US20070145125A1 - Purchasing aid logistics appliance - Google Patents

Purchasing aid logistics appliance Download PDF

Info

Publication number
US20070145125A1
US20070145125A1 US11/682,088 US68208807A US2007145125A1 US 20070145125 A1 US20070145125 A1 US 20070145125A1 US 68208807 A US68208807 A US 68208807A US 2007145125 A1 US2007145125 A1 US 2007145125A1
Authority
US
United States
Prior art keywords
pal
data
address
merchant
ram
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/682,088
Inventor
Joseph Caci
Gregory Scanlon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lockheed Martin Corp
Original Assignee
Lockheed Martin Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lockheed Martin Corp filed Critical Lockheed Martin Corp
Priority to US11/682,088 priority Critical patent/US20070145125A1/en
Publication of US20070145125A1 publication Critical patent/US20070145125A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0641Shopping interfaces

Definitions

  • This invention relates generally to electronic commerce, and, more particularly, to the processing, modifying, analyzing, and storing of purchaser data to support functions that are valuable to product identification selection, and purchase for the customer, the merchant, and the supply chain.
  • Merchants, suppliers and purchasers are beginning to work together. Merchants and suppliers now provide information through the Internet so purchasers can shop from home. Merchants and suppliers are providing barcode coupons through the Internet. Purchasers are beginning to use portable barcode scanner devices supplied by merchants to select and process products in the retail space. Merchants have deployed kiosks in the retail space with electronic displays and keyboards to display information about products to purchasers. Paper catalogs now appear with bareodes that direct a web browser to a product information page on the Internet. Electronic devices are now available to help a purchaser manage money and automate the payment function of the checkout process,
  • the present invention is a purchasing aid logistics appliance (PAL) is stand alone device that communicates with a merchant computer providing communication between a PAL and the merchant in-store computer. Sensitive personal finance, product, price and availability information can be exchanged between the PAL and the merchant computer in a secure timely manner to specific identifiable purchasers and to the general public.
  • the PAL will assist the purchaser in product selection and location; merchant selection and management; automated checkout; and managing financial data.
  • the PAL interfaces with a merchants in-store system to communicate to the purchaser in the retail space.
  • the PAL communicates using both data and voice using an unrestricted part of the spectrum.
  • the PAL interfaces with a network outside the retail space to gather product information in preparation for future visits to the merchant store. Further, the PAL interacts securely in the retail space with the merchants automation system to assist the purchaser with product selection, location and checkout.
  • FIG. 1 is a block diagram of the PAL computer hardware architecture of this invention
  • FIG. 2 is a pictorial representation of an example of a high-density barcode of this invention
  • FIG. 3 is a block diagram of the printed media decode process of this invention.
  • FIG. 4 is a tabular representation of the HTML decode table illustrated in FIG. 3 ;
  • FIG. 5 is a tabular representation of an example of a vertical barcode numerical code pattern for a high-density barcode used with this invention
  • FIG. 6 is a schematic representation of the results of the barcode decoding process in accordance with the present invention:
  • FIG. 7 is a flow chart of the information exchange links of the present invention illustrated in FIG. 1 ;
  • FIG. 8 is a flow chart of a memory map of the present invention.
  • FIG. 9 is a flow chart of a three way verification process of the secure memory of the present invention.
  • FIG. 10 is a flow chart of the key generation technique of the secure memory of the present invention.
  • FIG. 11 is a flow chart of the address encrypted RAM of the secure memory of the present invention:
  • FIG. 11A is a pictorial representation of the antenna system of the present invention.
  • FIG. 12 is a schematic representation of the PAL communication links with the merchant computer within four (4) areas of the merchant facility;
  • FIGS. 13A and 13B are plots of the ingress and egress barker beacon full duplex channels transmitted by the Main Doorway Area of the merchant computer illustrated in FIG. 12 ;
  • FIG. 14 is a process flow diagram of the PAL and checkout communication system of this invention.
  • FIG. 15 is a pictorial schematic representation of the power supply of the present invention.
  • FIG. 16 is a pictorial schematic representation of the weight-measuring device of the present invention.
  • the preferred embodiment of the present invention is represented by a purchasing aid logistics (PAL) appliance 10 .
  • the PAL 10 utilizes conventional components in the hardware architecture as shown in FIG. 1 . These components described below are not to be considered as a limitation on the present invention and can be substituted for by other equivalent components.
  • a central processor 11 with main memory 12 connected to a main system address/data bus 13 links all the components of the hardware architecture.
  • a Boot Program 14 brings up the PAL 10 from a cold or warm start and runs test executables.
  • the monitor program is stored in Flash Memory and System Software 16 where it can be updated as needed. Key session parameters have been stored from a previous use. Secure data such as encryption keys, financial data owner name and pertinent data are stored in an encryption circuitry equipped random access memory 18 .
  • Conventional voice analog circuitry 26 with speaker and microphone is utilized for voice digital conversion input/output 24 .
  • the monitor program stores specific voice samples for necessary biometric voice recognition.
  • the PAL 10 includes a barcode or optical reader subsystem 44 and optical scan assembly 46 , magnetic stripe reader 34 utilizing a hardware interface 32 to the system bus 13 , smart card reader 38 utilizing a hardware interface 36 , remote ear piece 28 , high-resolution touch screen display 50 with touch screen interface controller 48 , weight-measuring device 58 connected to the bus 13 by an analog-to-digital converter 56 , a radio link controller 40 and radio subsystem 42 for high-speed secure short-range communication. Additionally, the PAL 10 includes a front panel 54 that includes keys, switches and indicators coupled to the bus 13 by a panel interface 52 . As stated above, this listing of features is for illustrative purposes and not to limit the invention. Other features not listed are within the contemplation of the invention.
  • the PAL 10 can execute several program modules stored on the central processor 11 , such as accounting, calendar, clock, shopping list, and communication.
  • the accounting software keeps track of accounts such as credit cards, loans, checking and savings. It has a real time clock and calendar to measure the passage of time and records financial transaction logs in parallel with banks and other financial organizations.
  • the data is secure in the PAL 10 by means of a secure card reader and biometrics.
  • the PAL 10 is also capable of interacting with a user through voice recognition and fingerprint identification to provide a strong level of security (not shown).
  • the PAL 10 is designed to facilitate procurement planning. This planning will most likely take place as the purchaser or customer uses the PAL 10 to create lists of items to procure. For example, a merchant grocer distributes a flyer to each household in a district. To create a list the purchaser (customer) first scans in the merchant's specific optical code, which contains information pertinent to the merchant, including but not limited to sale terms and conditions. For each product listed, a printed barcode or similar code is produced that can be scanned into the PAL 10 . To add a specific product to the list, the purchaser Scans the product specific optical code. The code contains a product description, unit and price. The printed media advertisement will have a master barcode or similar control code identifying the merchant, date and sale terms.
  • the purchaser scans in the master control code for each item to be procured. Items can be added or removed using the keypad functions. In addition, items can be added from memory based upon previous purchases as well as on-line from the merchant's web site. If the purchaser is Internet enabled, an RF device (not shown) attached to the personal computer will activate the RF link via the optical scan assembly 46 , acting as an Internet port, and enable up loads and down loads to the PAL 10 . The merchant will receive advance information on product selections. If the purchaser is not Internet enabled or chooses not to use the Internet, then the merchant receives this information on customer ingress into the merchant store.
  • the PAL 10 By scanning a high-density barcode 60 , as shown in FIG. 2 , the PAL 10 provides a screen of information relevant to the product scanned, in particular similar data as received from a web site,
  • the PAL 10 has executable software to create a browser frame where a high-density barcode 60 is scanned that contains programming and information about the product, and sales terms and conditions.
  • the high-density barcode 60 makes use of printed media codes to extract information and present it to a user on the screen of the PAL 10 .
  • the high-density barcode 60 also extracts rules concerning the terms of the advertisement and presents the rules to the purchaser and alters the behavior of the PAL 10 while in a merchant's facility.
  • the display information is encoded in the media in two parts. One part is the visual formatting instructions to the PAL 10 and the other is the information to be presented.
  • Printed media pattern codes such as bareodes can be one or more dimensional ink on paper print patterns that can be decoded by an optical scan assembly 46 into a number.
  • scan codes There are many types of scan codes in existence.
  • the Data Matrix code is a bi-dimensional code that can represent a maximum of 2000 ASCII characters.
  • PDF417 is another bi-dimensional code. In this code each line is composed of a variable number of columns that encode data. This code is bracketed by a Start character and Stop character. The main characteristics are a minimum and maximum number of columns and rows.
  • Another code is Code 11 . It is named for the fact it contains 11 possible code patterns.
  • Code 39 an alphanumeric bar code that can encode decimal numbers, the upper case alphabet, and some extra symbols.
  • codes printed on low quality paper would not be able to support the dense ink patterns that many of these codes require.
  • a high-density barcode 60 increases the amount of data that can be transmitted using poor quality paper, as found in a newspaper.
  • the high-density barcode is a sequence of horizontal barcodes stacked into an arrangement that can be scanned in by a simple vertical sweeping motion of the hand. The scan will require limited uniform vertical motion, well within the capability of the wrist, elbow and shoulder. High-speed electronic processing is used to average out motion errors.
  • An encode process shows how a vertical barcode or similar code can encode a WEB page display and/or behavior modifying rules.
  • the encode process uses codes and checksums for data reliability.
  • the user will point a laser scan line 66 generated by the optical scan assembly 46 at the top barcode 202 and drag the laser scan line 66 to the bottom barcode 203 .
  • the purchasing aid logistic appliance 10 will beep one short high-pitched note. If not successful the purchasing aid logistic appliance 10 will beep one long low sounding beep.
  • Checksums in the code will indicate a successful scan.
  • other types of signals representative of information can also be printed by the PAL 10 .
  • the high-density barcode 60 which is designed to encode information required by the PAL 10 is scanned by a scanner 102 A, designed to extract the amount of information required to represent a WEB page.
  • a decoder 103 decodes the scan using rules concerning how numbers are coded to represent information. These rules are coded into tables represented by numerals 105 , 106 A, 107 and 111 . These tables interact with the decoder 103 to provide parsing information to a parser 104 A.
  • the parser 104 A creates the software that will build the display.
  • the parser 104 A can also identify rules and construct a Behavior Modifying Rules Table.
  • the rules decode table 111 is a table that governs the rules of communications and commerce by the PAL 10 .
  • the rules decode table 111 includes information specific to a unique merchant. When the PAL 10 is presented to the unique merchant, the rules decode table 111 will identify the merchant and terms and conditions of a sale. Information in the PAL 10 about other merchants will not be shared.
  • the browser receives HTML or similar software from the parser 104 A and creates a display 109 .
  • the vertical barcode format for example, does not contain a specific language, for example, Java or HTML. Rather the vertical barcode will represent a sequence of numerical codes. Then from that, each suitable language will have a table from which a list of codes will generate a finite number of web page variations.
  • the high-density barcode 60 identifies the table and represents codes indexed specifically for each language.
  • the high-density barcode 60 uses the parser 104 A to construct the frame software needed by a display browser 108 A. This is a multi step process designed to make, for example, the vertical barcode format or a similar code independent of any browser language.
  • the high-density barcode 60 can represent an imbedded browser frame.
  • scan codes There are many types of scan codes in existence. They vary by the size and type of code represented by the light and dark patterns of ink and paper.
  • a spot laser beam is swept into a line pattern by a reflecting device oscillating at a known rate.
  • the optical receive path can be the exact same path.
  • the laser spot man look continuous but is, in fact switched on and off at high speed to conserve power and for other reasons.
  • the optical receive is gated to the rate the laser is turned on and off.
  • the resulting optical detection pattern is processed to average and smoothes out any noise spikes. There will be several samples for each light and dark return. The dark returns will vary by the width of the ink line.
  • a time base is established by the preamble to the barcode helping to determine the frequency of the phase lock loop for the remainder of the barcode. This process is similar to a modem training sequence.
  • the layout of the high-density barcode 60 is shove in a vertical code format.
  • the purpose of the vertical code format is to demonstrate how to build a barcode that contains sufficient information to build a WEB page or rules table. As more data is required, more codes are stacked until the practicable limit is reached.
  • a first code line 202 shows where the first scan is started from and a last code line 203 shows the point to where the scan is dragged.
  • the first code line 201 shows a timing space between stacked codes for the purpose of resetting the scan to pull in the next level. This is only an example to show how bandwidth dense codes could be built on poor quality paper.
  • FIG. 4 is a partial example of how to build a HTML decode table 105 of numerical codes indexed to coding statements. Some coding statements will require additional fields to fully populate the statement.
  • the purpose of HTML decode table 105 is to reduce the need for information bandwidth by using numerical codes to represent entire statements. Thus by calling out codes and populating them with field data a full statement can be built conserving barcode bandwidth.
  • FIG. 6 illustrates a minimum number of statements in the HTML decode table 105 to build a web page displaying, for example, “HELLO WORLD.”
  • the parser 103 can build a fully functional HTML program by placing numerical codes 401 , for example, in a sequence creating a coding pattern table as illustrated in FIG. 5 .
  • the high-density barcode 60 or any similar print code contains a numerical table index code with data.
  • the codes are cross-referenced to tables 105 , 106 A, 107 , 111 , as shown in FIG. 3 .
  • the index points to a software instruction contained in the HTML decode table 105 , which contains a series of code values 401 , as illustrated in FIG. 5 . These values contain significance to the parser 104 A.
  • the HTML decode table 105 instructs the parser 104 A how to interpret the value. For example, code 11 indicates the start of table data. The next value is one of eight possibilities corresponding to tables 105 , 106 A, 107 , 111 .
  • FIG. 6 is al example of the parsing process where the barcode 503 represents the numerical sequence 501 .
  • Embedded in numerical sequence 501 is code 11 12 05 which tells the parser 104 A to select the HTML decode table 105 to interpret the remainder of the data and there are 5 code statements.
  • Code 60 is a fictitious checksum value shown for example only. It will repeat at the barcode end.
  • Code 22 indicates the start of table indices.
  • Code 00 is the first entry in the HTML decode table 105 . This first entry has no required fields.
  • Index 04 is the first code statement to require a field.
  • Code 31 tells the parser 104 A the next value is the number of characters in the first field.
  • code 31 would appear again after the 11 th character code with a numerical representing the size of the next field. This process would continue until all fields were fully presented. Continuing with the example, 11 characters follow. They are coded in the range 31 - 56 which tells the parser how they to are be interpreted as text characters. Finally code 21 appears again followed by 60 . If the parser were able to calculate the same checksum, a short high pitch beep would indicate a successful scan and the resultant 502 would be put up on the display. Numerical codes are used to represent coding statements from any descriptive language that can build a display by way of browser instructions. The vertical barcode format does not require a specific language for example WAP, JAVA or HTML.
  • the frame software will be built from numeric codes.
  • the high-density barcode 60 is based on the premise that a web page can be constructed from a closed list of software statements. By way of the present example, ninety-nine statements could be developed and referenced by a two digit decimal code. By way of example, any practical number could be used for example 199. Data fields follow other codes as shown in FIG. 3 .
  • the parser 104 A can build the code statement and populate it with field data extracted from the printed code. At the conclusion of this process HTML or similar software is generated for a browser to generate a frame display.
  • the vertical barcode format can contain information about a merchant and sale terms and conditions. This information is displayed and may be entered into the rules table 112 A.
  • the PAL 10 interfaces with print media 62 , the Internet 64 , and merchant's computer 66 .
  • Product data is downloaded to the PAL 10 , where the purchaser makes decisions and creates merchant specific product lists prior to going to the store.
  • a purchaser may wish to know which products do not contain an ingredient.
  • the purchaser may require breads that do not contain sodium
  • the purchaser can access the merchant computer 66 through a personal computer 68 via the Internet 64 , as illustrated in FIG. 7 , and request a listing of products matching the request sorted by preferred merchants. The purchaser then will select a product for purchase and estimate a purchase date.
  • the list for a merchant is managed by several factors including date when the date, for example, is a factor in terms and conditions. Price and availability may also, for example, manage individual items.
  • the PAL 10 can store the list until entry into the merchant facility or the PAL 10 can upload the list to the merchant's computer via an Internet portal for storage. The merchant may review the list and check inventory to assure the products are in stock.
  • the purchaser creates a list of items to procure and assigns a payment method to the list.
  • the PAL 10 will manage the budget for the list and all lists. Since financial data is sensitive, the PAL 10 may utilize a security system in a layers concept to safeguard use. Layers represent various facets of the device from trusted monitor to smart cards to encrypted memory. Access to sensitive data begins with smart card technology and works through succeeding layers. The smart card technology would be employed for store critical secure data.
  • the PAL 10 can read the magnetic stripe on credit or debit cards and down load this data into a secure memory where it can be retrieved and sent to the sales register at purchase time.
  • the secure memory of the present inventions illustrated in FIG. 8 is included in a memory map 70 , the most basic element of any computing device.
  • the memory map 70 is organized into regions where specific tasks are performed.
  • the regions are the physical address locations of a block of memory units 72 .
  • a memory unit 72 may be any number of bits but is usually a multiple of eight forming an eight-bit byte, sixteen-bit word, or thirty-two-bit double word.
  • a single address location consists of several binary circuits, which must be decoded before the location can he opened for reading or writing.
  • the central processor 11 illustrated in FIG. 1 , sends out address signals on the address bus, which is processed by a memory address decoder. The decoder then selects which physical unit of memory is accessed. As shown in FIG.
  • an elementary memory map 70 in which the top of the map, RAM 10 A, represents am area where a program and data are stored, with logical methods of data transfer to the RAM 10 A, RAM input 13 and RAM output 12 A.
  • Programs stored on permanent storage devices are accessed by software in the read only memory basic input/output operating system and put into RAM 10 A.
  • the specific memory used to hold the video image to be displayed is represented by video memory 15 .
  • the difference between RAM 10 A and video memory 15 is the address range, which is coded a read only memory basic input/output operating system (ROM BIOS) 25 .
  • ROM BIOS read only memory basic input/output operating system
  • Encrypted RAM 20 has the same general properties of RAM 10 A in that memory can be read from and written to. It has two modes of operation; the first is secure and second is disabled.
  • Encrypted RAM 20 A functions as ordinary memory when set to secure mode.
  • Encrypted RAM 20 A is set disabled the data retrieved by way of read circuitry 23 is not logical and therefore useless.
  • Write circuitry 22 A does not function in a logical manner when disabled.
  • the order of data is sometimes referred to in the literature as beg Endian or little Endian. This is a reference to which byte of a multi-byte retrieval contains the most significant bit and which contains the least significant bit. Without knowing which causes the data to be improperly interpreted.
  • FIG. 9 illustrates the use of encrypted RAM 20 A in the present invention in a three way verification process.
  • a smart card is inserted into the PAL 10 and the pin 30 is accessed.
  • the user is prompted to enter a personal identification number (PIN) 31 .
  • PIN personal identification number
  • the user's PIN number 31 is verified 32 S with the PIN 30 stored in the smart card.
  • a secure data hash 33 is compared to a hash 34 A stored in smart card or any convenient location. If the comparison 35 is valid then the process continues to step 3 , a verification 36 S of a bond created in a previous session. From a previous session, a hash of the secure data in encrypted RAM was created and stored in two places. One place is the smart card and other is on the PAL 10 .
  • step 4 If both step 1 and step 2 are valid then the decision branch at step 4 is yes and encrypted RAM is unlocked 38 S and made available. The user then performs one or more transactions, which may or may not change the data in encrypted RAM. Then a hash-creating algorithm located in ROM BIOS 25 , see FIG. 8 , runs and creates a new hash for the next session stored on the smart card data hash 34 A and on the PAL 10 For the next session. If steps 1 & 2 are not valid, then the data in encrypted RAM is destroyed.
  • FIG. 10 shows an alternative method of how encrypted RAM could be used in the PAL 10 .
  • two independent variables are generated 40 S: the first variable 41 and the second variable 42 .
  • the first variable 41 and second variable 42 A combine in a process to generate a cipher key 43 that fits into a special address decoder 44 A.
  • Ordinary RAM is attached to the special address decoder 44 .
  • the special address decoder 44 A and RAM 45 create encrypted RAM 46 A.
  • Encrypted RAM could then protect sensitive information. Now that several examples have shown how encrypted RAM could be used, following is a detailed explanation of how a special cipher locked address decoder could be made.
  • FIG. 11 is an alternative embodiment of encrypted RAM.
  • a signal 49 starts and stops the encryption process.
  • a portion of the RAM map 70 is set aside for secure memory.
  • a special address decoder 55 and an address tracker 56 A generate the memory select lines using one of several possible mathematical formulae. This formula requires a random number be generated at the first time secure data is created then stored in address decoder 55 .
  • the random number encode or cipher key 52 A is added to the address to create an offset address from the correct location.
  • the contents of a memory location are not encrypted but its address is intentionally misaligned by a random number incorporated into the address decoder. This random number is used whenever this secure address range is accessed in secure mode.
  • a RAM segment 54 A is address encrypted. To keep the following example simple the memory RAM segment 54 A will be limited to 1024 bytes (hex B 000 -B 3 FF) of memory but any size is possible and larger is better.
  • the address decoder 55 When the smart card is inserted into the PAL 10 , the address decoder 55 reads and writes data in secure mode as normally directed by the central processor 11 . In FIG. 11 , a random number is generated by random number generation circuitry 51 , hexadecimal F is used though any number is acceptable.
  • the processor 11 now issues a write-to-memory command by calling for base address B 000 50 .
  • the address decoder 55 receives B 000 50 on the active address data bus from the central processor 11
  • the address decoder 55 also receives random number encode key hexadecimal F from the random number circuitry item 51 .
  • the address decoder 55 then computes memory select lines 53 as if the address were B 00 F.
  • the central processor 11 writes a 4-byte variable so that 4 successive RAM 8 bit per byte locations are required.
  • the next byte value from memory will be B 001 bus address signals 50 A but is instead computed as select lines for B 010 (B 001 +F) by address decoder 55 .
  • the central processor 11 thinks it is writing B 000 through B 003 four successive locations for this one variable.
  • the four bytes are now stored in B 00 F B 010 , B 0011 , B 0012 .
  • the address decoder 55 now gets a signal not to use the random number encode key 52 A generated by random number generation circuitry 51 .
  • the central processor 11 attempts to read what has been written and issues 4 read commands by memory bus address signals 50 A beginning with location B 000 through B 003 .
  • the address decoder 55 functions normally but the data retrieved from these four locations B 000 -B 003 is not coherent and therefore unintelligible.
  • the smart card is again inserted using the previous example illustrated in FIG. 9 so that the address decoder 55 is now set to secure mode.
  • the address decoder 55 now gets a signal to use the random number encode key.
  • the four address locations B 000 -B 003 are changed to B 00 F, B 010 , B 0011 , B 0012 the exact same locations written to previously.
  • the data is correctly retrieved. This example shows how data can be safely encrypted by intentionally misaligning the address.
  • the central processor 11 keeps track of where data is stored using well-understood programming techniques. Using encrypted RAM, the central processor 11 cannot accurately track where data is physically stored. It depends on the address decoder 55 to correctly interpret the hexadecimal address. When the central processor 11 selects an address close to the end of encrypted RAM boundary, the address decoder 55 may set select lines 53 to go past the last boundary address. In the previous example that address is B 3 FF. The address select lines 53 will trap any address computed to be past the boundary.
  • the address decoder 55 would set the select lines for an address of B 400 (B 3 F 1 +F), where the upper boundary is B 3 FF.
  • the address tracker 56 A senses the condition and sends a signal 58 , ranging between 0 and E, generated by the address tracker 56 A to the address decoder 55 . This signal causes the address decoder 55 to reset the select lines 53 as if base address B 000 were being decoded.
  • the decode key 57 is generated by an encode cipher key 52 A for use by the address tracker 56 A. The decode key 57 is used to compute the value of the signal 58 A. No address is used twice and no valid memory contents are overwritten and the central processor 11 cannot determine the equivalent address used.
  • the encode cipher key 52 A can be changed from time to time to maintain an element of randomness.
  • the random encode cipher key 52 A may be generated once per active session.
  • An active session is defined as a continuous RAM 54 A power cycle. As long as the RAM 54 A is active the encode cipher key 52 A is not lost. If power to the RAM 54 A is lost, then the encode cipher key 52 A is likewise lost and data lost with it as well.
  • There are other possibilities for setting rules regarding the generation of an encode cipher key 52 A For example a key 52 A could he generated once per secure session and erased when the secure session is ended. In this case the data will be lost unless steps are taken to offload the encrypted RAM data to an alternate location.
  • the PAL 10 acts as a decision aid or purchasers by providing a variety of functions. These functions include, but not limited to, such factors as price, product location, shopping list, and stock status. It also acts as a purchase facilitator, capturing product data as the purchaser shops in the store. Furthermore, PAL 10 stores all purchase information including product data and purchase history. This PAL 10 can manage money from the purchase planning stage to the product selection stage to the checkout counter. Afterwards it can provide historical data for record keeping and historical analysis.
  • a radio subsystem 42 ( FIG. 1 ) utilizes two conventional types of antennae, as illustrated in FIG. 11 a , simultaneously. These two antennas, one a forward directional antenna 41 a and the other an omni directional antenna 43 a are used by the protocol to affect the RF link.
  • the forward directional antenna 41 a includes conventional components, such as, a signal absorbing material 41 b , reflecting cone shaped director 41 c , and a directional element 41 d .
  • the omni directional antenna 43 a includes conventional dual back-to-back hemispherical coverage antennas 43 b .
  • the omni directional antenna is used to communicate with the PAL 10 when it is not within the confines of the aisle shelf area. Both antennas are operated from their respective antenna controllers 41 c , 43 c and connected to the processor 11 through the radio link controller 40 .
  • the advantages of two antennas are diversity and multi channel link control living the merchant computer the ability to manage large numbers of simultaneous users.
  • the facility communication areas 67 effectuate communication between the merchant computer and the PAL 10 in the merchant facility.
  • the merchant facility is equipped with one or more facility communication areas 67 .
  • the preferred embodiment communicates four (4) ways in the merchant's facility as illustrated in FIG. 12 . Communication limitations are a function of facility planning not capability of the PAL 10 .
  • the first method incorporates quickly uploading and downloading data while traversing a main doorway area 150 .
  • the second method involves an omni directional general-purpose system for infrequent digital voice and short data bursts for use anywhere within the merchant facility area 152 .
  • the third method provides a short-range highly directional link to the aisle shelf area 154 for product data and location.
  • the fourth method is used for securing an ultra short-range link to a smart cash register area 156 .
  • the PAL 10 communicates in the merchant's facility using radio frequency and or infrared signals. As illustrated in FIG. 7 , The merchant computer 66 is linked to each of the four (4) areas 67 by a high-speed network 69 .
  • the PAL 10 when a purchaser (customer) first approaches the merchant's facility at the main doorway area 150 , the PAL 10 encounters one of several RF barker beacons 142 , which extend past the main doorway area 150 on either side.
  • the barker beacon 142 advertises its presence by transmitting the next available full duplex RF channel, as illustrated in FIGS. 13A and 13B .
  • An ingress barker channel 210 A illustrated in FIG. 13A
  • an egress barker channel 210 B illustrated in FIG. 13B
  • Each beacon 142 can manage a list of channels, 210 A.
  • Each PAL 10 will constantly monitor the beacon channels. Each PAL 10 to coming into the facility will enter with a variable logic condition “OUT_RETAIL_SPACE” set to true in order to effect which beacon 142 PAL 10 listens for. When the PAL 10 has successfully entered the main doorway area 150 , the logic condition “IN_RETAIL_SPACE” will be set to true. Only one of the conditions may be true at a time. On coming in the main doorway area 150 , PAL 10 monitors each ingress barker channel 210 A for the next available channel. When an ingress barker channel is read, the PAL 10 will monitor the energy.
  • PAL 10 begins to transmit its shopping list with other pertinent data to the merchants-in-store computer system 66 , see FIG. 7 . If during the short-term counter period the PAL 10 detects the presence of energy then it switches to the next highest free channel or moves onto the next barker beacon 142 The bandwidth associated with the barker beacons is separated into a band for customers coming in and a smaller separate band for the customers leaving. There is sufficient frequency diversity so those entering will not interfere with those leaving. Likewise the full duplex channels, 210 A, 210 B are sufficiently separated so each PAL 10 entering the facility is afforded a high speed channel fast enough to upload a shopping list file in the time it takes to traverse the main doorway area 150 .
  • the PAL 10 can upload the list to the merchant's computer via an Internet portal for storage.
  • the merchant may review the list and check inventory to assure the products are in stock.
  • the merchant computer 66 After the shopping list file has been uploaded, the merchant computer 66 , see FIG. 7 , returns pertinent data back to the PAL 10 while the PAL 10 is still traversing the doorway area 150 , see FIG. 12 .
  • a numerical ID value is assigned to each PAL 10 while it is in the facility. If desired, a customer may set the PAL 10 to provide customer identification through the use of a trusted surrogate ID that only has meaning to the merchant. If this information were to be intercepted it would have no value without the merchant computer's database. Likewise a customer may set the PAL 10 to deny customer private identification.
  • the customer may set PAL 10 to accept a merchant's database pointer value, which becomes the customer's In-Store ID and returns this pointer value when communicating with any of the link methods.
  • the barker beacon 142 will identify the merchant, address date and time and next channel assignment. These values will be sufficient for the PAL 10 to retrieve the merchant's database pointer set from a previous time and uplink it along with the item list.
  • the customer may choose not to send the database pointer but instead use a unique generic ID in place of the specific ID. Up linking the database pointer differentiates a patron user from a public user.
  • the merchant will set customer treatment rules accordingly so that the merchant computer 66 sends the correct information to each user. For example the merchant may wish to exchange a personalized greeting for each patron and a general greeting for a public customer.
  • each barker beacon 142 will manage a list of 4 full duplex channels, for example, of 7501 KHz bandwidth centered at 1 MHz intervals beginning at 381 MHz ending at 384 MHz.
  • a UHF ultra high frequency
  • the barker beacon 142 advertises channel 1 is free.
  • the incoming PAL 10 tunes to 381 MHz and senses energy levels. If no energy is present then the PAL 10 commences a random timer from 0 to 10 milliseconds.
  • the timer At the end of the timer if no energy is present then it transmits data to the merchant computer 66 , see FIG. 7 , at a middle power setting.
  • the merchant computer 66 will send data to the PAL 10 to adjust the transmit level up or down from the midlevel setting so the total RF energy in the main doorway area 150 is managed so all users can communicate without interference.
  • the next barker beacon 142 is set at 385 MHz and likewise has 4 channels to manage. If the 380 MHz list is full then the beacon advertises the next beacon as the next channel so, in effect, it manages a list of five numbers, four of which are active and one of which is used to inform the PAL 10 to seek out the next beacon.
  • the merchant computer 66 see FIG. 7 , continually monitors the received data for errors. If a Bit Error Rate (BER) exceeds an arbitrary threshold value, it will issue a command to the PAL 10 to increase transmit power, The PAL 10 and the merchant computer 66 continuously exchange RF performance and BER information interspersed with data.
  • BER Bit Error Rate
  • a radio frequency RF link is created on entering the main doorway area 150 with only merchant specific data is uploaded from the PAL 10 to the merchant computer 66 , where the store inventory is stored. All other data remains secure and protected.
  • Specific information provides the purchaser with product, price and aisle location that helps in quickly locating the correct product. This data may be downloaded to the PAL 10 as the purchaser enters the main doorway area 150 . Products can then be organized by aisle location to maximize selling opportunity and customer convenience.
  • the PAL 10 can also request to download data pertinent to personal preferences. This data is not related to any advertising the merchant wishes to send. Also, the purchaser will be able to obtain merchant's advertisement data downloaded from the ingress short-range RF link or select to ignore any such advertisements.
  • the channel 210 A is freed up and returns back to the available state.
  • the PAL 10 is assigned a Full duplex VHF channel for omni directional general communication in the merchant facility (retail) area 152 .
  • the VHF band is chosen in this example for its ability to work with an indirect line of sight.
  • Other PALs 10 may share the channels.
  • This link is designed for short data burst traffic and infrequent digital voice traffic. The main characteristic of this link is the need for indirect line of sight communications when the PAL 10 is not in contact with the aisle shelf area 154 .
  • the merchant computer 66 see FIG. 7 , will periodically “ping” each PAL 10 in its list of “IN_RETAIL_SPACE” set true to see if the PAL 10 is still within the facility, Each PAL 10 will respond with its temporary ID value. If no reply is received within a predetermined time out period, the PAL 10 is assumed to have left the space.
  • the merchant computer 66 can differentiate between voice data packets and general data packets.
  • Voice packets are labeled and time stamped for priority processing. Voice compression and weighting reduce the need for bandwidth.
  • Voice messages are not guaranteed real time processing. They are processed for guaranteed delivery and response with a paging system. If a customer or user were in the area of for example aisle ten and needs customer assistance then the customer would use the PAL 10 to summon assistance.
  • the merchant's employees/sales associates may carry a network phone and paging device (not shown).
  • the PAL 10 has voice input and output and therefore can call and talk with the sales associate on a paging device (not shown) Location data can appear on the paging display on the paging device while two-way voice communication is in progress.
  • One or more PALs 10 can be in two-way communication with antennas (not shown) in the aisle shelf area 154 to ascertain which shelf the customer is working with. The system will also know how long a customer dwells in front of a shelf and which aisles the customer uses. This data becomes the “breadcrumb trail” and can be overlaid on a map of the merchant's facility so the trail can be shown with actual denoted times.
  • Communications in the aisle shelf area 154 is asynchronous between the PAL 10 and the merchant computer 66 .
  • the link continuity is broken and the merchant computer 66 , see FIG. 7 , will then terminate the link.
  • a PAL 10 enters the field of the antenna a link is established with data being exchanged on a transaction-by-transaction basis. For example, scanning a barcode will trigger a transmission; requesting a map to the next product in the list will trigger a transmission and reception; requesting product information, a voice pager link or similar activity will trigger a transmission and cause the PAL 10 to wait for a reception.
  • each price unit quantity is scanned in.
  • the price for that product was downloaded when the PAL 10 is in the main doorway area 150 or the aisle shelf area 154 . If the purchaser sets a budget maximum then, the PAL 10 will signal the purchaser when the limit is reached. If the price was not available or is incorrect, the purchaser can enter the price through a touch screen. Differences are reconciled at checkout. Prices are totaled as items are added. Items can be added or removed from the list at any point prior to checkout. When the purchaser scans in each item to be purchased, the PAL 10 matches it against the shopping list.
  • the PAL 10 will notify the purchaser of forgotten items. Items will not be forgotten until the purchaser discards the item prior to checkout. When a customer removes an item from the shelf and scans in the unique product ID that number is registered in the PAL 10 . The PAL 10 will broadcast to the appropriate station the ID of the item selected.
  • the merchant computer 66 keeps track of the purchase list items as the purchaser removes them from the shelf.
  • the PAL 10 will in turn receive current price data. If there is a discrepancy against a previous price value, the purchaser is notified and has the option of returning the item to the shelf. If the purchaser returns the item to the shelf the purchaser removes the item from the procurement list on the PAL 10 display and the merchant computer 66 receives the updated information so the shelf item count is updated. This aspect of the present invention saves the merchant restocking labor.
  • the checkout process is illustrated in FIG. 14 .
  • the customer places the PAL 10 onto a conventional short-range pedestal 86 .
  • the link is actively managed in fractions of an inch.
  • the frequency band chosen for this link must be capable of meeting the demands of the link.
  • This link functions like the aisle link except it is managed for link distances in fractions of an inch.
  • Super high frequency microwave, infrared or optical are frequency bands that meet requirements.
  • This type of link is designed for high security however conventional encryption techniques may also be used.
  • the link power budget is managed so no energy escapes the contiguous link volume subtended when the PAL 10 is resting on the pedestal 86 .
  • a conventional infrared or optical port (not shown) connected to the radio subsystem 42 , see FIG.
  • a conventional link power management circuitry (not shown) keeps the power level very low so no detectable energy escapes the seams between the PAL 10 and the pedestal surface.
  • a 100 GHz super high frequency microwave can be embedded in the pedestal 86 so fractional microwatt power level can be used.
  • the ultra short range radio link controller 88 is connected to a smart cash or sales register 90 , which establishes two-way communications between the PAL 10 via the optical scan assembly 46 , and smart cash or sales register 90 .
  • a signal from the pedestal 86 detects the presence of a PAL 10 .
  • the ultra short range radio link controller 88 establishes communication by sending a control signal to the PAL 10 to enable control of the transmit power level from the PAL 10 back to the pedestal 86 . Communications with the smart cash or sales register 90 follows normally.
  • the PAL 10 can be removed from the pedestal 86 in the data exchange process. This action will momentarily interrupt the exchange process.
  • the process will be automatically restored when the PAL 10 is returned to the pedestal 86 .
  • the pedestal 86 contains conventional electronics and antenna elements (not shown) needed to manage the micro RF link.
  • the link exists only when the PAL 10 is on the pedestal 86 .
  • the RF field falls off to zero very rapidly away from the pedestal. This method limits what other PALs in close proximity or adjacent to the pedestal can sense. Others will not detect the presence of the micro RF field.
  • quantity aid price can reconcile the purchase list. Discrepancies will be discovered and displayed immediately.
  • a confirmation is made to send a credit or debit card data (not shown) to the sales register 90 automatically.
  • the cash register receipt is returned electronically.
  • a history of purchases and payment methods is maintained.
  • the purchaser can reconcile the data with financial statements.
  • the data then can be discarded or downloaded to a personal computer for long-term retention.
  • a running balance is maintained in all accounts.
  • the purchaser can have funds added at scheduled intervals.
  • the real time clock will monitor the financial calendar schedule and perform actions on schedule.
  • the PAL 10 may prompt the purchaser for a payment means such as cash, credit or checking.
  • a payment means such as cash, credit or checking.
  • the payment method could have been set prior to entry but this is not required. If the purchaser is paying by cash the PAL 10 subtracts the amount from the total (set by the purchaser or computed from previous transactions, or downloaded sales slip from the sales register) and shows the remainder. If the payment is by check then the check number, date and amount will be kept and down loaded to the purchaser's personal computer later. This data is not entered manually by the user but returned by the sales register for an automatic log. Other check data may be entered manually if so desired. If payment is by credit or debit card, a link is made to a banking network 92 A, see FIG. 14 .
  • Rebates offered by the merchant and manufacturers are automatically transacted by the system of this invention.
  • the customer will see the rebate offer transmitted by the station RF link for a scanned product.
  • the customer information necessary for the rebate is up loaded to the sales register to supply chain network 92 B, see FIG. 14 .
  • the customer will receive the rebate in due process and no further action is required. If the customer decides to return a product, the sales register attendant will scan in the unique product ID. The system will recognize the ID as having a rebate process pending and cancel the pending process. The merchant saves processing time and expense by such a procedure.
  • the customer can store the PAL 10 on his/her person and leave the store with the shopping history stored in PAL 10 for future use.
  • FIG. 15 shows the power supply 100 needed to operate the PAL 10 .
  • the power supply 100 uses two sets of batteries 102 , 104 to provide power. Only one set is needed at one time.
  • the processor 11 see FIG. 1 , is in communication with both sets to sense a low condition on the active set and to manage power, for example, by automatically switching to the second set and/or notifying the customer to change the depleted set. Since the PAL will be used for financial transaction processing, it will require a high degree of reliability. While the device may be designed with high reliability methods and components it will have a prominent risk of failure due to dependence on batteries. To mitigate this risk, special circuits are employed to manage two independent sets of batteries. The PAL 10 only runs from one set of batteries alternating between the two.
  • a power intelligence algorithm run by the processor 11 transfers to the second set.
  • the user is prompted to change batteries of the first set.
  • Each set of batteries has an indicator to mark the battery set for changing.
  • Two adjacent compartments 106 , 108 with a divider 110 separate the two-battery sets 102 , 104 under the battery cover (not shown).
  • the display 22 FIG. 1 , contains graphics and instructions on how to change the batteries. The customer is not required to change batteries immediately, up to a few weeks, after the PAL 10 has shifted over to the second set. When the second set begins to run down, the frequency of reminders increases. At the sixty-percent remaining level, the PAL 10 will not perform any functions until the first set is replenished.
  • FIG. 16 shows how PAL 10 can measure weight.
  • Weight is a key parameter for measuring out quantity to determine price.
  • the weight measuring device 58 includes a strain gauge 312 mounted on a shaft 314 .
  • the shaft 314 has a fixed end 315 A and a free end 315 B.
  • the fixed end 315 A is fixedly attached to the PAL and the free end 315 B is rotatably attached to the PAL 10 .
  • a spring 320 is fixedly attached to the PAL 10 and the shaft free end 315 B.
  • a line 316 is wound on a pulley 318 having a slip knot mechanism 320 A on the free end 321 of the line 316 .
  • the slip knot mechanism 320 A allows the line to form an adjustable loop.
  • the loop can be cinched to hold material without bottom support while the PAL. 10 computes the weight of an object purchased.
  • the pulley 318 is fixedly attached to the shaft 314 .
  • the line 310 is cinched tight to hold the object.
  • the PAL 10 determines the weight based on the strain measured by the strain gage 312 as the shaft 316 torsional deflects under the load of the object.
  • the user then can add price input to determine the total price.
  • the PAL 10 is equipped with a method for accurately measuring the weight of a small amount of mass.
  • a pulley, shaft and springs are used to make a self-retracting mechanism for storing a strong lightweight braided line.
  • the line material is chosen so that it will not stretch over time or distort in any way when used within design limits.
  • a line release mechanism 322 on the PAL 10 handle releases a lock (not shown) that allows the line 316 to be extended from the PAL 10 .
  • the strain gauge 312 is connected to the analog-to-digital converter 56 , thereby linking the weight measuring device 58 to the processor 11 , as illustrated in FIG. 1 .
  • the strain gauge deflections are transmitted to the central processor 11 for conversion into weight and calculating purchase price based on the cost per unit weight inputted by an input device, such as an optical scanner or keyboard.

Abstract

A purchasing aid logistics appliance that assists a purchaser with a shopping list generation, in-store product location, automated checkout, and financial management. The PAL is in the form of a battery operated PAL with touch screen display and multimedia input/output. The PAL functions as a fiduciary aid and two-way communications device secure for managing money and processing perishable data. The PAL can function as a stand-alone device or synchronized with a user's personal computer via a RF or IR link.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 10/037,382 filed Jan. 4, 2002 and entitled “PURCHASING AID LOGISTICS APPLIANCE,” which is hereby incorporated by reference herein in its entirety.
  • BACKGROUND OF THE INVENTION
  • This invention relates generally to electronic commerce, and, more particularly, to the processing, modifying, analyzing, and storing of purchaser data to support functions that are valuable to product identification selection, and purchase for the customer, the merchant, and the supply chain.
  • The retail industry's drive for efficiency is on going. Purchasers favor merchants with lowest prices. Merchants compete to provide lowest prices. In this competition unit stores are growing ever-larger floor and shelf space and carrying more stock. Managing very large stock, floor and shelf spaces is becoming difficult. Purchasers need assistance to manage the volume and frequency of product and sales information; navigate in large retail spaces to find specific products; provide electronic payment for product purchases.
  • Merchants, suppliers and purchasers (customers) are beginning to work together. Merchants and suppliers now provide information through the Internet so purchasers can shop from home. Merchants and suppliers are providing barcode coupons through the Internet. Purchasers are beginning to use portable barcode scanner devices supplied by merchants to select and process products in the retail space. Merchants have deployed kiosks in the retail space with electronic displays and keyboards to display information about products to purchasers. Paper catalogs now appear with bareodes that direct a web browser to a product information page on the Internet. Electronic devices are now available to help a purchaser manage money and automate the payment function of the checkout process,
  • Financial transactions require encryption to keep sensitive data secure. Communications encryption is accomplished today using the Public Key Infrastructure or PKI. This method is safe and secure as long as the key is safe and secure. If someone steals a laptop computer, the key is stored in the computer and it is compromised. In the prior art, the public key is offloaded from the laptop computer to a smartcard. The smart card must be inserted to make a secure connection. However the memory of the laptop computer is still unprotected leaving stored data susceptible to theft.
  • Examples of systems in place today to accommodate purchasers are described in U.S. Pat. No. 5,873,045 to Peter Lee et al that describes a mobile client system using a cellphone interconnected with a mobile computing device; and U.S. Pat. No. 5,956,693 that describes merchant communication to customers. Both of these devices place mobile computer power in the hands of the purchaser. These devices advance purchaser or customer automation by providing, access to product data in the retail space. But neither is designed to be ubiquitously integrated into a merchants retail automation system. Both of these devices are insufficient to support all the functions needed by the merchant, supplier and purchaser (customer).
  • For a better understanding of the present invention, reference is made to the accompanying drawings and detailed description and its scope will be pointed out in the appended claims.
  • SUMMARY OF THE INVENTION
  • The present invention is a purchasing aid logistics appliance (PAL) is stand alone device that communicates with a merchant computer providing communication between a PAL and the merchant in-store computer. Sensitive personal finance, product, price and availability information can be exchanged between the PAL and the merchant computer in a secure timely manner to specific identifiable purchasers and to the general public. The PAL will assist the purchaser in product selection and location; merchant selection and management; automated checkout; and managing financial data. In addition, the PAL interfaces with a merchants in-store system to communicate to the purchaser in the retail space. The PAL communicates using both data and voice using an unrestricted part of the spectrum. The PAL interfaces with a network outside the retail space to gather product information in preparation for future visits to the merchant store. Further, the PAL interacts securely in the retail space with the merchants automation system to assist the purchaser with product selection, location and checkout.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of the PAL computer hardware architecture of this invention;
  • FIG. 2 is a pictorial representation of an example of a high-density barcode of this invention;
  • FIG. 3 is a block diagram of the printed media decode process of this invention;
  • FIG. 4 is a tabular representation of the HTML decode table illustrated in FIG. 3;
  • FIG. 5 is a tabular representation of an example of a vertical barcode numerical code pattern for a high-density barcode used with this invention,
  • FIG. 6 is a schematic representation of the results of the barcode decoding process in accordance with the present invention:
  • FIG. 7 is a flow chart of the information exchange links of the present invention illustrated in FIG. 1;
  • FIG. 8 is a flow chart of a memory map of the present invention;
  • FIG. 9 is a flow chart of a three way verification process of the secure memory of the present invention;
  • FIG. 10 is a flow chart of the key generation technique of the secure memory of the present invention;
  • FIG. 11 is a flow chart of the address encrypted RAM of the secure memory of the present invention:
  • FIG. 11A is a pictorial representation of the antenna system of the present invention;
  • FIG. 12 is a schematic representation of the PAL communication links with the merchant computer within four (4) areas of the merchant facility;
  • FIGS. 13A and 13B are plots of the ingress and egress barker beacon full duplex channels transmitted by the Main Doorway Area of the merchant computer illustrated in FIG. 12;
  • FIG. 14 is a process flow diagram of the PAL and checkout communication system of this invention;
  • FIG. 15 is a pictorial schematic representation of the power supply of the present invention; and
  • FIG. 16 is a pictorial schematic representation of the weight-measuring device of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The preferred embodiment of the present invention is represented by a purchasing aid logistics (PAL) appliance 10. The PAL 10 utilizes conventional components in the hardware architecture as shown in FIG. 1. These components described below are not to be considered as a limitation on the present invention and can be substituted for by other equivalent components.
  • A central processor 11 with main memory 12 connected to a main system address/data bus 13 links all the components of the hardware architecture. A secure trusted monitor program stored in the main memory 12 and executable by the central processor 11 controls all functions. A Boot Program 14 brings up the PAL 10 from a cold or warm start and runs test executables. The monitor program is stored in Flash Memory and System Software 16 where it can be updated as needed. Key session parameters have been stored from a previous use. Secure data such as encryption keys, financial data owner name and pertinent data are stored in an encryption circuitry equipped random access memory 18. There is a micro video display controller 20 for a micro video display 22. Conventional voice analog circuitry 26 with speaker and microphone is utilized for voice digital conversion input/output 24. The monitor program stores specific voice samples for necessary biometric voice recognition. Additionally, the PAL 10 includes a barcode or optical reader subsystem 44 and optical scan assembly 46, magnetic stripe reader 34 utilizing a hardware interface 32 to the system bus 13, smart card reader 38 utilizing a hardware interface 36, remote ear piece 28, high-resolution touch screen display 50 with touch screen interface controller 48, weight-measuring device 58 connected to the bus 13 by an analog-to-digital converter 56, a radio link controller 40 and radio subsystem 42 for high-speed secure short-range communication. Additionally, the PAL 10 includes a front panel 54 that includes keys, switches and indicators coupled to the bus 13 by a panel interface 52. As stated above, this listing of features is for illustrative purposes and not to limit the invention. Other features not listed are within the contemplation of the invention.
  • The PAL 10 can execute several program modules stored on the central processor 11, such as accounting, calendar, clock, shopping list, and communication. The accounting software keeps track of accounts such as credit cards, loans, checking and savings. It has a real time clock and calendar to measure the passage of time and records financial transaction logs in parallel with banks and other financial organizations. The data is secure in the PAL 10 by means of a secure card reader and biometrics. The PAL 10 is also capable of interacting with a user through voice recognition and fingerprint identification to provide a strong level of security (not shown).
  • The PAL 10 is designed to facilitate procurement planning. This planning will most likely take place as the purchaser or customer uses the PAL 10 to create lists of items to procure. For example, a merchant grocer distributes a flyer to each household in a district. To create a list the purchaser (customer) first scans in the merchant's specific optical code, which contains information pertinent to the merchant, including but not limited to sale terms and conditions. For each product listed, a printed barcode or similar code is produced that can be scanned into the PAL 10. To add a specific product to the list, the purchaser Scans the product specific optical code. The code contains a product description, unit and price. The printed media advertisement will have a master barcode or similar control code identifying the merchant, date and sale terms. The purchaser scans in the master control code for each item to be procured. Items can be added or removed using the keypad functions. In addition, items can be added from memory based upon previous purchases as well as on-line from the merchant's web site. If the purchaser is Internet enabled, an RF device (not shown) attached to the personal computer will activate the RF link via the optical scan assembly 46, acting as an Internet port, and enable up loads and down loads to the PAL 10. The merchant will receive advance information on product selections. If the purchaser is not Internet enabled or chooses not to use the Internet, then the merchant receives this information on customer ingress into the merchant store.
  • By scanning a high-density barcode 60, as shown in FIG. 2, the PAL 10 provides a screen of information relevant to the product scanned, in particular similar data as received from a web site, The PAL 10 has executable software to create a browser frame where a high-density barcode 60 is scanned that contains programming and information about the product, and sales terms and conditions. The high-density barcode 60 makes use of printed media codes to extract information and present it to a user on the screen of the PAL 10. The high-density barcode 60 also extracts rules concerning the terms of the advertisement and presents the rules to the purchaser and alters the behavior of the PAL 10 while in a merchant's facility. The display information is encoded in the media in two parts. One part is the visual formatting instructions to the PAL 10 and the other is the information to be presented.
  • Printed media pattern codes such as bareodes can be one or more dimensional ink on paper print patterns that can be decoded by an optical scan assembly 46 into a number. There are many types of scan codes in existence. For example the Data Matrix code is a bi-dimensional code that can represent a maximum of 2000 ASCII characters. Another such code, PDF417, is another bi-dimensional code. In this code each line is composed of a variable number of columns that encode data. This code is bracketed by a Start character and Stop character. The main characteristics are a minimum and maximum number of columns and rows. Another code is Code 11. It is named for the fact it contains 11 possible code patterns. Still another is Code 39, an alphanumeric bar code that can encode decimal numbers, the upper case alphabet, and some extra symbols. There are many existing codes that could be used with the present invention. However, codes printed on low quality paper would not be able to support the dense ink patterns that many of these codes require.
  • As shown in FIG. 2, a high-density barcode 60 increases the amount of data that can be transmitted using poor quality paper, as found in a newspaper. The high-density barcode is a sequence of horizontal barcodes stacked into an arrangement that can be scanned in by a simple vertical sweeping motion of the hand. The scan will require limited uniform vertical motion, well within the capability of the wrist, elbow and shoulder. High-speed electronic processing is used to average out motion errors.
  • An encode process, as shown in FIG. 3, shows how a vertical barcode or similar code can encode a WEB page display and/or behavior modifying rules. The encode process uses codes and checksums for data reliability. Returning to FIG. 2, the user will point a laser scan line 66 generated by the optical scan assembly 46 at the top barcode 202 and drag the laser scan line 66 to the bottom barcode 203. When successful the purchasing aid logistic appliance 10 will beep one short high-pitched note. If not successful the purchasing aid logistic appliance 10 will beep one long low sounding beep. Checksums in the code will indicate a successful scan. Also, other types of signals representative of information can also be printed by the PAL 10.
  • Returning to FIG. 3, the high-density barcode 60, which is designed to encode information required by the PAL 10 is scanned by a scanner 102A, designed to extract the amount of information required to represent a WEB page. A decoder 103 decodes the scan using rules concerning how numbers are coded to represent information. These rules are coded into tables represented by numerals 105,106A,107 and 111. These tables interact with the decoder 103 to provide parsing information to a parser 104A. The parser 104A creates the software that will build the display. The parser 104A can also identify rules and construct a Behavior Modifying Rules Table. The rules decode table 111 is a table that governs the rules of communications and commerce by the PAL 10. Specifically, the rules decode table 111 includes information specific to a unique merchant. When the PAL 10 is presented to the unique merchant, the rules decode table 111 will identify the merchant and terms and conditions of a sale. Information in the PAL 10 about other merchants will not be shared. The browser receives HTML or similar software from the parser 104A and creates a display 109.
  • The vertical barcode format, for example, does not contain a specific language, for example, Java or HTML. Rather the vertical barcode will represent a sequence of numerical codes. Then from that, each suitable language will have a table from which a list of codes will generate a finite number of web page variations. The high-density barcode 60 identifies the table and represents codes indexed specifically for each language. The high-density barcode 60 uses the parser 104A to construct the frame software needed by a display browser 108A. This is a multi step process designed to make, for example, the vertical barcode format or a similar code independent of any browser language.
  • The high-density barcode 60 can represent an imbedded browser frame. There are many types of scan codes in existence. They vary by the size and type of code represented by the light and dark patterns of ink and paper. In the present art, a spot laser beam is swept into a line pattern by a reflecting device oscillating at a known rate. The optical receive path can be the exact same path. The laser spot man look continuous but is, in fact switched on and off at high speed to conserve power and for other reasons. The optical receive is gated to the rate the laser is turned on and off. The resulting optical detection pattern is processed to average and smoothes out any noise spikes. There will be several samples for each light and dark return. The dark returns will vary by the width of the ink line. A time base is established by the preamble to the barcode helping to determine the frequency of the phase lock loop for the remainder of the barcode. This process is similar to a modem training sequence.
  • Returning to FIG. 2, the layout of the high-density barcode 60 is shove in a vertical code format. The purpose of the vertical code format is to demonstrate how to build a barcode that contains sufficient information to build a WEB page or rules table. As more data is required, more codes are stacked until the practicable limit is reached. A first code line 202 shows where the first scan is started from and a last code line 203 shows the point to where the scan is dragged. The first code line 201 shows a timing space between stacked codes for the purpose of resetting the scan to pull in the next level. This is only an example to show how bandwidth dense codes could be built on poor quality paper.
  • FIG. 4 is a partial example of how to build a HTML decode table 105 of numerical codes indexed to coding statements. Some coding statements will require additional fields to fully populate the statement. The purpose of HTML decode table 105 is to reduce the need for information bandwidth by using numerical codes to represent entire statements. Thus by calling out codes and populating them with field data a full statement can be built conserving barcode bandwidth. FIG. 6 illustrates a minimum number of statements in the HTML decode table 105 to build a web page displaying, for example, “HELLO WORLD.”
  • The parser 103, shown in FIG. 3, can build a fully functional HTML program by placing numerical codes 401, for example, in a sequence creating a coding pattern table as illustrated in FIG. 5.
  • The high-density barcode 60 or any similar print code contains a numerical table index code with data. The codes are cross-referenced to tables 105, 106A, 107, 111, as shown in FIG. 3. The index points to a software instruction contained in the HTML decode table 105, which contains a series of code values 401, as illustrated in FIG. 5. These values contain significance to the parser 104A. The HTML decode table 105 instructs the parser 104A how to interpret the value. For example, code 11 indicates the start of table data. The next value is one of eight possibilities corresponding to tables 105, 106A, 107, 111.
  • FIG. 6 is al example of the parsing process where the barcode 503 represents the numerical sequence 501. Embedded in numerical sequence 501 is code 11 12 05 which tells the parser 104A to select the HTML decode table 105 to interpret the remainder of the data and there are 5 code statements. Code 60 is a fictitious checksum value shown for example only. It will repeat at the barcode end. Code 22 indicates the start of table indices. Code 00 is the first entry in the HTML decode table 105. This first entry has no required fields. Index 04 is the first code statement to require a field. Code 31 tells the parser 104A the next value is the number of characters in the first field. If there were a second field, code 31 would appear again after the 11th character code with a numerical representing the size of the next field. This process would continue until all fields were fully presented. Continuing with the example, 11 characters follow. They are coded in the range 31-56 which tells the parser how they to are be interpreted as text characters. Finally code 21 appears again followed by 60. If the parser were able to calculate the same checksum, a short high pitch beep would indicate a successful scan and the resultant 502 would be put up on the display. Numerical codes are used to represent coding statements from any descriptive language that can build a display by way of browser instructions. The vertical barcode format does not require a specific language for example WAP, JAVA or HTML. Rather the frame software will be built from numeric codes. For example the HTML statement: <p><table bgcolor=“#000000” border=0 cellpadding=5 cellspacing=1 wIDth=468> could be designated by the numeric code 43. The high-density barcode 60 is based on the premise that a web page can be constructed from a closed list of software statements. By way of the present example, ninety-nine statements could be developed and referenced by a two digit decimal code. By way of example, any practical number could be used for example 199. Data fields follow other codes as shown in FIG. 3. The parser 104A can build the code statement and populate it with field data extracted from the printed code. At the conclusion of this process HTML or similar software is generated for a browser to generate a frame display.
  • By way of example, the vertical barcode format can contain information about a merchant and sale terms and conditions. This information is displayed and may be entered into the rules table 112A.
  • As shown in FIG. 7, the PAL 10 interfaces with print media 62, the Internet 64, and merchant's computer 66. Product data is downloaded to the PAL 10, where the purchaser makes decisions and creates merchant specific product lists prior to going to the store. In the planning stage of a purchase, for example, a purchaser may wish to know which products do not contain an ingredient. For example, the purchaser may require breads that do not contain sodium The purchaser can access the merchant computer 66 through a personal computer 68 via the Internet 64, as illustrated in FIG. 7, and request a listing of products matching the request sorted by preferred merchants. The purchaser then will select a product for purchase and estimate a purchase date. The list for a merchant is managed by several factors including date when the date, for example, is a factor in terms and conditions. Price and availability may also, for example, manage individual items. Upon completion of the product list or shopping list, the PAL 10 can store the list until entry into the merchant facility or the PAL 10 can upload the list to the merchant's computer via an Internet portal for storage. The merchant may review the list and check inventory to assure the products are in stock.
  • The purchaser creates a list of items to procure and assigns a payment method to the list. The PAL 10 will manage the budget for the list and all lists. Since financial data is sensitive, the PAL 10 may utilize a security system in a layers concept to safeguard use. Layers represent various facets of the device from trusted monitor to smart cards to encrypted memory. Access to sensitive data begins with smart card technology and works through succeeding layers. The smart card technology would be employed for store critical secure data. The PAL 10 can read the magnetic stripe on credit or debit cards and down load this data into a secure memory where it can be retrieved and sent to the sales register at purchase time.
  • The secure memory of the present inventions illustrated in FIG. 8, is included in a memory map 70, the most basic element of any computing device. The memory map 70 is organized into regions where specific tasks are performed. The regions are the physical address locations of a block of memory units 72. A memory unit 72 may be any number of bits but is usually a multiple of eight forming an eight-bit byte, sixteen-bit word, or thirty-two-bit double word. A single address location consists of several binary circuits, which must be decoded before the location can he opened for reading or writing. The central processor 11, illustrated in FIG. 1, sends out address signals on the address bus, which is processed by a memory address decoder. The decoder then selects which physical unit of memory is accessed. As shown in FIG. 8, an elementary memory map 70 in which the top of the map, RAM 10A, represents am area where a program and data are stored, with logical methods of data transfer to the RAM 10A, RAM input 13 and RAM output 12A. Programs stored on permanent storage devices are accessed by software in the read only memory basic input/output operating system and put into RAM 10A.
  • The specific memory used to hold the video image to be displayed is represented by video memory 15. The difference between RAM 10A and video memory 15 is the address range, which is coded a read only memory basic input/output operating system (ROM BIOS) 25. When a program executing in RAM 10A has data to write to the display, it calls the video out routine in ROM BIOS 25 and sends it data by was of the circuitry 17. This data is then displayed by the video generating circuitry connected to this memory (not shown) which is a well-understood process.
  • A similar method is used to set encrypted RAM 20. Encrypted RAM 20 has the same general properties of RAM 10A in that memory can be read from and written to. It has two modes of operation; the first is secure and second is disabled. By way of read circuitry 23 and write circuitry 22A encrypted RAM 20A functions as ordinary memory when set to secure mode. When encrypted RAM 20A is set disabled the data retrieved by way of read circuitry 23 is not logical and therefore useless. Write circuitry 22A does not function in a logical manner when disabled. The order of data is sometimes referred to in the literature as beg Endian or little Endian. This is a reference to which byte of a multi-byte retrieval contains the most significant bit and which contains the least significant bit. Without knowing which causes the data to be improperly interpreted.
  • FIG. 9 illustrates the use of encrypted RAM 20A in the present invention in a three way verification process. In step 1 a smart card is inserted into the PAL 10 and the pin 30 is accessed. The user is prompted to enter a personal identification number (PIN) 31. The user's PIN number 31 is verified 32S with the PIN 30 stored in the smart card. In step 2 a secure data hash 33 is compared to a hash 34A stored in smart card or any convenient location. If the comparison 35 is valid then the process continues to step 3, a verification 36S of a bond created in a previous session. From a previous session, a hash of the secure data in encrypted RAM was created and stored in two places. One place is the smart card and other is on the PAL 10. If both step 1 and step 2 are valid then the decision branch at step 4 is yes and encrypted RAM is unlocked 38S and made available. The user then performs one or more transactions, which may or may not change the data in encrypted RAM. Then a hash-creating algorithm located in ROM BIOS 25, see FIG. 8, runs and creates a new hash for the next session stored on the smart card data hash 34A and on the PAL 10 For the next session. If steps 1 & 2 are not valid, then the data in encrypted RAM is destroyed.
  • FIG. 10 shows an alternative method of how encrypted RAM could be used in the PAL 10. First, two independent variables are generated 40S: the first variable 41 and the second variable 42. The first variable 41 and second variable 42A combine in a process to generate a cipher key 43 that fits into a special address decoder 44A. Ordinary RAM is attached to the special address decoder 44. Together the special address decoder 44A and RAM 45 create encrypted RAM 46A.
  • Alternative applications of encrypted RAM could also have significance in non-mobile computers. For example a desktop computer can use encrypted RAM to securely store sensitive E-mail or other data. Many users leave the desktop computer on continuously. The common practice is to lock the keyboard and display with a password. If a thief can steal a password then entry could be made on a desktop. Encrypted RAM could then protect sensitive information. Now that several examples have shown how encrypted RAM could be used, following is a detailed explanation of how a special cipher locked address decoder could be made.
  • FIG. 11 is an alternative embodiment of encrypted RAM. A signal 49 starts and stops the encryption process. A portion of the RAM map 70, as shown in FIG. 8, is set aside for secure memory. A special address decoder 55 and an address tracker 56A generate the memory select lines using one of several possible mathematical formulae. This formula requires a random number be generated at the first time secure data is created then stored in address decoder 55. The random number encode or cipher key 52A is added to the address to create an offset address from the correct location. The contents of a memory location are not encrypted but its address is intentionally misaligned by a random number incorporated into the address decoder. This random number is used whenever this secure address range is accessed in secure mode. Note that this technique applies to static RAM, Dynamic Ram and Flash RAM where an address decoder is required to generate select lines. For the purpose of this example shown in FIG. 11, a RAM segment 54A is address encrypted. To keep the following example simple the memory RAM segment 54A will be limited to 1024 bytes (hex B000-B3FF) of memory but any size is possible and larger is better.
  • When the smart card is inserted into the PAL 10, the address decoder 55 reads and writes data in secure mode as normally directed by the central processor 11. In FIG. 11, a random number is generated by random number generation circuitry 51, hexadecimal F is used though any number is acceptable. The processor 11 now issues a write-to-memory command by calling for base address B000 50. The address decoder 55 receives B000 50 on the active address data bus from the central processor 11 The address decoder 55 also receives random number encode key hexadecimal F from the random number circuitry item 51. The address decoder 55 then computes memory select lines 53 as if the address were B00F. The central processor 11 writes a 4-byte variable so that 4 successive RAM 8 bit per byte locations are required. The next byte value from memory will be B001 bus address signals 50A but is instead computed as select lines for B010 (B001+F) by address decoder 55. The central processor 11 thinks it is writing B000 through B003 four successive locations for this one variable. The four bytes are now stored in B00F B010, B0011, B0012. When the smart card is removed, the address decoder 55 now gets a signal not to use the random number encode key 52A generated by random number generation circuitry 51. Now the central processor 11 attempts to read what has been written and issues 4 read commands by memory bus address signals 50A beginning with location B000 through B003. The address decoder 55 functions normally but the data retrieved from these four locations B000-B003 is not coherent and therefore unintelligible, Next the smart card is again inserted using the previous example illustrated in FIG. 9 so that the address decoder 55 is now set to secure mode. The address decoder 55 now gets a signal to use the random number encode key. The four address locations B000-B003 are changed to B00F, B010, B0011, B0012 the exact same locations written to previously. The data is correctly retrieved. This example shows how data can be safely encrypted by intentionally misaligning the address. There is no record of the encode key stored in the RAM 10A as shown in FIG. 9, the RAM 10A where program and data are kept. Therefore the key cannot be retrieved by any method. Alternative embodiments include using −F instead of F as the encryption key, and binary compliment arithmetic could be used in place of simple addition. There are several valid methods other than strict interpretation of the above example capable of achieving the same purpose.
  • Returning to FIG. 11, the central processor 11 keeps track of where data is stored using well-understood programming techniques. Using encrypted RAM, the central processor 11 cannot accurately track where data is physically stored. It depends on the address decoder 55 to correctly interpret the hexadecimal address. When the central processor 11 selects an address close to the end of encrypted RAM boundary, the address decoder 55 may set select lines 53 to go past the last boundary address. In the previous example that address is B3FF. The address select lines 53 will trap any address computed to be past the boundary. In the previous example if the central processor 11 set the address lines to B3F1 and the address decoder 55 was set to secure mode then the address decoder 55 would set the select lines for an address of B400 (B3F1+F), where the upper boundary is B3FF. The address tracker 56A senses the condition and sends a signal 58, ranging between 0 and E, generated by the address tracker 56A to the address decoder 55. This signal causes the address decoder 55 to reset the select lines 53 as if base address B000 were being decoded. The decode key 57 is generated by an encode cipher key 52A for use by the address tracker 56A. The decode key 57 is used to compute the value of the signal 58A. No address is used twice and no valid memory contents are overwritten and the central processor 11 cannot determine the equivalent address used.
  • The encode cipher key 52A can be changed from time to time to maintain an element of randomness. The random encode cipher key 52A may be generated once per active session. An active session is defined as a continuous RAM 54A power cycle. As long as the RAM 54A is active the encode cipher key 52A is not lost. If power to the RAM 54A is lost, then the encode cipher key 52A is likewise lost and data lost with it as well. There are other possibilities for setting rules regarding the generation of an encode cipher key 52A. For example a key 52A could he generated once per secure session and erased when the secure session is ended. In this case the data will be lost unless steps are taken to offload the encrypted RAM data to an alternate location. If the data were offloaded onto temporary storage then the encode key could be changed periodically and the secure data reloaded back to encrypted RAM. This would be better for security if the encode key were periodically changed. This technique makes it highly unlikely an external spoof can be used to strobe and read out secure memory.
  • Once the data is input into the PAL 10, the PAL 10 acts as a decision aid or purchasers by providing a variety of functions. These functions include, but not limited to, such factors as price, product location, shopping list, and stock status. It also acts as a purchase facilitator, capturing product data as the purchaser shops in the store. Furthermore, PAL 10 stores all purchase information including product data and purchase history. This PAL 10 can manage money from the purchase planning stage to the product selection stage to the checkout counter. Afterwards it can provide historical data for record keeping and historical analysis.
  • A radio subsystem 42 (FIG. 1) utilizes two conventional types of antennae, as illustrated in FIG. 11 a, simultaneously. These two antennas, one a forward directional antenna 41 a and the other an omni directional antenna 43 a are used by the protocol to affect the RF link. The forward directional antenna 41 a includes conventional components, such as, a signal absorbing material 41 b, reflecting cone shaped director 41 c, and a directional element 41 d. The omni directional antenna 43 a includes conventional dual back-to-back hemispherical coverage antennas 43 b. By managing the power, a link can be created within the confines of an aisle shelf area (to be discussed below). The omni directional antenna is used to communicate with the PAL 10 when it is not within the confines of the aisle shelf area. Both antennas are operated from their respective antenna controllers 41 c, 43 c and connected to the processor 11 through the radio link controller 40. The advantages of two antennas are diversity and multi channel link control living the merchant computer the ability to manage large numbers of simultaneous users.
  • As illustrated in FIG. 7, the facility communication areas 67 effectuate communication between the merchant computer and the PAL 10 in the merchant facility. The merchant facility is equipped with one or more facility communication areas 67. The preferred embodiment communicates four (4) ways in the merchant's facility as illustrated in FIG. 12. Communication limitations are a function of facility planning not capability of the PAL 10. The first method incorporates quickly uploading and downloading data while traversing a main doorway area 150. The second method involves an omni directional general-purpose system for infrequent digital voice and short data bursts for use anywhere within the merchant facility area 152. The third method provides a short-range highly directional link to the aisle shelf area 154 for product data and location. The fourth method is used for securing an ultra short-range link to a smart cash register area 156. The PAL 10 communicates in the merchant's facility using radio frequency and or infrared signals. As illustrated in FIG. 7, The merchant computer 66 is linked to each of the four (4) areas 67 by a high-speed network 69.
  • Mode of Operation
  • Referring to FIG. 12 of the drawings, when a purchaser (customer) first approaches the merchant's facility at the main doorway area 150, the PAL 10 encounters one of several RF barker beacons 142, which extend past the main doorway area 150 on either side. The barker beacon 142 advertises its presence by transmitting the next available full duplex RF channel, as illustrated in FIGS. 13A and 13B. An ingress barker channel 210A, illustrated in FIG. 13A, is used to greet the PAL 10 when it enters the facility, and an egress barker channel 210B, illustrated in FIG. 13B, is used to clear the PAL 10 from the facility. Each beacon 142 can manage a list of channels, 210A. Larger busy doorways will have more barker beacons 142 than smaller less busy doorways. Each PAL 10 will constantly monitor the beacon channels. Each PAL 10 to coming into the facility will enter with a variable logic condition “OUT_RETAIL_SPACE” set to true in order to effect which beacon 142 PAL 10 listens for. When the PAL 10 has successfully entered the main doorway area 150, the logic condition “IN_RETAIL_SPACE” will be set to true. Only one of the conditions may be true at a time. On coming in the main doorway area 150, PAL 10 monitors each ingress barker channel 210A for the next available channel. When an ingress barker channel is read, the PAL 10 will monitor the energy. If no energy is present it will begin actuation of a short-term time random counter from 0 to 10 milliseconds. If the counter timer expires and there is still no energy present in the channel then PAL 10 begins to transmit its shopping list with other pertinent data to the merchants-in-store computer system 66, see FIG. 7. If during the short-term counter period the PAL 10 detects the presence of energy then it switches to the next highest free channel or moves onto the next barker beacon 142 The bandwidth associated with the barker beacons is separated into a band for customers coming in and a smaller separate band for the customers leaving. There is sufficient frequency diversity so those entering will not interfere with those leaving. Likewise the full duplex channels, 210A, 210B are sufficiently separated so each PAL 10 entering the facility is afforded a high speed channel fast enough to upload a shopping list file in the time it takes to traverse the main doorway area 150.
  • Alternatively, upon completion of the product list or shopping list, the PAL 10 can upload the list to the merchant's computer via an Internet portal for storage. The merchant may review the list and check inventory to assure the products are in stock.
  • After the shopping list file has been uploaded, the merchant computer 66, see FIG. 7, returns pertinent data back to the PAL 10 while the PAL 10 is still traversing the doorway area 150, see FIG. 12. A numerical ID value is assigned to each PAL 10 while it is in the facility. If desired, a customer may set the PAL 10 to provide customer identification through the use of a trusted surrogate ID that only has meaning to the merchant. If this information were to be intercepted it would have no value without the merchant computer's database. Likewise a customer may set the PAL 10 to deny customer private identification. On the other hand the customer may set PAL 10 to accept a merchant's database pointer value, which becomes the customer's In-Store ID and returns this pointer value when communicating with any of the link methods. The barker beacon 142 will identify the merchant, address date and time and next channel assignment. These values will be sufficient for the PAL 10 to retrieve the merchant's database pointer set from a previous time and uplink it along with the item list. Likewise the customer may choose not to send the database pointer but instead use a unique generic ID in place of the specific ID. Up linking the database pointer differentiates a patron user from a public user. The merchant will set customer treatment rules accordingly so that the merchant computer 66 sends the correct information to each user. For example the merchant may wish to exchange a personalized greeting for each patron and a general greeting for a public customer.
  • In the preferred embodiment, each barker beacon 142 will manage a list of 4 full duplex channels, for example, of 7501 KHz bandwidth centered at 1 MHz intervals beginning at 381 MHz ending at 384 MHz. A UHF (ultra high frequency) is used in the main doorway area 150 such that the barker beacons 142 is transmitted at, for example, a 5 MHz spacing beginning from a fixed point, however, any frequency band that meets the needs is acceptable. The barker beacon 142 advertises channel 1 is free. The incoming PAL 10 tunes to 381 MHz and senses energy levels. If no energy is present then the PAL 10 commences a random timer from 0 to 10 milliseconds. At the end of the timer if no energy is present then it transmits data to the merchant computer 66, see FIG. 7, at a middle power setting. The merchant computer 66 will send data to the PAL 10 to adjust the transmit level up or down from the midlevel setting so the total RF energy in the main doorway area 150 is managed so all users can communicate without interference. Then the next barker beacon 142 is set at 385 MHz and likewise has 4 channels to manage. If the 380 MHz list is full then the beacon advertises the next beacon as the next channel so, in effect, it manages a list of five numbers, four of which are active and one of which is used to inform the PAL 10 to seek out the next beacon.
  • The merchant computer 66, see FIG. 7, continually monitors the received data for errors. If a Bit Error Rate (BER) exceeds an arbitrary threshold value, it will issue a command to the PAL 10 to increase transmit power, The PAL 10 and the merchant computer 66 continuously exchange RF performance and BER information interspersed with data.
  • Therefore, when the customer visits a merchant a radio frequency RF link is created on entering the main doorway area 150 with only merchant specific data is uploaded from the PAL 10 to the merchant computer 66, where the store inventory is stored. All other data remains secure and protected. A majority of the time the purchaser (customer) will have selected items from a general list prior to entering the facility in the purchase-planning mode. At other times the customer has only listed a category (categories) of products rather than a specific product. Those items, which fit the category or categories along with any product promotion in the category, will be uploaded upon entering the facility. Specific information provides the purchaser with product, price and aisle location that helps in quickly locating the correct product. This data may be downloaded to the PAL 10 as the purchaser enters the main doorway area 150. Products can then be organized by aisle location to maximize selling opportunity and customer convenience.
  • Also, by the act of entering or ingress, the PAL 10 can also request to download data pertinent to personal preferences. This data is not related to any advertising the merchant wishes to send. Also, the purchaser will be able to obtain merchant's advertisement data downloaded from the ingress short-range RF link or select to ignore any such advertisements.
  • Still referring to FIG. 12, as the PAL 10 leaves the doorway area 150, out of range of the barker beacon 142, and enters the facility, the channel 210A is freed up and returns back to the available state. The PAL 10 is assigned a Full duplex VHF channel for omni directional general communication in the merchant facility (retail) area 152. The VHF band is chosen in this example for its ability to work with an indirect line of sight. Other PALs 10 may share the channels. This link is designed for short data burst traffic and infrequent digital voice traffic. The main characteristic of this link is the need for indirect line of sight communications when the PAL 10 is not in contact with the aisle shelf area 154. Location data, “retail” space map segments and infrequent voice packing are carried on this link. Antennas (not shown) in the merchant facility area 152 are positioned strategically within a store. These antennas are designed to communicate in the full range of space with voice and pager communications. The merchant computer 66, see FIG. 7, will periodically “ping” each PAL 10 in its list of “IN_RETAIL_SPACE” set true to see if the PAL 10 is still within the facility, Each PAL 10 will respond with its temporary ID value. If no reply is received within a predetermined time out period, the PAL 10 is assumed to have left the space.
  • The merchant computer 66, see FIG. 7, can differentiate between voice data packets and general data packets. Voice packets are labeled and time stamped for priority processing. Voice compression and weighting reduce the need for bandwidth. Voice messages are not guaranteed real time processing. They are processed for guaranteed delivery and response with a paging system. If a customer or user were in the area of for example aisle ten and needs customer assistance then the customer would use the PAL 10 to summon assistance. The merchant's employees/sales associates may carry a network phone and paging device (not shown). The PAL 10 has voice input and output and therefore can call and talk with the sales associate on a paging device (not shown) Location data can appear on the paging display on the paging device while two-way voice communication is in progress.
  • One or more PALs 10 can be in two-way communication with antennas (not shown) in the aisle shelf area 154 to ascertain which shelf the customer is working with. The system will also know how long a customer dwells in front of a shelf and which aisles the customer uses. This data becomes the “breadcrumb trail” and can be overlaid on a map of the merchant's facility so the trail can be shown with actual denoted times.
  • Communications in the aisle shelf area 154 is asynchronous between the PAL 10 and the merchant computer 66. When a customer aims the PAL 10 away from an antenna in the aisle shelf area 154, the link continuity is broken and the merchant computer 66, see FIG. 7, will then terminate the link. When a PAL 10 enters the field of the antenna, a link is established with data being exchanged on a transaction-by-transaction basis. For example, scanning a barcode will trigger a transmission; requesting a map to the next product in the list will trigger a transmission and reception; requesting product information, a voice pager link or similar activity will trigger a transmission and cause the PAL 10 to wait for a reception.
  • When the purchaser (customer) selects a product from the shelf, and scans the product barcode or unique identification symbol before placing it into the cart, each price unit quantity is scanned in. The price for that product was downloaded when the PAL 10 is in the main doorway area 150 or the aisle shelf area 154. If the purchaser sets a budget maximum then, the PAL 10 will signal the purchaser when the limit is reached. If the price was not available or is incorrect, the purchaser can enter the price through a touch screen. Differences are reconciled at checkout. Prices are totaled as items are added. Items can be added or removed from the list at any point prior to checkout. When the purchaser scans in each item to be purchased, the PAL 10 matches it against the shopping list. If an item is not scanned in, the PAL 10 will notify the purchaser of forgotten items. Items will not be forgotten until the purchaser discards the item prior to checkout. When a customer removes an item from the shelf and scans in the unique product ID that number is registered in the PAL 10. The PAL 10 will broadcast to the appropriate station the ID of the item selected.
  • The merchant computer 66, see FIG. 7, keeps track of the purchase list items as the purchaser removes them from the shelf. The PAL 10 will in turn receive current price data. If there is a discrepancy against a previous price value, the purchaser is notified and has the option of returning the item to the shelf. If the purchaser returns the item to the shelf the purchaser removes the item from the procurement list on the PAL 10 display and the merchant computer 66 receives the updated information so the shelf item count is updated. This aspect of the present invention saves the merchant restocking labor.
  • The checkout process is illustrated in FIG. 14. Proceeding on to the checkout area the customer places the PAL 10 onto a conventional short-range pedestal 86. On the pedestal 86 the link is actively managed in fractions of an inch. The frequency band chosen for this link must be capable of meeting the demands of the link. This link functions like the aisle link except it is managed for link distances in fractions of an inch. Super high frequency microwave, infrared or optical are frequency bands that meet requirements. This type of link is designed for high security however conventional encryption techniques may also be used. The link power budget is managed so no energy escapes the contiguous link volume subtended when the PAL 10 is resting on the pedestal 86. A conventional infrared or optical port (not shown) connected to the radio subsystem 42, see FIG. 1, can be fashioned so that it covers up the active area on the pedestal. A conventional link power management circuitry (not shown) keeps the power level very low so no detectable energy escapes the seams between the PAL 10 and the pedestal surface. Likewise, for example, a 100 GHz super high frequency microwave can be embedded in the pedestal 86 so fractional microwatt power level can be used.
  • The ultra short range radio link controller 88 is connected to a smart cash or sales register 90, which establishes two-way communications between the PAL 10 via the optical scan assembly 46, and smart cash or sales register 90. When a PAL 10 is first placed on pedestal 86, a signal from the pedestal 86 detects the presence of a PAL 10. Once the presence is detected, the ultra short range radio link controller 88 establishes communication by sending a control signal to the PAL 10 to enable control of the transmit power level from the PAL 10 back to the pedestal 86. Communications with the smart cash or sales register 90 follows normally. The PAL 10 can be removed from the pedestal 86 in the data exchange process. This action will momentarily interrupt the exchange process. The process will be automatically restored when the PAL 10 is returned to the pedestal 86. The pedestal 86 contains conventional electronics and antenna elements (not shown) needed to manage the micro RF link. The link exists only when the PAL 10 is on the pedestal 86. The RF field falls off to zero very rapidly away from the pedestal. This method limits what other PALs in close proximity or adjacent to the pedestal can sense. Others will not detect the presence of the micro RF field.
  • Once the PAL 10 forms a link with the smart cash or sales register 90, quantity aid price can reconcile the purchase list. Discrepancies will be discovered and displayed immediately. When the purchaser is satisfied with the results, a confirmation is made to send a credit or debit card data (not shown) to the sales register 90 automatically. The cash register receipt is returned electronically. A history of purchases and payment methods is maintained. The purchaser can reconcile the data with financial statements. The data then can be discarded or downloaded to a personal computer for long-term retention. A running balance is maintained in all accounts. The purchaser can have funds added at scheduled intervals. The real time clock will monitor the financial calendar schedule and perform actions on schedule.
  • As mentioned above, the PAL 10 may prompt the purchaser for a payment means such as cash, credit or checking. The payment method could have been set prior to entry but this is not required. If the purchaser is paying by cash the PAL 10 subtracts the amount from the total (set by the purchaser or computed from previous transactions, or downloaded sales slip from the sales register) and shows the remainder. If the payment is by check then the check number, date and amount will be kept and down loaded to the purchaser's personal computer later. This data is not entered manually by the user but returned by the sales register for an automatic log. Other check data may be entered manually if so desired. If payment is by credit or debit card, a link is made to a banking network 92A, see FIG. 14.
  • Rebates offered by the merchant and manufacturers are automatically transacted by the system of this invention. The customer will see the rebate offer transmitted by the station RF link for a scanned product. At the sales register the customer information necessary for the rebate is up loaded to the sales register to supply chain network 92B, see FIG. 14. The customer will receive the rebate in due process and no further action is required. If the customer decides to return a product, the sales register attendant will scan in the unique product ID. The system will recognize the ID as having a rebate process pending and cancel the pending process. The merchant saves processing time and expense by such a procedure.
  • Upon completion of the sales transaction, the customer can store the PAL 10 on his/her person and leave the store with the shopping history stored in PAL 10 for future use.
  • FIG. 15 shows the power supply 100 needed to operate the PAL 10. The power supply 100 uses two sets of batteries 102, 104 to provide power. Only one set is needed at one time. The processor 11, see FIG. 1, is in communication with both sets to sense a low condition on the active set and to manage power, for example, by automatically switching to the second set and/or notifying the customer to change the depleted set. Since the PAL will be used for financial transaction processing, it will require a high degree of reliability. While the device may be designed with high reliability methods and components it will have a prominent risk of failure due to dependence on batteries. To mitigate this risk, special circuits are employed to manage two independent sets of batteries. The PAL 10 only runs from one set of batteries alternating between the two. As one set is run down, a power intelligence algorithm run by the processor 11, see FIG. 1, transfers to the second set. The user is prompted to change batteries of the first set. Each set of batteries has an indicator to mark the battery set for changing. Two adjacent compartments 106, 108 with a divider 110 separate the two-battery sets 102, 104 under the battery cover (not shown). An intermittent indicator 112, 114 of any color, though red is preferred, flashes to denote the tray compartment having run down batteries. The display 22, FIG. 1, contains graphics and instructions on how to change the batteries. The customer is not required to change batteries immediately, up to a few weeks, after the PAL 10 has shifted over to the second set. When the second set begins to run down, the frequency of reminders increases. At the sixty-percent remaining level, the PAL 10 will not perform any functions until the first set is replenished.
  • Finally, an additional feature of the PAL 10 of this invention, as illustrated in FIG. 16, shows how PAL 10 can measure weight. Weight is a key parameter for measuring out quantity to determine price. The weight measuring device 58 includes a strain gauge 312 mounted on a shaft 314. The shaft 314 has a fixed end 315A and a free end 315B. The fixed end 315A is fixedly attached to the PAL and the free end 315B is rotatably attached to the PAL 10. A spring 320 is fixedly attached to the PAL 10 and the shaft free end 315B. A line 316 is wound on a pulley 318 having a slip knot mechanism 320A on the free end 321 of the line 316. The slip knot mechanism 320A allows the line to form an adjustable loop. The loop can be cinched to hold material without bottom support while the PAL. 10 computes the weight of an object purchased. The pulley 318 is fixedly attached to the shaft 314. The line 310 is cinched tight to hold the object. The PAL 10 then determines the weight based on the strain measured by the strain gage 312 as the shaft 316 torsional deflects under the load of the object. The user then can add price input to determine the total price. The PAL 10 is equipped with a method for accurately measuring the weight of a small amount of mass. A pulley, shaft and springs are used to make a self-retracting mechanism for storing a strong lightweight braided line. The line material is chosen so that it will not stretch over time or distort in any way when used within design limits. A line release mechanism 322 on the PAL 10 handle releases a lock (not shown) that allows the line 316 to be extended from the PAL 10. The strain gauge 312 is connected to the analog-to-digital converter 56, thereby linking the weight measuring device 58 to the processor 11, as illustrated in FIG. 1. The strain gauge deflections are transmitted to the central processor 11 for conversion into weight and calculating purchase price based on the cost per unit weight inputted by an input device, such as an optical scanner or keyboard.
  • Although the invention has been described with respect to various embodiments, it should be realized this invention is also capable of a wide variety of further and other embodiments within the spirit and scope of the appended claims.

Claims (3)

1. A handheld device comprising:
encrypted random access memory (RAM) having a disabled mode; an address decoder;
means for misaligning an address of a memory location in said encrypted RAM by a random number incorporated into said address decoder to encrypt the address to prepare said handheld device for said disabled mode;
an unlocking process capable of performing a multi-step process to access said encrypted RAM in said disabled mode including the steps of:
inserting a smart card into a smart card reader of said handheld device;
accessing a personal identification number on said smart card;
receiving a user entry including a candidate personal identification number; verifying said personal identification number with said candidate personal identification number;
comparing a secure data hash on said handheld device with a hash stored on said smart card;
unlocking said encrypted RAM if said personal identification number and said secure data hash verify; and
accessing said memory location by said address decoder by using said random number when a secure address range is accessed.
2. The handheld device of claim 1 further comprising:
a plurality of antennas for sending and receiving simultaneous signals;
means for receiving said simultaneous signals on a wireless channel;
means for releasing said wireless channel;
means for exchanging information from said simultaneous signals on a full duplex wireless channel after releasing said wireless channel; and
means for transmitting said information using a special purpose short-range link to provide secure transmission of said financial data.
3. The handheld device of claim 2 further comprising:
means for controlling transmitting power in said full duplex wireless channel.
US11/682,088 2002-01-04 2007-03-05 Purchasing aid logistics appliance Abandoned US20070145125A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/682,088 US20070145125A1 (en) 2002-01-04 2007-03-05 Purchasing aid logistics appliance

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/037,382 US7200567B2 (en) 2002-01-04 2002-01-04 Purchasing aid logistics appliance and method for use
US11/682,088 US20070145125A1 (en) 2002-01-04 2007-03-05 Purchasing aid logistics appliance

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/037,382 Continuation US7200567B2 (en) 2002-01-04 2002-01-04 Purchasing aid logistics appliance and method for use

Publications (1)

Publication Number Publication Date
US20070145125A1 true US20070145125A1 (en) 2007-06-28

Family

ID=21894043

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/037,382 Expired - Fee Related US7200567B2 (en) 2002-01-04 2002-01-04 Purchasing aid logistics appliance and method for use
US11/682,088 Abandoned US20070145125A1 (en) 2002-01-04 2007-03-05 Purchasing aid logistics appliance

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/037,382 Expired - Fee Related US7200567B2 (en) 2002-01-04 2002-01-04 Purchasing aid logistics appliance and method for use

Country Status (3)

Country Link
US (2) US7200567B2 (en)
AU (1) AU2002360808A1 (en)
WO (1) WO2003058529A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098585A1 (en) * 2002-11-05 2004-05-20 Rainbow Technologies, Inc. Secure authentication using hardware token and computer fingerprint
US20080080715A1 (en) * 2006-09-29 2008-04-03 Lee Ho G Apparatus and method for high-speed, large-volume data encryption using secure memory
US20100006646A1 (en) * 2008-07-08 2010-01-14 Stiller Craig R Home grocery inventory system
US20100280873A1 (en) * 2009-04-30 2010-11-04 Bryant Justin K Electronic coupon storage and manipulation system and method
US20140136329A1 (en) * 2012-11-12 2014-05-15 Maximilian A. Chang User Interface For Vehicular-Based Mobile Payment System And Method

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7386238B2 (en) * 2000-08-15 2008-06-10 Lockheed Martin Corporation Method and system for infrared data communications
WO2002015438A1 (en) * 2000-08-15 2002-02-21 Lockheed Martin Corporation Infrared data communication system
US8037530B1 (en) * 2000-08-28 2011-10-11 Verizon Corporate Services Group Inc. Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor
US7725842B2 (en) * 2003-04-24 2010-05-25 Bronkema Valentina G Self-attainable analytic tool and method for adaptive behavior modification
US20050086065A1 (en) * 2003-10-16 2005-04-21 Nokia Corporation Automatic field completion in capacity-constrained media
US7680705B2 (en) * 2004-01-30 2010-03-16 Jump Technologies, Inc. Method and system for additive bar codes to minimize the size and optimize the function and usability of a bar code scannable business catalog
US7364070B2 (en) * 2004-04-20 2008-04-29 Korea Atomic Energy Research Institute System and method for real-time remote shopping
US20060005047A1 (en) * 2004-06-16 2006-01-05 Nec Laboratories America, Inc. Memory encryption architecture
JP2006023957A (en) * 2004-07-07 2006-01-26 Sony Corp Semiconductor integrated circuit and information processor
JP2008512796A (en) * 2004-09-10 2008-04-24 エピセンター ホールディングス, インコーポレイテッド Integration of electronic and traditional retail
CA2524037A1 (en) * 2004-11-01 2006-05-01 John Scott System and method for providing optimized shopping list
US8152062B2 (en) * 2005-04-29 2012-04-10 Mercatus Technologies Inc. Portable information terminal mountable on shopping cart and removable memory device usable with same
JP2008539492A (en) * 2005-04-29 2008-11-13 スプリングボード リテール ネットワークス ライセンシング エスアールエル User information management system and method via network
US8005465B2 (en) * 2006-11-08 2011-08-23 Nokia Corporation Connectionless information transfer from advertising device
US20120123826A1 (en) * 2007-09-13 2012-05-17 French John R Shopping Cart Accountability Using Coupon Incentives with Participation Option
GB2454460A (en) * 2007-11-06 2009-05-13 Gehan De Alwis Home lifestyle organiser
US8499173B2 (en) 2010-11-23 2013-07-30 Lockheed Martin Corporation Apparatus and method for protection of circuit boards from tampering
US8905356B2 (en) * 2011-07-06 2014-12-09 Eads Construcciones Aeronáuticas, S.A. Air to air refueling system with an autonomous electrical system
US9785687B2 (en) 2013-06-06 2017-10-10 Oracle International Corporation System and method for transparent multi key-value weighted attributed connection using uni-tag connection pools
US9747341B2 (en) 2013-06-06 2017-08-29 Oracle International Corporation System and method for providing a shareable global cache for use with a database environment
US9720970B2 (en) * 2013-06-06 2017-08-01 Oracle International Corporation Efficient storage and retrieval of fragmented data using pseudo linear dynamic byte array
US10776378B2 (en) 2014-07-09 2020-09-15 Oracle Interntional Corporation System and method for use of immutable accessors with dynamic byte arrays
US9880938B2 (en) 2014-09-26 2018-01-30 Oracle International Corporation System and method for compacting pseudo linear byte array
KR20170110824A (en) * 2016-03-24 2017-10-12 삼성전자주식회사 Display apparatus and the control method thereof
EP3229445B1 (en) * 2016-04-06 2018-08-08 The Boeing Company A system and a computer-implemented method for multi path communication with an unmanned aerial vehicle during a mission
CA3110570A1 (en) * 2018-09-05 2020-03-12 Mp Acquisition, Llc Grossing station camera system
CN112001468B (en) * 2020-07-24 2021-12-10 南通大学 Character type commodity anti-counterfeiting code generation and identification method

Citations (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4675926A (en) * 1983-08-17 1987-06-30 Lindblom Hans Olov Chair and/or bed arrangement
US4992940A (en) * 1989-03-13 1991-02-12 H-Renee, Incorporated System and method for automated selection of equipment for purchase through input of user desired specifications
US5047614A (en) * 1989-01-23 1991-09-10 Bianco James S Method and apparatus for computer-aided shopping
US5067104A (en) * 1987-05-01 1991-11-19 At&T Bell Laboratories Programmable protocol engine having context free and context dependent processes
US5250789A (en) * 1991-10-31 1993-10-05 Johnsen Edward L Shopping cart
US5295064A (en) * 1987-09-21 1994-03-15 Videocart, Inc. Intelligent shopping cart system having cart position determining and service queue position securing capability
US5321542A (en) * 1990-10-29 1994-06-14 International Business Machines Corporation Control method and apparatus for wireless data link
US5469206A (en) * 1992-05-27 1995-11-21 Philips Electronics North America Corporation System and method for automatically correlating user preferences with electronic shopping information
US5611051A (en) * 1993-11-22 1997-03-11 Enterprise Systems, Inc. Point of supply use distribution process and apparatus
US5701491A (en) * 1995-05-31 1997-12-23 Microsoft Corporation, Inc. Method and system for transitioning the network mode of a workstation
US5825002A (en) * 1996-09-05 1998-10-20 Symbol Technologies, Inc. Device and method for secure data updates in a self-checkout system
US5831664A (en) * 1995-12-15 1998-11-03 Mediaone Group, Inc. Method and system for synchronizing data between at least one mobile interface device and an interactive terminal
US5832296A (en) * 1995-04-26 1998-11-03 Interval Research Corp. Wearable context sensitive user interface for interacting with plurality of electronic devices of interest to the user
US5845282A (en) * 1995-08-07 1998-12-01 Apple Computer, Inc. Method and apparatus for remotely accessing files from a desktop computer using a personal digital assistant
US5850433A (en) * 1996-05-01 1998-12-15 Sprint Communication Co. L.P. System and method for providing an on-line directory service
US5857201A (en) * 1996-06-18 1999-01-05 Wright Strategies, Inc. Enterprise connectivity to handheld devices
US5867292A (en) * 1996-03-22 1999-02-02 Wireless Communications Products, Llc Method and apparatus for cordless infrared communication
US5873045A (en) * 1997-10-29 1999-02-16 International Business Machines Corporation Mobile client computer with radio frequency transceiver
US5884215A (en) * 1997-01-31 1999-03-16 Motorola, Inc. Method and apparatus for covariance matrix estimation in a weighted least-squares location solution
US5897622A (en) * 1996-10-16 1999-04-27 Microsoft Corporation Electronic shopping and merchandising system
US5950173A (en) * 1996-10-25 1999-09-07 Ipf, Inc. System and method for delivering consumer product related information to consumers within retail environments using internet-based information servers and sales agents
US5956693A (en) * 1996-07-19 1999-09-21 Geerlings; Huib Computer system for merchant communication to customers
US5966225A (en) * 1995-12-28 1999-10-12 International Business Machines Corporation Multi-channel optical transceiver
US5969678A (en) * 1995-06-06 1999-10-19 Wayport, Inc. System for hybrid wired and wireless geographic-based communications service
US5974547A (en) * 1998-03-20 1999-10-26 3Com Corporation Technique for reliable network booting of an operating system to a client computer
US5971277A (en) * 1996-04-02 1999-10-26 International Business Machines Corporation Mechanism for retrieving information using data encoded on an object
US5979757A (en) * 1996-09-05 1999-11-09 Symbol Technologies, Inc. Method and system for presenting item information using a portable data terminal
US5982520A (en) * 1996-03-28 1999-11-09 Xerox Corporation Personal storage device for application and data transfer
US6038551A (en) * 1996-03-11 2000-03-14 Microsoft Corporation System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
US6061057A (en) * 1997-03-10 2000-05-09 Quickbuy Inc. Network commercial system using visual link objects
US6064979A (en) * 1996-10-25 2000-05-16 Ipf, Inc. Method of and system for finding and serving consumer product related information over the internet using manufacturer identification numbers
US6073842A (en) * 1993-12-22 2000-06-13 Fujitsu Limited Operating terminal in which operable level depending on operator can be set
US6078806A (en) * 1995-02-15 2000-06-20 Nokia Mobile Phones Limited Method for using applications in a mobile station, a mobile station, and a system for effecting payments
US6085030A (en) * 1997-05-02 2000-07-04 Novell, Inc. Network component server
US6092053A (en) * 1998-10-07 2000-07-18 Cybercash, Inc. System and method for merchant invoked electronic commerce
US6094724A (en) * 1997-11-26 2000-07-25 Atmel Corporation Secure memory having anti-wire tapping
US6101486A (en) * 1998-04-20 2000-08-08 Nortel Networks Corporation System and method for retrieving customer information at a transaction center
US6101483A (en) * 1998-05-29 2000-08-08 Symbol Technologies, Inc. Personal shopping system portable terminal
US6106570A (en) * 1998-02-27 2000-08-22 Kabushiki Kaisha Toshiba Network computer, and file transfer method applied to network computer
US6108703A (en) * 1998-07-14 2000-08-22 Massachusetts Institute Of Technology Global hosting system
US6119935A (en) * 1996-06-26 2000-09-19 Telxon Corporation Shopping cart mounted portable data collection device with tethered dataform reader
US6125352A (en) * 1996-06-28 2000-09-26 Microsoft Corporation System and method for conducting commerce over a distributed network
US6123259A (en) * 1998-04-30 2000-09-26 Fujitsu Limited Electronic shopping system including customer relocation recognition
US6189781B1 (en) * 1993-12-08 2001-02-20 Fujitsu Limited Terminal unit having function for converting commodity information into bar code and vice versa
US6272575B1 (en) * 1999-02-26 2001-08-07 Lucent Technologies Inc. Modular digital assistant
US6278499B1 (en) * 1997-03-24 2001-08-21 Evolve Products, Inc. Two-way remote control with advertising display
US6292283B1 (en) * 1998-07-17 2001-09-18 Lsi Logic Corporation Audio/video device including an infrared transceiver for transmitting and receiving configuration data, and method for configuring same
US6311167B1 (en) * 1997-12-22 2001-10-30 Motorola, Inc. Portable 2-way wireless financial messaging unit
US20010054114A1 (en) * 2000-03-21 2001-12-20 Duval Mary Wireless data transport of internet content to display device
US20020006788A1 (en) * 2000-05-05 2002-01-17 Per Knutsson Method and apparatus for a mobile access system delivering location based information and services
US6381465B1 (en) * 1999-08-27 2002-04-30 Leap Wireless International, Inc. System and method for attaching an advertisement to an SMS message for wireless transmission
US20020052781A1 (en) * 1999-09-10 2002-05-02 Avantgo, Inc. Interactive advertisement mechanism on a mobile device
US20020055924A1 (en) * 2000-01-18 2002-05-09 Richard Liming System and method providing a spatial location context
US6397057B1 (en) * 1995-06-07 2002-05-28 Ewireless, Inc. System and method of providing advertising information to a subscriber through a wireless device
US20020104087A1 (en) * 2000-12-05 2002-08-01 Philips Electronics North America Corp. Method and apparatus for selective updating of a user profile
US6466048B1 (en) * 2001-05-23 2002-10-15 Mosaid Technologies, Inc. Method and apparatus for switchably selecting an integrated circuit operating mode
US6505046B1 (en) * 1997-11-19 2003-01-07 Nortel Networks Limited Method and apparatus for distributing location-based messages in a wireless communication network
US6587835B1 (en) * 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US6601038B1 (en) * 1998-07-20 2003-07-29 Usa Technologies, Inc. Delivery of goods and services resultant from an electronic commerce transaction by way of a pack and ship type company
US6629151B1 (en) * 1999-03-18 2003-09-30 Microsoft Corporation Method and system for querying the dynamic aspects of wireless connection
US6643510B2 (en) * 2001-08-29 2003-11-04 The Boeing Company Mobile platform real time availability and content scheduling system and method
US6643650B1 (en) * 2000-05-09 2003-11-04 Sun Microsystems, Inc. Mechanism and apparatus for using messages to look up documents stored in spaces in a distributed computing environment
US6647269B2 (en) * 2000-08-07 2003-11-11 Telcontar Method and system for analyzing advertisements delivered to a mobile unit
US6684399B1 (en) * 1999-09-17 2004-01-27 Spotware Technologies, Inc. Electronic program guide including live network multimedia broadcast channels
US6738951B1 (en) * 1999-12-09 2004-05-18 International Business Machines Corp. Transcoding system for delivering electronic documents to a device having a braille display
US6760916B2 (en) * 2000-01-14 2004-07-06 Parkervision, Inc. Method, system and computer program product for producing and distributing enhanced media downstreams
US6785902B1 (en) * 1999-12-20 2004-08-31 Webtv Networks, Inc. Document data structure and method for integrating broadcast television with web pages
US20040204112A1 (en) * 2003-01-16 2004-10-14 Caci J. Claude Antenna segment system
US6857021B1 (en) * 1998-10-30 2005-02-15 3Com Corporation Proximity-based registration on a data network telephony system
US6966027B1 (en) * 1999-10-04 2005-11-15 Koninklijke Philips Electronics N.V. Method and apparatus for streaming XML content
US7050787B2 (en) * 2002-10-30 2006-05-23 Lockheed Martin Corporation Cooperative element location system
US7050786B2 (en) * 2002-10-30 2006-05-23 Lockheed Martin Corporation Method and apparatus for locating a wireless device
US7200848B1 (en) * 2000-05-09 2007-04-03 Sun Microsystems, Inc. Migrating processes using data representation language representations of the processes in a distributed computing environment

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5025486A (en) * 1988-12-09 1991-06-18 Dallas Semiconductor Corporation Wireless communication system with parallel polling
US4975926A (en) 1989-03-30 1990-12-04 Guenther Knapp Wireless indoor data communication system
US5251215A (en) 1992-01-13 1993-10-05 At&T Bell Laboratories Modifying check codes in data packet transmission
US5424524A (en) * 1993-06-24 1995-06-13 Ruppert; Jonathan P. Personal scanner/computer for displaying shopping lists and scanning barcodes to aid shoppers
US5923735A (en) * 1996-05-29 1999-07-13 Symbol Technologies, Inc. Self-service checkout system utilizing portable self-checkout communications terminal
US5664110A (en) * 1994-12-08 1997-09-02 Highpoint Systems, Inc. Remote ordering system
EP1431864B2 (en) * 1995-02-13 2012-08-22 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5970469A (en) * 1995-12-26 1999-10-19 Supermarkets Online, Inc. System and method for providing shopping aids and incentives to customers through a computer network
US6314406B1 (en) * 1996-06-26 2001-11-06 Telxon Corporation Customer information network
CA2212121C (en) * 1996-08-02 2010-03-30 Symbol Technologies, Inc. Improvements in data retrieval
IL119481A0 (en) * 1996-10-24 1997-01-10 Eldat Communication Ltd Personal shopping system
DE19718904A1 (en) 1997-05-05 1998-11-12 Olaf Kosel Hand-held computer for supermarket or warehouse shopping
US6012049A (en) * 1998-02-04 2000-01-04 Citicorp Development Center, Inc. System for performing financial transactions using a smartcard
US6602469B1 (en) * 1998-11-09 2003-08-05 Lifestream Technologies, Inc. Health monitoring and diagnostic device and network-based health assessment and medical records maintenance system
AU4481600A (en) * 1999-04-22 2000-11-10 Qode.Com, Inc. System and method for providing electronic information upon receipt of a scannedbar code
WO2001020526A1 (en) * 1999-09-15 2001-03-22 Meals.Com Shopping list organizer apparatus and method
AU2001251634A1 (en) * 2000-04-17 2001-10-30 Emtera Corporation System and method for wireless purchases of goods and services
US20020019782A1 (en) * 2000-08-04 2002-02-14 Arie Hershtik Shopping method
WO2002015438A1 (en) 2000-08-15 2002-02-21 Lockheed Martin Corporation Infrared data communication system
US6568596B1 (en) * 2000-10-02 2003-05-27 Symbol Technologies, Inc. XML-based barcode scanner

Patent Citations (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4675926A (en) * 1983-08-17 1987-06-30 Lindblom Hans Olov Chair and/or bed arrangement
US5067104A (en) * 1987-05-01 1991-11-19 At&T Bell Laboratories Programmable protocol engine having context free and context dependent processes
US5295064A (en) * 1987-09-21 1994-03-15 Videocart, Inc. Intelligent shopping cart system having cart position determining and service queue position securing capability
US5047614A (en) * 1989-01-23 1991-09-10 Bianco James S Method and apparatus for computer-aided shopping
US4992940A (en) * 1989-03-13 1991-02-12 H-Renee, Incorporated System and method for automated selection of equipment for purchase through input of user desired specifications
US5321542A (en) * 1990-10-29 1994-06-14 International Business Machines Corporation Control method and apparatus for wireless data link
US5250789A (en) * 1991-10-31 1993-10-05 Johnsen Edward L Shopping cart
US5469206A (en) * 1992-05-27 1995-11-21 Philips Electronics North America Corporation System and method for automatically correlating user preferences with electronic shopping information
US5611051A (en) * 1993-11-22 1997-03-11 Enterprise Systems, Inc. Point of supply use distribution process and apparatus
US6189781B1 (en) * 1993-12-08 2001-02-20 Fujitsu Limited Terminal unit having function for converting commodity information into bar code and vice versa
US6073842A (en) * 1993-12-22 2000-06-13 Fujitsu Limited Operating terminal in which operable level depending on operator can be set
US6078806A (en) * 1995-02-15 2000-06-20 Nokia Mobile Phones Limited Method for using applications in a mobile station, a mobile station, and a system for effecting payments
US5832296A (en) * 1995-04-26 1998-11-03 Interval Research Corp. Wearable context sensitive user interface for interacting with plurality of electronic devices of interest to the user
US5701491A (en) * 1995-05-31 1997-12-23 Microsoft Corporation, Inc. Method and system for transitioning the network mode of a workstation
US5969678A (en) * 1995-06-06 1999-10-19 Wayport, Inc. System for hybrid wired and wireless geographic-based communications service
US6397057B1 (en) * 1995-06-07 2002-05-28 Ewireless, Inc. System and method of providing advertising information to a subscriber through a wireless device
US5845282A (en) * 1995-08-07 1998-12-01 Apple Computer, Inc. Method and apparatus for remotely accessing files from a desktop computer using a personal digital assistant
US5831664A (en) * 1995-12-15 1998-11-03 Mediaone Group, Inc. Method and system for synchronizing data between at least one mobile interface device and an interactive terminal
US5966225A (en) * 1995-12-28 1999-10-12 International Business Machines Corporation Multi-channel optical transceiver
US6038551A (en) * 1996-03-11 2000-03-14 Microsoft Corporation System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
US5867292A (en) * 1996-03-22 1999-02-02 Wireless Communications Products, Llc Method and apparatus for cordless infrared communication
US5982520A (en) * 1996-03-28 1999-11-09 Xerox Corporation Personal storage device for application and data transfer
US5971277A (en) * 1996-04-02 1999-10-26 International Business Machines Corporation Mechanism for retrieving information using data encoded on an object
US5850433A (en) * 1996-05-01 1998-12-15 Sprint Communication Co. L.P. System and method for providing an on-line directory service
US5857201A (en) * 1996-06-18 1999-01-05 Wright Strategies, Inc. Enterprise connectivity to handheld devices
US6129276A (en) * 1996-06-26 2000-10-10 Telxon Corporation Shopping cart mounted portable data collection device with tethered dataform reader
US6119935A (en) * 1996-06-26 2000-09-19 Telxon Corporation Shopping cart mounted portable data collection device with tethered dataform reader
US6125352A (en) * 1996-06-28 2000-09-26 Microsoft Corporation System and method for conducting commerce over a distributed network
US6073112A (en) * 1996-07-19 2000-06-06 Geerlings; Huib Computer system for merchant communication to customers
US5956693A (en) * 1996-07-19 1999-09-21 Geerlings; Huib Computer system for merchant communication to customers
US6199753B1 (en) * 1996-09-05 2001-03-13 Symbol Technologies, Inc. Method and system for presenting item information using a portable data terminal
US5979757A (en) * 1996-09-05 1999-11-09 Symbol Technologies, Inc. Method and system for presenting item information using a portable data terminal
US5825002A (en) * 1996-09-05 1998-10-20 Symbol Technologies, Inc. Device and method for secure data updates in a self-checkout system
US5897622A (en) * 1996-10-16 1999-04-27 Microsoft Corporation Electronic shopping and merchandising system
US6064979A (en) * 1996-10-25 2000-05-16 Ipf, Inc. Method of and system for finding and serving consumer product related information over the internet using manufacturer identification numbers
US5950173A (en) * 1996-10-25 1999-09-07 Ipf, Inc. System and method for delivering consumer product related information to consumers within retail environments using internet-based information servers and sales agents
US5884215A (en) * 1997-01-31 1999-03-16 Motorola, Inc. Method and apparatus for covariance matrix estimation in a weighted least-squares location solution
US6061057A (en) * 1997-03-10 2000-05-09 Quickbuy Inc. Network commercial system using visual link objects
US6278499B1 (en) * 1997-03-24 2001-08-21 Evolve Products, Inc. Two-way remote control with advertising display
US6085030A (en) * 1997-05-02 2000-07-04 Novell, Inc. Network component server
US5873045A (en) * 1997-10-29 1999-02-16 International Business Machines Corporation Mobile client computer with radio frequency transceiver
US6505046B1 (en) * 1997-11-19 2003-01-07 Nortel Networks Limited Method and apparatus for distributing location-based messages in a wireless communication network
US6094724A (en) * 1997-11-26 2000-07-25 Atmel Corporation Secure memory having anti-wire tapping
US6311167B1 (en) * 1997-12-22 2001-10-30 Motorola, Inc. Portable 2-way wireless financial messaging unit
US6106570A (en) * 1998-02-27 2000-08-22 Kabushiki Kaisha Toshiba Network computer, and file transfer method applied to network computer
US5974547A (en) * 1998-03-20 1999-10-26 3Com Corporation Technique for reliable network booting of an operating system to a client computer
US6101486A (en) * 1998-04-20 2000-08-08 Nortel Networks Corporation System and method for retrieving customer information at a transaction center
US6123259A (en) * 1998-04-30 2000-09-26 Fujitsu Limited Electronic shopping system including customer relocation recognition
US6101483A (en) * 1998-05-29 2000-08-08 Symbol Technologies, Inc. Personal shopping system portable terminal
US6108703A (en) * 1998-07-14 2000-08-22 Massachusetts Institute Of Technology Global hosting system
US6292283B1 (en) * 1998-07-17 2001-09-18 Lsi Logic Corporation Audio/video device including an infrared transceiver for transmitting and receiving configuration data, and method for configuring same
US6601038B1 (en) * 1998-07-20 2003-07-29 Usa Technologies, Inc. Delivery of goods and services resultant from an electronic commerce transaction by way of a pack and ship type company
US6092053A (en) * 1998-10-07 2000-07-18 Cybercash, Inc. System and method for merchant invoked electronic commerce
US6857021B1 (en) * 1998-10-30 2005-02-15 3Com Corporation Proximity-based registration on a data network telephony system
US6272575B1 (en) * 1999-02-26 2001-08-07 Lucent Technologies Inc. Modular digital assistant
US6629151B1 (en) * 1999-03-18 2003-09-30 Microsoft Corporation Method and system for querying the dynamic aspects of wireless connection
US6381465B1 (en) * 1999-08-27 2002-04-30 Leap Wireless International, Inc. System and method for attaching an advertisement to an SMS message for wireless transmission
US20020052781A1 (en) * 1999-09-10 2002-05-02 Avantgo, Inc. Interactive advertisement mechanism on a mobile device
US6684399B1 (en) * 1999-09-17 2004-01-27 Spotware Technologies, Inc. Electronic program guide including live network multimedia broadcast channels
US6966027B1 (en) * 1999-10-04 2005-11-15 Koninklijke Philips Electronics N.V. Method and apparatus for streaming XML content
US6738951B1 (en) * 1999-12-09 2004-05-18 International Business Machines Corp. Transcoding system for delivering electronic documents to a device having a braille display
US6785902B1 (en) * 1999-12-20 2004-08-31 Webtv Networks, Inc. Document data structure and method for integrating broadcast television with web pages
US6760916B2 (en) * 2000-01-14 2004-07-06 Parkervision, Inc. Method, system and computer program product for producing and distributing enhanced media downstreams
US20020055924A1 (en) * 2000-01-18 2002-05-09 Richard Liming System and method providing a spatial location context
US20080228600A1 (en) * 2000-02-09 2008-09-18 Vengte Software Ag Limited Liability Company Purchasing Systems
US6587835B1 (en) * 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US20010054114A1 (en) * 2000-03-21 2001-12-20 Duval Mary Wireless data transport of internet content to display device
US20020006788A1 (en) * 2000-05-05 2002-01-17 Per Knutsson Method and apparatus for a mobile access system delivering location based information and services
US6643650B1 (en) * 2000-05-09 2003-11-04 Sun Microsystems, Inc. Mechanism and apparatus for using messages to look up documents stored in spaces in a distributed computing environment
US7200848B1 (en) * 2000-05-09 2007-04-03 Sun Microsystems, Inc. Migrating processes using data representation language representations of the processes in a distributed computing environment
US6647269B2 (en) * 2000-08-07 2003-11-11 Telcontar Method and system for analyzing advertisements delivered to a mobile unit
US20020104087A1 (en) * 2000-12-05 2002-08-01 Philips Electronics North America Corp. Method and apparatus for selective updating of a user profile
US6466048B1 (en) * 2001-05-23 2002-10-15 Mosaid Technologies, Inc. Method and apparatus for switchably selecting an integrated circuit operating mode
US6643510B2 (en) * 2001-08-29 2003-11-04 The Boeing Company Mobile platform real time availability and content scheduling system and method
US7050787B2 (en) * 2002-10-30 2006-05-23 Lockheed Martin Corporation Cooperative element location system
US7050786B2 (en) * 2002-10-30 2006-05-23 Lockheed Martin Corporation Method and apparatus for locating a wireless device
US20040204112A1 (en) * 2003-01-16 2004-10-14 Caci J. Claude Antenna segment system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098585A1 (en) * 2002-11-05 2004-05-20 Rainbow Technologies, Inc. Secure authentication using hardware token and computer fingerprint
US20100100746A1 (en) * 2002-11-05 2010-04-22 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US7895443B2 (en) * 2002-11-05 2011-02-22 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US8392978B2 (en) * 2002-11-05 2013-03-05 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US20080080715A1 (en) * 2006-09-29 2008-04-03 Lee Ho G Apparatus and method for high-speed, large-volume data encryption using secure memory
US20100006646A1 (en) * 2008-07-08 2010-01-14 Stiller Craig R Home grocery inventory system
US20100280873A1 (en) * 2009-04-30 2010-11-04 Bryant Justin K Electronic coupon storage and manipulation system and method
US20140136329A1 (en) * 2012-11-12 2014-05-15 Maximilian A. Chang User Interface For Vehicular-Based Mobile Payment System And Method

Also Published As

Publication number Publication date
US20030130909A1 (en) 2003-07-10
WO2003058529A1 (en) 2003-07-17
US7200567B2 (en) 2007-04-03
AU2002360808A1 (en) 2003-07-24

Similar Documents

Publication Publication Date Title
US7200567B2 (en) Purchasing aid logistics appliance and method for use
US10235652B2 (en) Inventory control system
US10121140B2 (en) Proximity transaction apparatus and methods of use thereof
US6092725A (en) Statistical sampling security methodology for self-scanning checkout system
US8473363B1 (en) Systems and methods for price searching and customer self-checkout using a mobile device
US6747560B2 (en) System and method of detecting movement of an item
US6084528A (en) Intranet scanning terminal system
CN100568303C (en) Portable closing accounts terminal, system and method based on mobile banking and anti-theft tag
US20070094154A1 (en) Processing transactions using a register portion to track transactions
US20090055278A1 (en) Complete Secure Retail Transaction Via A Mobile Device
US20030233320A1 (en) Unified electronic transaction fulfillment
US7680702B1 (en) Systems and methods for price searching and customer self-checkout using a mobile device
US20070228144A1 (en) Processing transactions using a register portion to track transactions
US20030015585A1 (en) Self checkout system utilizing networked shopping carts
US8348155B2 (en) All in one card
JP2000156891A (en) Portable communication equipment and method for communicating information
JP2012194959A (en) Shopping system and shopping program
CN101527071B (en) Merchandise sales data processing apparatus and a merchandise sales data processing method
CN102483821A (en) Secure alert system and method
US20040129778A1 (en) Cashless automatic vendor system and method, and automatic vendor
CN101354811B (en) Article sales data processing apparatus
WO2017027336A1 (en) Mobile payment system and method
US20110202425A1 (en) Self checkout system
JPH0264799A (en) Portable terminal equipment and transaction processing equipment
JP2002352321A (en) Method for managing transaction information using short distance radio, transaction management method for portable information terminal, and terminal therefor

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION