Paper-based control of computer systems

ABSTRACT

The present invention relates to linking on-line data to printed documents, such as business cards, envelopes, stickers, stationary, letterhead, résumés, etc. In one embodiment, a card-user registers with an on-line database and receives a gallery item including a steganographically-embedded unique identifier. The gallery item, such as a graphical background, text, shading, graphic, etc., is integrated and then printed with a document. The printed document can then be presented an optical-scanner, which outputs data. The output data is decoded to identify the unique identifier. The unique identifier is then used to index into the on-line database to retrieve information related to the proprietor of the document. In one embodiment, the on-line database includes features such as providing an immediate contact number, translation and/or pronunciation ability, and storage of audio/video files.

RELATED APPLICATION DATA

[0001] This patent application is a continuation-in-part of assignee'sU.S. patent application Ser. No. 09/314,648, filed May 19, 1999, whichis a continuation-in-part of co-pending U.S. patent application Ser. No.09/130,624, filed Aug. 6, 1998, which is a continuation of U.S. patentapplication Ser. No. 08/508,083, filed Jul. 27, 1995 (now U.S. Pat. No.5,841,978, issued Nov. 24, 1998). Each of these patent documents ishereby incorporated by reference.

[0002] The subject matter of this application is generally related tothat in the assignee's U.S. Pat. Nos. 5,841,886, 5,832,119, 5,822,446and 5,841,978, and assignee's co-pending U.S. patent application Ser.No. 09/343,104, filed Jun. 29, 1999, and Ser. No. 09/571,422, filed May15, 2000. Each of these patent documents is hereby incorporated byreference.

FIELD OF THE INVENTION

[0003] The present invention relates to use of printed documents tocontrol computer systems. Exemplary documents include business cards,stationary, envelopes, résumés, stickers, brochures, advertisements, andidentification badges, but the invention is not so limited.

BACKGROUND AND SUMMARY OF THE INVENTION

[0004] Over the past century, business cards have formed part ofbusiness ritual. Functionally, they serve as a record of an encounter,and provide details of how the giver may be contacted (address, phone,e-mail, etc.).

[0005] Essentially, business cards have not changed in response to theadvent of computers. Some accommodation has been made for business cardson the computer side, in the form of specialized scanner and opticalcharacter recognition (OCR) tools, by which textual data printed oncards can be read and entered into personal productivity software tools(e.g. contact managers, address books, datebooks, personal informationmanagers, etc.). However, the data transferred into the personalproductivity software is static and unchanging.

[0006] In accordance with one embodiment of the present invention, thegraphical, background and/or textual information on a business card aresupplemented with steganographically-encoded, multi-bit binary data.When presented to a compliant sensing computer or device, the cardserves as an associated link to access further, related information. Theinformation may be maintained in an on-line database at an internetsite. Through the database, the recipient of the card may gain access toinformation that changes over time (e.g., contact information, personaldata, job title, etc.).

[0007] The foregoing and additional features and advantages of thepresent invention will be more readily apparent from the followingdetailed description, which proceeds with reference to the accompanyingdrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008]FIG. 1 shows a flow chart of a process according to one embodimentof the present invention.

[0009]FIGS. 2 and 3 show an illustrative embodiment of the presentinvention.

DETAILED DESCRIPTION

[0010] Digital watermarking is a quickly growing field of endeavor, andmany techniques are known. Generally, all seek to steganographicallyconvey multi-bit data ancillary to some other signal or medium.

[0011] Digital watermarking systems typically have two primarycomponents: an encoder that embeds the watermark in a host media signal,and a decoder that detects and reads the embedded watermark from asignal suspected of containing a watermark (a suspect signal). Theencoder embeds a watermark by altering the host media signal. Thedetector component analyzes a suspect signal to detect whether awatermark is present. In applications where the watermark encodesinformation, the reader component extracts this information from thedetected watermark.

[0012] The present assignee's prior application Ser. No. 09/127,502,filed Jul. 31, 1998, shows techniques by which very fine lines can beprinted on a medium to slightly change the medium's apparent tint, whilealso conveying digital data. Commonly owned application Ser. No.09/074,034, filed May 6, 1998, details how the contours of printedimagery can be adjusted to convey digital data. (That technique can beapplied to printed text characters, as well as the line art imageryparticularly considered.). Assignee's U.S. Pat. No. 5,850,481 detailshow the surface of paper or other media can be textured to conveyoptically-detectable binary data. The Assignee's U.S. Pat. Nos.5,841,886, 5,809,160, and the priority applications cited above, detailvarious techniques for steganographically encoding.

[0013] Three papers by Brassil et al show other techniques for conveyingwatermark data by slight changes to printed text, “Electronic Markingand Identification Techniques to Discourage Document Copying,”Proceedings of INFOCOM '94 Conference on Computer, IEEE Comm. SocConference, Jun. 12-16, 1994, pp. 1278-1287; “Hiding Information inDocument Images,” November, 1995, 7 pages, AT&T Bell LaboratoriesTechnical Report; and “Document Marking and Identification using BothLine and Word Shifting,” INFOCOM '95.

[0014] The foregoing is just a sampling of the large literature onwatermarking. The artisan is presumed to be familiar with such art, allof which is generally suitable for use with the novel implementationsdetailed below.

[0015] Linking to a Card-Giver's Information

[0016] In accordance with any of the known watermarking techniques, abusiness card is steganographically encoded with plural bit data. In oneembodiment, at least part of this data identifies an internet address orweb site at which data about the giver of the card is stored. Ifsufficient bits can be encoded into the business card, ASCII or binarynumeric encoding can encode the address literally. Alternatively, toreduce the data payload, an abbreviated form of an address is encoded.One example of such an abbreviated form is a Unique Identifier (UID),which can be, e.g., a 24-bit value.

[0017] Desirably, the steganographic encoding is tailored to facilitatedecoding in the presence of arbitrary rotation or scale distortion ofthe card introduced during scanning. (Some such techniques are shown,e.g., in applicant's related patents identified above. Of course, othertechniques are known to those skilled in the art, and such techniquesmay be employed with the present invention.).

[0018] As shown in FIG. 1, the card is scanned (e.g., by use ofconventional opto-electronic devices, such as a business card reader,scanner, web cam or other sensing device). The output data is thenoptionally processed to account for any skew or scale factor. Theplural-bit digital data is then decoded and/or stored, e.g., in personalproductivity software.

[0019] (Although not particularly shown in FIG. 1, the detailed processmay often be supplemental to known OCR-reading of business cards, andentry of the textual data into personal productivity software. That is,the scan data may be processed both by OCR techniques, and bysteganographic decoding techniques, and the results of both operationsmay be selectively stored in a data structure or other memory for laterreference.).

[0020] The steganographically-decoded plural-bit data is provided to aweb browser or other internet appliance and used to initiate a link to aremote computer over the internet's network of computers. If the remoteaddress was literally encoded in the business card, that address is useddirectly. If an abbreviated form of address was encoded, an additionalstep may be required.

[0021] If a UID was encoded in the card, rather than a literal address,the web browser might consult an index to correlate the UID to anaddress. The index could be a table or other data structure stored onthe user's local computer, but more commonly is a remote name serverdatabase to which the browser links as a default when processingbusiness card UIDs. Data obtained from the index is then used tocomplete the linking to the ultimate destination e.g., a web siteassociated with the card-giver. (In addition to reducing the businesscard payload, such linking through an index, e.g., by a UID, offersflexibility in that the ultimate destination can be moved to otherserver sites as needed, with just a simple update to the index.Alternatively, all business cards encoded with the former address wouldbe rendered obsolete if the site were relocated.)

[0022] At the ultimate site, in one embodiment, the card-recipient ispresented with whatever information the business card giver chooses toprovide, including biographical information, photos, promotional offersor advertisements relating to the card-giver's business (or relating toenterprises to whom the card-giver has rented screen space), etc., etc.In one embodiment, the giver's site is linked to the giver's personalproductivity tool(s) and permits viewing, e.g., of calendar information(showing where the business card giver is scheduled to be today, or forthe rest of the week, month, etc.)

[0023] Typically, this calendar information is not available to casualweb browsers; the steganographically decoded data from the business cardmay include some authentication data (akin to a password) that permitsaccess to otherwise restricted data. This authentication data can takethe form of a web page address to which no publicly-accessible linkpoints, a password that is separately presented to the web server by theuser's browser after a link is established, or other known technique.

[0024] In one form of the invention, the giver of business cards mayhave several differently-encoded cards, each with a different level ofaccess authorization. Thus, some cards may access a biographical pagewithout any calendar information, other cards may access the same ordifferent page with access enabled to today's calendar, and still othercards may access the same or different page with access enabled for thecard-giver's complete calendar. In another form of the invention, asingle card is used with all recipients, yet provides differentrecipients with different levels of access. This may be done, forexample, by providing the most limited form of access to all recipients.If a recipient desires more information, he can enter supplementalinformation (e.g., a name, email address, phone number or otherinformation) that identifies him or her. The giver of the business cardcan pre-authorize certain identified individuals to receive differentlevels of access (e.g., by setting permission levels in a calendaryprogram or otherwise). Based on the supplemental information entered bythe user, a commensurate level of access is granted. (A great variety ofother ways of granting different permissions can naturally be used; theforegoing just illustrates a range of possibilities.)

[0025] System Implementation—Including an On-line Database

[0026] An illustrative system 10 is now described with reference toFIGS. 2 and 3. System 10 facilitates registration, the obtaining (oraccounting of) unique identifiers, and access to additional data storedin an on-line database via the watermarked business card.

[0027]FIG. 2 illustrates system 10, including a plurality of userterminals 40, 41 and 42, and a central site 43. The user terminals 40,41 and 42 communicate with the central site 43 via a network, such as aninternet, intranet, dedicated network, WAN, LAN, wireless network, etc.Of course, the user terminals 40, 41 and 42 may be adjacently located,or may be located remotely with respect to one another. For example, afirst user terminal 40 may be located in an office or business, while asecond user terminal 41 may be located in a residence. The thirdterminal 42 may even be a remote terminal, which gains access to thenetwork via a wireless connection, remote connection, guest connection,etc. Of course, system 10 will typically include many more userterminals, and may even include a plurality of distributed servers,which collectively function as central site 43. If a plurality ofdistributed servers is employed, the servers can communicate tosynchronize their data. Preferably, with such a distributed serverconfiguration, each distributed server may respond to individualrequests.

[0028] Preferably, each of the user terminals 40, 41, 42 includes ageneral purpose or dedicated computer incorporating at least a CPU,memory, interface to an input device (e.g., web camera, business cardreader, optical scanner, other sensing device, etc.), a display (orother output device), and a network connection. The network connectionmay be used to connect to the network to communicate with central site43.

[0029] Of course, a user terminal may comprise a portable computingunit, such as a personal financial assistant, portable phone, wirelessimaging device, PocketPC, PalmPilot, PDA, etc., with associated imagingcomponents and/or wireless, cable, phone or other networking ability. Toillustrate, such units may include a miniature digital camera module,e.g., a “digital eye” or other input sensing device. Such an inputsensing device enables mobile or portable devices to capture, displayand transmit digital data (audio, images, video). The “digital eye”modules typically include a complete camera on a chip, CMOS imagingsensor, miniaturized lens, imaging software, etc.

[0030] Suitable client software programming instructions, stored in auser terminal memory, or in a remote memory, can be used to affectvarious types of functionality for the user terminals 40, 41 and 42. Forexample, the software may include a browser or other internet navigationtool. Alternatively, the software may be a separate module or may beintegrated within a software application. In either case, the softwareinstructions help to facilitate communication between the respectiveuser terminal and the central site 43. The user terminals 40, 41 and 42preferably include software instructions to facilitate detection anddecoding of embedded data.

[0031] Central site 43 includes a computer or server (or a plurality ofinterconnected servers). As will be appreciated by those skilled in theart, these computers maintain and execute software, e.g., for hosting(and/or supporting) web pages, communication, database management, etc.Site 43 also maintains suitable software program instructions tofacilitate the system operations described herein. Of course, system 43may include a plurality of distributed central sites and a database (ordatabases). The database may be maintained under the direction of thecentral site 43, or may be remotely accessed by the central site 43.

[0032] A user (e.g., a card-giver) initiates a registration process byaccessing a website or other interface supported by central site 43,e.g., with the aid of an interface residing on a user terminal 40, 41 or42. The interface may include a dialog box, web browser, application,and/or other communication mechanism. The central site 43 maintains aseries of web pages (or other interface) to facilitate the registrationprocess. From a user's perspective, a first-time user initiallyregisters with the central site 43. The registration process may includegathering the user's contact information, selecting payment options(e.g., credit card, on-line exchange, etc.), and optionally assigning auser name (or ID) and password. As a result of the registration process,the user is assigned a unique identifier. (Of course, this assignmentmay either be perceptible or imperceptible to the user. Such anassignment will typically be associated the user (and/orusername/password) with the unique identifier.). The unique identifieris typically embedded by the central site 43 in a gallery item to beprovided to the user, along with an address (e.g., a URL, IP address,and/or UID) associated with the central site 43.

[0033] Preferably, the central site 43 maintains a plurality of galleryitems including, for example, patterns, colors, graphics, shading,tints, backgrounds, logos, fonts, etc. Via the central site 43interface, a user selects a gallery item (or items) to be applied whenprinting a business card. The selected gallery item is then digitallywatermarked. The watermark includes the user's unique identifier and mayinclude the central site's address (in some applications, the centralsite's address is known to the decoding software without being specifiedon the card, or is inferred by the decoder from the identifier, e.g.,identifiers in the range of 3000-5000 are directed towww.digimarc.com/bizcards). The selected, watermarked gallery item isprovided to the user, e.g., via e-mail, downloaded, etc., from thecentral site 43.

[0034] The selected, watermarked gallery item is then used in a typicalprinting process. For example, a watermarked background item is used asa card's background when printing a business card. Consider thefollowing applications. A watermarked background item is provided foruse with printing software (e.g., Quark Express, Microsoft Word, AdobeAcrobat, etc., etc.). The software incorporates the background item in aparticular custom business card design. The resulting cards are printed(e.g., from a home computer system or commercial printer).Alternatively, an electronic version of the watermarked background itemis supplied to a commercial printer (e.g., copy store, office supplystore, printer, etc.). The printer applies the watermarked background tothe card during the printing processes. The resulting business cardsinclude the watermarked background.

[0035] Preferably, the user provides information to an on-lineinformational database, associated with the central site 43. Thisprocess may occur during the initial registration process via the webpages or user interface. Or the user may later access the database witha username/password. As a further alternative, the user is provided withaccess data that is used to access the database. The access data mayinclude embedded data having appropriate identifiers and authorizations,and may even be embedded into a document, such as a “master” businesscard or other item (e.g., a watermarked driver's license, or key chain).The master business card can then be read by a compliant reader (e.g., auser terminal), which uses the embedded data to access the database oruser interface. In one embodiment, central site 43 maintains thedatabase. In another embodiment, central site 43 links (or providesredirection data) a user and/or card recipient to a remotely accesseddatabase.

[0036] Upon access to the on-line database, the user may enter data. Thedata may include business contact information, personal data, current(or “now”) contact numbers, etc. This now contact number can becontinually updated throughout the day (either by the user, or inaccordance with a programmed calendar) with the then-most-suitablecommunications channel to contact the user (card-giver). When the userleaves home to go to the office, or leaves the office for a trip in thecar, or works a week at a corporate office in another town, etc., thisdata field can be updated accordingly. (A pocket GPS receiver, with awireless uplink, can be carried by the person to aid in switching the“now” number among various possibilities, depending on the user'sinstantaneous position.). The now number may also include an“Out-of-Office” or a “currently-unavailable” setting, which allows auser to indicate that they are away from the office. Such a setting mayalso include redirection information, such as when the user will return,whom to contact in the user's absence, etc. When this on-line databaseis polled for the “now” number, it provides the then-currentinformation.

[0037] The user data can also include pictures, résumé's, corporate orpersonal web links, graphics, PDF versions of brochures, logos, etc. Ofcourse, this information may be updated as needed. Optionally, the userprovides audio/visual data, such as audio and/or video clips (e.g.,digital files). The clips may include greetings, further information,contact information, personalized messages, virtual tours, missionstatements, etc. Alternatively, the user may enter pointers or links tosuch audio/visual data. As a further alternative, system 10 may allow auser to input a “redirect” address (e.g., a URL), which is thenassociated by system 10 with the user's unique identifier. System 10then redirects any card-recipients to the redirect address when selected(or automatically upon access to the central site 43). Of course, theuser can turn on/off the redirect address, and/or update the redirectaddress as needed.

[0038] The system may optionally support translation and/orpronunciation tools. To illustrate, the central site 43 may optionallyallow a registered user to provide an audio and/or video clip todemonstrate the correct pronunciation of their name, business and/orother personal data to card recipients (or other persons who gainaccess). The system may also optionally include automated translationand pronunciation functionality (e.g., audio synthesis, wave files,digital speech, etc.), which can be provided to a card recipient.

[0039] Watermarked business cards are distributed in a typical fashion.After receipt, a card recipient presents the embedded card to anassociated input device of a recipient's terminal 45, as shown in FIG.3. (Of course, a recipient's terminal 45 may include components andsoftware like those discussed above with respect to the user terminals40, 41 and 42. In one embodiment, the user terminals may be used as arecipient terminal. Of course system 10 may include many such recipientterminals.). The embedded data is extracted by decoding software runningon the recipient's terminal 45. Preferably, as discussed above, theextracted data includes the card-giver's unique identifier and, in somecases, an electronic address. In one embodiment, the address is a URLcorresponding to the central site 43. In other embodiments, therecipient terminal 45 is provided with software that always looks to aprogrammed, default address. Or a protocol is established by which thedecoder can locally look-up the identifier in a data structure anddetermine an address to which the identifier should be sent (e.g.,identifiers in the range 3000-5000 are sent towww.digimarc.com/bizcards). The software interface (e.g., browser) isredirected to the address, and the extracted unique identifier isprovided to the central site 43.

[0040] Upon receipt of a recipient's request, the central site 43indexes the on-line database via the provided unique identifier. At thispoint, the card recipient can access the respective user's data via webpages (or other interface) supported by central site 43. Preferably,some or all of the user's data is electronically available (e.g., viadownload, e-mail, etc.) in a standardized format, such as in a vCard orASCII file. The term vCard is used generally herein to includeelectronic files or standardized formats of digital information. In oneexample, a vCard is a standardized format which allows a card recipientto seamlessly incorporate the electronic data into her softwareappointment/contact manager, such as in Microsoft's Outlook application,etc. In another example, a vCard is a virtual card that includes agreeting, data or other message. A vCard may include a “hot” URL, whichallows a card-recipient to link to the card-giver's website. (Instead ofaccessing the central site, presentation of the card can cause a remotecomputer to dispatch an e-mail to the card-recipient's terminal (e.g.,addressed per e-mail address data transmitted to the central site withthe card-recipient's request). This e-mail can contain the userinformation described above, or any of the information detailed below.Functionality detailed below can be invoked by a card-recipient throughactivating a hyperlink included in the e-mail sent to thecard-recipient's terminal. Alternatively, instead of accessing thecard-giver data in a database or website, presentation of the card canopen an instant message dialog channel with the recipient (a channelwhich may convey video and audio, as well as text). Again, informationand functionality described above and below can be presented to thecard-recipient through this channel.

[0041] In another embodiment, a card-giver up-loads a vCard into thedatabase, to help simplify data entry. The vCard can be uploaded in anumber of know methods, including drag-and-drop, file transfer,cut-and-paste, copy, etc. Or an extension may be added to a softwareproductivity manager, such as Microsoft's Outlook, to facilitate suchtransfer.

[0042] The card recipient may also select from a plurality of optionsprovided by the central site 43. (Of course, the following options maybe provided as standard or optional features.). As a first option, therecipient selects a contact channel for the respective user(card-giver). For example, an e-mail link may be selected, which willlaunch an e-mail program on the recipient's terminal. As anotherexample, a “now” contact channel is selected and the cardgiver's defined“now” channel is activated (e.g., a phone number is dialed, an e-mailapplication is launched, a video link is established, a pager number iscalled, a radio frequency channel is activated, a personal computingassistant is pinged, etc.). In one embodiment, a card-recipient leavesher own “calling card” in the form of a link (or vCard, message, etc.)to her own central-site (or other) account. For example, thecard-recipient brings up the card-giver's account (in any of the methodsdiscussed above), and then flashes (e.g., presents to an optical scanneror other input device) her own card. System 10 stores the link to thecard-recipient's account (e.g., data associated with thecard-recipient's unique identifier). An e-mail alert (or othercommunication) is automatically sent by system 10 to the card ownerstating that a calling card has been left and can be picked up any time.The card-giver, upon access to system 10, can check a mailbox or recentmessage area to retrieve the message. Or the calling card, vCard, orlink to the card-recipient's account can be included in the e-mail orother communications.

[0043] The central site 43 may support one or more “hot” buttons. A hotbutton is preferably a link or shortcut to a communications channel,website or IP address. For example, an e-mail hot button can be selectedby a card-recipient, which launches an e-mail program. (In oneembodiment, an e-mail program resident on the card-recipient's terminalis launched. In another, the e-mail program is maintained by centralsite, which the card-recipient interfaces with.). Selecting other hotbuttons may invoke a phone call, video conference, fax, voice mail(e.g., calling a voice mailbox or recording and/or uploading an audiofile for delivery to the card-giver), pager, and/or GPS locator.

[0044] A card recipient may select to listen or view the card-giver'saudio/visual files, or to activate the translation and/or pronunciationfiles. Such files are transferred (or streamed) to the card recipient'sterminal for performance via a multimedia player. Of course, such aplayer may be an independent application, or may be integrated with abrowser or other tool. Alternatively, the card recipient selects a linkto another location (via a pointer or link). The files are retrieved oraccessed at this other location.

[0045] The card recipient may request that a “tickler” be sent when therespective card-giver updates her on-line data. There can be variouslevels of gradation to trigger such a tickle. For example, the recipientcan be notified (e.g., via e-mail, phone-messaging, and/or mail, etc.)when a standard contact field (address, e-mail, etc.) is changed.Alternatively, the card recipient is tickled when any informationchanges, including the “now” contact number.

[0046] The card recipient may select an option to expedite contact withthe card-giver in the future (e.g., the next time the card recipientholds the business card up to their compliant device). For example, thecard recipient may request that instead of accessing the data in theon-line database, a contact channel be opened. To accomplish this, acookie or other data structure may be stored locally on the recipient'sterminal 45. The cookie or data structure identifies the user (via theuser's unique identifier) and also the recipient (e.g., via anidentifier or last-session identifier). Such data is provided to thecentral site 43 the next time the card recipient accesses the centralsite 43 via the recipient's terminal 45. The central site 43 examinesthe data and determines that, instead of viewing the user's data, therecipient wishes to activate a contact channel (e-mail, phone number,etc.). Optionally, the recipient is queried to confirm her choice (e.g.,a dialog box which asks the recipient whether they want to access thedatabase, or activate the communications channel.). Of course, locallystoring extracted identifiers in an “immediate contact list,” and thencomparing a currently extracted user identifier to the immediate contactlist can be used to carry out this same process. This same result isachieved by assigning the card recipient a username and/or password,which is examined by the central site 43. An immediate contact list canbe associated with the username/password to determine access to thedatabase, or to launch a communications channel.

[0047] A card-recipient may also register with the central site 43. Uponregistration, the card-recipient is given a username/password (or isallowed to select such). (In another embodiment, the card-recipient isgiven embedded data, which is applied to a printed document or item.)The username/password (and embedded data) can be used to access thecentral site in the future. For example, if the card-recipient loses abusiness card, or does not have access to a respective, downloadedvCard, the card-recipient “logs-on” to the central site and searches fora particular name. (In this case, the central site supports a namesearch functionality using known database search/index techniques.).Permissions levels can be established to prevent a card-recipient fromunauthorized perusing. To illustrate, a card-recipient may only accessthose files (e.g., card-giver accounts), which she has already accessedvia an embedded business card. Or a card-recipient is only permittedaccess to a minimum level of information, such as name, contact numberor e-mail.

[0048] System 10 generates many benefits, such as the ability to enhancefunctionality of business cards, change on-line data while static dataon a business card remains the same, simplifying contact processes, andlinking to related information. Centralizing the data in an on-linedatabase also provides efficiency and security. These and other benefitsare readily apparent from the description in this document.

[0049] Alternative Embodiments

[0050] As an alternative implementation, a representative,administrator, or office supplier may handle the registration process,instead of the user. Such an administrator may represent a variety ofusers and have special access privileges. For example, a print shop oroffice supplier may contact the central site 43 on a user's behalf, toobtain a watermarked gallery item. Optionally, the print shop or officesupplier may also to enter the user's data into the online database.Similarly, an organization or business may complete the registrationprocess for its members or employees, and thereafter control databaseentry. Organizational control may be advantageous in that a position(e.g., purchasing agent, sales person, technical position) may beupdated to reflect personnel changes, organizational restructuring, etc.Control can also be important to organizations, in that terminatedemployees can be removed from association with the company. Such controlalso allows a company to maintain brand and image control. For example,a highly “brand-sensitive” company may not want its employees to be ableto add non-brand related content to the contact site. Accordingly, thecompany can control the content associated with an employee's uniqueidentifier.

[0051] Whereas the above system implementation has been described withrespect to business cards, the present invention is not so limited. Infact, many other watermarked documents may be used to accomplish thesame functionality via the system 10 architecture. Consider envelopes,letterhead, note pages (e.g., Post-It brand notes) and stationary. Auser may similarly register and obtain a gallery item to apply to such.A card recipient, upon receipt of these types of watermarked documents,presents the respective document to a compliant terminal in the mannerdiscussed above. Access to the on-line data repository is similarlyachieved. (Corporations too, may want to have these types of itemslinked to general contact or company information.).

[0052] Now consider a résumé. A potential employee may submitwatermarked résumés to a plurality of potential employers. The potentialemployee adds impressive data to the linked on-line database, including,for example, audio or video clips, to be viewed by potential employers.A potential employee may even custom design the information for anindividual employer by sending the employer a résumé embedded with acorresponding, specific unique identifier. The employer, upon access tothe on-line data via the encoded résumé, is greeted with specific andtargeted data. (A business card may even replace a résumé, in that thebibliographic information is easily accessible on-line via the encodedbusiness card.).

[0053] Encoded labels may also be used with system 10. For example,printed mailing/shipping labels may be encoded with an identifier, whichis used to link to associated information (e.g., sender, addressee,corporate information, product information, etc.). Such an encoded labelcould be used with packaging to augment a shipping manifest, shippinglabel, product and handling instructions, etc. For shipments withoutexternal markings, the encoded label could provide a means to determinethe package's content. Moreover, such an encoded label may be used totrack a package throughout a distribution system.

[0054] Of course, other documents, such as stickers, brochures,appointment cards, etc. may be encoded in a similar manner, andimplemented with system 10.

[0055] As a further alternative, a user need not select a gallery item,but may instead present her own document to be watermarked. The user'sdocument itself is then embedded with data, which can then be reprinted.For example, a user presents a business card to an optical scanner. Theoptical scanner captures an electronic copy of the business card. Theelectronic copy is then watermarked (e.g., by subtle alterations to thetext or graphics already present) and returned to the user for printingand distribution. (The watermarking may be accomplished via the centralsite 43, or via software maintained by a user terminal, whichcommunicates with the central site 43 to assign or register a uniqueuser identifier.). Of course the watermark survives the printingprocess, and is reproduced when the watermarked, electronic copy isprinted. Since, a unique identifier is assigned to the user's document,the user may then access the on-line database for data entry associatedwith the unique identifier.

[0056] Similarly, a further embodiment allows a user to submit anelectronic card image to a watermarking professional, who embeds theimage with the unique identifier (and, optionally, with an electronicaddress). The watermarking professional can then either return thewatermarked, electronic card image to the user or send the card imagedirectly to a printer for printing. In this case, the professionalpreferably communicates (either before, during or after embedding) withthe central site to facilitate the association of a unique useridentifier with the user. Alternatively, upon an initial access to thecentral site, the identifier is extracted and registered, and the useris then permitted to enter data.

[0057] As even a further embodiment, system 10 supports a model whereina professional designs a document (e.g., business card), potentiallyincluding artwork (e.g., graphics, text, shading, background, etc.),which document is specifically supportive of digital watermarks. Thedocument is then watermarked with a unique identifier as discussedabove.

[0058] In one embodiment, a card-recipient maintains a visual databaseof each card-giver accessed via the on-line database. To illustrate, acard-recipient, upon access to the on-line database, may download avisual icon (e.g., a digital image of the card-giver, a company logo,graphic, etc.) associated with a card-giver. The icons serve as ashortcut to the card-giver's data. The card-giver's data (e.g., vCard,unique identifier, perhaps encrypted for protections, and/or other data)may be stored locally, or may be accessed via the on-line database. Suchicons may be stored in a file, folder, or on a computer's desktopenvironment.

[0059] A card-giver, in one embodiment, may choose to have her e-mailforwarded to the on-line database. (The database may manage the e-mailin an account associated with the card-giver's unique identifier.). Thecard-giver may then access the on-line database (e.g., via a her ownwatermarked business card or a master business card) to retrieve here-mail. This allows a traveler to easily access her e-mail when on theroad, upon the presentment of her business card to a compliant device.(Kiosks may be set-up, in airports, travel hubs, coffee shops,convention centers, offices, corporate sites, etc., to provideadditional compliant devices for such travelers.).

[0060] The central site 43 and/or online database can be configured toallow a user to be associated with a plurality of different data sets.For example, a business card may include two unique identifiers, each ofwhich triggers a separate response. A first identifier may be includedon a front side of a business card, while a second identifier isincluded on the backside of the card. The first identifier links tobusiness data, while the second identifier may link to personal data,corporate data, and/or industry data, etc. From the perspective of thedatabase, the user may be assigned separate identifiers to accomplishthe separate responses, or the identifiers may be linked as subsets to auser's main profile. Alternatively, a user may carry several differentlywatermarked cards, each linked to separate information in the on-linedatabase.

[0061] Another variation included within the scope of the presentinvention is a distributed system. For example, instead of storing datain a central site (or a plurality of central sites), user data may bedistributed or maintained in alternative locations. To illustrate, acard-giver may maintain related data (e.g., contact information,audio/video clips, links, etc.) on her own client system (or on adesignated system). Software resident on a recipient or user terminalmay then query a look-up router to obtain an appropriate address (e.g.,one corresponding to the extracted unique identifier) to access for thecard-giver's related data. (In this case, a user may initially query thelook-up router to obtain an appropriate unique identifier. In oneembodiment, the user's address is the unique identifier.). Upon receiptof the address, the software accesses to the indicated site (orterminal). As a further alternative, the watermark itself includessufficient encoded address information so that the decoding software(and/or communications software) can link to the client system withoutneeding to query a central site or look-up router. (In this case, theuser's address may serve as a unique identifier, which can be embeddedby client software on the user's terminal.). Of course, suchmodifications are within the scope of the present invention.

[0062] Conclusion

[0063] The reference to business cards is illustrative only. Of course,the invention is more widely applicable. Going back a century, “callingcards” were used by persons whose interests were strictly social, ratherthan business. The principles of the present invention can similarly beapplied. Teenagers can carry small cards (or adhesive stickers) that canbe exchanged with new acquaintances to grant access to private dossiersof personal information/favorite music/artwork/video clips/etc., toinvoke instant message communications, or any other purpose. The cardscan be decorated with art or other indicia that can serve purposeswholly unrelated to the linking data steganographically encoded therein.Additionally, a calling card may even be blank (e.g., no text or obviousgraphic), while still carrying encoded data in the background,texturing, or shading. Or the card may have a one word identifier orgraphic to identify the card-giver.

[0064] Even the “card” paradigm is too restrictive. The same techniquescan be applied to any object. A music CD cover can be encoded to pointto a promotional site associated with the music artist. A book jacketcan link to a similar site. Printed advertising distributed through theUS mail (cards, magazines, etc.) can be encoded to point to relatedweb-based promotional sites. (Sponsors of such advertising or othersites can reward visits to their internet site by issuing cardrecipients digital tokens or coupons that can be redeemed for premiums,cash-back, etc., either for any such visit, or only if the visit waseffected through the portal of a steganographically-encoded printedmedium.).

[0065] Many contexts arise in which data to be presented to a consumeris valuable only if timely. The postal service mail is ill-suited forsome such information due to the latency between printing a document,and its ultimate delivery to a recipient. The principles of the presentinvention allow the recipient to take a steganographically-encoded dataobject (card, etc.) that was printed well before delivery, and use it onreceipt to receive up-to-the-minute information. (In this and otherembodiments, the steganographically-encoded data can also include datauniquely identifying the recipient/user, so the web site can presentdata customized to that user.)

[0066] The present technology also has application in access controlsystems. An identification badge (either with photo or graphics, or withtext alone) can be encoded with steganographically access control data(e.g., access codes or digital keys) that is recognized byoptical-scanner-equipped locks and the like, permitting access byauthorized persons to restricted areas or restricted services (e.g.,computer privileges). Given the low cost of media and printing (ascompared with other access control technologies), the cards can beissued on a daily, weekly, or other frequent interval, and the accesscontrol system can be programmed to permit access in response to suchcards only for the pre-set limited period. Lost cards soon lose theirthreat.

[0067] Tickets to sporting events, concerts, and other events can besteganographically encoded to permit the bearer to access premium webcontent available only to those who have purchased tickets (e.g., anon-line text-, audio-, or video-chat session with the featured performeror sports star the day before the event). Alternatively, the encodeddata may link to a transactional site. In some such embodiments, theticket is printed with a nominal show data and seat assignment, but alsoincludes a UID in addition to the encoded address of an associatedtransactional ticket site. The user then can visit the transactional website to change seating (or date). On attending the event, the consumerpresents the ticket to a steganographic decoder apparatus that discernsthe UID and looks up the seat assignment most-recently picked by theconsumer. It then prints a chit entitling the consumer to take the seatearlier selected on-line.

[0068] The reference to “scanning” of objects naturally brings to mindimages of desktop flatbed scanners, or multi-function hydra devices.While such devices can be used—together with convention digital cameras(including video cameras)—the inventors foresee that image input deviceswill soon be much more commonplace. The provision of digital cameras asbuilt-in components of certain computers (e.g., the Sony Vaio laptops)is just one manifestation of this trend. Another is camera-on-a-chipsystems, as typified by U.S. Pat. No. 5,841,126 and detailed in Nixon etal., “256×256 CMOS Active Pixel Sensor Camera-on-a-Chip,” IEEE J.Solid-State Circuits, Vol. 31(12), pp. 2046-2051 (1996), and Fossum,“CMOS Image Sensors: Electronic Camera-on-a-Chip,” IEEE Transactions ofElectron Devices, vol. 44, No. 10, October 1997. Still another ishead-mounted cameras (as are presently used in some computer-augmentedvision systems). Another is a camera module for mobile phones that use aCCD image sensor. Such camera often feature low electric powerconsumption, and high sensitivity. Another is a wristwatch with an imagesensor. These and other image input devices could all be used inconnection with the present invention.

[0069] To facilitate embodiments of the present invention, a prior artcamera-on-a-chip system can be modified to also include a steganographicwatermark detector on the same semiconductor substrate. Such a chip—inaddition to providing image output data—can also analyze the image datato discern any steganographically encoded data, and producecorresponding output data. (Again, such analysis desirably includescorrection for scale and rotation factors, so precise positioning of theobject being “read” is not essential for correct decoding.).

[0070] To provide a comprehensive disclosure without unduly lengtheningthis specification, applicants incorporate by reference the patents,applications, and publications identified above.

[0071] Having described and illustrated the principles of our inventionwith reference to illustrative embodiments, it should be recognized thatthe invention is not so limited.

[0072] For example, while certain of the embodiments were illustratedwith reference to an internet-based embodiment, the same techniques aresimilarly applicable to any other computer-based system. For example,the central server does not necessarily need to be on the internet.Within a company, such central site may be available via an intranet orother network. Watermark documents or objects (e.g., an ID or securitybadge) may be used for access to specific documents or access tospecific locations or services within the company's facilities. Also,for internet-based embodiments, the use of web browsers and web pages isnot essential; other digital navigation devices and other on-line datarepositories can be similarly accessed.

[0073] While steganographic encoding of the digital data is used in thepreferred embodiments, visible forms of digital encoding—such as barcodes or alphanumeric codes—can naturally be employed where aestheticconsiderations permit.

[0074] Although not belabored, artisans will understand that theregistration, watermarking, detecting and other operations can beperformed in accordance with software instructions stored in a computermemory (or library) or on other storage media, and executed by aprocessor in the computer as needed. (Alternatively, dedicated hardware,or programmable logic circuits, can be employed for such operations.).

[0075] The above section headers (e.g., “System Implementation”) provideno substantive limitations. Rather, the section headers are merelyprovided for the reader's convenience. Of course, elements discussed inone section can be combined with those in another section, and so forth.

[0076] In view of the many embodiments to which the principles of ourinvention may be applied, it should be recognized that the detailedembodiments are illustrative only and should not be taken as limitingthe scope of our invention. Rather, we claim as our invention all suchembodiments as fall within the scope and spirit of the following claims,and equivalents thereto.

What is claimed is:
 1. A method comprising the steps of: accessing acentral site to obtain a steganographically-encoded item, the itemincluding at least a unique identifier; applying thesteganographically-encoded item to a document; and inputting datarelating to a proprietor of the document, the data being input into adatabase, and associating the data with the unique identifier.
 2. Themethod according to claim 1 , wherein the document is a business card.3. The method according to claim 1 , wherein the document comprises oneof a sticker, résumé, label, brochure, post-it, envelope, stationary,and letterhead.
 4. The method according to claim 1 , wherein the data isformatted into a standardized format.
 5. The method according to claim 4, wherein the standardized format comprises a vCard.
 6. The methodaccording to claim 1 , wherein the data comprises audio or visual data.7. The method according to claim 1 , wherein the data comprisespronunciation data.
 8. The method according to claim 1 , furthercomprising the step of translating the data into a different language.9. The method according to claim 1 , further comprising the step ofproviding an audio pronunciation of the stored data.
 10. The methodaccording to claim 1 , wherein the steganographically-encoded itemcomprises one of a background, tint, graphic, shading, logo, text orfont.
 11. The method according to claim 1 , wherein thesteganographically-encoded item comprises a business card.
 12. Themethod according to claim 1 , wherein the steganographically-encodeditem includes an electronic address associated with the central site.13. A method of doing business comprising the steps of: providing awatermarked item for integration with a business card, the watermarkeditem including a unique identifier associated with an internet database;receiving data in the internet database, the received data correspondingto a proprietor of the business card; associating the received data withthe unique identifier; and permitting access to the received data in theinternet database when presented with the unique identifier.
 14. Themethod according to claim 13 , wherein the received data includes acurrent contact-channel.
 15. The method according to claim 14 , whereinthe current contact-channel comprises an immediate contact number. 16.The method according to claim 13 , further comprising the step ofproviding a digital file comprising a pronunciation of at least some ofthe received data.
 17. The method according to claim 13 , furthercomprising the step of providing a digital file comprising a translationof at least some of the received data.
 18. The method according to claim13 , further comprising the step of standardizing the format of thereceived data.
 19. The method according to claim 18 , wherein the formatcomprises a vCard.
 20. The method according to claim 13 , furthercomprising the step of notifying a card-recipient when the received datachanges.
 21. The method according to claim 13 , wherein the watermarkeditem further includes an address associated with the internet database.22. A system comprising: a central computer, said central computercommunicating with a network; a database in communication with thecentral computer, the database indexing user data according to uniqueidentifiers; a gallery of items maintained by the central computer, eachitem capable of hosting encoded data; an encoder tosteganographically-encode a unique identifier per item of the gallery ofitems; and an interface through which at least one user can access thegallery items and database.
 23. The system according to claim 22 ,wherein the gallery of items comprises at least one of background,tints, shading, graphics, text, fonts, and logos.
 24. The systemaccording to claim 22 , wherein the encoder encodes an address of thesystem per item of the gallery of items.
 25. The system according toclaim 22 , wherein a unique identifier is communicated to a user.
 26. Amethod of linking data to a document comprising the steps of:registering at least one document-giver with an on-line registrationserver and assigning the document-giver a unique identifier;steganographically-encoding the unique identifier into an item to beincorporated with a printed document associated with the document-giver;receiving information related to the card-giver into a databaseassociated with the online registration server; and transferring therelated information upon receipt of the unique identifier.
 27. Themethod according to claim 26 , wherein the document comprises one of abusiness card, résumé, envelope, stationary, label, post-it, letterhead,brochure and sticker.
 28. The method according to claim 26 , furthercomprising the steps of: presenting the document to an optical sensor ata first terminal, the optical sensor producing output data; decoding thesteganographically-encoded unique identifier from the sensor outputdata; establishing a link with the on-line registration server; andtransferring the document-giver's received information from the on-lineregistration server to the first terminal.
 29. The method according toclaim 28 , wherein the document-giver's received information comprisesat least one of audio files, video files, contact information, and audiopronunciation data.
 30. The method according to claim 26 , furthercomprising the step of transferring the received information from theon-line registration server to a first terminal.
 31. The methodaccording to claim 30 , wherein the received information is transferredin a standardized format.
 32. The method according to claim 31 , whereinthe standardized format comprises a vCard.
 33. A method of linking datato a business card comprising the steps of: registering at least onecard-giver with an on-line registration server and assigning thecard-giver a unique identifier; steganographically-encoding the uniqueidentifier and an address of the on-line registration server into anitem to be incorporated with a business card associated with thecard-giver; receiving information related to the card-giver into adatabase associated with the on-line registration server; andtransferring the related information upon receipt of the uniqueidentifier.
 34. A method of linking data to a document comprising thesteps of: receiving an electronic copy of the document;steganographically-encoding a unique identifier into the electronic copyof the document; receiving information related to the proprietor of thedocument into a database and associating the received data with theunique identifier; and transferring the related information upon receiptof the unique identifier.
 35. A method comprising the steps of: decodingsteganographically-encoded data from a document; querying a look-uptable to determine a web-site corresponding to thesteganographically-encoded data; and accessing the web site to obtaindata relating to a proprietor of the document.
 36. A method comprising:presenting a business card of an individual to an optical sensor, theoptical sensor producing output data; decodingsteganographically-encoded plural-bit data from the sensor output data;and using said plural-bit data to establish a link to an internetaddress having data relating to the proprietor of said business card.37. The method of claim 36 , which includes obtaining from said internetsite calendar data detailing certain activities of the individual. 38.The method of claim 37 in which the amount of calendar data obtaineddepends on an authorization level.
 39. The method of claim 38 in whichthe authorization level is reflected in the plural-bit data encoded inthe individual's business card, wherein an individual can distributedifferently-encoded cards to different recipients, to grant therecipients different access rights to said calendar data.
 40. The methodof claim 36 in which the optical sensor is a business card reader thatalso serves to input textual information from business cards into apersonal information manager.