates the process. If the level matches level C, at step 524, the CPU 40 can modify the access level of the unique secret key to level B then the CPU 40 terminates the process. After this process, the sender system, which has a "waiting for validation" status, has a "sender authorized" status and the receiver apparatus is configured to accept documents sent in the future from this sender system.
[0099] FIG. 9-B is a flowchart illustrating a method in accordance with aspects of the present invention of authorizing a sender system that has previously been refused. In one embodiment, a user may press a button on the remote controller 12 to command the CPU 40 to display on the screen the list of sender names that have been refused 114. The user can select a sender name in the list to evaluate or change then at step 530 display the document by pushing a button on the remote controller 12, for example the button "RECALL". At step 532, the CPU 40 searches the list of secret keys 112 that matches the sender's name then the CPU 40 modifies the access level of this unique secret key to access level B. At step 534, the CPU 40 deletes this sender's name from the list of refused sender names 114 then the process ends. This method allows the receiver apparatus to accept documents sent from this sender system after previously denying the same.
[0100] FIG.10 is a flowchart illustrating a method of sending or auto-forwarding documents to an email server using a dial-up connection linked to an Internet Service Provider (ISP). Connection with an the Internet network may be made with various alternative configurations including, but not limited to, a dial-up connection, a DSL connection or a wireless connection. In one embodiment, user of the receiver apparatus has stored the ISP telephone number, his email address, his user name, his password, the period and/or frequency for forwarding and the outgoing mail server (e.g. SMTP) into the system and user's parameters 110. After the compressed image file of the document is stored into the hard disk as explained in FIG. 7-B, the CPU 40 first gets the current date from the real-time clock 42 then the CPU 40 compares it with the period and/or frequency of forwarding stored in the parameters 110. At step 600, if the current date does not match the period and/or frequency of forwarding, the process is terminated. In another case, at step 602, the CPU 40 generates a real-time identification then continues to step 604 for creating an email file format with the RTI written in the subject of the email and the compressed image file (the document) gets attached to the email. At step 606, the apparatus calls the telephone number of the Internet Service Provider, sends the username and password of the Internet account then wait for the communication to be established. At step 608, if the communication cannot be established for any number of reasons, the process goes to step 616 and wait before resending. Step 616 may have instructions to write the unsuccessful forwarding event to the events register and terminate the process after a limited number of unsuccessful attempts to establish communication. Back at step 608, if the communication is established, the CPU 40 will send instructions to a modem 70 for connecting with the outgoing mail server (e.g. SMTP server) at step 610 then it sends out the email at step 612. Once the email is sent to the outgoing mail server at step 614, the CPU 40 terminates the communication, disconnects and erases the RTI from the DDR memory. This forwarding event is also written into the event register at step 614 before the process is finished. [0101] Similarly, the sender system may send a document by email using the method of FIG. 10. In this case, the sending process starts from step 602 and the compressed image file is provided by the CPU 40, which may be generated by a connected scanner 22.
[0102] FIG. H-A and FIG. H-B, are flowcharts illustrating a method of selectively receiving documents in imaged file format attached to an email as provided in accordance with aspects of the present invention. The apparatus 10 may be configured to periodically connect to a mail sever using an Internet Protocol. The connection may be done through the modem 70 or via LAN port 78. For example, the connection to the mail server is made every 120 minutes. The connection gives the user the ability to retrieve documents attached to emails, and other information such as the date-time that these emails arrived into the incoming mail server, from the incoming mail server (e.g. POP3). In one embodiment, each email retrieved from the POP3 server will be in accordance with the process described in FIG H-A and FIG. H-B. At step 700, the email is temporary stored into the DDR memory 46. If the size of the file attached to the email is too large, the email will be temporary stored in the hard disk 58. At step 702, the CPU 40 will extract the real-time identification (RTI) from the email to analyze and identify the sender system. At step 704, if the RTI does not match the specific format, the process finishes at step 712 and the email in DDR memory gets deleted. In one embodiment, if the RTI matches a specified format, at step 706, the CPU 40 will decrypt the RTI with an internal algorithm and extracts information from the email, such as the unique secret key ("sender unique secret key"), the sender's name, the owner's postal address, the date, the time and the time zone. The CPU 40 may combine the date, the time and the time zone for obtaining the "sending GMT time". As explained in FIG. 5 and FIG. 6, the RTI is auto-generated by the sender system at the time it sends out the document. Generally, an email sent by a sender system will arrive to the recipient's incoming mail server within a few minutes and the "receiving GMT time" is attached with the email. Therefore, to increase security, at step 708, the "sending GMT time" will be compared with the "receiving GMT time". If the "receiving GMT time" has a difference of more than a few minutes, such as more than 5 minutes, like more than 10 minutes, compared to the "sending GMT time", the RTI is considered incorrect and the process goes to step 712. If the comparison of "sending GMT time" matches the "receiving GMT time, which is considered proper if falls within a time span of a few minutes, such as within 10 minutes or less, the CPU 40 will consider the RTI to be correct. The comparison time of 10 minutes is not static and it is only an example that is subject to change. The CPU 40 will now check the specific format of the "sender unique secret key" extracted from the RTI. At step 710, if the format of the "sender unique secret key" does not match the specific format, the process is terminated at step 712. The step 712 may include instructions to display an "alarm message" on the screen. Back at step 710, if the "sender unique secret key" matches the specific format, the process will continue to the flowchart of FIG. H-B.
[0103] Referring now to FIG. H-B, the "sender unique secret key" extracted from the RTI at step 706 is compared with the list of unique secret keys 112 stored in the receiver apparatus. At step 714, if this "sender unique secret key" does not match one of the unique secret keys included in the list 112, the process goes to step 724 for writing this "sender unique secret key" with access level C in the list 112. At step 734, the CPU 40 may connect to the outgoing mail server for replying "Authorized Temporary" to the email address of the sender at step 736. At step 738, the process is terminated and the CPU 40 writes the attached image file of the email and the identity (name and postal address) of the sender into the hard disk 58. The temporary stored email in the DDR memory 46 is also deleted. As explained in the summary of the invention, when the receiver apparatus receives a document for the first time from a sender system, the receiver apparatus accepts the compressed file format (document) but the unique secret key of the sender system will be given a "waiting for validation" status, which means the receiver apparatus will not accept additional documents from the sender system until the user of the receiver apparatus reads the received document and changes the access level of the unique secret key of the sender apparatus, in list 112, to access level B ("sender authorized"). Back at step 714, if the "sender unique secret key" matches one of unique secret keys included in the list 112, the process continues to step 716 for analyzing the access level of the matched unique secret key in the list 112. If the access level is R, at step 718, the CPU 40 may connect to the outgoing mail server and reply "Refused" to the email address of the sender at step 720 then terminates the process at step 722, which may include deleting the temporary stored email in the DDR memory. If the access level is C, the CPU 40 may connect to the outgoing mail server at step 726 and reply "Waiting for validation" to the email address of the sender at step 728 and then terminate the process at step 722. If the access level is A or B, the CPU 40 may connect to the outgoing mail server at step 730 for replying "Authorized" to the email address of the sender at step 732 then the process continues to step 738 to terminate. The CPU 40 then writes the attached image file of the email and the identity (name and postal address) of the sender into the hard disk 58. The temporary stored email in the DDR memory 46 may be deleted. Thus, aspects of the present invention include a process for identifying the sender of an email and then provide the receiving system with the ability to selectively receive documents attached to the email.
[0104] Referring now to FIG. 12, a diagrammatical representation of a personal computer connected to an apparatus 10 via Internet Protocol is shown for demonstrating remote access capability. The exemplary personal computer is shown as a laptop computer PCl running, for example, on Windows XP and is connected to the apparatus 10 via its Ethernet LAN port. The network communication line 34 is preferably a CAT 5 cross network cable. Alternatively, the communication between the laptop computer PCl and the apparatus 10 can be done through a wireless communication router or through a global Internet Protocol network. The apparatus 10 has been configured with a static Internet Protocol address. The remote access feature may use Internet browser software such as Internet Explorer, Firefox or Netscape for connecting to the apparatus 10 via its static IP address. The communication is secured by a username and password. After the identification, the laptop computer PCl is logged in and the screen on the laptop computer PCl will display a menu, which in one embodiment has function buttons similar to the remote controller 12. Therefore, user of the laptop computer PCl can use all the features of the apparatus 10. In a search mode, documents can be displayed on the screen of the laptop computer PCl.
[0105] Turning now to FIG. 13, an example of a document printed with a barcode according to a seventh aspect of the invention is shown. The paper size is preferably standard, such as Letter, Legal, A4 or B5. This method of printing uses a printer driver configured to print in accordance with the requirements of the apparatus. In one embodiment, the barcode is printed inside the right paper margin and includes information related to the date of the document and the name of author, for example. The barcode format is preferably type code 128 but is not necessarily limited such barcode.
[0106] Turning now to the FIG. 14, a flowchart illustrating a method of transferring a paper document in a compressed image file then storing it into the apparatus of FIG. 1 is shown. The paper document may be printed with the method described in FIG. 13 immediately above. User of the apparatus puts a paper document in a scanner then presses a specific button or buttons on the remote controller 12 to initiate the process. The CPU 40 sends instructions to the scanner 22 then the CPU 40 gets an image file into the DDR memory at step 800. At step 802, the process analyzes the picture file to retrieve information from the barcode. At step 804, if the process cannot find the barcode or the barcode does not match the required format, the process will end at step 812 and an error message will be displayed on the screen. Back at step 804, if the barcode is recognized, the CPU 40 will translate the bar code to clear text then extract the author's name and the date of the document then the process continues to step 808 for compressing the image file. At step 810, the CPU 40 writes this compressed image file, the Author's name and the date of document into the hard disk 58 before the process is ended. This method discloses a process for storing a paper document by pressing only one specific button. In other embodiments two or more buttons are pressed to initiate the same sequence of steps.
[0107] FIG. 15 shows a first alternative embodiment of the apparatus 10, which may be integrated into the body of the screen 28. The screen 28 can be a TFT display and may be connected to a telecommunications network 14 via a communication cable 16. The telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20. The MFC, which may include a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26. The MFC is capable of separately printing, copying and scanning. The infrared remote controller 12 may be used to control the apparatus 10.
[0108] FIG. 16 shows a second alternative embodiment of the apparatus 10, which is integrated into the body of an MFC (printer/scanner/copier) and the TFT screen is installed above the MFC. The MFC has an auto sheet feeder for using multi-sheets operation. The apparatus is connected to a telecommunications network 14 via a communication cable 16. The telephone hand set may be integrated and the remote controller 12 is replaced by an integrated keypad located at the front panel of the MFC.
[0109] Referring now to FIG.17, a diagrammatical representation of a laptop computer PC2 incorporating one or more methods or processes of the invention according to a third alternative embodiment is shown. This laptop computer has a built-in modem capable sending and receiving data. In one embodiment, the modem meets International standard 33.6 Unified Data Pump (V.34 HD/FD, V.8), 14.4 Unified Data Pump (V.32/V.32bis/V.22/V.22bis, optionally V.23, and V.17/V.21/V.27/V.29), V.42bis data compression, V.42 error correction, and T.30 fax communication. The laptop computer PC2 is connected to a communications network 14 by a communication cable 16. Connection to the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications. The MFC, which may include a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26. The MFC is capable of separately printing, copying and scanning. The principles of the present invention are equally applicable to other computer platforms or architectures and the operating system of the computer may be Windows XP, Windows Vista, Linux, UNIX or other operating systems. The software may be developed for using this computer with methods of the present invention.
[0110] Referring now to FIG. 18, a diagrammatical depiction of a process for circulating documents to recipients having the communication device 10 of the present invention is shown, which is generally designated 900. Alternatively, this device 10 can be a personal computer PC2 shown in FIG. 17 or other communication devices that use the method described in the present invention for sending a document. In one exemplary embodiment, the originator of the documents may be any number of entities, such as a governmental agency, a corporate entity, a bank, an advertising agency, an education institution, a homeowner association, that desires to transmit the documents to a plurality of recipients, such as more than 2, preferably more than 50, still preferably more than 500, and still yet preferably more than 5,000 recipients. As non-limiting examples, the documents may be an informational document, a registration form, an invoice, an ad, a campaign flyer, a special bulletin, a government notice, that are suitable for mass distribution to a plurality of recipients. Presently, the mode of sending such documents are by mass mailing, which require printing, assembling and stamping the mail packages, and then mailing them. Not only is costs a significant factor in such undertaking, the "snail mail" process and the general apathy of most recipients to non-personal, non-essential documents cast doubts in the overall effectiveness the sender's mailing campaign.
[0111] Another mode of mass distribution is through the Internet. Although inexpensive to undertake, spam guards, software viruses, and the general apathy of most recipients negate the low cost Internet alternative. Additionally, it is difficult if not impossible to target a certain geographical demographic of choice due to the random nature of e-mail addresses. Hence, senders desiring to reach recipients in a certain geographical region and of certain demographic are often discouraged by the shortcomings of the Internet.
[0112] Hencetofore, there is provided a process for sending documents in accordance with aspects of the present invention that overcomes the shortcomings associated with the prior art mass mailing methods. With reference again to FIG. 18, a document originator or sender 902 may send a plurality of documents to a plurality of communication device users Ui-1, by way of a service center, which has a device server 904. As discussed above, the service center 904 will add a unique secret key associated to an access level and originator's information to the document before dispatching this document to the plurality of communication devices Ui-n. Communication devices Ui-11 will check the access level before accepting the incoming document then send back an acknowledgement to inform the service center 904 whether the incoming document is accepted or denied.
[0113] Upon receipt of the documents, the communication devices 10 (not shown) belonging to the users Ui-11 temporarily store the documents in each respective hard drive and will send a reply to the service center 904 acknowledging receipt of the document. If a particular user subsequently declines or rejects the originator 902, then the user that has exercised the refusal will not accept future mass mailing by the originator by flagging the secret key and the originator's personal information associated with the document. In contrast, if a user accepts the document and changes the sender's status to B for authorized sender, then the change in status can be taken as a positive feedback of the delivery method. Hence, aspects of the present invention comprises a process for delivering documents through a secure, access-level verifiable process that allows end users to acknowledge receipt of the document, and also accepts or refuses future document delivery. After receiving the documents, the end users may store, print, view, forward, search, reply, and manipulate the documents in any manner discussed above.
[0114] In one exemplary embodiment, the service center 904 comprises a plurality of FAX servers and telephones, modems, or dialers, for simultaneously sending documents to a plurality of users. In one exemplary embodiment, the service center 904 comprises at least 2 dialers, more preferably at least 20 dialers, still more preferably at least 200 dialers, and yet more preferably at least 2,000 dialers to simultaneously dial, serially dial, or repeatedly dial, and send documents to a plurality of users U1-0. Aspects of the present invention further includes provisions for multiple servers each utilizing a plurality of dialers for sending similar documents to different plurality of users. Alternatively, each server may be configured to send a specific document type to targeted groups of communication device users, also called specific server call center. Still alternatively, a mega server center capable of sending documents to a large group of users, in the order of 500,000 or more users, may be used for mass document distribution. Such mega server center is contemplated to have at least 10,000 dialers, more preferably at least 50,000 dialers, and yet more preferably at least 100,000 dialers.
[0115] In another aspect of the present invention, fax over IP (FoIP) is used to mass distribute documents to a plurality of users of the communication device 10 of the present invention.
[0116] Aspects of the present invention further include provisions for generating revenue from generator or initiator of sent documents. In one exemplary embodiment, a mass sender of documents is enticed to pay a fee for sending documents to a plurality of recipients. The process comprising one or more of the following steps: (1) promoting the document sending service to potential senders, (2) pricing the service of sending documents by one or more of the following exemplary sending categories: by age, by income, by zip codes, by gender, by marital status, by numbers in a household, by education level, by total number of recipients, by frequency of sending, by the week or some time related interval, etc., (3) taking receipt of the document(s) to be sent from the generator of the document(s), and (4) sending the document(s) using the communication device server of the service center 904.
[0117] A further aspect of the present invention comprises the step of generating revenue from users of the communication device 10. For example, users can subscribe to specialty services that are delivered directly from the operator of the communication device server 904, which may in turn subscribe to the specialty services from one or more specialty service providers. Alternatively, the service center 904 may permit the specialty service providers to send documents directly to the end users in return for a commission or a percentage of the service price. The following exemplary specialty services are contemplated: news service, financial information service, home bankruptcy listing service, weather information, traffic information, entertainment listing, most frequently visited sites, entertainment news, etc. Other existing subscriber based services may also be implemented with the service center 904 and communication device of the present invention.
[0118] Referring now to FIG. 19, an alternative diagrammatical depiction of a process for circulating documents to recipients having the communication device 10 of the present invention is shown, which is generally designated 906. Alternatively, this device 10 can be a personal computer PC2 shown in figure 17 or other communication devices, which sends a document as described in the present invention. In one exemplary embodiment, a first company 908 possesses one or more databases with unique secret keys associated with an access level as described elsewhere herein. Thus, access to the one or more databases will enable an initiator of a document to send to any one or more of the holders or users of the communication device.
[0119] To generate revenue for the privilege accessing the one or more databases of unique secret keys, the holder of the one or more databases 908 may, for a price or ongoing royalty or licensing fee, provide an initiator of a document 910 one or more secret keys to in turn send documents to the communication devices Ui.n. The sender 910 can associate the purchased unique secret key with a document to be mass distributed to communication devices Ui-11. The originator of the document may send a plurality of documents using its own mail server 912 or through the services of a service center 904 (FIG. 18). In one exemplary embodiment, the number of documents sent to each recipient per time interval, such as per day, per week, per month, etc., or the number of pages per delivery may be regulated by secret keys given to the sender 910, which may be embedded with security codes for regulating the frequency and contents of the documents.
[0120] If sent using a service center (e.g., server 904, FIG. 18), a secret key associated with the originator of the document and personal information will be sent with each document. Thus, when a recipient sends a reply to the server to reject the document from the originator, the party that has refused acceptance, whether sent by the server or the originator, will not accept future documents associated with the originator by way of the originator's secret key.
[0121] With reference now to FIG. 20, an alternative diagrammatical depiction of a process for circulating documents to recipients using the communication device 10 of the present invention is shown, which is generally designated 914. Alternatively, this device 10 can be a personal computer PC2 shown in figure 17 or other communication devices that send documents in the same manner and way as described elsewhere herein. The alternative process resembles the process of FIG. 19. However, an accounting center 916 is incorporated to track the number of documents received by each communication device Ui-0 This may be implemented by causing the individual communication device 10 to memorize and send immediately or periodically a statement of documents received by sender initiators 910 to an accounting center 916. The accounting center 916 can then send a bill to the initiator 910, which bill may be computed on a per document received by each communication device Ui-n. Thus, the method provided herein is capable tying the fee or charge to the initiator of documents with an accurate count of the recipients that actually received the documents.
[0122] In a further aspect of the present invention, means for tendering a check using the apparatus of the present invention is provided. Turning initially to FIG. 21, there is shown a flowchart illustrating a method for sending a payment by check using an apparatus 10 as provided in accordance with aspects of the present invention, which has application software for processing a check, authenticating the check, and delivering the check to a beneficiary's apparatus for crediting. The flowchart illustrates the steps that are carried out when a user of the apparatus 10, such as the one shown in FIG. 1, sends a check to a beneficiary's apparatus via a telecommunications network (e.g., a public telephone switched network). After filling in a check with the beneficiary's name and an amount to be tendered and signing the check, the user places the signed check into the scanner 22 then presses a button on the remote controller 12. At step 1002, the CPU 40 processes the signal from the remote controller and sends instructions through the USB interface to order the scanner 22 to scan an image of the check along with a barcode then writes the check in compressed image file format into the DDR memory 46. Alternatively, the check's image file can be written onto the hard disk 58 (FIG. 2). As used herein in connection with the check tendering process, paying, and cashing aspects of the present invention, the term barcode means information, either alpha numeric, codes, bars, or other identification information, for identifying the account associated with the check, the bank associated with the check, the holder of the check, etc. For example, it could mean the check's account number, routing slip number, or the banking institution where the check originates.
[0123] At step 1004, the CPU 40 analyzes the saved compressed image file from memory then translates the barcode printed on the check into clear text information or information that the apparatus can understand and can manipulate. At step 1006, the CPU 40 displays the check's image onto the screen 28 (FIG. 1) then the CPU 40 asks the user (i.e., the paying party) to enter the beneficiary's personal information, such as a telephone number. At step 1008, the user enters the beneficiary's personal information using the remote controller 12. Other personal information may include the beneficiary's email address, his social security number, his mailing address, etc. that the telecommunications net work can use to associate with the beneficiary. Then at step 1010, the CPU 40 asks the user to enter a security password, which may be entered using the remote controller 12. Alternatively, other electronic identification devices, such as a fingerprint reader or card reader connected to the apparatus 10, can replace the security password.
[0124] At step 1012, the CPU 40 compares the security password entered at step 1010 with the security password memorized in the system and user's parameters 110. In one exemplary embodiment, if this comparison does not match, the CPU 40 moves to step 1030 to terminate the operation then display an error message on the screen 28 before writing this error into the events register. Back at step 1012, if the comparison matches, the CPU 40 moves to step 1014 to call a remote check database server and moves to step 1016 to send out the clear text information of the check. In one exemplary embodiment, the check database server can be a remote server or a local server. For example, the server can be located at a banking institution, a clearinghouse, a brokerage firm, a credit union, etc. At step 1018, the apparatus gets a reply from the remote check's database server before disconnecting from the remote check's database server. In one exemplary embodiment, replies can include a positive reply, a yes reply, a clear signal reply, a verified reply, a decline reply, a negative reply, a retry reply, an account closed reply, a check stolen reply, a positive reply, etc., which are designed to provide a response to the inquiry. In an alternative embodiment, the hard disk of the sender apparatus 10 may contain a local check's database and the CPU 40 can compare the clear text information of the check to this local check's database.
[0125] At step 1020, if the reply from the check's database server is not positive, the CPU 40 moves to step 1030 to terminate the operation then display an error message on the screen 28 before writing this error into the events register. Back at step 1020, if the reply from the check's database server is positive, the CPU 40 will go to step 1022 to call the beneficiary's apparatus then moves to step 1024 to send out the check's image. At step 1026, it waits for acknowledgement from the beneficiary's apparatus. Once the acknowledgement is received, the CPU 40 moves to step 1028 to terminate communication with the beneficiary's apparatus, writes an acknowledgement into the events register, and writes an image of the check that was sent onto the hard disk of the apparatus 10.
[0126] Turning now to FIG. 22, there is shown a flowchart illustrating a method for sending credit card payments using an apparatus 10 provided in accordance with aspects of the present invention, such as when a user of the apparatus 10 in FIG. 1 wants to send a credit card payment to a beneficiary's apparatus via a telecommunications network (e.g., a public telephone switched network). In one exemplary embodiment, the user can initiate the payment by credit card process by first filling out an authorization form with information, such as the beneficiary's name, an amount to pay, a credit card number, and date information, and signing the form. The user then places his credit card and the signed authorization form into the scanner 22 and presses a button on the remote controller 12. At step 1102, the CPU 40 sends instructions through a USB interface to order the scanner 22 to scan an image of the credit card and the signed authorization form then writes the image in compressed image file format into the DDR memory 46. Alternatively, the image file of the credit card and signed authorization form can be written onto the hard disk of the apparatus 10.
[0127] At step 1104, the CPU 40 displays the image of the credit card and signed authorization form onto a screen 28 connected to the CPU and the moves to step 1106to ask the user to enter the verification code printed on the back of his credit card. At step 1108, the user enters the beneficiary's telephone number using the remote controller 12. Alternatively, the beneficiary's telephone number can be replaced by the beneficiary's email address or other unique information that the telecommunications network uses to associate with the beneficiary. Then at step 1110, the CPU 40 asks the user to enter a security password. The security password can be entered using the remote controller 12. Alternatively, other electronic identification devices, such as a fingerprint reader or card reader connected to the apparatus 10, can replace the security password.
[0128] In one exemplary embodiment, at step 1112, the CPU 40 compares the security password entered at step 1110 with the security password stored in the system and user's parameter 110 data file or database. If this comparison does not yield a match, the CPU 40 moves to step 1124 to terminate the operation then display an error message on the screen 28 before writing this error into the events register. Referring again to step 1112, if the comparison matches, the CPU 40 moves to step 1114 and calls the beneficiary's apparatus using the previously entered telephone number, at step 1108. When the beneficiary's apparatus receives the call from the sender apparatus, the CPU of the sender apparatus forwards the credit card information along with the signed authorization form and the associated verification code at step 1116. At step 1118, the CPU 40 waits for acknowledgement from the beneficiary's apparatus. Once the acknowledgement is received, the CPU 40 moves to step 1120 to terminate communication with the beneficiary's apparatus, write the acknowledgement into the events register, and write the signed authorization form image onto the hard disk of the apparatus 10.
[0129] Turning now to FIG. 23, a flowchart provided in accordance with aspects of the present invention illustrates a method for auto-generating a real time identification (RTI) of a recipient's apparatus, including the recipient's coordinate, to enhance system security. In one specific aspect of the present invention, this real-time identification protocol is auto-generated by an apparatus in accordance with aspects of the present invention, such as the apparatus 10 shown in FIG. 1, before it calls the recipient's apparatus. In one exemplary embodiment, a user will use the apparatus in FIG 1 for sending a document to a recipient who uses a similar apparatus with its own set of unique key or secret key and security features as discussed above through a public telephone network switch. In sending mode, after the user enters a recipient's telephone number and pushes a button on a remote controller, the CPU 40 opens a temporary file (TF) in the DDR memory 46 for stocking information received from the EEPROM 50 and from the FLASH Memory 52 at step 1200. At step 1202, the CPU 40 writes the information into the temporary file TF, which preferably includes the unique secret key 100, the sender's name 102, the postal address of owner 104, and the time zone 106 (FIG. 3). At step 1204, the CPU 40 writes the current date and the current time generated by the real-time clock 42 (FIG. 2) into the temporary file TF. At step 1206, the CPU 40 retrieves the recipient's telephone number, which was previously entered by the user with the remote controller, and writes this number into the temporary file TF. The temporary file TF now contains a chain of characters or data, including the current date-time and the recipient's telephone number. As may be readily apparent to a person of ordinary skill in the art, the chain of characters can vary in contents, such as having fewer, more, or different information, and still provide the necessary security for providing a real time identification process.
[0130] At step 1208, the CPU 40 encrypts this chain of characters with an algorithm and temporarily stores this encrypted chain in the DDR memory 46 at step 1210 before continuing the sending process. Combined with the method described in FIG. 24 below, this method for auto-generating a real time identification procedure, which includes a recipient's coordinate, will reduce or eliminate the risk that an unauthorized apparatus captures documents sent by the sender apparatus 10, such as documents bearing check information, credit card information, or other sensitive information that the sender does not wish to be captured by an unauthorized apparatus.
[0131] Turning now to FIG. 24, there is a flowchart illustrating a method for reducing or eliminating the risk that an unauthorized apparatus captures documents sent by an apparatus 10 in accordance with aspects of the present invention. In one exemplary embodiment, the apparatus of FIG. 1 is used by a recipient and is set in receiving mode and receives an incoming call from another apparatus (i.e., a sender apparatus) on a telephone line, which provides a network between the two apparatuses. Alternatively, the network connection may be made through other means, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP), and wireless communications. At step 1302, if the communication cannot be established for any reason, the CPU 40 of the receiving apparatus will terminate the communication and disconnect the telephone line at step 1320. Back at step 1302, if the communication is established between the sender apparatus and the receiver apparatus, the RTI, discussed above with reference to FIG. 23, will be received in DDR memory 46 of the receiving apparatus at step 1304. In one exemplary embodiment at step 1306, the CPU 40 of the receiving apparatus analyzes this RTI and verifies its format. If the RTI' s format does not match the specific format programmed in the receiving apparatus' memory, the CPU 40 will terminate the communication and releases the telephone line at step 1320. If the RTI matches the specific format, at step 1308, the CPU 40 will decrypt the RTI with an internal algorithm and extracts the recipient's telephone number from the RTI. At step 1310, if the recipient's telephone number extracted from the RTI dos not match the telephone number memorized in the receiver apparatus, the CPU 40 will terminate the communication and disconnects the telephone line at step 1320. If the recipient's telephone number extracted from the RTI matches the telephone number memorized in the receiver apparatus, the CPU 40 will continue the receiving process.
[0132] Referring now to FIG. 25, there is illustrated a stand-alone apparatus 10 connected to a telecommunications network 14 (e.g., the public switched telephone network) by a communications line 16. Connection with the network may be made through alternative means, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications. The telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20. A smaitcard reader-writer 22 is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26. The smartcard reader-writer 22 is capable of bidirectional communications with the apparatus 10. The remote controller 12, which may be IR or RF based, may be used to control the apparatus 10. A TV screen 28 is connected to the apparatus 10 by a video signal cable 30. Alternatively, the TV screen 28 could be a VGA monitor and the video signal cable 30 could be a VGA standard cable. In one exemplary embodiment, the system of FIG. 25 can send data read from a smartcard that has been inserted into the smartcard reader-writer 22 to another apparatus through the telecommunications network. This system 10 may also receive data from another (i.e., sender) apparatus through the telecommunications network and then writes the received data onto the smartcard.
[0133] Thus, there have been described and illustrated herein, methods, system and apparatus for sending, selectively receiving and storing documents. However, those skilled in the art should recognize that many modifications and variations in the size, shape, materials, components, circuit elements, wiring connections and contacts besides those specifically mentioned may be made in the techniques described herein without departing substantially from the concept of the present invention. Accordingly, it should be clearly understood that the form of the invention described herein is exemplary only and is not intended as a limitation on the scope of the invention.

Claims

CLAIMSWhat is claimed is:
1. A method for sending a document comprising: obtaining a combination secret key and personal identification, said personal identification comprising at least one of a name, a zip code, a postal address, a telephone number, and a time zone of a sender; electronically sending a document linked with the combination secret key and personal identification to a recipient; and electronically receiving a response to the sent document.
2. The method according to claim 1, further comprising the step of associating an access level with the combination secret key and personal identification.
3. The method according to claim 1, wherein the document is a payment check.
4. The method according to claim 1, wherein the document is in an image file format.
5. The method according to claim 1, wherein the secret key is unique to a sending apparatus and not modifiable.
6. The method according to claim 1, the document is linked with a bar code.
7. The method according to claim 5, wherein the secret key is established before the apparatus is received by a user.
8. A system for communicating between two communication devices comprising: a first communication device comprising a first secret key and a first telephone number; a second communication device comprising a list of secret keys; a network connecting the first communication device and the second communication device; and wherein the first secret key is one of a plurality of secret keys in said list of secret keys.
9. The system of claim 8, wherein the first secret key is linked to a government entity.
10. The system of claim 8, wherein an access level is associated with the first secret key.
11. The system of claim 8, further comprising a remote controller configured to send a document linked with the first secret key to the second communication device.
12. The system of claim 8, further comprising creating an image file format from a paper document and sending the image file format between the first communication device and the second communication device.
13. The system of claim 12, wherein the paper document is scanned and converted into the image file format.
14. The system of claim 12, wherein the paper document is a payment check.
15. A method for selectively receiving image files over a communications line comprising: receiving a first image file, said first image file linked to a first secret key; receiving a second image file, said second image file linked to a second secret key; comparing said first secret key and said second secret key to a list of secret keys; rejecting a third image file associated with said first secret key; accepting a fourth image file associated with said second secret key.
16. The method of claim 15, wherein the first secret key is unique to a first apparatus.
17. The method of claim 16, wherein the first secret key is not modifiable.
18. The method of claim 15, wherein the fourth image file is associated with a bar code.
19. The method of claim 15, wherein the first image file is an image of a credit card.
20. A communication device for document transmission and management comprising: a network connection; a sending mode; a receiving mode; a secret key unique to said device; a list of secret keys not unique to said device; a storage unit; and a remote controller, and wherein a document received comprises a sender secret key that is at least one of a secret key on said list of secret keys and not a secret key on said list of secret keys.
PCT/US2008/006715 2007-06-01 2008-05-28 Apparatuses, systems and methods for transmitting information WO2008153787A2 (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US93237607P 2007-06-01 2007-06-01
US60/932,376 2007-06-01
US96268407P 2007-07-31 2007-07-31
US60/962,684 2007-07-31
US99551707P 2007-09-28 2007-09-28
US60/995,517 2007-09-28

Publications (2)

Publication Number Publication Date
WO2008153787A2 true WO2008153787A2 (en) 2008-12-18
WO2008153787A3 WO2008153787A3 (en) 2009-02-05

Family

ID=40130385

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/006715 WO2008153787A2 (en) 2007-06-01 2008-05-28 Apparatuses, systems and methods for transmitting information

Country Status (1)

Country Link
WO (1) WO2008153787A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010078657A1 (en) * 2009-01-08 2010-07-15 D-Box Technologies Inc. Cpu platform interface method and device for synchronizing a stream of motion codes with a video stream

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6820204B1 (en) * 1999-03-31 2004-11-16 Nimesh Desai System and method for selective information exchange
US6842772B1 (en) * 2000-03-14 2005-01-11 Envoy World Wide, Inc Application program interface for message routing and management system
US20050182933A1 (en) * 2004-02-03 2005-08-18 Derek Ritz Method and system for document transmission

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6820204B1 (en) * 1999-03-31 2004-11-16 Nimesh Desai System and method for selective information exchange
US6842772B1 (en) * 2000-03-14 2005-01-11 Envoy World Wide, Inc Application program interface for message routing and management system
US20050182933A1 (en) * 2004-02-03 2005-08-18 Derek Ritz Method and system for document transmission

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010078657A1 (en) * 2009-01-08 2010-07-15 D-Box Technologies Inc. Cpu platform interface method and device for synchronizing a stream of motion codes with a video stream
US8390739B2 (en) 2009-01-08 2013-03-05 D-Box Technologies Inc. CPU platform interface method and device for synchronizing a stream of motion codes with a video stream

Also Published As

Publication number Publication date
WO2008153787A3 (en) 2009-02-05

Similar Documents

Publication Publication Date Title
US11394751B2 (en) Electronic messaging exchange
CN101336437B (en) A communication system for providing the delivery of e-mail message
US7085745B2 (en) Method and apparatus for identifying, managing, and controlling communications
US20080235766A1 (en) Apparatus and method for document certification
US20030145212A1 (en) Secure system for delivery of a fax to a remote user
JP2008537650A (en) Method and system for transferring a digital representation of a document via a computer network transfer protocol
US20040120016A1 (en) Method and system for viewing a fax document
WO1996038987A1 (en) Method and apparatus for handling communications
CN1700227A (en) Consumer authentication system, consumer authentication method and service provide equipment
WO2008153787A2 (en) Apparatuses, systems and methods for transmitting information
AU2004216700B2 (en) Method and apparatus for identifying, managing, and controlling communications
JP3619046B2 (en) Facsimile apparatus and control method thereof, and network facsimile apparatus and control method thereof
JP2004199346A (en) Digital data save system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08754756

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08754756

Country of ref document: EP

Kind code of ref document: A2