Systems, methods and apparatuses for brokering data between wireless devices, servers and data rendering devices

ABSTRACT

A system ensures security over remote controlled entries utilizing a remote control transmitter when a unique number pattern or code is entered into the user interface. The remote control transmitter can include three or more buttons (either physical or represented on a touchscreen display) whereon a unique pattern is entered in order to cause the transmitter to send its RF signal to a receiver associated with the secured entry. When the proper code is not entered onto the keypad or buttons associated with the remote control transmitter with a preselected number of tries then the remote control transmitter can become inoperable for a period of time before entry can be attempted again. When unsuccessful entry is attempted on more than another preselected number of tries then the remote control transmitter can become inoperable for a longer duration, or permanently.

PRIORITY TO RELATED APPLICATIONS

This application claims priority as a continuation application of Nonprovisional patent application Ser. No. 13/777,273, entitled “Systems, Methods and Apparatuses for Brokering Data Between Wireless Devices, Servers and Data Rendering Devices,” filed Feb. 26, 2013 and is incorporated herein by reference, which is a continuation application of Nonprovisional patent application Ser. No. 12/569,739, entitled “Systems, Methods and Apparatuses for Providing Video Data to Data Rendering Devices for Display on Multimedia Video Devices at the Request of Wireless Hand Held Devices,” filed Sep. 29, 2009 and is incorporated herein by reference, which is a continuation of Nonprovisional patent application Ser. No. 09/887,492, entitled “Systems, Methods and Apparatuses for Brokering Data Between Wireless Devices and Data Rendering Devices,” which was filed Jun. 22, 2001 and is also incorporated herein by reference, and which is a continuation of Provisional Patent Application Ser. No. 60/214,339, also entitled “Systems, methods and apparatuses for brokering data between wireless devices and data rendering devices,” filed Jun. 27, 2000. This application also claims priority as a continuation application of Nonprovisional patent application Ser. No. 13/030,037, entitled “Coded Remote Controller and Means to Secure Entry,” filed Feb. 17, 2011, which claims priority to provisional application 61/305,190 filed Feb. 17, 2010, and both applications are also incorporated herein by reference.

TECHNICAL FIELD OF THE INVENTION

The present invention is generally related to the use and management of data retrieved over wireless networks. More particularly, the present invention is related to handheld devices that are programmable with unique codes to wirelessly open secured entries such as garage doors and gates.

BACKGROUND

Wireless computing devices (generally known as mobile or cellular phones, smart phones, and laptops) are available that communicate wirelessly through data networks (including cellular digital wireless networks). Many wireless telephones are “Web-enabled.” Hand held wireless devices that transmit and receive digital data are referred to as Personal Digital Assistants (“PDAs”, with similar devices being referred to as palm or pocket computers). Wireless networks are continuing to be expanded and integrated with new applications and services that are compatible with the growing number of wireless devices entering the marketplace. The capabilities of a cell phone and PDA are being combined into a smartphone.

Other examples of advancements within the field of wireless communications include the following: The Wireless Internet is generally known as an RF-based service that provides access to the Internet (e.g., WiFi), e-mail and/or the World Wide Web via wireless devices. Wireless IP generally refers to the packet data protocol standard for sending wireless data over the Internet. Wireless LANs (Local Area Networks) are known to utilize wireless transmissions, such as radio or infrared communication instead of phone lines or fiber-optic cable, to connect to data devices.

Remote control systems employed to operate barriers, such as garage doors, gates and the like typically utilize hand held transmitters which emit encoded signals transmitted at radio frequencies to a receiver associated with an automatic door or gate operator. The receiver is effective to intercept and decode the transmitted signal and thus cause the actuation of the operator to open or close the door or gate. These systems include the type in which the receiver has code switches which can be manually set to correspond to the authorized transmitter codes or, alternatively, may be “learn”-type systems in which codes or the like that are used to identify authorized transmitter codes are initially stored in the receiver during a preparatory program or learn mode.

Remote control garage door or entry door openers presently available remain straightforward in operation and architecture. A portable RF transmitter (Radio frequency transmitter) is coded to open or matched with an opener associated with a secure entry (e.g., garage doors and gates). The RF transmitter is typically handheld, wireless and sends a RF signal that is matched with or learned by the entry receiver. For example, a transmitter in the form of a portable garage door opener typically kept in an automobile is matched by a unique RF signal generated by the transmitter to a receiver associated with the garage door opener equipment. A single button can be pressed on the transmitter to open or close a garage door or gate by transmission of a coded signage or unique frequency.

The risk of unauthorized access is a major concern associated with the use of the above-mentioned systems. For example, unauthorized access can potentially be achieved by means of an exhaustive, systematic search in which a large number of different codes are successively transmitted in the hope that, eventually, one of the transmitted codes will match the authorized code and activate the system. Another scheme used to gain unauthorized access is a technique, sometimes referred to as “code grabbing”, in which the initial transmission of the authorized code is electronically intercepted and stored for later unauthorized use.

Hence it is believed that a more secure method and system for enabling access to a secured environment are needed. The present invention accomplishes the need.

BRIEF SUMMARY OF THE INVENTION

The following summary is provided to facilitate an understanding of some of the innovative features unique to the embodiments disclosed and is not intended to be a full description. A full appreciation of the various aspects of the embodiments can be gained by taking the entire specification, claims, drawings, and abstract as a whole.

It is, therefore, one aspect of the present invention to provide a secured entry system utilizing at least one unique code entered on an user interface to open at least one associated entry that is secured (e.g., garage door, gated entry, front door lock).

It is another aspect of the present invention to provide systems and methods for enabling access to a secured environment utilizing handheld devices and utilizing unique codes assigned to secured entries.

It is a further aspect of the present invention to provide systems that can ensure security over remote controlled entries utilizing a programmable remote control transmitter, which can be provided in the form of a smartphone (wireless PDA).

The aforementioned aspects and other objectives and advantages can now be achieved as described herein. The present invention includes a system to ensure security over remote controlled entries utilizing a remote control transmitter when a unique number pattern or code is entered into the user interface (e.g., buttons or touchscreen of remote control transmitter. The remote control transmitter can include three or more buttons (either physical or represented on a touchscreen display) whereon a unique pattern is entered in order to cause the transmitter to send its RF signal to a receiver associated with the secured entry. When the proper code is not entered onto the keypad or buttons associated with the remote control transmitter with a preselected number of tries then the remote control transmitter can become inoperable for a period of time before entry can be attempted again. When unsuccessful entry is attempted on more than another preselected number of tries then the remote control transmitter can become inoperable for a longer duration, or permanently.

The remote control transmitter can be adapted to operate with any currently existing receiver, such as standard garage door openers, gate openers and door-locks. The remote control transmitter can be matched, for example, with the garage door opener through procedures known in the art such as programming the entry receiver to recognize a unique code transmitted from the transmitter. After matching the transmitter with the receiver, the unique code on the transmitter can only be transmitted from the transmitter when the proper combination of key entries is entered on the transmitter.

In accordance with a feature of the present invention, openers for secured entries can receive data directly from WDs and/or through data networks (wireless and wired) after/with coordination by WDs with wireless networks providing data to secured entries.

The novel features of the present invention will become apparent to those of skill in the relevant art upon examination of the following detailed description of the invention or can be learned by practice of the present invention. It should be understood, however, that the detailed description of the invention and the specific examples presented, while indicating certain embodiments of the present invention, are provided for illustration purposes only because various changes and modifications within the scope of the invention will become apparent to those of skill in the relevant art from the detailed description of the invention and claims that follow.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying figures, in which like references numerals may refer to identical or functionally-similar elements throughout the separate views are incorporated in and form part of the specification, further illustrate aspects of the present invention and, together with the detailed description of the invention, serve to better explain the principles of, but are not intended to limit, the present invention.

FIG. 1 illustrates a block diagram of a wireless remote control and receiver system which can be adapted for use in implementing a preferred embodiment;

FIG. 2 illustrates a high-level flow chart of logical operational steps of a method, which can be implemented in accordance with a preferred embodiment;

FIG. 3 is a block diagram illustrating components that can be included in a wireless device (WD) in accordance with aspects of the present invention;

FIG. 4 is a flow diagram illustrating steps by a WD for selecting and providing data to a DRD;

FIG. 5 is a flow diagram illustrating additional steps of a WD for providing data to a DRD for rendering by the DRD;

FIG. 6 is a flow diagram illustrating steps by a WD for selecting a DRD for transfer of data;

FIG. 7 is a flow diagram illustrating steps by a WD for selecting a DRD using network resources, selecting data for transfer to/rendering by a selected DRD and requesting data transfer/render to the selected DRD;

FIG. 8 is a flow diagram illustrating steps for a WD/user to select a DRD for data transfer via a network and selecting render functions at a DRD;

FIG. 9 is a flow diagram illustrating steps by a network server in processing a request for DRD location information;

FIG. 10 is a flow diagram illustrating steps by a WD for requesting DRD location information, data transfer and data rendering;

FIG. 11 is a flow diagram illustrating steps by a DRD for receiving/rendering data at the request of a WD; and

FIG. 12 is a flow diagram illustrating approval determination steps by a DRD.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Particular configurations discussed in these non-limiting examples can be varied and are cited merely to illustrate at least one preferred embodiment of the present invention and are not intended to limit the scope of the invention.

FIG. 1 illustrates a block diagram of a wireless remote control and receiver system, which can be adapted for use in implementing a preferred embodiment. A portable, wireless transmitter 110 can be provided for enabling access to secured entries. A memory (not shown in figure) can be adapted to store unique signals employed for transmission by the wireless transmitter 110 and for storing unique entry patterns provided by a user interface. A controller 130 having access to said memory and adapted to provide at least one unique signal to the wireless transmitter 110 and unique entry patterns as input signals from at least one of a biometric sensor or at least three button switches can also be provided. The wireless transmitter 110 provided can be adapted to transmit at least one unique radio frequency provided from said controller 130. Any user interface can be included with at least one of a biometric sensor or at least three button switches in communication with said controller 130. During use, a user can enter a unique pattern of numbers (or a biometric when a biometric reader is used), which can then activate the transmitter to send an RF signal to the entry circuit receiver 120. During programming, the user can enter a unique pattern (e.g., any combination of 0-9, or a biometric) for storage in the memory. Re-entry of the pattern can initiate transmission of the RF signals. After programming, the remote controller's unique signal can be matched with (programmed to operate) the entry system hardware 140, by methods known in the art of garage door and entry openers.

As an alternate embodiment, the remote control transmitter 110 can be coded with a biometric template memorized from at least one user authorized with entry into the secured embodiment. Other than a unqiue patter of numbers or key entries, a biometric (e.g., fingerprint) can be utilized to activate transmission of the RF signal to the secured entry receiver120.

It can be appreciated that the remote controller can be used to open more than one secure entry. Several unique transmission signals can be transmitted by the remote controller. Each unique transmission signal can be associated with a different unique pattern (e.g., a unique combination of numbers from 0-9, or a different biometric sample such as a thumb or index finger).

FIG. 2 illustrates a high-level flow chart 200 of logical operational steps of a method, which can be implemented in accordance with a preferred embodiment. As depicted at 201 the user can enter a unique pattern of numbers on the wireless transmitter 110 (FIG. 1). Then as illustrated at 202 the wireless transmitter 110 get activated and it can send an RF signal. Next the entry circuit receiver 120 receives these RF signals as illustrated at 203. The controller 130 can then provide unique signals as indicated at 204. Finally the entry system hardware matches these signals with the signals in memory and transmits a command to open the entry if proper combination is entered.

The present invention allows a user to use a single portable wireless device having a user interface (e.g, keypad) with at least three buttons, similar to a key fob or garage remote control device that is clipped onto a car visor, to open more than one secured entry by physically entering (using a human finger) a unique pattern associated with each of the more than one secured entry onto the single portable wireless device using a combination of more than three buttons entries physically entered by a user on a user interface, where the unique patterns are each associated with one of the more than one secured entries that can be opened using the single portable wireless device, and physical entry of a unique pattern causes a unique RF signal to be transmitted to a wireless receiver of the secured entry that is associated with the unique RF signal caused to be transmitted from the single portable device by physical entry of the unique pattern.

In other words, and by example only, a single portable wireless device can open more than one garage door and other secured entries into a secured complex using a unique entry pattern physically entered on buttons associated with a user interface, thereby preventing unauthorized humans from gaining entry with the wireless device because the unauthorized humans would not know the unique patterns to enter into the wireless device to open each entry, and the portable wireless device become disabled should a pattern not stored in memory be physically entered on the buttons more than once. The prior art does not teach this, either alone or in combination. For exemplary purposes only, the following example entries can be opened entering a unique pattern onto a three button “A”, “C” portable device also illustrated below:

Physical Pattern Secured Entry Assigned Frequency ACB Complex Entry Gate 123 MHz CAB Garage Door # 1 286 MHz BAC Garage Door # 2 154 MHz BBB Front Entry Door 175 MHz . . . . . . . . . . . . . . . . . . AAA Office Garage 111 MHz

As can be easily determined mathematically by the example, a total of twenty-seven (27) potential combinations are possible with only a three-button opener. Therefore up to a total of twenty-seven potential entries could potentially be operated with a single device. This capability simply is not taught or suggested by the cited art of Fitzgibbon and Rodriguez, nor any other art in the field of endeavor for a portable device, such as a garage door opener.

In accordance with the following disclosure of the present invention, data generally refers to text, voice, graphics and/or video. Data rendering generally refers to the printing, displaying and/or retrieval of data. Wireless Devices (WD) include mobile phones, PDAs, pagers and other hand held wireless appliances adapted for connectivity to wireless networks and capable of processing data. A Data Rendering Device (DRD) includes data rendering hardware (e.g., printers, copiers, displays, etc.) and multimedia software adapted for rendering data at the request and/or coordination of what can be a previously unknown WD. DRDs can receive data directly from WDs and/or through networks (e.g., wireless, Internet, intranet, etc.) after/with coordination by WDs with networks providing data and support to DRDs. Data Brokering includes the negotiation, management, coordination and/or facilitation of data movement and use between and throughout DRDs, WDs and networks.

Referring to FIG. 1, an environment is illustrated as an example wherein aspects of the invention described herein can be deployed. An aspect of the present invention provides methods, systems and apparatuses for data brokering between wireless devices (WDs) 6 and Data Rendering Devices (DRDs) 7. Data brokering can be carried out directly between WDs 6 and DRDs 7 via local wireless communications including infrared (IR) or radio frequency (RF) technology and/or indirectly via networks 12 through the use of known networking and data formatting protocols. Information related to WDs 6, DRDs 7 and/or WD user's (e.g., subscriber identification, location, accounting, profiles) can be managed by a combination of network servers 15, Home Location Registers (NLRB) 16 and Visiting Location Registers 19. Subscriber information for a WD user can be kept Ire at least one HLR 13 and/or VLR 19, but can also be generated by the WD 6 (e.g., stored in the WD or provided together with a network request by WD user). Subscriber information can include a profile regarding DRD usage (e.g., restriction regarding geography, hardware capabilities, security, biometrics, etc). A WD 6 user is typically in communication with a supporting network 12 through wireless network communications hardware such as cellular antennas 16, Base Station Controllers (BSCs) 17 and Mobile System Controller (MSCs) 18. A copy of a WD 6 user's subscription information can be kept in a VLR 19 associated with the area and MSC 18 the user is operating during communication. Satellite global positioning system (GPS) 9 capabilities installed at the wireless network interface can assist in determining a WD 6 user's location by routing location information to the VLR19/HLR 13 when a WD user communicates with a supporting wireless network 12. A WD 6 user will generally retrieve data from multimedia database resources 8 available or accessible to the WD and WD user over networks 12. Examples of multimedia resources include messaging mailboxes and Internet/intranet information.

In accordance with another aspect of the present invention data brokering can be accomplished directly between WDs and DRDs (e.g., locally via infrared (IR) or radio frequency (RF) technology) or can be negotiated with and provided through networks using available networking protocols. Referring to FIG. 2, a block diagram of some of the components that can be included in a DRD 7 is provided. A DRD 7, serving as an apparatus adapted for rendering data associated with a data rendering request issued by a WD 6, includes an authorization module 21, communications means 23, rendering means 25, and a microprocessor 24. The authorization module 21 approves receipt of rendering data in accordance with a request initiated by a WD 6. The authorization module 21 can approve or deny the request to render data based on the DRDs 7 readiness status 27. A status monitor 27 can be provided to track the operational readiness of the rendering means 25 (which can include printing, display and retrieval hardware status, and microprocessor 24 load/communications activity). The communications means 23 can provide a DRD 7 with wired and/or wireless communications with networks 28 and/or wireless devices (as generally described and illustrated in FIG. 1 and as further known in the wireless communications art). Wired communication via communications means 23 can occur through known data network communications hardware, methods and protocols (e.g., cable modems, Ethernet, Bluetooth, etc.). Wireless communication via communications means 23 can occur through known wireless data network communications hardware, methods and protocols (e.g., Bluetooth, WLAN, 802.11b, etc.). The network communications means 28 can provide DRD 7 communication capabilities over, for example, the public service telephone network (PSTN), digital subscriber line (DSL), Integrated Services for Digital Networks (ISDN) and/or Local Area Network (LAN). A DRD 7 can also communicate with networks via wireless means (e.g., cellular, satellite, microwave, etc.) A user's direct interaction with a DRD 7 can be provided through a user interface (UI) 22 associated with the DRD 7. The UI 22 can allow users to control (e.g., manage) and manipulate (e.g., interact with) data at the DRD 7. The UI 22 can be used to provide user passcodes (including biometrics) directly to the DRD 6 in order to receive rendered data from the DRD 7. Alternatively, a user can interact directly with the DRD 7 via a WD 6. A WD 6 can provide commands and/receive data from the DRD 7 through IR and RF means. IR and RF data transport and communication hardware and protocols are known in the art and can be used for local communication between WDS 6 and DRDs 7. Memory 30 is also available at the DRD 7 to store applications, data, DRD profile information, passcode-related tools and other information and tools necessary for the DRD 7 to operate and communicate. The microprocessor 24 provides management and control over the DRD 6 and its components. Management and control over the DRD 7 and data can be through the UI 22 and/or WD 6.

DRDs 7 can be easily locatable using network 28 resources and/or WDs 6, Information related to a DRD's physical location and rendering capabilities, for example, can be registered at network 28 resources (e.g., an HLR) supporting network communication with the DRD 7. DRD information regarding capabilities can also be held within DRD memory 30 for retrieval by the network and/or WD 6. In accordance with this aspect of the present invention, WD proximity-based DRD locating/finding technology should enable WD users to locate available DRDs 7 based on a DRD's 7 proximity to the a roaming WD's location (e.g., determinable by GPS) and/or profile information. Profile information related to the DRD 20 can be provided from memory 30 at the DRD 20 and/or through the network 28. User/WD 6 location information can be determined via networks in communication with the user's WD 6. The user can choose to render data at the DRD 7 suggested by the network. Several DRDs can be identified by the network 28 for selection by the WD user. DRD brokering and location functionality can be included in familiar rendering devices (e.g., Internet Kiosks, printers, photocopiers, fax machines, automatic teller machines (ATMs), video monitors, projectors used in conference rooms and other multimedia-enabled devices) that are IR, RF and/or network communication enabled. DRDs can be public or exclusive to an enterprise. Other DRD compatible devices are foreseeable given the various aspects of the present invention taught herein.

A block diagram of some of the components that can be included in a WD 6 are illustrated in FIG. 3. Referring to FIG. 3, a WD 6 will include a communications means 31, microprocessor 35, and memory 36. The communications means can include IR 32, RF 33 and mobile network RF communications modules 34. The WD 6 can have a broad RF 33 and/or IR 32 signal recording learning capabilities under the control of the microprocessor 35 utilizing the WD memory 36 for signal storage. The WD can be programmed/provided with unique control functions and/or signals applicable to a particular DRD 7 selected for use by the WD 6. Control functions can be recorded by the WD 6 memory 36 after being obtained by the communications means 31. A WD 6 can be provided with unique DRD control signals from the network or by requesting a temporary copy of DRD 7 control functionality directly from the DRD 7, in which case the DRD 7 can upload, via IR or RF communication, a copy of DRD programmable functions to the WD. It would be desirable for basic DRD functions and signaling to become standardize so that WDS and DRDs can interact with ease. WD and DRD location information can be coordinated/facilitated with the assistance of a locator module 37. The locator module 37 can be used to incorporate device-based GPS resources and/or to store locator programs and functions. The memory 36 can be used to store, for example, data, profile information, passcode information (including COMSEC) and programmable functions associated with IR and RF control over and communication with remote controlled devices (in addition to the DRD).

In addition to memorizing DRD 7 control signals and functions, a WD 6 having signal recording capabilities can be programmable to facilitate user control over other devices having wireless remote control capabilities. A WD 6 can learn device signals and functions associated with controlled devices by being programmed with applicable remote control signals. RF/IR signals can be learned and stored in WD memory and associated functionality can be assigned to optional/additional WD menu functions or UI controls. A WD can thereby be adapted to communicate with diverse remote controlled devices (e.g., secured entry (garage doors, gates, etc), entertainment devices (games, TV, audio) and alarm control (home, vehicle)).

Another aspect of the present invention can provide users with passcode protected retrieval of data from the DRD 7. The passcode can be provided to the DRD 7 prior to data rendering and/or retrieval from the network 28. The authorization module 21 can facilitate passcode interaction at the DRD 20. A user can provide passcode information at the UI 22 and/or through a WD 6. The passcode can be verified at the network 28 (e.g., HLR) or by the DRD 7 (e.g., referencing DRD memory 20). Passcode information and verification can include the use of biometrics (e.g., voice, retinal, fingerprint) and/or communication security (COMSEC) methods. Passcode control can also be provided over use of the WD 6. For example, a passcode can be required before a WD user can use the WD to communicate with and control diverse remote controlled devices as described above (e.g., controlling security alarms and secured entry devices).

Referring again to FIG. 2, a temporary memory 20 can be located at the DRD as a means for providing additional dedicated security over user data. The temporary memory 20 can be used for temporary storage of user data provided to the DRD 7 for rendering on behalf of the WD user. The memory 20 holding the data can be permanently cleared of the data (also referred to “zeroing” the memory) through methods known in the art (e.g., electrical potential used to clear electronic memory registers). Zeroing the memory will ensure that data can not be reused by a subsequent user of the DRD. Memory 20 can be cleared upon: termination of use by the user, after a period of time (e.g., based on failure to render data or log-off) and/or upon user selection of a memory clearing operation at the DRD.

Methods of communications security (COMSEC) can also be incorporated into the DRD 7 to provide secure retrieval/use of data. Using encryption/decryption (also referred to as cryptography or “Crypto”) methods, a user can be required to provide a DRD 7 with decryption codes to render data. Encryption/decryption coding can be provided by the network 28 (service provider) with data being transmitted at the request of the WD 6. The network 28 can generate data in encrypted form and provide the encrypted data to the DRD 7 through the network 28. The network can also provide the WD 6 (e.g., can be stored in WD memory 36) with decryption codes needed to render encrypted data at the DRD 7. The user can transmit decryption codes to the DRD 7 directly via the WD 6 (e.g., IR or RF transmission).

Another aspect of the present invention provides simultaneous display of data at DRDs and WDs, which can be referred to as data mirroring or video mirroing. Such capability can be most relevant where WDs and DRDs possess compatible display technologies. In accordance with simultaneous display, another aspect of the present invention enables WD 6 control and/or manipulation of data displayed on a DRD 7. WD 6 control can be provided via IR/RF communication with a DRD. The WD 6 can host the networks retrieval of data for redisplay on DRD 7 via simultaneous WD-DRD communication (e.g., IR and/or additional RF capacity) and/or WD-network communication via cellular RF capability. Simultaneous network and DRD communication by the WD 6 would be possible where more than one RF transmitter/receiving capability can be provided with the WD 6 (as shown in FIG. 3).

Another aspect of the present invention provides a payment mechanisms and/or billing methods associated with DRDs. Payment mechanisms can be incorporated at the DRD 7 and managed by the microprocessor 24 and authorization module 21. A DRD 7 can accept currency and/or provide for electronic debits (e.g., e-money, account debits, etc.) through the payment mechanism. For example, an ATM machine can provide DRD capabilities and allow users to be billed a transaction fee via bank account cards (e.g., ATM, Debit and Credit cards). Another public device that can provide DRD capabilities are public telephones, which can allow users to make rendering related transaction payments via payment mechanisms or be biped via communication service accounts or arrangements. The DRD can also authorize operations through billing arrangements (e.g., prepaid services). DRD services/capabilities do not have to be billed to a WD/DRD user in company environments where the users and/or WD is recognized, by the network and/or DRD, as an authorized member of an organization. An example of a device that is generally available throughout large organizations and that can be suitable for DRD applications is a photocopier.

Another aspect of the present invention can enable office hardware such as photocopiers, printers, PCs, monitors, multimedia projectors, and TV monitors to be incorporated with DRD methodologies described herein. For example, presentation projectors typically used in conference room scenarios are already generally capable of being connected to laptops for the purpose of displaying electronic information. DRD compatible software and hardware can be integrated within and/or connected to a multimedia projector to enable a WD to display data via the projector. Another aspect of the presentation in such a setting would allow several WD users to interact with the DRD simultaneously. Simultaneous, multi-WD user interaction together with dedicated computing capability can enable conference participants to interact with each other and displayed data and/or project independent data for comment by participants. In accordance with another aspect of the present invention, computing capability necessary to host a multi-WD user session with a DRD can be provided via networked or dedicated DRD processing capabilities (e.g., a host computer or network connection to the DRD) or via a user's WD acting as the host of the multi-WD session. The host could generally be responsible for presenting the data (e.g., the image of interest to the audience) and selectively archiving participant changes and/or multi-WD interaction with the data.

In accordance with aspects of using the present invention methods of use will now be described. Referring to FIG. 4, a WD user can generally render data at an unassigned DRD by selecting data for rendering using a WD 41 (e.g., through the WDs associated UI). Once data has been selected, the user issues a command at the WD to provide data 42 to the DRD. Data can be provided directly to the DRD by the WD, or via a network supporting the WD.

Referring to FIG. 5, when a WD is providing data directly to a DRD (e.g., via IR or RF communications) some additional steps can be required by the WD prior to providing data to the DRD. After the user selects data at the WD 51, but before data is provided to the DRD 53 at the direction of the WD, the WD achieves communication with the DRD 52. Once communication has been established 52, the WD provides the DRD with data 53. The DRD can verify to the WD 54 that it received the data. The DRD then renders the data 55 after it is received (generally at the command of the user).

A WD user can generally invoke the services of any DRD, public or private, using methods of WD, DRD and Network interaction further described below. A WD user can render the data directly at the DRD if its location is known to the user, or the user can request networks in communication with the WD for assistance in locating an appropriate DRD. DRD location can be based on the user's location or a user's (or hand held wireless device's) proximity to DRDs (known because of location in close proximity to the DRD (as in the same room), or determinable by the network or WD) and/or can be based on user requirements provided to the network or embodied in a WD user profile.

Referring to FIG. 6, a user selects data for rendering at a WD 61. If the user does not know the location of a DRD, the user can request network assistance in identifying the location and/or capabilities of a DRD 62. Once an acceptable DRD has been selected, the user can request the network to transfer the data to the DRD 63. Referring to FIG. 7, the WD can first be used by the WD user to request network assistance in locating an appropriate DRD 71. After the DRD has been located 71, data for rendering can be selected at the WD 72 and the network requested to transfer the data to the DRD 73.

Prior to actual transmission of data to the DRD, the DRD can require security passcode (e.g., including any of: passcode, biometrics and/or COMSEC) for transfer and rendering to occur. The WD device user can provide the passcode at the DRD's physical location prior to data transfer and rendering. Referring to FIG. 8, data is selected at the WD for transfer to a DRD via networking 81. Data is then transferrable to the DRD via network 82. Although data can be transferred and eventually rendered at the DRD 84 without a passcode, a passcode can be required 83. The passcode can be entered at the DRD prior to data transfer 82, or prior to data rendering 84 at the DRD. If a passcode is required, data will be rendered by the DRD 85 after the passcode has been entered. The passcode can be entered using a DRD user interface or via direct (local) communication to the DRD by the WD.

When the network is requested to assist the WD in locating a DRD, the network can select a DRD for the WD based only on the WDs proximity to the DRD. The network, however, can utilize more than just a WD x, y location within a geographic region based on GPS to find an appropriate DRD for the WD. DRD selection can be based on a profile. Referring to FIG. 9, a network server can receive a request from a WD for DRD location based on a profile 91. Profile information can be located in a database (HLR) accessible to the server and/or transferred by the WD as part of the request for assistance. The profile can include new requirements issued by the user regarding locating an appropriate DRD. After the server receives the request, the server locates and identifies a DRD to the WD matching the profile 92. The server sends DRD location information to the WD 93. DRD location information can include address information, driving directions and/or a map. Such information is already available from some Internet websites providing directions/maps. With the present invention, however, the user does not have to provide known WD location information. The server can utilize WD location information known by the server (e.g., based on GPS) to generate directions and/or maps provided to the WD to locate the appropriate DRD.

Referring to FIG. 10, a flow diagram of DRD location and data delivery is illustrated. At the WD the user wanting to render data at a DRD can request the network to find a DRDs location 101. A network server will assist the WD as provided in FIG. 9. The WD will receive DRD location information provided by the network 102. After DRD location is determined, the WD can have data delivered to the DRD either: directly from the WD 103 after physically locating the DRD, or via a request for data delivery through the network 104. If data is provided directly from the WD to the DRD, data can be rendered by the DRD 107 after receiving the data transferred by the WD. If data delivery through the network 104 is chosen, the WD/user can be required to enter a passcode to the DRD 105 prior to receiving data delivery at the DRD 104 and/or prior to requesting rendering to the DRD 106. After the rendering request is provided 106, and appropriate passcode authorization received 105 (if applicable), the DRD renders the data 107.

Referring to FIG. 11, The DRD can be required to verify/authorize data receipt and/or rendering. The request for data receipt and/or rendering can be initiated by the WD/user at the DRD 111. The DRD can request the WD/user to enter a passcode 113 either before the DRD receives data 112, or before data is requested by the WD/user to be rendered by the DRD 114.

Although a DRD may seem appropriate for temporary assignment to the WD/user for data rendering because of its proximity to and/or profile match with the WD/user, it may not be available for rendering. For example, a DRD may not be available for rendering because it is out of service or has already reached its schedules/queued/potential capacity for data delivery/rendering based on a report by dedicated status monitoring means at the DRD. Referring to FIG. 12, a DRD receives a network request for the DRD to receive/render data 121 associated with a WD. The DRD will verify its availability and either approve or deny delivery 122. If delivery is denied, a rejection is provided to the network 123 (e.g., to the requesting server). If the DRD accepts delivery/rendering an approval is sent to the network 124. The network can then send data to be received by the DRD 125. The DRD can then render the data in accordance with other described methods.

The embodiments and examples set forth herein are presented to best explain the present invention and its practical application and to thereby enable those skilled in the relevant art to make and utilize the invention. The skilled in the art, however, should recognize that the foregoing description and examples have been presented for the purpose of illustration and example only. Other variations and modifications of the present invention will be apparent to those of skill in the art, and it is the intent of the appended claims that such variations and modifications be covered. The description as set forth is not intended to be exhaustive or to limit the scope of the invention. Many modifications and equivalent variations are possible in light of the above teaching without departing from the spirit and scope of the following claims. It is contemplated that the use of the present invention can involve components having different characteristics. It is intended that the scope of the present invention be defined by the claims appended hereto, giving full cognizance to equivalents in all respects. 

What is claimed is:
 1. A portable, wireless transmitter for enabling access to secured entries, comprising: a controller; a user interface including at least three button switches in communication with said controller; a memory accessible by said controller and storing unique signals for more than one secured entry and used for transmission by a wireless transmitter and for storing unique entry patterns provided on more than one of said at least three button switches, wherein said controller has access to said memory and is adapted to provide at least one unique signal to a wireless RF transmitter in response to unique entry patterns physically entered on said at least three button switches and wherein said controller becomes inoperable when a pattern not stored in memory is physically entered more than once on said at least three button switches; and a wireless RF transmitter adapted to transmit at least one unique radio frequency provided from said controller to at least one secured entry selected from the user interface by physical entry on said at least three button switches of the unique entry pattern associated with the at least one entry.
 2. The portable, wireless transmitter for enabling access to secured entries of claim 1, wherein said user interface includes at least three button switches and said unique entry pattern is a number or letter character pattern entered on said at least three button switches by a user and said unique entry pattern is associated with a secured entry selected from more than one secured entry, wherein each secured entry is associated with its own unique entry pattern entered on a combination of the at least three button switches labeled by number or letter characters.
 3. A portable, wireless transmitter for enabling access to secured entries, comprising: a controller; a user interface in communication with a controller and including at least three button switches, wherein each of said at least three button switches are marked with number or letter characters; a memory accessible by said controller and adapted to store unique signals associated with more than one secured entry and used for transmission by a wireless transmitter to wireless receivers associated with the more than one secured entry and for storing unique entry patterns provided on said user interface that are further associated with the unique signals that are each associated with the more than one secured entry; and a wireless RF transmitter in communication with said controller, wherein said controller matches a unique entry pattern provided as input signals from the at least three button switches with unique entry patterns stored in said memory and provide at least one of the unique signals associated with the unique entry pattern obtained from memory to the wireless RF transmitter for transmission to a secure entry receiver if unique entry patterns entered on said user interface match stored unique entry patterns associated with the a unique signal recognized by the secure entry, otherwise said controller become inoperable when a pattern not stored in memory is physically entered more than once on said at least three button switches.
 4. A method using a portable, wireless transmitter for authorized access to secured entries, comprising: providing a portable, wireless remote control including a controller, a user interface in communication with a controller, a wireless transmitter in communication with said controller and a memory accessible by said controller and adapted to store unique signals used for transmission by said wireless transmitter and for storing unique entry patterns provided by a user on at least three buttons associated with said user interface; initiating said portable, wireless remote control in association with a unique signal that is further associated with a secured entry by accepting an initial unique entry pattern from a user on the at least three buttons of said user interface and storing the initial unique pattern in memory, and repeating initiation for more than one secured entry; and using said portable, wireless remote control after initiation to gain access to a secure entry selected from more than one secured entry with unique signals stored in the portable, wireless remote control, wherein said controller matches a unique entry pattern entered by a user on the at least three buttons with the initial unique entry pattern stored in said memory and provides at least one of said unique signals obtained from memory to a wireless RF transmitter for transmission to a secure entry receiver if unique entry patterns pattern matches the secured entry and send a unique signal recognized by the secure entry receiver, otherwise said controller become inoperable when a pattern not stored in memory is physically entered more than once on said at least three button switches. 