WO2008153787A2 - Dispositifs, systèmes et procédés de transmission de données - Google Patents
Dispositifs, systèmes et procédés de transmission de données Download PDFInfo
- Publication number
- WO2008153787A2 WO2008153787A2 PCT/US2008/006715 US2008006715W WO2008153787A2 WO 2008153787 A2 WO2008153787 A2 WO 2008153787A2 US 2008006715 W US2008006715 W US 2008006715W WO 2008153787 A2 WO2008153787 A2 WO 2008153787A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secret key
- document
- sender
- image file
- cpu
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00127—Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32502—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices
- H04N1/32523—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices a plurality of output devices
- H04N1/32529—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device in systems having a plurality of input or output devices a plurality of output devices of different type, e.g. internal and external devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/0077—Types of the still picture apparatus
- H04N2201/0093—Facsimile machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3204—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
- H04N2201/3205—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3204—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
- H04N2201/3207—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of an address
Definitions
- the present invention relates generally to methods, systems and apparatuses that use a telecommunication network for sending, selectively receiving and storing documents.
- a receiver apparatus automatically identifies a sender apparatus before accepting a document transmitted by the sender apparatus.
- Other features of the present invention include:
- the word "document” as used herein is intended to broadly mean a medium with recorded information, such as an invoice, a legal letter, a check, an image of a credit card, a manuscript, an agreement, an application, a resume, a video file, a voice file, a still image, etc., which, in one embodiment, may be represented digitally via digitization or saved as a voice data file or video data file.
- aspects of the present invention relate to an apparatus for sending information, a document, or a message that includes a combination of one or more of the following: a central processing unit (CPU) with DDR memory, FLASH memory, a EEPROM, a hard disk and its interface, a real-time clock, a modem, a front panel, a TV and VGA output interface, a Liquid crystal display (LCD) screen, an USB interface, a smartcard controller, a SD/MMC/MS adapter, and an infra-red remote controller, an Ethernet interface and a front panel control.
- the apparatus is usable with a telecommunication network.
- Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
- ISDN integrated service digital network
- DSL digital subscriber lines
- IP Internet protocol
- the preferred apparatus may be used in a method that includes highly secured transmission with unique secret key for sending and receiving electronic documents. This allows the machine to identify the sender's machine or the sender so that the origin of the document received is known and intentional thus unsolicited documents may be avoided. By limiting transmissions between known senders and recipients, the spread of viruses and perpetration of fraud may be minimized.
- the apparatus is configured to automatically store documents received in its storage unit for document management, for displaying documents on screen, and/or for printing documents on demand.
- the apparatus include bidirectional capability. That is, when the apparatus sends a document to another apparatus, it becomes a sender apparatus (or sender system). When the apparatus (or system) receives a document from another apparatus (or from another system), it becomes a receiver apparatus (or receiver system).
- GMT Time Greenwich date and time.
- a first aspect of the invention is a secret key implemented in the apparatus:
- the apparatus of the present invention When the apparatus of the present invention is in a sending mode, it is identified by a secret key, which is stored permanently into the memory of the apparatus and cannot be modified or deleted. Most preferably, each apparatus as its own unique secret key and is not shared by any other apparatuses in the system.
- the secret key may have 128 bits and is unique to each apparatus, in specific format with particular checksum algorithm and is hidden.
- the unique secret key is considered a "sender unique secret key”.
- the identity of the owner of the apparatus which includes his name and his postal address stored in the memory of the apparatus, and can be sent with the "sender unique secret key" as a cross-reference.
- the memory of the apparatus contains a list of unique secret keys for comparing against incoming "sender unique secret keys".
- Each unique secret key in the list is associated with an access level, which in one embodiment may be adjusted by the receiving apparatus.
- Exemplary access levels include: access level A for "official sender”, access level B for "authorized sender”, access level C for "sender waiting of authorisation", and access level R for "sender refused".
- the number of levels can be extended, such as more than four levels, and the level designations can be other than letters, such as numbers or words.
- the list of unique secret keys in the receiver apparatus is used to compare with the incoming "sender unique secret key" of the sender apparatus before the receiver apparatus accepts or stores an incoming document into its memory.
- a second aspect of the invention is a method of auto-generating a real-time identification by the sender apparatus and comparing the real-time identification by the receiver apparatus:
- the unique secret key and other static parameters such as the name of the apparatus (which may be the sender's name), the postal address of the owner and the time zone of the location where the apparatus is installed, are encrypted with the time and date taken from its internal real-time clock, just before the sender apparatus establishes communication with the receiver apparatus. Therefore, the identification of the sender apparatus is a real-time identification that is auto-generated. In a preferred embodiment, the sender apparatus sends out this real-time identification to the receiver apparatus as a way of asking for permission to send documents to the receiver apparatus. The receiver apparatus will compare the date-time of the real-time identification received with the date-time of the receiver apparatus at the moment it receives the real-time identification.
- the receiver apparatus will consider the real-time identification of the sender apparatus to be old and, and in one embodiment, treats it as stolen data. If that is the case, the receiver apparatus may terminate the communication (or disconnect the apparatus from the telecommunication network). If the time comparison fails again or several times over a finite time period, the receiver apparatus can revert into auto- protection mode and may not answer incoming data signal for a predetermined time period. This method limits the number of times a sender apparatus can attempt-heck a receiver apparatus using a stolen real-time identification to thereby protect the receiver apparatus against intrusion.
- a third aspect of the invention is a method for selectively receiving and auto-storing received documents:
- the receiver apparatus may first decrypt the real-time identification that it received. After comparing the date-time, explained in the second aspect of the invention above, and if this comparison is satisfied, the receiver apparatus then compares the "sender unique secret key" with the list of secret keys stored in the receiver apparatus. If the "sender unique secret key" matches one of the unique secret keys with access level A ("official sender") or access level B ("authorized sender”), the receiver apparatus may then reply "authorizedauthorized” to the sender apparatus. The receiver apparatus then accepts the document from the sender apparatus, stores this document in the hard disk, and sends an acknowledgment to the sender apparatus before it terminates communication.
- access level A official sender
- access level B access level B
- the receiver apparatus may send a "refused” reply, or other similar messages, to the sender system then it terminates communication.
- the apparatus may send a "waiting for validation” reply to the sender system or apparatus then it terminates communication.
- the receiver apparatus will take it to mean that the document was sent from an unknown sender apparatus, which may be attempting to send a document to the receiver apparatus for the first time.
- the receiver apparatus will send a "temporary authorized" reply authorized to the sender apparatus then accepts and stores the incoming document into the hard disk.
- the "sender unique secret key" of the sender is then written into the list with access level C for further verification.
- the receiver apparatus will not accept another or different document from this sender apparatus until the user of the receiver apparatus views the document and changes the access level for this "sender unique secret key" to a level B ("authorized sender")and updating its list of secret keys.
- the receiver may optionally change the status to access level R ("refused sender").
- the received document is stored in memory with the identity of the sender (owner of the sender apparatus) associated with it.
- An acknowledgment is then sent back to the sender apparatus that may include the identity of the receiver apparatus so that information about the receiver apparatus may be stored in the sender apparatus.
- This method of the invention gives to the receiver apparatus an automatic process for accepting, refusing or receiving documents only one time from an unknown sender apparatus.
- the sender's system can store the reply it received from the receiver apparatus so that it can automatically manage documents that it sends to the receiver apparatus in the future.
- a fourth aspect of the invention is a method for searching a document and handling authorization of received documents from a sender apparatus or sender systems:
- User of the apparatus can search and view on screen a document stored in the hard disk of the apparatus.
- the list of documents received is sorted by sender name or by date and time of sending.
- the receiver may also edit the saved document, using a keyboard (preferably wireless) or a remote controller, by giving it a title or a brief description for added file management and later retrieving and sorting.
- the user of the apparatus can select a document in the list and display the content of this document and the postal address of sender on the screen for viewing, for printing or forwarding to another receiver system or an email server.
- the user can also change the access level of unique secret keys in the list when viewing documents, except for access level A ("official sender"), which in the preferred embodiment cannot be changed.
- the access level A is reserved for official organizations, like for example government offices.
- Access level C (“sender waiting for validation") can be changed to access level B ("sender authorized") or to access level R ("sender refuse”).
- Access level B (“sender authorized”) can be changed to access level R (“sender refused”).
- Access level R (“refused sender”) can be changed to the access level B (“sender authorized”).
- a user can press a button or a sequence of buttons on the remote controller or the keyboard when the document is displayed on screen.
- the unique secret key is not displayed on screen but is represented by the sender's name so that the user of the apparatus will not know the sender's unique secret key.
- the user also can delete a document with a specific button or sequence of buttons on the remote controller or keyboard when a document is displayed on screen.
- a fifth aspect of the invention is a method for auto-forwarding a received document to another apparatus or to another receiver system:
- User of the apparatus can configure the apparatus for automatically forwarding documents received to another apparatus or to another receiver system.
- the period or frequency of forwarding documents can be selected by its user.
- User of the apparatus can also configure it to auto-forward the type of documents received. For example, he can configure auto-forwarding only those documents that have the "sender unique secret keys" matched unique secret keys with access level A or B in the list of unique secret keys stored in the apparatus.
- the receiver apparatus automatically becomes a sender apparatus when it establishes a new communication for forwarding the received documents to another receiver apparatus or to another receiver system.
- another receiver system is an email server
- the user may need an account with an Internet service provider.
- This aspect of the invention allows the user of the apparatus to receive documents whenever he is away from the location where the apparatus is installed.
- a sixth aspect of the invention is a method for remotely accessing the apparatus:
- a user experienced with computer may read documents stored in its apparatus, such as internal or external memory, remotely if the apparatus and his computer are connected together via an Internet Protocol network or via other high-speed communication networks.
- the screen of the computer may display all the functions of the remote controller and the screen of the computer can display documents selected from the hard disk of the apparatus.
- a password is configured in the apparatus and the computer has to supply this password to gain access to the apparatus. This method allows owner of the apparatus remote access to his documents when he is away from the location where the apparatus is installed. Thus, the apparatus may become a personal secured mailbox.
- a seventh aspect of the invention is a method of printing that involves a barcode containing information, such as the author's name, key search words, and the date the document was created: [0032]
- the method comprises printer driver software for a sender system using a personal computer. Through the printer driver or software, this bar code is printed along with the content of the document, for example along the right margin of the document.
- the barcode information allows the system to store the document into a sortable or retrieveable file or folder for later retrieval.
- An example of a document printed by this method is further discussed below.
- This method of the invention allows a user to print a document that has been stored in the apparatus of the invention.
- An eighth aspect of the invention is a method of transferring a paper document and storing its image file into the apparatus:
- the apparatus when the apparatus is in a searching mode, the stored document will be displayed as if it was received via the telecommunication network and the user of the apparatus can view, delete, print or forward the document. This method is useful and allows the user of the apparatus to centralize all documents in the apparatus for better document management.
- a ninth aspect of the invention is a method for backing up the storage unit:
- the apparatus may include options to automatically backup the internal memory by schedule or by manually backing up all the contents of the internal hard disk to an external storage unit, such as a remote server or external hard drive, or to a memory card connected to a USB interface of the apparatus. A password will be asked for this operation and this password is used for protecting data in the external storage unit.
- the contents of the external storage unit can only be read by the original apparatus or optionally on another apparatus provided proper clearance is gained, such as with a correct password used during the backup operation. This method allows a user to safely keep his documents.
- a tenth aspect of the invention is a method of sending a payment by check:
- a user In using the apparatus, a user, such as the owner of the apparatus, can send an image of his signed check to another compatible apparatus through the communications network. After filling in a check with a beneficiary name, an amount to be tendered, and signing the check, the user can place the signed check into a scanner connected to the apparatus then push a button on the remote controller, or other command console or unit, to initiate the process.
- a program included in the apparatus can then analyze the barcode printed on the check and converts that information into a useable form. In one exemplary embodiment, the information is translated into clear text for writing the check number and other information about the check, such as the amount and the beneficiary, onto a non- volatile memory of the apparatus.
- the program included in the apparatus preferably will display the check's image onto a screen connected to the apparatus and then will ask the user to enter additional information about the beneficiary and user's security password.
- the beneficiary's telephone number is added to the check image shown on the display using a remote controller.
- the beneficiary's address, certain password or keyword associated with the beneficiary, or other information unique to the beneficiary may be added.
- the program will compare information obtained by the check's barcode with a check database located in the apparatus.
- the apparatus may connect to a remote database for checking and receiving reply from the remote database. If the completed check is verified or positively authenticated, the apparatus can then send out the image of this check to the beneficiary's apparatus through the communications network.
- this tenth aspect of the invention is configured to provide a level of assurance or comfort to the beneficiary of the check when he or she receives the check knowing that it was sent by the owner of the check.
- An eleventh aspect of the invention is a method for sending credit card payments using the apparatus of the present invention:
- a user In using the apparatus, a user, such as an owner of the apparatus, can send an image of his credit card along with a signed payment statement or document to another compatible apparatus connected the communications network. After writing the amount to pay and signing an authorization form or statement, the user can put his credit card and the signed authorized statement into a scanner connected to the apparatus and pushes a button on a remote controller.
- a program included in the apparatus will display an image of the credit card and an image of the authorized document, or a single of both items, on a screen connected to the apparatus. In one specific aspect of the present invention, the program then asks the user to enter a verification code printed on the back of the credit card.
- this eleventh aspect of the invention is configured to provide a level of assurance or comfort to the beneficiary of the payment that the sender has the same name as the name printed on the credit card and that the user has the credit card on hand at the time he uses this credit card.
- Another aspect of the present invention is a method for reducing or eliminating the risk that an unauthorized apparatus captures documents, documents bearing a check or credit card information.
- Each apparatus provided in accordance with aspects of the present invention preferably has its own coordinate stored into a non-volatile memory of the apparatus, which is most preferably made not to be modifiable by the user of the apparatus.
- the apparatus When in a sending mode, the apparatus encrypts the recipient's coordinate, for example the recipient's telephone number, into real time identification.
- the receiver apparatus when in a receiving mode, the receiver apparatus first extracts the recipient's telephone number from the encrypted real time identification and compares the extracted number with the number stored in the receiver apparatus. If the comparison is not a match, the transmission is terminated and the document is not transmitted. If the comparison is a match, the transmission is allowed.
- This aspect of the present invention is configured to prevent any apparatus from capturing a document that is not the intended recipient's apparatus.
- Another aspect of the invention is two-way communications capability between two electronic devices through the communications network via the apparatus.
- Electronic devices such as a biometric reader, a camera, a card reader- writer and other electronic devices may communicate with the apparatus through a local wire or wireless communication channel.
- One or more programs included in the apparatus can catch data from any of the connected electronic devices and then send them to another apparatus through the communications network.
- Programs loaded in the apparatus can also receive data from the communications network then write them onto the hard disk of the apparatus, display that information onto the screen connected to the apparatus, transfer them to any of the electronic devices connected to the apparatus.
- this present aspect of the invention permits two-way communications between an electronic device and the apparatus. It also permits two-way communications between two electronic devices through the communications network via the apparatus.
- Other aspects of the present invention include a method for sending a document comprising obtaining a combination secret key and personal identification, said personal identification comprising at least one of a zip code, a postal address, a telephone number, a time zone, and a sender name and associating an access level with the combination secret key and personal identification.
- a method for sending a document comprising obtaining a combination secret key and personal identification, said personal identification comprising at least one of a zip code, a postal address, a telephone number, a time zone, and a sender name and associating an access level with the combination secret key and personal identification.
- Still yet other aspects of the present invention include a system for communicating between two communication devices comprising a first communication device comprising a first secret key and a first telephone number; a second communication device comprising a list of secret keys; a network communication connecting the first communication device and the second communication device; and wherein the first secret key is one of a plurality of secret keys in said list of secret keys.
- a still further novel and unobvious feature of the present invention is a method for selectively receiving image files over a communication line comprising receiving a first image file, said first image file linked to a first secret key; receiving a second image file, said second image file linked to a second secret key; comparing said first secret key and said second secret key to a list of secret keys; rejecting a third image file associated with said first secret key; accepting a fourth image file associated with said second secret key.
- a method for generating revenue from an act of sending a document over a communication line comprising receiving a document to be sent over the communication line; providing a list of recipients, wherein each recipient is configured to receive an electronic copy of the document; associating each recipient with a secret key personal to said each recipient; and collecting a fee commensurate with at least one of a number of recipients receiving electronic copies of the document and a number of recipients in said list of recipients.
- the concepts disclosed herein also include a communication device for document transmission and management comprising: a network connection; a sending mode; a receiving mode; a secret key unique to said device; a list of secret keys not unique to said device; a storage unit; and a remote controller, and wherein a document received comprises a sender secret key that is at least one of a secret key on said list of secret keys and not a secret key on said list of secret keys.
- a method for generating revenue comprising associating a secret key with a document to be sent; receiving an electronic file linked to the secret key of the sent document; repeating the associating step for a second document; and paying a monetary value computed based on, at least in part, a number of documents sent.
- a further method disclosed herein includes a method for sending a check to an apparatus linked to a pre-determined telephone number comprising the steps: digitizing an image of a check and displaying the image onto a screen; associating a payer information with the check; verifying the payer information with a check database; sending the image of the check to the apparatus linked to the pre-determined telephone number; and wherein the sending step includes combining a key unique to a sending apparatus with the image of the check.
- a similar method involving a credit card includes a method for sending a credit card payment to an apparatus linked to a pre-determined telephone number comprising the steps: filing out a form with an amount to pay to a beneficiary of the payment; digitizing an image of a credit card and displaying the image onto a screen; entering a password and comparing the entered password with passwords saved in a database; sending the image of the credit card to a apparatus linked to the pre-determined telephone number; and wherein the sending step includes combining a secret key with the image of the credit card.
- Another inventive aspect of the present invention involves a method for sending a payment to a beneficiary using a remote control.
- the method comprising the steps: digitizing an image of a document; sending the image of the document with a secret key to a remote communication apparatus and over a communication line; having the secret key verified by the remote communication apparatus; and wherein at least one of the digitizing step, verifying step, and sending step involves pressing a button on a remote control.
- Another unique feature of the present invention involves a method creating a chain of characters for security purposes. This method involves sending encrypted information to a receiver apparatus linked to a telephone number, which includes the steps of entering a recipient telephone number into a sender apparatus; creating a chain of characters that include the recipient telephone number, a unique secret key that is unique to the sender apparatus, and at least one of a date information and a time information; encrypting the chain of characters; and sending the encrypted chain of characters to a receiver apparatus, which is linked to the recipient telephone number.
- a further method provided herein includes the steps of receiving an encrypted chain of characters; checking the encrypted chain of characters for acceptable format; decrypting the encrypted chain of characters and extracting a recipient telephone number from the chain of characters; and verifying the extracted telephone number with a telephone number associated with a receiving apparatus.
- FIG.l is a diagrammatical representation of an apparatus provided in accordance with to the preferred embodiment of the invention.
- FIG. 2 is the block diagram of the apparatus of FIG. 1 ;
- FIG. 3 is a block diagram illustrating an example of implantation of secrets keys in the memory
- FIG. 4 is a block diagram illustrating two systems, which includes the apparatus presented in FIG.l connected to a public telephone switched network;
- FIG. 5 is a flowchart illustrating a method of creating a real-time identification (RTI) of the sender apparatus
- FIG. 6 is a flowchart illustrating a method of sending a document through a telecommunication network
- FIG. 7-A is a flowchart illustrating the method of comparing the real-time identification received
- FIG. 7-B is a flowchart illustrating the method of selectively receiving and auto-storing the received document into memory
- FIG. 8A-C are examples of menus displayed on a screen during search mode
- FIG. 9A-B are flowcharts illustrating the method of handling the access level of a unique secret key included in the list of comparison
- FIG.10 is a flowchart illustrating a method of auto-forwarding documents to an email server
- FIG. H-A and FIG. H-B are flowcharts illustrating a method of selectively receiving document files attached to an email
- FIG.12 is a diagrammatical representation of a personal computer connected to the apparatus via Internet Protocol for using remote access feature
- FIG. 13 is an example of a document printed with a barcode
- FIG. 14 is a flowchart illustrating a method of transferring a paper document in a compressed image file then storing it into the apparatus
- FIG.15 is a diagrammatical representation of an apparatus with a liquid crystal display built-in according to a first alternative embodiment
- FIG.16 is a diagrammatical representation of an apparatus integrated into a multifunction machine (printer/scanner/copier) according to a second alternative embodiment
- FIG.17 is a diagrammatical representation of a laptop computer using methods of the invention according to a third alternative embodiment
- FIG. 18 is a diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device
- FIG. 19 is an alternative diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device
- FIG. 20 is yet another alternative diagrammatical representation of a process or method for sending documents to a plurality of end users of the communication device;
- FIG. 21 is a diagrammatical representation of a process or method for tendering payment, such as a check, using the apparatus in accordance with aspects of the present invention
- FIG. 22 is a diagrammatical representation of an alternative process or method for tendering payment, such as a credit card, using the apparatus in accordance with aspects of the present invention
- FIG. 23 is a diagrammatical representation of a process or method for creating real time identification data for verifying and authenticating
- FIG. 24 is a diagrammatical representation of a process or method for processing the real time identification data of FIG. 23.
- FIG. 25 is a diagrammatical representation of an accessory device useable with the apparatus of the present invention.
- the word "document” used in the description is intended to broadly mean any paper medium containing information or images, such an invoice, a legal letter, a book report, a resume, a balance sheet, and all kinds of documents and images suitable for use with the apparatus of the present invention.
- GMT Time Greenwich date and time.
- FIG. 1 there is illustrated a communication device or standalone apparatus 10 provided in accordance with aspects of the present invention connected to a telecommunications network 14 (e.g. a public switched telephone network) by a communications line 16. Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
- the telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20.
- a multi-function-copier machine (MFC) which includes a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
- the MFC is capable of separately printing, copying and scanning a document.
- an infrared remote controller 12 is used for controlling the apparatus 10 of the present invention.
- other control console or unit may be used, such as a wired or wireless keyboard or a voice recognition controller.
- a TV screen 28 is connected to the apparatus 10 by a video signal cable 30.
- the TV screen 28 could be a VGA monitor and the video signal cable 30 could be a VGA standard cable.
- the system of FIG. 1 may represent a complete system of the preferred embodiment. [0086] Turning to FIG. 2, there is illustrated an exemplary block diagram of the circuitry of the apparatus 10 of FIG. 1.
- the CPU 40 acts as the brain or nerve center of the system and it runs the operating system and applications software.
- a real-time clock integrated circuitry with rechargeable battery built-in 42 provides the current date and current time to the CPU 40.
- the CPU 40 provides a bus 44 for communicating between the CPU 40 and external memories such as EEPROM memory 50, Flash memory 52, SD/MMC/MS memory adapter 54, and hard disk interface 56.
- the DDR memory 46 contains uncompressed code for applications software, temporary system data storage and temporary receiving data storage.
- the EEPROM memory 50 is used to store data and parameters not subject to change or modification, for example the unique secret key of the apparatus, the name of owner of the apparatus, the owner's postal address and the time zone in the most preferred embodiment are not modifiable.
- the Flash memory 52 is used to store data subject to change and data to be restored after powering up the apparatus.
- the SD/MMC/MS memory interface 54 is used to read and write data from and to a removable memory card.
- a hard disk 58 is connected to the CPU 40 via a hard disk interface 56.
- the hard disk 58 is configured to store documents in compressed picture file format, list of events, and data subject to change.
- Infrared receiver 62, Led display 64 and buttons 66 of the front panel are connected to the CPU 40 through the front panel interface 60.
- the CPU 40 communicates with external telecommunication network through the LAN port 78 or through the modem 70 and the line out 72 may provide voice signals for external device (e.g. telephone handset).
- the modem 70 may include a DSP chip TMS320C54xx and it may include International standard 33.6 Unified Data Pump (V.34 HD/FD, V.8), 14.4 Unified Data Pump (V.32/V.32bis/V.22/V.22bis, optional V.23, and V.17/V.21/V.27/V.29), V.42bis data compression, V.42 error correction, T.30 fax communication.
- the CPU 40 provides two Universal Serial Bus (USB) channels 74 and 76. These two USBs 74 and 76 may connect with external devices such as MFC (Multi-function copier machine), USB Printer, USB Scanner, USB external hard disk, removable USB memory key and other USB devices that are compatible with the International standard USB 2.0.
- MFC Multi-function copier machine
- the Ethernet transceiver 78 provides a LAN port compatible with 10 Base 10/100 Base T and this LAN port 78 can be connected to the Internet Protocol network, to an Ethernet router, or alternatively it can be connected directly to a personal computer by a RJ45 cross cable.
- the Smartcard controller and adapter 80 may be connected to the CPU 40.
- a TV or VGA screen can be connected to the video display interface 82 and the video display interface 82 receives data from the CPU 40.
- the modem 70 can be replaced by a Digital Subscriber Line modem (DSL modem) or other wire and wireless modem.
- DSL modem Digital Subscriber Line modem
- the hard disk 58 can be replaced by a big capacity memory card
- the EEPROM memory 50 can be replace by a ROM
- the DDR memory 46 can be replaced by DRAM
- the LED 64 can be replaced by a small LCD.
- buttons 66 can be replaced by a numeric keypad and functional buttons.
- the EEPROM 50 includes a secret key 100 unique to the apparatus, the name of the owner 102 of the apparatus (e.g., the sender's name), the postal address of the owner 104 of the apparatus, and the time zone 106 of the location where the apparatus is delivered or transmits data.
- the unique secret key 100 is programmed at the factory to ensure its unique identity. Once a particular apparatus is acquired by a user, the name of the owner 102, the postal address of the owner 104, and the time zone 106 where the apparatus is used can be downloaded to the apparatus from a maintenance managing center before the apparatus is delivered to the buyer.
- the unique secret key 100 can be a 128 bit key and is secured with a specific format that cannot easily be modified or altered.
- the apparatus checks information included in the EEPROM 50 before switching to operating mode.
- a smartcard may be used with a smartcard adapter 80 and may contain information contained in the EEPROM 50.
- the Flash memory 52 may include the Operating system and compressed code applications software 108, as well as system and user's parameters 110, a list of comparison of unique secrets keys 112, and a list of sender's names 114 that have been refused, as further discussed below.
- the list of comparison of unique secrets keys 112 contains unique secret keys of different sender apparatuses.
- the list is compiled over time and is gathered by compiling unique secret keys every time a transmission is received from a new sender apparatus.
- the list 112 may be changed automatically or manually.
- Each unique secret key in the list 112 is associated with an access level that can be changed by the user of apparatus to permit the sender apparatus linked with that unique secret key to transmit information to the receiving apparatus.
- An access level grants certain sending privileges to a sender apparatus and instructs a receiver apparatus how to consider certain incoming documents.
- four access levels are provided with different access levels contemplated, such as fewer than or greater than four access levels.
- access level A is reserved for “Official sender”
- access level B is reserved for “Authorized sender”
- access level C is reserved for “sender waiting for validation”
- access level R is reserved for "refused sender”.
- all the contents of the EEPROM 50 and the contents of the FLASH Memory 52 may be included in the hard disk 58.
- One system Al may be considered a sender system, which will send a document to the receiver system A2, through the public switched telephone network.
- Connection with the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
- ISDN integrated service digital network
- DSL digital subscriber lines
- IP Internet protocol
- the unique realtime identification is auto-generated by the apparatus 10 of sender system Al before it calls the receiver system A2.
- the CPU 40 opens a temporary file (TF) in the DDR memory 46 for stocking information received from the EEPROM 50 and from the FLASH Memory 52.
- the CPU 40 writes the unique secret key 100, the sender's name 102, the postal address of owner 104, and the time zone 106 into a temporary file TF.
- the CPU 40 writes a current date and a current time of the real-time clock 42 into the temporary file TF.
- the temporary file TF now contains a chain of characters that include data of 100, 102, 104, 106 and current date-time.
- the CPU 40 encrypts this chain of characters with an algorithm and temporarily stores this encrypted chain in the DDR memory 46 before terminating the process.
- this encrypted chain of characters is a real-time identification (RTI) that permits a receiver system to identify a unique sender apparatus and therefore the origin of a document.
- RTI real-time identification
- FIG. 6 a flowchart illustrating a method of sending a document by an apparatus 10 is shown.
- the user of the apparatus 10 in sender system Al wants to send a document to the receiver system A2 via the telecommunication network (e.g. public telephone switched network).
- a paper document is inserted in a scanner 22 located at the sender system Al and then the user dials the telephone number of the receiver system A2 and then presses a specific button on the remote controller 12.
- the CPU 40 sends instructions through the USB interface to instruct the scanner 22 to scan the paper document.
- the CPU 40 then writes this document in compressed image file format into the DDR memory 46.
- the CPU 40 can get the compressed image file from the memory card presented in the SD/MMC/MS 54.
- a real-time identification (explained in FIG. 5) will be auto- generated at step 302 before the modem 70 dials the telephone number of the receiver system A2 at step 304.
- the CPU 40 waits for the communication between the sender system Al and the receiver system A2 to be established. If the communication cannot be established for various reasons, such as a busy signal or the receiver system A2 is not connected to the network, at step 322, the CPU 40 will terminate the communication and the telephone line is released.
- the process at step 322 may include instructions for redialling, which may be one or more times, and if communication cannot be established after this timeout, the process is terminated.
- the process waits for a short period before repeating from step 302.
- This process may include many features, such as timeouts, re-dialling a limited number of times, recording errors in an event register, and sending error messages to a screen or monitor to alert the user.
- the CPU 40 sends out the real-time identification (RTI) then waits for a reply from the receiver system A2 at step 310.
- RTI real-time identification
- step 7B the process then proceeds to step 314 for terminating communication, releasing the telephone line, and erasing the RTI and the compressed image file from the DDR memory 46.
- the reply from receiver system A2 can be memorized into the events register in the hard disk 58 for further use.
- step 312 if the CPU 40 receives the reply "authorized" from the receiver system A2, at step 316, the CPU 40 will send out the compressed image file and waits for acknowledgment from the receiver system A2.
- step 318 if acknowledgement is received, the process continues to step 320 to write the sent compressed image file and the acknowledgement into the hard disk 58.
- the acknowledgement sent by the receiver apparatus may include the date and time the document is received, its sender's name and its owner's postal address.
- the CPU 40 erases the RTI and the compressed image file then terminates the process.
- the process then goes to step 322 and wait before redialling and retransmitting the document.
- the process at step 322 may include instructions to write sending errors in the event register then terminating the communication and exiting the process after a limited number of attempted transmissions have failed.
- FIG. 7-A a flowchart illustrating a method of comparing real-time identification is provided. This flowchart demonstrates a process in the receiver system A2 when it is connected with the sender system Al via a public telephone switched network.
- the modem 70 of the receiver system A2 detects and analyzes an incoming call signal. If the incoming call signal is a voice call, the modem 70 switches the call to the voice circuitry, for example the telephone handset 18 then the process is terminated at step 414. If the incoming call signal is detected as a data signal at step 400, the CPU 40 will establish a communication with the sender system using the modem 70. At step 402, if the communication cannot be established for any reason, the CPU 40 will terminate the communication and disconnect the telephone line at step 416. For securing the apparatus 10 against hacker or other malicious acts, step 416 may include instructions to force the apparatus 10 into auto-protection mode, such as not replying to any data signal call for 30 minutes.
- step 402 if the communication is established between the sender system Al and the receiver system A2 at step 404, the RTI will be received and stored in DDR memory 46 then the CPU 40 may analyze this RTI and verify its format at step 406. If the RTI format does not match a specified or recognized format, the CPU 40 will terminate communication and releases the telephone line at step 416. If the RTI matches the specific format, at step 408 the CPU 40 will decrypt the RTI with an internal algorithm and extract the unique secret key (i.e., sender unique secret key), along with other sender personal info (such as the sender's name, the owner's postal address, the date, the time and the time zone). The CPU 40 will combine the date and the time zone for obtaining a "sending GMT time".
- unique secret key i.e., sender unique secret key
- the RTI is auto-generated by the apparatus 10 (in the sender system Al) at the time it sends out the document and generally the RTI transmission over the telephone line should not take more than a few seconds. Therefore, to add further security, at step 410, this "sending GMT time" will be compared with the "receiving GMT time".
- the "receiving GMT time" of the receiver apparatus is obtained by the current date- time from the real-time clock 42 and the time zone 106 of the receiver apparatus. If the "sending GMT time" has a difference of more than a few minutes, such as more than 3 minutes, from the "receiving GMT time", the RTI is considered incorrect and the process goes to step 416.
- the CPU 40 will consider the RTI as correct.
- the "window time” comparison of 3 minutes is not static and is only an example, which is subject to change, to more than or less than 3 minutes.
- the CPU 40 will now check the specific format of the "sender unique secret key" extracted from the RTI. At step 412, if the format of the "sender unique secret key" does not match the specific format, the process is terminated at step 416.
- Step 416 may include instructions to quickly disconnect and display an "alarm message" on the screen and forcing the apparatus 10 to go into auto-protection mode so that the apparatus 10 will not reply to any signal data call for some extended period, such as 30 minutes or some increment thereof.
- the "sender unique secret key" matches a recognized format, the process will continue as provided in the flowchart of FIG. 7B.
- FIG. 7-B a flowchart (continued from FIG. 7-A) illustrating a method of selectively accepting an incoming document for storage into memory, such as into the built-in hard disk drive, is provided.
- the "sender unique secret key” extracted from the RTI at step 408 is compared with a list of unique secrets keys 112 stored in the receiver apparatus. If this "sender unique secret key" does not match one of the unique secrets keys identified in the list of secret keys 112, the process goes to step 422 for writing this "sender unique secret key” with access level C in the list 112.
- the CPU 40 sends a "Authorized temporary" reply message to the sender system Al.
- the CPU 40 is now ready to receive the compressed image file (document) from the sender system Al.
- the CPU 40 writes the incoming compressed image file and the identity (name and postal address) of the sender into the hard disk 58 then the CPU 40 sends an acknowledgment to the sender system Al at step 434.
- the acknowledgement may include the date and time the document was received, the name of the owner of the apparatus of receiver system A2 and the owner's postal address.
- the CPU 40 terminates the communication and writes the receiving event into the events register then erases the RTI from the DDR memory 46.
- the receiver apparatus when the receiver apparatus receives an inquiry from a sender system for sending document(s) for the first time (for example Al), the receiver apparatus can accept the compressed file format (document) from the sender system but the unique secret key of the sender system will be identified with a "waiting for validation" status. In one embodiment, this means that the receiver apparatus will not accept any further document(s) from this sender system until the user of the receiver apparatus reads the received document and decides to change the access level of the unique secret key of the sender apparatus, in list 112, to access level B ("sender authorized").
- step 418 if the "sender unique secret key" matches one of the unique secrets keys identified in the list 112, the process continues to step 420 for analyzing the access level of the matched unique secret key in the list 112. If the access level is R, at step 426, the CPU 40 will send a "refused" reply to the sender then the process ends at step 438. The process in step 438 may disconnect and terminate communication, write this rejection event into the events register and erases the RTI from DDR memory. If the access level is C, the CPU 40 will send a "waiting for validation" reply at step 428 then ends the process at step 438.
- the CPU 40 will send a "Authorized" reply to the sender system Al at step 430 then the CPU 40 will be ready to receive the compressed image file from the sender system Al.
- the CPU 40 writes the incoming compressed image file into the hard disk 58 then at step 434, the CPU 40 sends an acknowledgment to the sender system Al before ending at step 436.
- the received document may be auto-forwarded to another receiver system by a method explained in FIG. 10, as further discussed below.
- Documents stored in the hard disk 58 can easily be searched by a user and the apparatus 10 can display documents stored in the hard drive, compressed in various image file formats such as TIFF, JPEG, PDF or others format, on a display screen 28.
- a user of the apparatus can print these documents to an attached printer 24, forward them to another receiver system, or delete a document(s) that the user does not want to keep.
- the user can also setup the apparatus 10 to automatically authorize or automatically refuse documents sent from a particular sender system.
- the user can press a specific button on the infrared remote controller 12 then a menu will be displayed on the screen 28.
- FIG. 8-A is an example of a menu displayed on the screen.
- the user can select an option with the infrared remote controller 12.
- the user may select option 3 to view unread stored documents.
- the list of unread documents may be displayed like the example shown in FIG. 8-B.
- the user can select an item in this list to view.
- the access level of different unique secret keys is shown in the status column.
- the contents of the document is displayed on the screen, like the example shown in FIG. 8-C.
- the user can select an option to print this document, to delete this documents, or to change the access level of the sender system that has sent the document.
- FIG. 9-A is a flowchart illustrating a method of controlling and changing access level of a unique secret key in the list of secret keys 112 by a user of the apparatus 10.
- the user can select an option to delete the document, to delete the document and refuse future acceptance by the sender system of the document or to authorize the sender system by changing its status from a "waiting for validation" status. If a document is sent by a system with an access level A ("sender official"), that system may be permanently authorized and it cannot be changed.
- the CPU 40 executes one of these steps 500 or 510 or 520 depending on the particular button pressed on the remote controller 12.
- the CPU 40 may check the access level of the unique secret key (in the list 112) attached to the displayed document. At step 502, if the access level does not match access level B or level C, the CPU 40 terminates the process. If the level matches level B or level C, the CPU 40 will modify the access level of the unique secret key to level R at step 504 then at step 506, the CPU 40 writes the sender's name to the list of refused sender names 114 before the CPU 40 terminates the process.
- aspects of the present invention include a process that starts at step 500 and allows a user to refuse a "sender authorized" or a "sender in waiting for validation" from sending future documents to the user's apparatus.
- the CPU 40 may check the access level of the unique secret key (in list 112) associated with the displayed document. At step 512, if the access level does not match level B or level C, the CPU 40 terminates the process. But if the level matches level B or level C, at step 514 the CPU 40 modifies the access level of the unique secret key to level R then at step 516, the CPU 40 writes the sender's name of the displayed document to the list of refused sender names 114. At step 518, the CPU 40 erases the compressed image file (of the displayed document) stored in the hard disk 58 then ends the process. This process demonstrates that a user may refuse a document sent by a "sender authorized" apparatus or a "sender in waiting for validation" apparatus and documents received from these senders are deleted.
- the CPU 40 may check the access level of the unique secret key (in list 112) associated with the displayed document. At step 522, if the access level does not match access level C, the CPU 40 terminates the process. If the level matches level C, at step 524, the CPU 40 can modify the access level of the unique secret key to level B then the CPU 40 terminates the process. After this process, the sender system, which has a "waiting for validation” status, has a "sender authorized" status and the receiver apparatus is configured to accept documents sent in the future from this sender system.
- FIG. 9-B is a flowchart illustrating a method in accordance with aspects of the present invention of authorizing a sender system that has previously been refused.
- a user may press a button on the remote controller 12 to command the CPU 40 to display on the screen the list of sender names that have been refused 114.
- the user can select a sender name in the list to evaluate or change then at step 530 display the document by pushing a button on the remote controller 12, for example the button "RECALL".
- the CPU 40 searches the list of secret keys 112 that matches the sender's name then the CPU 40 modifies the access level of this unique secret key to access level B.
- the CPU 40 deletes this sender's name from the list of refused sender names 114 then the process ends. This method allows the receiver apparatus to accept documents sent from this sender system after previously denying the same.
- FIG.10 is a flowchart illustrating a method of sending or auto-forwarding documents to an email server using a dial-up connection linked to an Internet Service Provider (ISP).
- ISP Internet Service Provider
- Connection with an the Internet network may be made with various alternative configurations including, but not limited to, a dial-up connection, a DSL connection or a wireless connection.
- user of the receiver apparatus has stored the ISP telephone number, his email address, his user name, his password, the period and/or frequency for forwarding and the outgoing mail server (e.g. SMTP) into the system and user's parameters 110.
- the outgoing mail server e.g. SMTP
- the CPU 40 first gets the current date from the real-time clock 42 then the CPU 40 compares it with the period and/or frequency of forwarding stored in the parameters 110. At step 600, if the current date does not match the period and/or frequency of forwarding, the process is terminated. In another case, at step 602, the CPU 40 generates a real-time identification then continues to step 604 for creating an email file format with the RTI written in the subject of the email and the compressed image file (the document) gets attached to the email. At step 606, the apparatus calls the telephone number of the Internet Service Provider, sends the username and password of the Internet account then wait for the communication to be established.
- Step 608 if the communication cannot be established for any number of reasons, the process goes to step 616 and wait before resending. Step 616 may have instructions to write the unsuccessful forwarding event to the events register and terminate the process after a limited number of unsuccessful attempts to establish communication.
- the CPU 40 will send instructions to a modem 70 for connecting with the outgoing mail server (e.g. SMTP server) at step 610 then it sends out the email at step 612. Once the email is sent to the outgoing mail server at step 614, the CPU 40 terminates the communication, disconnects and erases the RTI from the DDR memory. This forwarding event is also written into the event register at step 614 before the process is finished.
- the sender system may send a document by email using the method of FIG. 10. In this case, the sending process starts from step 602 and the compressed image file is provided by the CPU 40, which may be generated by a connected scanner 22.
- FIG. H-A and FIG. H-B are flowcharts illustrating a method of selectively receiving documents in imaged file format attached to an email as provided in accordance with aspects of the present invention.
- the apparatus 10 may be configured to periodically connect to a mail sever using an Internet Protocol.
- the connection may be done through the modem 70 or via LAN port 78.
- the connection to the mail server is made every 120 minutes.
- the connection gives the user the ability to retrieve documents attached to emails, and other information such as the date-time that these emails arrived into the incoming mail server, from the incoming mail server (e.g. POP3).
- each email retrieved from the POP3 server will be in accordance with the process described in FIG H-A and FIG. H-B.
- the email is temporary stored into the DDR memory 46. If the size of the file attached to the email is too large, the email will be temporary stored in the hard disk 58.
- the CPU 40 will extract the real-time identification (RTI) from the email to analyze and identify the sender system.
- RTI real-time identification
- the process finishes at step 712 and the email in DDR memory gets deleted.
- the CPU 40 will decrypt the RTI with an internal algorithm and extracts information from the email, such as the unique secret key ("sender unique secret key"), the sender's name, the owner's postal address, the date, the time and the time zone.
- the CPU 40 may combine the date, the time and the time zone for obtaining the "sending GMT time".
- the RTI is auto-generated by the sender system at the time it sends out the document.
- an email sent by a sender system will arrive to the recipient's incoming mail server within a few minutes and the "receiving GMT time" is attached with the email. Therefore, to increase security, at step 708, the "sending GMT time” will be compared with the "receiving GMT time". If the "receiving GMT time" has a difference of more than a few minutes, such as more than 5 minutes, like more than 10 minutes, compared to the "sending GMT time", the RTI is considered incorrect and the process goes to step 712.
- the CPU 40 will consider the RTI to be correct.
- the comparison time of 10 minutes is not static and it is only an example that is subject to change.
- the CPU 40 will now check the specific format of the "sender unique secret key" extracted from the RTI.
- the process is terminated at step 712.
- the step 712 may include instructions to display an "alarm message" on the screen.
- the process will continue to the flowchart of FIG. H-B.
- the "sender unique secret key" extracted from the RTI at step 706 is compared with the list of unique secret keys 112 stored in the receiver apparatus.
- the process goes to step 724 for writing this "sender unique secret key” with access level C in the list 112.
- the CPU 40 may connect to the outgoing mail server for replying "Authorized Temporary" to the email address of the sender at step 736.
- the process is terminated and the CPU 40 writes the attached image file of the email and the identity (name and postal address) of the sender into the hard disk 58.
- the temporary stored email in the DDR memory 46 is also deleted.
- the receiver apparatus when the receiver apparatus receives a document for the first time from a sender system, the receiver apparatus accepts the compressed file format (document) but the unique secret key of the sender system will be given a "waiting for validation" status, which means the receiver apparatus will not accept additional documents from the sender system until the user of the receiver apparatus reads the received document and changes the access level of the unique secret key of the sender apparatus, in list 112, to access level B ("sender authorized").
- the "sender unique secret key" matches one of unique secret keys included in the list 112, the process continues to step 716 for analyzing the access level of the matched unique secret key in the list 112.
- the CPU 40 may connect to the outgoing mail server and reply "Refused" to the email address of the sender at step 720 then terminates the process at step 722, which may include deleting the temporary stored email in the DDR memory. If the access level is C, the CPU 40 may connect to the outgoing mail server at step 726 and reply "Waiting for validation" to the email address of the sender at step 728 and then terminate the process at step 722. If the access level is A or B, the CPU 40 may connect to the outgoing mail server at step 730 for replying "Authorized" to the email address of the sender at step 732 then the process continues to step 738 to terminate.
- aspects of the present invention include a process for identifying the sender of an email and then provide the receiving system with the ability to selectively receive documents attached to the email.
- FIG. 12 a diagrammatical representation of a personal computer connected to an apparatus 10 via Internet Protocol is shown for demonstrating remote access capability.
- the exemplary personal computer is shown as a laptop computer PCl running, for example, on Windows XP and is connected to the apparatus 10 via its Ethernet LAN port.
- the network communication line 34 is preferably a CAT 5 cross network cable.
- the communication between the laptop computer PCl and the apparatus 10 can be done through a wireless communication router or through a global Internet Protocol network.
- the apparatus 10 has been configured with a static Internet Protocol address.
- the remote access feature may use Internet browser software such as Internet Explorer, Firefox or Netscape for connecting to the apparatus 10 via its static IP address.
- the communication is secured by a username and password.
- the laptop computer PCl After the identification, the laptop computer PCl is logged in and the screen on the laptop computer PCl will display a menu, which in one embodiment has function buttons similar to the remote controller 12. Therefore, user of the laptop computer PCl can use all the features of the apparatus 10. In a search mode, documents can be displayed on the screen of the laptop computer PCl.
- FIG. 13 an example of a document printed with a barcode according to a seventh aspect of the invention is shown.
- the paper size is preferably standard, such as Letter, Legal, A4 or B5.
- This method of printing uses a printer driver configured to print in accordance with the requirements of the apparatus.
- the barcode is printed inside the right paper margin and includes information related to the date of the document and the name of author, for example.
- the barcode format is preferably type code 128 but is not necessarily limited such barcode.
- FIG. 14 a flowchart illustrating a method of transferring a paper document in a compressed image file then storing it into the apparatus of FIG. 1 is shown.
- the paper document may be printed with the method described in FIG. 13 immediately above.
- User of the apparatus puts a paper document in a scanner then presses a specific button or buttons on the remote controller 12 to initiate the process.
- the CPU 40 sends instructions to the scanner 22 then the CPU 40 gets an image file into the DDR memory at step 800.
- the process analyzes the picture file to retrieve information from the barcode.
- the process will end at step 812 and an error message will be displayed on the screen.
- step 804 if the barcode is recognized, the CPU 40 will translate the bar code to clear text then extract the author's name and the date of the document then the process continues to step 808 for compressing the image file.
- step 810 the CPU 40 writes this compressed image file, the Author's name and the date of document into the hard disk 58 before the process is ended.
- This method discloses a process for storing a paper document by pressing only one specific button. In other embodiments two or more buttons are pressed to initiate the same sequence of steps.
- FIG. 15 shows a first alternative embodiment of the apparatus 10, which may be integrated into the body of the screen 28.
- the screen 28 can be a TFT display and may be connected to a telecommunications network 14 via a communication cable 16.
- the telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20.
- the MFC which may include a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
- the MFC is capable of separately printing, copying and scanning.
- the infrared remote controller 12 may be used to control the apparatus 10.
- FIG. 16 shows a second alternative embodiment of the apparatus 10, which is integrated into the body of an MFC (printer/scanner/copier) and the TFT screen is installed above the MFC.
- the MFC has an auto sheet feeder for using multi-sheets operation.
- the apparatus is connected to a telecommunications network 14 via a communication cable 16.
- the telephone hand set may be integrated and the remote controller 12 is replaced by an integrated keypad located at the front panel of the MFC.
- FIG.17 a diagrammatical representation of a laptop computer PC2 incorporating one or more methods or processes of the invention according to a third alternative embodiment is shown.
- This laptop computer has a built-in modem capable sending and receiving data.
- the modem meets International standard 33.6 Unified Data Pump (V.34 HD/FD, V.8), 14.4 Unified Data Pump (V.32/V.32bis/V.22/V.22bis, optionally V.23, and V.17/V.21/V.27/V.29), V.42bis data compression, V.42 error correction, and T.30 fax communication.
- the laptop computer PC2 is connected to a communications network 14 by a communication cable 16.
- Connection to the network may be made with various alternative configurations, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
- the MFC which may include a printer 24 and a scanner 22, is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
- USB Universal Serial Bus
- the MFC is capable of separately printing, copying and scanning.
- the principles of the present invention are equally applicable to other computer platforms or architectures and the operating system of the computer may be Windows XP, Windows Vista, Linux, UNIX or other operating systems.
- the software may be developed for using this computer with methods of the present invention.
- FIG. 18 a diagrammatical depiction of a process for circulating documents to recipients having the communication device 10 of the present invention is shown, which is generally designated 900.
- this device 10 can be a personal computer PC2 shown in FIG. 17 or other communication devices that use the method described in the present invention for sending a document.
- the originator of the documents may be any number of entities, such as a governmental agency, a corporate entity, a bank, an advertising agency, an education institution, a homeowner association, that desires to transmit the documents to a plurality of recipients, such as more than 2, preferably more than 50, still preferably more than 500, and still yet preferably more than 5,000 recipients.
- the documents may be an informational document, a registration form, an invoice, an ad, a campaign flyer, a special bulletin, a government notice, that are suitable for mass distribution to a plurality of recipients.
- the mode of sending such documents are by mass mailing, which require printing, assembling and stamping the mail packages, and then mailing them. Not only is costs a significant factor in such undertaking, the "snail mail" process and the general apathy of most recipients to non-personal, non-essential documents cast doubts in the overall effectiveness the sender's mailing campaign.
- a document originator or sender 902 may send a plurality of documents to a plurality of communication device users Ui -1 , by way of a service center, which has a device server 904.
- the service center 904 will add a unique secret key associated to an access level and originator's information to the document before dispatching this document to the plurality of communication devices Ui -n .
- Communication devices Ui -11 will check the access level before accepting the incoming document then send back an acknowledgement to inform the service center 904 whether the incoming document is accepted or denied.
- the communication devices 10 (not shown) belonging to the users Ui -11 temporarily store the documents in each respective hard drive and will send a reply to the service center 904 acknowledging receipt of the document. If a particular user subsequently declines or rejects the originator 902, then the user that has exercised the refusal will not accept future mass mailing by the originator by flagging the secret key and the originator's personal information associated with the document. In contrast, if a user accepts the document and changes the sender's status to B for authorized sender, then the change in status can be taken as a positive feedback of the delivery method.
- aspects of the present invention comprises a process for delivering documents through a secure, access-level verifiable process that allows end users to acknowledge receipt of the document, and also accepts or refuses future document delivery.
- the end users may store, print, view, forward, search, reply, and manipulate the documents in any manner discussed above.
- the service center 904 comprises a plurality of FAX servers and telephones, modems, or dialers, for simultaneously sending documents to a plurality of users.
- the service center 904 comprises at least 2 dialers, more preferably at least 20 dialers, still more preferably at least 200 dialers, and yet more preferably at least 2,000 dialers to simultaneously dial, serially dial, or repeatedly dial, and send documents to a plurality of users U 1-0 .
- Aspects of the present invention further includes provisions for multiple servers each utilizing a plurality of dialers for sending similar documents to different plurality of users.
- each server may be configured to send a specific document type to targeted groups of communication device users, also called specific server call center.
- a mega server center capable of sending documents to a large group of users, in the order of 500,000 or more users, may be used for mass document distribution.
- Such mega server center is contemplated to have at least 10,000 dialers, more preferably at least 50,000 dialers, and yet more preferably at least 100,000 dialers.
- fax over IP is used to mass distribute documents to a plurality of users of the communication device 10 of the present invention.
- aspects of the present invention further include provisions for generating revenue from generator or initiator of sent documents.
- a mass sender of documents is enticed to pay a fee for sending documents to a plurality of recipients.
- the process comprising one or more of the following steps: (1) promoting the document sending service to potential senders, (2) pricing the service of sending documents by one or more of the following exemplary sending categories: by age, by income, by zip codes, by gender, by marital status, by numbers in a household, by education level, by total number of recipients, by frequency of sending, by the week or some time related interval, etc., (3) taking receipt of the document(s) to be sent from the generator of the document(s), and (4) sending the document(s) using the communication device server of the service center 904.
- a further aspect of the present invention comprises the step of generating revenue from users of the communication device 10.
- users can subscribe to specialty services that are delivered directly from the operator of the communication device server 904, which may in turn subscribe to the specialty services from one or more specialty service providers.
- the service center 904 may permit the specialty service providers to send documents directly to the end users in return for a commission or a percentage of the service price.
- the following exemplary specialty services are contemplated: news service, financial information service, home bankruptcy listing service, weather information, traffic information, entertainment listing, most frequently visited sites, entertainment news, etc.
- Other existing subscriber based services may also be implemented with the service center 904 and communication device of the present invention.
- FIG. 19 an alternative diagrammatical depiction of a process for circulating documents to recipients having the communication device 10 of the present invention is shown, which is generally designated 906.
- this device 10 can be a personal computer PC2 shown in figure 17 or other communication devices, which sends a document as described in the present invention.
- a first company 908 possesses one or more databases with unique secret keys associated with an access level as described elsewhere herein. Thus, access to the one or more databases will enable an initiator of a document to send to any one or more of the holders or users of the communication device.
- the holder of the one or more databases 908 may, for a price or ongoing royalty or licensing fee, provide an initiator of a document 910 one or more secret keys to in turn send documents to the communication devices Ui. n .
- the sender 910 can associate the purchased unique secret key with a document to be mass distributed to communication devices Ui -11 .
- the originator of the document may send a plurality of documents using its own mail server 912 or through the services of a service center 904 (FIG. 18).
- the number of documents sent to each recipient per time interval such as per day, per week, per month, etc., or the number of pages per delivery may be regulated by secret keys given to the sender 910, which may be embedded with security codes for regulating the frequency and contents of the documents.
- a secret key associated with the originator of the document and personal information will be sent with each document.
- a recipient sends a reply to the server to reject the document from the originator, the party that has refused acceptance, whether sent by the server or the originator, will not accept future documents associated with the originator by way of the originator's secret key.
- FIG. 20 an alternative diagrammatical depiction of a process for circulating documents to recipients using the communication device 10 of the present invention is shown, which is generally designated 914.
- this device 10 can be a personal computer PC2 shown in figure 17 or other communication devices that send documents in the same manner and way as described elsewhere herein.
- the alternative process resembles the process of FIG. 19.
- an accounting center 916 is incorporated to track the number of documents received by each communication device Ui -0 This may be implemented by causing the individual communication device 10 to memorize and send immediately or periodically a statement of documents received by sender initiators 910 to an accounting center 916.
- the accounting center 916 can then send a bill to the initiator 910, which bill may be computed on a per document received by each communication device Ui -n .
- the method provided herein is capable tying the fee or charge to the initiator of documents with an accurate count of the recipients that actually received the documents.
- FIG. 21 there is shown a flowchart illustrating a method for sending a payment by check using an apparatus 10 as provided in accordance with aspects of the present invention, which has application software for processing a check, authenticating the check, and delivering the check to a beneficiary's apparatus for crediting.
- the flowchart illustrates the steps that are carried out when a user of the apparatus 10, such as the one shown in FIG. 1, sends a check to a beneficiary's apparatus via a telecommunications network (e.g., a public telephone switched network).
- a telecommunications network e.g., a public telephone switched network
- the user After filling in a check with the beneficiary's name and an amount to be tendered and signing the check, the user places the signed check into the scanner 22 then presses a button on the remote controller 12.
- the CPU 40 processes the signal from the remote controller and sends instructions through the USB interface to order the scanner 22 to scan an image of the check along with a barcode then writes the check in compressed image file format into the DDR memory 46.
- the check's image file can be written onto the hard disk 58 (FIG. 2).
- barcode means information, either alpha numeric, codes, bars, or other identification information, for identifying the account associated with the check, the bank associated with the check, the holder of the check, etc. For example, it could mean the check's account number, routing slip number, or the banking institution where the check originates.
- the CPU 40 analyzes the saved compressed image file from memory then translates the barcode printed on the check into clear text information or information that the apparatus can understand and can manipulate.
- the CPU 40 displays the check's image onto the screen 28 (FIG. 1) then the CPU 40 asks the user (i.e., the paying party) to enter the beneficiary's personal information, such as a telephone number.
- the user enters the beneficiary's personal information using the remote controller 12.
- Other personal information may include the beneficiary's email address, his social security number, his mailing address, etc. that the telecommunications net work can use to associate with the beneficiary.
- the CPU 40 asks the user to enter a security password, which may be entered using the remote controller 12.
- other electronic identification devices such as a fingerprint reader or card reader connected to the apparatus 10, can replace the security password.
- the CPU 40 compares the security password entered at step 1010 with the security password memorized in the system and user's parameters 110. In one exemplary embodiment, if this comparison does not match, the CPU 40 moves to step 1030 to terminate the operation then display an error message on the screen 28 before writing this error into the events register. Back at step 1012, if the comparison matches, the CPU 40 moves to step 1014 to call a remote check database server and moves to step 1016 to send out the clear text information of the check.
- the check database server can be a remote server or a local server.
- the server can be located at a banking institution, a clearinghouse, a brokerage firm, a credit union, etc.
- the apparatus gets a reply from the remote check's database server before disconnecting from the remote check's database server.
- replies can include a positive reply, a yes reply, a clear signal reply, a verified reply, a decline reply, a negative reply, a retry reply, an account closed reply, a check stolen reply, a positive reply, etc., which are designed to provide a response to the inquiry.
- the hard disk of the sender apparatus 10 may contain a local check's database and the CPU 40 can compare the clear text information of the check to this local check's database.
- step 1020 if the reply from the check's database server is not positive, the CPU 40 moves to step 1030 to terminate the operation then display an error message on the screen 28 before writing this error into the events register.
- step 1020 if the reply from the check's database server is positive, the CPU 40 will go to step 1022 to call the beneficiary's apparatus then moves to step 1024 to send out the check's image.
- step 1026 it waits for acknowledgement from the beneficiary's apparatus. Once the acknowledgement is received, the CPU 40 moves to step 1028 to terminate communication with the beneficiary's apparatus, writes an acknowledgement into the events register, and writes an image of the check that was sent onto the hard disk of the apparatus 10.
- FIG. 22 there is shown a flowchart illustrating a method for sending credit card payments using an apparatus 10 provided in accordance with aspects of the present invention, such as when a user of the apparatus 10 in FIG. 1 wants to send a credit card payment to a beneficiary's apparatus via a telecommunications network (e.g., a public telephone switched network).
- a telecommunications network e.g., a public telephone switched network.
- the user can initiate the payment by credit card process by first filling out an authorization form with information, such as the beneficiary's name, an amount to pay, a credit card number, and date information, and signing the form. The user then places his credit card and the signed authorization form into the scanner 22 and presses a button on the remote controller 12.
- the CPU 40 sends instructions through a USB interface to order the scanner 22 to scan an image of the credit card and the signed authorization form then writes the image in compressed image file format into the DDR memory 46.
- the image file of the credit card and signed authorization form can be written onto the hard disk of the apparatus 10.
- the CPU 40 displays the image of the credit card and signed authorization form onto a screen 28 connected to the CPU and the moves to step 1106to ask the user to enter the verification code printed on the back of his credit card.
- the user enters the beneficiary's telephone number using the remote controller 12.
- the beneficiary's telephone number can be replaced by the beneficiary's email address or other unique information that the telecommunications network uses to associate with the beneficiary.
- the CPU 40 asks the user to enter a security password.
- the security password can be entered using the remote controller 12.
- other electronic identification devices such as a fingerprint reader or card reader connected to the apparatus 10, can replace the security password.
- the CPU 40 compares the security password entered at step 1110 with the security password stored in the system and user's parameter 110 data file or database. If this comparison does not yield a match, the CPU 40 moves to step 1124 to terminate the operation then display an error message on the screen 28 before writing this error into the events register. Referring again to step 1112, if the comparison matches, the CPU 40 moves to step 1114 and calls the beneficiary's apparatus using the previously entered telephone number, at step 1108. When the beneficiary's apparatus receives the call from the sender apparatus, the CPU of the sender apparatus forwards the credit card information along with the signed authorization form and the associated verification code at step 1116. At step 1118, the CPU 40 waits for acknowledgement from the beneficiary's apparatus. Once the acknowledgement is received, the CPU 40 moves to step 1120 to terminate communication with the beneficiary's apparatus, write the acknowledgement into the events register, and write the signed authorization form image onto the hard disk of the apparatus 10.
- FIG. 23 a flowchart provided in accordance with aspects of the present invention illustrates a method for auto-generating a real time identification (RTI) of a recipient's apparatus, including the recipient's coordinate, to enhance system security.
- this real-time identification protocol is auto-generated by an apparatus in accordance with aspects of the present invention, such as the apparatus 10 shown in FIG. 1, before it calls the recipient's apparatus.
- a user will use the apparatus in FIG 1 for sending a document to a recipient who uses a similar apparatus with its own set of unique key or secret key and security features as discussed above through a public telephone network switch.
- the CPU 40 In sending mode, after the user enters a recipient's telephone number and pushes a button on a remote controller, the CPU 40 opens a temporary file (TF) in the DDR memory 46 for stocking information received from the EEPROM 50 and from the FLASH Memory 52 at step 1200.
- the CPU 40 writes the information into the temporary file TF, which preferably includes the unique secret key 100, the sender's name 102, the postal address of owner 104, and the time zone 106 (FIG. 3).
- the CPU 40 writes the current date and the current time generated by the real-time clock 42 (FIG. 2) into the temporary file TF.
- the CPU 40 retrieves the recipient's telephone number, which was previously entered by the user with the remote controller, and writes this number into the temporary file TF.
- the temporary file TF now contains a chain of characters or data, including the current date-time and the recipient's telephone number.
- the chain of characters can vary in contents, such as having fewer, more, or different information, and still provide the necessary security for providing a real time identification process.
- the CPU 40 encrypts this chain of characters with an algorithm and temporarily stores this encrypted chain in the DDR memory 46 at step 1210 before continuing the sending process.
- this method for auto-generating a real time identification procedure which includes a recipient's coordinate, will reduce or eliminate the risk that an unauthorized apparatus captures documents sent by the sender apparatus 10, such as documents bearing check information, credit card information, or other sensitive information that the sender does not wish to be captured by an unauthorized apparatus.
- FIG. 24 there is a flowchart illustrating a method for reducing or eliminating the risk that an unauthorized apparatus captures documents sent by an apparatus 10 in accordance with aspects of the present invention.
- the apparatus of FIG. 1 is used by a recipient and is set in receiving mode and receives an incoming call from another apparatus (i.e., a sender apparatus) on a telephone line, which provides a network between the two apparatuses.
- the network connection may be made through other means, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP), and wireless communications.
- ISDN integrated service digital network
- DSL digital subscriber lines
- IP Internet protocol
- the CPU 40 of the receiving apparatus will terminate the communication and disconnect the telephone line at step 1320.
- the RTI discussed above with reference to FIG. 23, will be received in DDR memory 46 of the receiving apparatus at step 1304.
- the CPU 40 of the receiving apparatus analyzes this RTI and verifies its format. If the RTI' s format does not match the specific format programmed in the receiving apparatus' memory, the CPU 40 will terminate the communication and releases the telephone line at step 1320. If the RTI matches the specific format, at step 1308, the CPU 40 will decrypt the RTI with an internal algorithm and extracts the recipient's telephone number from the RTI.
- step 1310 if the recipient's telephone number extracted from the RTI dos not match the telephone number memorized in the receiver apparatus, the CPU 40 will terminate the communication and disconnects the telephone line at step 1320. If the recipient's telephone number extracted from the RTI matches the telephone number memorized in the receiver apparatus, the CPU 40 will continue the receiving process.
- FIG. 25 there is illustrated a stand-alone apparatus 10 connected to a telecommunications network 14 (e.g., the public switched telephone network) by a communications line 16. Connection with the network may be made through alternative means, including, but not limited to, conventional telephone wire, integrated service digital network (ISDN), digital subscriber lines (DSL), Internet protocol (IP) and wireless communications.
- the telephone hand set 18 may be connected to the apparatus 10 by a communication cable 20.
- a smaitcard reader-writer 22 is connected to the apparatus 10 by a Universal Serial Bus (USB) cable 26.
- the smartcard reader-writer 22 is capable of bidirectional communications with the apparatus 10.
- the remote controller 12, which may be IR or RF based, may be used to control the apparatus 10.
- a TV screen 28 is connected to the apparatus 10 by a video signal cable 30.
- the TV screen 28 could be a VGA monitor and the video signal cable 30 could be a VGA standard cable.
- the system of FIG. 25 can send data read from a smartcard that has been inserted into the smartcard reader-writer 22 to another apparatus through the telecommunications network.
- This system 10 may also receive data from another (i.e., sender) apparatus through the telecommunications network and then writes the received data onto the smartcard.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Facsimiles In General (AREA)
- Facsimile Transmission Control (AREA)
Abstract
L'invention concerne des systèmes et des dispositifs ainsi que des procédés d'utilisation de ceux-ci, qui comprennent un réseau de télécommunications pour envoyer, recevoir et stocker sélectivement des documents. Dans une forme de réalisation, le système comprend au moins un dispositif émetteur et un dispositif récepteur, ce dernier identifiant le dispositif émetteur avant d'accepter le(s) document(s) transmis par le dispositif émetteur. D'autres caractéristiques des systèmes et dispositifs comprennent des éléments servant à stocker les documents reçus dans une unité de stockage en vue d'une visualisation ultérieure sur un écran de télévision, ou d'une impression. Certains dispositifs de l'invention peuvent stocker et trier un document papier balayé par un scanneur. Dans un aspect particulier de l'invention, le dispositif est une unité autonome hautement sécurisée.
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US93237607P | 2007-06-01 | 2007-06-01 | |
| US60/932,376 | 2007-06-01 | ||
| US96268407P | 2007-07-31 | 2007-07-31 | |
| US60/962,684 | 2007-07-31 | ||
| US99551707P | 2007-09-28 | 2007-09-28 | |
| US60/995,517 | 2007-09-28 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2008153787A2 true WO2008153787A2 (fr) | 2008-12-18 |
| WO2008153787A3 WO2008153787A3 (fr) | 2009-02-05 |
Family
ID=40130385
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2008/006715 WO2008153787A2 (fr) | 2007-06-01 | 2008-05-28 | Dispositifs, systèmes et procédés de transmission de données |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2008153787A2 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010078657A1 (fr) * | 2009-01-08 | 2010-07-15 | D-Box Technologies Inc. | Procédé et dispositif d’interface unité centrale/plateforme pour la synchronisation d’un flux de codes de mouvements et avec un flux vidéo |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6820204B1 (en) * | 1999-03-31 | 2004-11-16 | Nimesh Desai | System and method for selective information exchange |
| US6842772B1 (en) * | 2000-03-14 | 2005-01-11 | Envoy World Wide, Inc | Application program interface for message routing and management system |
| US20050182933A1 (en) * | 2004-02-03 | 2005-08-18 | Derek Ritz | Method and system for document transmission |
-
2008
- 2008-05-28 WO PCT/US2008/006715 patent/WO2008153787A2/fr active Application Filing
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010078657A1 (fr) * | 2009-01-08 | 2010-07-15 | D-Box Technologies Inc. | Procédé et dispositif d’interface unité centrale/plateforme pour la synchronisation d’un flux de codes de mouvements et avec un flux vidéo |
| US8390739B2 (en) | 2009-01-08 | 2013-03-05 | D-Box Technologies Inc. | CPU platform interface method and device for synchronizing a stream of motion codes with a video stream |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2008153787A3 (fr) | 2009-02-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11843640B2 (en) | Electronic messaging exchange | |
| CN101336437B (zh) | 用于提供电子邮件消息的递送的通信系统 | |
| US7085745B2 (en) | Method and apparatus for identifying, managing, and controlling communications | |
| US20080235766A1 (en) | Apparatus and method for document certification | |
| US20030145212A1 (en) | Secure system for delivery of a fax to a remote user | |
| WO1996038987A1 (fr) | Procede et dispositif pour le traitement de communications | |
| JP2008537650A (ja) | コンピュータネットワーク転送プロトコルを介してドキュメントのデジタル表現を転送するための方法およびシステム | |
| US6970847B1 (en) | Business method for secure document folder distribution | |
| WO2008153787A2 (fr) | Dispositifs, systèmes et procédés de transmission de données | |
| CN1700227A (zh) | 用户认证系统、用户认证方法及服务提供设备 | |
| AU2004216700B2 (en) | Method and apparatus for identifying, managing, and controlling communications | |
| JP3619046B2 (ja) | ファクシミリ装置およびその制御方法およびネットワークファクシミリ装置およびその制御方法 | |
| JP2004199346A (ja) | デジタルデータ一時保管システム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08754756 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 08754756 Country of ref document: EP Kind code of ref document: A2 |