Alert options for electronic-paper verification

ABSTRACT

A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is related to, claims the earliest availableeffective filing date(s) from (e.g., claims earliest available prioritydates for other than provisional patent applications; claims benefitsunder 35 USC §119(e) for provisional patent applications), andincorporates by reference in its entirety all subject matter of theherein listed application(s) to the extent such subject matter is notinconsistent herewith; the present application also claims the earliestavailable effective filing date(s) from, and also incorporates byreference in its entirety all subject matter of any and all parent,grandparent, great-grandparent, etc. applications of the herein listedapplication(s) to the extent such subject matter is not inconsistentherewith.

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation in part of the followingcurrently co-pending commonly owned United States patent applications.The subject matter of the applications listed below are incorporated byreference in their entirety in the present application to the extentsuch subject matter is not inconsistent herewith.

Ser. No. 11/040,497 filed 20 Jan. 2005, entitled “Semi-PermanentElectronic Paper” naming Edward K. Y. Jung, Royce A. Levien, Mark A.Malamud, Kenneth B. Paley, John D. Rinaldo, Jr. and Clarence T. Tegreeneas inventors, which is currently co-pending, or is an application ofwhich a currently co-pending application is entitled to the benefit ofthe filing date.

Ser. No. 11/041,510 filed 21 Jan. 2005, entitled “Permanent ElectronicPaper” naming Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, JohnD. Rinaldo, Jr. and Clarence T. Tegreene as inventors, which iscurrently co-pending, or is an application of which a currentlyco-pending application is entitled to the benefit of the filing date.

For purposes of the USPTO extra-statutory requirements, the presentapplication constitutes a continuation of co-pending commonly owned Ser.No. 11/129,020 filed 12 May 2005, entitled “Alert Options forElectronic-Paper Verification” naming Edward K. Y. Jung, Royce A.Levien, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, which iscurrently co-pending, or is an application of which a currentlyco-pending application is entitled to the benefit of the filing date,which application is incorporated herein by reference.

The present application is also related to the following commonly ownedco-pending United States patent applications. The subject matter of theapplications listed below is incorporated by reference in its entiretyin the present application to the extent such subject matter is notinconsistent herewith.

Ser. No. 11/129,680 filed on 12 May, 2005, entitled “Write Accessibilityfor Electronic Paper”, naming Edward K. Y. Jung, Royce A. Levien, MarkA. Malamud, and John D. Rinaldo, Jr. as inventors, attorney docketnumber 0404-003-024A-000000, which is currently co-pending, or is anapplication of which a currently co-pending application is entitled tothe benefit of the filing date.

Ser. No. 11/638,095 filed on 12 Dec. 2006, entitled “Write Accessibilityfor Electronic Paper”, naming Edward K. Y. Jung, Royce A. Levien, MarkA. Malamud, and John D. Rinaldo, Jr. as inventors, attorney docketnumber 0404-003-024A-000001, which is currently co-pending, or is anapplication of which a currently co-pending application is entitled tothe benefit of the filing date.

Ser. No. 11/639,385 filed on 13 Dec. 2006, entitled “Write Accessibilityfor Electronic Paper”, naming Edward K. Y. Jung, Royce A. Levien, MarkA. Malamud, and John D. Rinaldo, Jr. as inventors, attorney docketnumber 0404-003-024A-000002, which is currently co-pending, or is anapplication of which a currently co-pending application is entitled tothe benefit of the filing date.

The United States Patent Office (USPTO) has published a notice to theeffect that the USPTO's computer programs require that patent applicantsreference both a serial number and indicate whether an application is acontinuation or continuation-in-part. Stephen G. Kunin, Benefit ofPrior-Filed Application, USPTO Official Gazette Mar. 18, 2003. Thepresent Applicant Entity (hereinafter “Applicant”) has provided above aspecific reference to the application(s) from which priority is beingclaimed as recited by statute. Applicant understands that the statute isunambiguous in its specific reference language and does not requireeither a serial number or any characterization, such as “continuation”or “continuation-in-part,” for claiming priority to U.S. patentapplications. Notwithstanding the foregoing, Applicant understands thatthe USPTO's computer programs have certain data entry requirements, andhence Applicant is designating the present application as acontinuation-in-part of its parent applications as set forth above, butexpressly points out that such designations are not to be construed inany way as any type of commentary and/or admission as to whether or notthe present application contains any new matter in addition to thematter of its parent application(s).

TECHNICAL FIELD

This application relates generally to data on electronic paper (e-paper)material and e-paper documents.

BACKGROUND

Electronic paper (sometimes also called electric paper and e-paper) hasbegun to replace legacy paper as an information source. It has many ofthe attributes of paper. For example it is writable, reflective andstable. Electronic paper can also be configured as a flexible and thinsheet, like paper.

Electronic paper can be used as an information source to be written toby multiple entities. In some circumstances a reader of electronic paperwill want to reliably understand that a specific entity has written aparticular type of information, and/or that a particular region of theelectronic paper has been written to by a particular entity, or has beenwritten subject to the occurrence of a specific event.

SUMMARY

Methods and systems for indicating a verification status of an e-paperdocument related to an associated item, as disclosed herein, may takedifferent forms. For example, some embodiments provide a sensor devicefor scanning encrypted or encoded information incorporated in thee-paper document, and a processor unit for performing a securityvalidation on the encrypted or encoded information. An alert indicatoron the e-paper document provides a first output responsive to thesecurity validation performed by the processor unit.

Other aspects may be implemented in a method for providing verificationstatus for an e-paper document associated with an item, wherein themethod includes periodically monitoring encrypted or encoded dataindicia on the e-paper document, and detecting an unauthorized accessand/or unauthorized alteration to the encrypted or encoded data indicia.An automatic status output alert is generated based on a result obtainedby the detecting.

Some implementations disclosed herein include a method for providingverification status for an e-paper document associated with an item. Themethod may include scanning encrypted or encoded data indicia on thee-paper document, and making a validation determination of whether theencrypted or encoded data indicia has been altered. The method mayfurther provide a status output based on a result obtained by thevalidation determination.

Some embodiments are implemented in a computer program product withprogram instructions configured to perform a process that associatesinformation in a computer system. An exemplary process may includescanning one or more types of encrypted or encoded data indicia on ane-paper document associated with an item or product or container orpackage, and making a validation determination of whether the encryptedor encoded data indicia has been altered. A status output is providedthat is based on a result obtained by the validation determination.

The computer program product may also include a computer-readablesignal-bearing media bearing the program instructions. Thesignal-bearing may include storage media and/or communication media.

Additional features, aspects and benefits will be understood by thoseskilled in the art from the following drawings and detailed descriptionfor various exemplary and preferred embodiments.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is an embodiment of an illustrative product container havingdisposed thereon an electronic paper label and an embodiment of acoupled circuit disposed thereon to conditionally disenable an entityfrom writing to a specific region of the electronic paper.

FIG. 2 is a block diagram of an embodiment of an electronic papershowing a circuit to fix a region of the electronic paper from beingfurther written to.

FIG. 3 is a top view diagram of an embodiment of an electronic paperpartitioned into illustrative regions, coupled to a block diagram of anembodiment of a downloading circuit.

FIG. 4 is a top view diagram of an embodiment of an electronic paperpartitioned into illustrative regions, coupled to a block diagram ofanother embodiment of a downloading circuit

FIG. 5 is a top view diagram of an embodiment of an electronic paperpartitioned into illustrative regions, coupled to a block diagram of anembodiment of a circuit to conditionally disenable an entity fromwriting to a specific region of an electronic paper.

FIG. 6 is a block diagram of an embodiment of a circuit to control thewriting of an image on regions of an electronic paper.

FIG. 7 is a flow chart of an embodiment of a method of using electronicpaper and the actions of a circuit configured to control the writing ofan image on a region of the electronic paper.

FIGS. 8A and 8B are a flow chart of another embodiment of a method ofusing electronic paper and the actions of a circuit configured tocontrol the writing of an image on a region of the electronic paper.

FIG. 9 is a flow chart of yet another embodiment of a method of usingelectronic paper and the actions of a circuit configured to control thewriting of an image on a region of the electronic paper.

FIG. 10 shows a high-level logic flowchart of a process.

FIG. 11 depicts a high-level logic flowchart illustrating alternateimplementations of the process of FIG. 10.

FIG. 12 illustrates a high-level logic flowchart illustrating alternateimple 10.

FIG. 13 is a schematic block diagram for a further embodiment showingread/write accessibility to electronic paper material.

FIG. 14 is a schematic block diagram showing an exemplary embodimentthat includes status indicators for verification of information onelectronic paper material.

FIG. 15 is a schematic block diagram showing another exemplaryembodiment that includes a reader/scanner unit that is operably coupledwith a first status indicator.

FIG. 16 is a schematic block diagram showing additional exemplaryembodiment that includes a reader/scanner unit that is operably coupledwith a second status indicator.

FIGS. 17 and 18 are top view diagrams that schematically show differentexemplary implementations of data and authentication indiciaincorporated on electronic paper material.

FIG. 19 is a top view diagram that schematically shows an exemplaryimplementation of authentication indicia incorporated on a label-type ofelectronic paper material attached to an associated item, product,container or package.

FIG. 20 is a side view diagram that schematically illustrates differenttypes of verification coupling links between a label-type of electronicpaper material and an attached or associated item, product, container orpackage.

FIG. 21 is a schematic block diagram for an exemplary electronic papersystem that includes an alert device.

FIG. 22 is a schematic diagram for an exemplary alert device with anindicator that receives status information regarding multiple types ofe-paper verification problems.

FIG. 23 is a schematic diagram for another exemplary alert device withseparate indicators respectively provided for different types of e-paperverification problems.

FIG. 24 is a diagram illustrating different exemplary integrationschemes for encoded or encrypted indicia on e-paper material.

FIGS. 25A, 25B and 25C are schematic block diagrams showing differentexemplary implementations for obtaining, processing and displayingverification status outputs from e-paper material.

FIGS. 26, 27 and 28 are schematic block diagrams showing differentexemplary embodiments with various verification component locations.

FIG. 29 is a schematic flow chart that illustrates an exemplary e-paperdocument that passes through different stages of being attached to orassociated with a manufactured item.

FIG. 30 is a schematic flow chart that illustrates multiple examples ofindividual and composite e-paper documents that pass through differentstages of being attached to or associated with a manufactured andassembled device.

FIG. 31 is a high level flow chart showing an exemplary process for someembodiments.

FIG. 32 is a high level flow chart showing an exemplary processincorporated in a computer program product.

FIGS. 33-34 are more detailed flow charts showing further exemplaryprocess features for additional embodiments.

FIG. 35 is a high level flow chart showing another exemplary process forcertain embodiments.

FIG. 36 is a high level flow chart showing a further exemplary processincorporated in a computer program product.

FIGS. 37-39 are more detailed flow charts showing additional exemplaryprocess features.

FIG. 40 is a high level flow chart showing an additional exemplaryprocess for certain embodiments.

FIG. 41 is a more detailed flow chart showing other exemplary processfeatures for various embodiments.

DETAILED DESCRIPTION

Those having skill in the art will recognize that the state of the arthas progressed to the point where there is little distinction leftbetween hardware and software implementations of aspects of systems; theuse of hardware or software is generally (but not always, in that incertain contexts the choice between hardware and software can becomesignificant) a design choice representing cost vs. efficiency tradeoffs.Those having skill in the art will appreciate that there are variousvehicles by which processes and/or systems and/or other technologiesdescribed herein can be effected (e.g., hardware, software, and/orfirmware), and that the preferred vehicle will vary with the context inwhich the processes and/or systems and/or other technologies aredeployed. For example, if an implementer determines that speed andaccuracy are paramount, the implementer may opt for a mainly hardwareand/or firmware vehicle; alternatively, if flexibility is paramount, theimplementer may opt for a mainly software implementation; or, yet againalternatively, the implementer may opt for some combination of hardware,software, and/or firmware. Hence, there are several possible vehicles bywhich the processes and/or devices and/or other technologies describedherein may be effected, none of which is inherently superior to theother in that any vehicle to be utilized is a choice dependent upon thecontext in which the vehicle will be deployed and the specific concerns(e.g., speed, flexibility, or predictability) of the implementer, any ofwhich may vary. Those skilled in the art will recognize that opticalaspects of implementations will typically employ optically-orientedhardware, software, and or firmware.

Those skilled in the art will recognize that it is common within the artto describe devices and/or processes in the fashion set forth herein,and thereafter use standard engineering practices to integrate suchdescribed devices and/or processes into data processing systems. Thatis, at least a portion of the devices and/or processes described hereincan be integrated into a data processing system via a reasonable amountof experimentation. Those having skill in the art will recognize that atypical data processing system generally includes one or more of asystem unit housing, a video display device, a memory such as volatileand non-volatile memory, processors such as microprocessors and digitalsignal processors, computational entities such as operating systems,drivers, graphical user interfaces, and applications programs, one ormore interaction devices, such as a touch pad or screen, and/or controlsystems including feedback loops and control motors (e.g., feedback forsensing position and/or velocity; control motors for moving and/oradjusting components and/or quantities). A typical data processingsystem may be implemented utilizing any suitable commercially availablecomponents, such as those typically found in datacomputing/communication and/or network computing/communication systems.

The herein described aspects and drawings illustrate differentcomponents contained within, or connected with, different othercomponents. It is to be understood that such depicted architectures aremerely exemplary, and that in fact many other architectures can beimplemented which achieve the same functionality. In a conceptual sense,any arrangement of components to achieve the same functionality iseffectively “associated” such that the desired functionality isachieved. Hence, any two components herein combined to achieve aparticular functionality can be seen as “associated with” each othersuch that the desired functionality is achieved, irrespective ofarchitectures or intermedial components. Likewise, any two components soassociated can also be viewed as being “operably connected”, or“operably coupled”, to each other to achieve the desired functionality,and any two components capable of being so associated can also be viewedas being “operably couplable”, to each other to achieve the desiredfunctionality. Specific examples of operably couplable include but arenot limited to physically mateable and/or physically interactingcomponents and/or wirelessly interactable and/or wirelessly interactingcomponents and/or logically interacting and/or logically interactablecomponents.

Those skilled in the art will recognize that some aspects of theembodiments disclosed herein can be implemented in standard integratedcircuits, and also as one or more computer programs running on one ormore computers, and also as one or more software programs running on oneor more processors, and also as firmware, as well as virtually anycombination thereof. It will be further understood that designing thecircuitry and/or writing the code for the software and/or firmware couldbe accomplished by a person skilled in the art in light of the teachingsand explanations of this disclosure.

Referring to FIG. 1, there is shown an embodiment of a product container110. A product container 110 may illustratively contain a pharmaceuticalto be provided to a consumer by a drugstore, a foodstuff, a manufacturedproduct, or a communication medium such as a book or a DVD, and mayillustratively be provided by a manufacturer, a wholesaler, a retailer,or a lending entity.

The product container 110 has disposed thereon an electronic paper 120.In an embodiment, the electronic paper 120 may be illustrativelyalternatively disposed on, or attached to, the product. The electronicpaper 120 may function as a label, or some other indicator or source ofinformation associated with the product. The electronic paper hasregions illustratively portrayed as a first region 130, as a secondregion 140, and as a third region 150. In some embodiments, each region130, 140, 150 may be written to by a specific entity. For instance, inan illustrative operation of the electronic paper 120, the first region130 may be written to by a supplier of the product to a vendor, such asby a manufacturing entity or by a wholesaling entity. The second region140 may be written to by a vendor of the product to a consumer, such asby a retailing entity or by a renting entity. The third region 150 maybe written to by a consumer entity or by a purchaser of the productentity. In some embodiments, a region 130, 140, and/or 150 of theelectronic paper 120 may be configured to have a visually distinctappearance from the remainder of the electronic paper. In someembodiments, the visually distinct appearance may be a background hue ofa character written in a pixel of the region. In some embodiments, thevisually distinct appearance may be a visual border of the region.

Some illustrative embodiments of electronic paper may includeindependently addressable and controllable pixels. In some embodiments,each pixel may include a pair of opposed electrodes disposedorthogonally to the surface of the paper. Each pixel may include anelectrophoretic colored ink particle disposed in a region between theelectrodes. When a field is applied between the electrodes, the inkparticle in response migrates toward or away from an electrode, makingthe color of the ink particle visible or not visible to a readerobserving the electronic paper. In some embodiments, each pixel mayinclude a pair of opposed electrodes disposed orthogonally to thesurface of the paper, each having an ink that includes a multicoloredelement. The ink may be configured to be rotatable in response to afield. Upon application of the field between the orthogonally disposedelectrodes, the element will rotate according to the interaction of itsdipole and the polarity of the field, to present a region to the surfaceof the electronic paper visible to a reader observing the electronicpaper. In some embodiments, the electronic paper has ambient lightbehavior, being easier to see the brighter the ambient light. Moreover,in some embodiments the ink is stable in each pixel state so that theelectronic paper consumes substantially little or no power inmaintaining a pixel state.

In some embodiments of operation of the electronic paper 120, in anembodiment in which illustratively the electronic paper 120 is a labelon a product container 110 for containing a pharmaceutical, the firstregion 130 may be for writing by the manufacturing entity and maycontain such information as the potency of the enclosed pharmaceuticaland the contraindications associated with the pharmaceutical. The secondregion 140 may be for writing by a drugstore entity, and may containsuch information as the dosage and the usage instructions associatedwith the pharmaceutical. And the third region 150 may be for writing bya patient entity, and may contain such information as the times at whichthe patient has consumed or is scheduled to consume the pharmaceutical.Thus, in some embodiments each region may be exclusively written to by aspecific entity.

In some embodiments, the electronic paper 120 may be configured toreceive a signal indicating an image to be written on the first region130, the second region 140, and/or the third region 150; and to causethe indicated image to be written on the electronic paper 120. Thesignal is termed herein an image indicating signal.

In some embodiments, the image indicating signal may be illustrativelyformatted to indicate an image corresponding to the respective pixels ofthe electronic paper 120, such as a pixel map, or may be formattedaccording to some other format, such as a page description languagerepresentation format, or a picture editing application representationformat (such as a graphics application format, an image editingapplication format, a painting application format, an illustrationapplication format, a drafting application format, a CAD applicationformat, a diagramming application format, or the like). In someembodiments, the electronic paper 120 may have an associated circuit todecode the image indicating signal, and to address a control signal toeach pixel indicated by the image indicating signal.

In some embodiments, the electronic paper 120 may include pixel addresslines, each able to couple to an external coupling structure 170. Theexternal coupling structure 170 may be configured to transmit the imageindicating signal to the electronic paper 120 by communicating with eachcoupled address line. In this embodiment, the image indicating signalmay include a separate signal for each pixel, transmitted to the properaddress lines by the external coupling structure 170.

Illustratively, in some embodiments, coupled to the electronic paper 120may be a circuit 160 configured to control the writing of an image tothe illustrative regions 130, 140, and 150 of the electronic paper 120.In some embodiments, at least a portion of the circuit 160 may bedisposed on, without, and/or within the electronic paper 120. In someembodiments, the circuit 160 may be disposed on or within the productcontainer 110, or other structure to which the electronic paper 120 isattached. The circuit 160 may be coupled to the electronic paper 120across the external coupling structure 170. The circuit 160 may beconfigured to receive an image indicating signal from an imageindicating signal downloading circuit 180 across another couplingstructure 190. The coupling structure 190 in some embodiments includesillustratively a bus, a wireless connection, and/or a network fortransmitting the image indicating signal from the image indicatingsignal downloading circuit 180 to the circuit 160, or to the electronicpaper 120.

The circuit 160, in some embodiments, may be configured to control thewriting of the image by an entity to at least one of the regions 130,140, and 150, by conditionally disenabling the entity from writing tothe region. As used herein, the term disenabling may include preventingor making something unable to operate; and may include disabling, notgenerating, and the like. In some embodiments, the circuit 160 may beconfigured to disenable an entity from writing to a region of theelectronic paper 120 by not transmitting a received image indication(from the image indicating signal downloading circuit 180) to theelectronic paper 120. Some embodiments of the circuit 160 and theactions it may be configured to perform are described below, as well aswith reference to FIGS. 5, 6, 7A and 7B, and 8 below.

An example of conditional disenabling is to disenable some or allentities from writing to at least one specific region such that one ormore specific entities may write to the specific region. For instance,as described above, each region may to be written to by a definedspecific entity. Illustratively, the first region 130 may be for writingto by a defined manufacturing entity, the second region 140 may be forwriting to by a defined drugstore entity, and the third region 150 maybe for writing to by a patient entity, and other entities may bedisenabled from writing to the regions. For example, a manufacturingentity may be disenabled from writing to the second region 140 and thethird region 150, the drugstore entity may be disenabled from writing tothe first region 130 and the third region 150, and the patient entitymay be disenabled from writing to the first region 130 and the secondregion 140. As another example of conditional disenabling, a specificregion may be disenabled from being written to by specific entities (orequivalently, a specific entity may be disenabled from writing to aspecific region) subject to an occurrence of an event, such as an eventdefined as a region having been written to a specific number of times.In some such embodiments, and other embodiments that depend upon aregion of the electronic paper and/or an entity endeavoring to write tothe region, the circuit 160 may be configured to read from the receivedimage indicating signal an identity of the region to be written toand/or an identity of the entity endeavoring to write to the region, andto transmit an indication of the image to the electronic paper 120 forentities not disenabled from writing to a region. In anotherimplementation, the circuit 160 may be configurable to control thesubstantially permanent writing to a specific region 130, 140, and/or150 of the electronic paper 120 by disenabling an entity from writing toa region subject to the occurrence of the region having been written toa prescribed number of times, such as one time.

In some embodiments, the circuit 160 may be configured to substantiallypermanently write a specific region of the electronic paper 120. Forexample, the circuit 160 may be configured to fix an image in all orpart of the region of the electronic paper 120. Referring to FIG. 2, inan embodiment, the circuit 160 may be configured to generate and send tothe electronic paper 120, or a circuit 220 associated with theelectronic paper 120, a signal indicating the pixels 230 i-230 n (i=1 ton) of the electronic paper 120 to be fixed. In some embodiments, thecircuit 160 may be configured to generate the signal based on anidentity of the region, and/or on an identity of an entity endeavoringto write on the region as described above with reference to FIG. 1 Insome embodiment the electronic paper 120 may include a circuit 220configured to fix the electronic paper by fixing pixels of a specifiedregion of the electronic paper. Those skilled in the art will appreciatethat although circuits 160 and 220 are shown separated herein for sakeof clarity, and circuit 220 is shown as part of electronic paper 120, inother embodiments circuit 160 and circuit 220 may be combined in oneoverall circuit which can be external from or internal to electronicpaper 120 (e.g., associated with electronic paper 120). In anillustrative implementation, an individual pixel of an electronic paper120 is fixed by controlling the transmission of an image to the pixelThe circuit 220 may be configured to fix the region of the electronicpaper 120 from being to by illustratively opening the transmission pathto the pixels 230 i-230 n subsequent to information being writtenthereto (e.g., by circuit 160), so that the information previouslywritten to the pixels 230 i- 230 n may be regarded as substantiallypermanent As a specific example of the foregoing, one or more voltagesto be provided to one or more of the pixels 230 i-230 n would bedisabled from being received by one or more of the pixels 230 i-230 n.

Exemplary implementations of substantially permanently writing at leastone region of electronic paper are described herein in the context of anillustrative pixel addressing scheme. In an embodiment, informationwritten to at least one pixel may be rendered substantially permanent byopening an input circuit of the pixel. In another illustrativeembodiment, information written to at least one pixel may be renderedsubstantially permanent by closing a circuit to divert a signal formodifying the pixel. And in another embodiment, information written toat least one pixel may be rendered substantially permanent by activatinga switched input of the pixel.

Illustratively in an implementation of substantially permanently writingat least one region of electronic paper, a pixel may be addressed by anactive matrix addressing scheme in which a separately addressedelectrode is provided for each pixel. One implementation in which thepixel may be fixed includes a fuse to control transmission to theelectrode, so if the fuse opens, a transmission to the electrode may bedisabled. Then by controlling the current to the fuse to exceed the fusetransmission limit, the fuse is caused to open and thus the content ofthe pixel is therefore rendered substantially permanent. Similarly in animplementation, an antifuse may be configured so that if the antifusecloses, a transmission to the electrode will bypass the electrode,therefore disabling the transmission from affecting the electrodevoltage, and the thus content of the pixel is therefore renderedsubstantially permanent. Those skilled in the art will appreciate thatthis single pixel example may be replicated such that substantially anydesired pattern displayed by a collection of like configured and/orcontrolled pixels may thus be made substantially permanent. Moreover,illustratively a pixel may be addressed by a passive matrix addressingscheme in which two sets of intersecting conductors, one designated arow conductor and one designated a column conductor, together uniquelysupply a voltage to a given electrode of the pixel. The supplied voltageis the sum of the voltage of the row and the column conductors. Theelectrode is configured to retain the applied voltage. Each row orcolumn voltage is below the threshold to cause an ink to respond to thefield generated by the electrode of the pixel. However, the sum of therow and column voltages exceeds the ink response threshold. This issometimes called a threshold response behavior. One implementation inwhich the pixel may be fixed includes a fuse (or the antifuse) tocontrol transmission to the electrode, so if the fuse opens (or theantifuse closes), a transmission from the intersecting conductors to theelectrode may be disabled. Then by controlling the current to the fuse(or antifuse) to exceed the fuse (or the antifuse) transmission limit,the fuse is caused to open (or the antifuse is caused to close) and thepixel is therefore fixed from being written to. Those skilled in the artwill appreciate that this single pixel example may be replicated suchthat substantially any desired pattern displayed by a collection of likeconfigured and/or controlled pixels may thus be made substantiallypermanent. Moreover, illustratively a pixel may be addressed by a matrixaddressing scheme in which an electrically non-linear element isoperationally disposed between a supply voltage and a pixel electrode toswitch a voltage onto the electrode. In this schema, the switch mayillustratively be disabled from further switching so that the electrodemay retain its supplied voltage. This may be affected by a variety ofschema, depending upon the specific characteristics of the switch.Illustratively, if the switch is embodied as a transistor, the controlcurrent of the transistor may be controlled to disable the transistorfrom supplying the electrode with a switched voltage.

As has been described elsewhere herein, electronic paper itself has dataretention characteristics which allow information written thereto be torendered substantially permanent by effectively disabling further inputto pixels of the electronic paper once the data to be made permanent hasbeen written. In some contemplated implementations, the information maybe rendered yet more permanent by circuit 160 and or 220 (or variouscombinations or permutations thereof within the ambit of those skilledin the art) configurable to fix an image within at least a portion ofthe first region 130 by being configurable to write an image within atleast the portion of the first region and to thereafter establish one ormore assisted non-volatile signal levels to the pixels of the portion ofthe first region 130. In some implementations, the assisted non-volatilesignals are created by applying related art signal maintenancetechniques to one or more of the electronic paper pixels into whichinformation has been loaded (e.g., by applying capacitive storage and/orflash-memory like techniques to the pixels), and thereafter effectivelyrendering further input to the loaded pixels effectively inoperative.Illustrative implementations by which further input to the loaded pixelsis rendered effectively inoperative include fusing circuitry,anti-fusing circuitry, lasing circuitry, an electro-mechanical switch,and/or an electro-mechanical cutting mechanism, but those skilled in theart will recognize that other functionally interchangeable related arttechniques are also applicable. Moreover, in an embodiment the circuitry(e.g., circuits analogous to circuit 160 and/or 220 as describedelsewhere herein) may include write-once circuitry configured to permitone image to be written to the portion of the first region 130. In anembodiment, this includes circuitry configured to make static at least aportion of the first region 130. In an embodiment, this circuitry mayinclude fusing circuitry, lasing circuitry, an electro-mechanicalswitch, an electro-mechanical lead cutting mechanism, and/or circuitryto establish a non-volatile signal level. Both assisted and non-assistednon-volatile signal levels as described herein are contemplated.

Referring now to FIG. 3, in an embodiment, an illustrative electronicpaper 310 includes a finite quantity of defined regions for portrayingan image, 315A through 315XX, here illustratively portrayed as a firstregion 315A, as a second region 315B, and as a third region 315C, andillustratively other regions 315D. In an embodiment, a region 315A,315B, 315C and/or 315D of the electronic paper 310 is configured to havea visually distinct appearance from the remainder of the electronicpaper. In an embodiment, the visually distinct appearance is abackground hue of a character written in a pixel of the region. In anembodiment, the visually distinct appearance is a visual border of theregion.

The electronic paper 310 is configured to receive a signal indicating animage to be written on the first region 315A, an image to be written onthe second region 315B, and/or an image to be written on the thirdregion 315C of the electronic paper 310, termed an image indicatingsignal; and to cause the indicated image to be written on the electronicpaper 310.

In an embodiment, an illustrative downloading circuit 320 is configuredto download the image indicating signal to the electronic paper 310 foran image to be written on the first region 315A, the second region 315B,and/or the third region 315C of the electronic paper 310. Thedownloading circuit 320 may be coupled to the electronic paper 310 byway of a coupling structure 330. The downloading circuit 320 is todownload the image indicating signal across the coupling structure 330to the electronic paper 310. In embodiments, the coupling structure 330may comprise a wireless connection, a bus connection, and/or a networkas well as other structures known in this art to transmit an imageindicating signal from the downloading circuit 320 to the electronicpaper 310. In an embodiment, the downloading circuit 320 includes acircuit 340 to prepare an image indicating signal. In an embodiment, thedownloading circuit 320 further includes a coupling circuit 350 tocouple the circuit 340 to the electronic paper 310, by way of thecoupling structure 330 in a transmitting relationship from thedownloading circuit 320 to the coupling structure 330.

In an embodiment, the downloading circuit 320 includes a circuit 360configured to control the writing of an image to specified regions 315A,315B, and 315C of the electronic paper 310. In an implementation, thedownloading circuit 360 may be configured to control the writing of theimage by an entity to the specified regions, by conditionallydisenabling the entity from writing to a specific region. In animplementation, the conditional disenabling depends upon an identity ofthe region, and/or an identity of the entity. In an implementation, thedownloading circuit 360 is configurable to control the substantiallypermanent writing to a specific region 315A, 315B, and/or 315C of theelectronic paper 310.

In an embodiment, the circuit 360 controls disenabling writing an imageto the specified regions, and substantially making permanent an imagewritten to a region, by disenabling the downloading circuit 320 fromtransmitting the image indicating signal for an image to be written onthe regions 315A, 315B, and/or 315C. The circuit 360 may be configuredto disenable the downloading circuit 320 from transmitting the imageindicating signal for these regions, depending upon criteria such as theentity that is endeavoring to write on the region, the occurrence of anevent, and the identity of the region 315A, 315B, 315C to which anentity is endeavoring to write. Stated in an analogous way, the circuit360 may be configured to disenable the downloading circuit 320 fromtransmitting the image indicating signal for an entity endeavoring towrite on a region depending upon criteria such as an identity of theentity and an identity of the region, and an occurrence of an event. Anembodiment of the circuit 360 and the actions it is configured toperform are furthermore presently described with reference to FIGS. 6,7, 8A and 8B, and 9.

In an implementation, the downloading circuit 320 and/or circuit 360 mayinclude a user interface (not shown) to receive inputs from an entity,the inputs indicating an image to be written on the first region 315A,the second region 315B, and/or the third region 315C, and/or anidentification of the identity of the entity. In an implementation, thecircuit 360 may control the writing of the image to the regions 315A,315B, and 315C by algorithmically determining whether the downloadingcircuit 320 is to include the image in an image indicating signal to bedownloaded to the electronic paper 310. If the downloading circuit 320is to include the image in the image indicating signal, the circuit 360may be configured to transmit an indication of the request by the entityto the circuit 340, so that the downloading circuit 320 can download animage indicating signal for the image(s). In an implementation, if thedownloading circuit 320 is not to include the image in the imageindicating signal, the circuit 360 may be configured to not transmit anindication of the request by the entity to the circuit 340, or anothercircuit in the downloading circuit 320. In another implementation, thecircuit 360 may be configured to transmit an indication that thedownloading circuit 320 is to not download an indication of the image tothe circuit 340 or to another circuit in the downloading circuit 320. Inthis implementation, the downloading circuit 320 may include a userinterface (not shown) to receive inputs indicating an image to bewritten on the first region 315A, the second region 315B, and/or thethird region 315C, and/or an identification of the entity requesting theimage be downloaded by the downloading circuit 320 to the electronicpaper 310, depending upon a receipt of a disenabling signal from thecircuit 360.

In another embodiment, the circuit 360, the circuit 340, or anothercircuit of the downloading circuit 320 may be configured to generate andto send to the electronic paper 310, or a circuit within the electronicpaper 310, a signal indicating the pixels of the electronic paper 310 tobe fixed from being further written to, as described above withreference to FIGS. 1 and 2. In an embodiment, the circuit is configuredto fix the electronic paper 310 based on an identity of the region,and/or on an identity of an entity endeavoring to write on the region

Referring to FIG. 4, in another illustrative embodiment, there isportrayed a downloading circuit 420 to download an image indicatingsignal to the electronic paper 310 across the coupling structure 330.The downloading circuit 420 includes the circuit 340, the couplingcircuit 350, and a circuit 460. The circuit 460 is coupled to thecircuit 340 in an image indicating signal receiving relationship, and tothe coupling circuit 350 in an image indicating signal transmittingrelationship.

The circuit 460 is configured to control the writing of an image tospecified regions 315A, 315B, and 315C of the electronic paper 310. Inan implementation, the circuit 460 may be configured to control thewriting of the image by an entity to the specified regions, byconditionally disenabling the entity from writing to a specific region.In an implementation, the conditional disenabling may depend upon anidentity of the region, the occurrence of an event, and/or an identityof the entity. In an implementation, the circuit 460 is configurable tocontrol the substantially permanent writing to a specific region 315A,315B, and/or 315C of the electronic paper 310.

In an embodiment, the circuit 460 controls disenabling writing an imageto a region, and for substantially making permanent an image written toa region, by disenabling the circuit 420 from transmitting the imageindicating signal for an image to be written on the regions 315A, 315B,and/or 315C. The circuit 460 may be configured to disenable the circuit420 from transmitting the image indicating signal for these regions,depending upon criteria such as the entity that is endeavoring to writeon the region, and the identity of the region 315A, 315B, 315C to whichan entity is endeavoring to write, and an occurrence of an event. Statedin an analogous way, the circuit 460 may be configured to disenable thedownloading circuit 320 from transmitting the image indicating signalfor an entity endeavoring to write on a region depending upon criteriasuch as an identity of the entity, an identity of the region, and/or anoccurrence of an event. An embodiment of the circuit 460 and the actionsit is configured to perform are furthermore presently described withreference to FIGS. 6, 7, 8A and 8B, and 9.

The circuit 460 may be configured to receive an image indicating signalfrom the circuit 340. The circuit 460 may be configured to selectivelydownload the received image indicating signal to the coupling circuit350 for transmission to the electronic paper 310, algorithmicallydepending upon the region to which the image is to be written, theentity requesting that the image be written, and/or an occurrence of anevent. In an implementation, the downloading circuit 420 includes a userinterface (not shown) to receive inputs indicating an entity requestingthat an image be written on the first region 315A, the second region315B, and/or the third region 315C, as well as an identity of theregion, and/or an identity of the requesting entity.

In an embodiment, the circuit 460 may be configured to fix theelectronic paper 310 from writing onto the electronic paper 310, or ontoa specific region 315A, 315B, and/or 315C of the electronic paper 310,an image downloaded to the electronic paper 310. The circuit 460, oranother circuit of the downloading circuit 420, may be configured togenerate and to send to the electronic paper 310, or a circuit withinthe electronic paper 310, a signal indicating the pixels of theelectronic paper 310 to be fixed from being further written to, asdescribed above with reference to FIGS. 1 and 2. In an embodiment, thecircuit is configured to fix the electronic paper 310 based on anidentity of the region, and/or on an identity of an entity endeavoringto write on the region.

Referring now to FIG. 5, in an embodiment, a downloading circuit 520, inoperation of downloading an image indicating signal for an image to beportrayed on the first region 315A, on the second region 315B, and/or onthe third region 315C of the electronic paper 310, is coupled to theelectronic paper 310 by way of the sequential coupling of the couplingstructure 330, a circuit 560, and a coupling structure 530. Thedownloading circuit 520 is configured to download an image indicatingsignal across the coupling structure 330 to the electronic paper 310. Inembodiments, the coupling structure 530 may comprise a wirelessconnection, a bus connection, and/or a network, as well as otherstructures known in this art to transmit an image indicating signal froma circuit to an electronic paper 310. In an embodiment, the downloadingcircuit 520 is disposed on, along, or within the electronic paper 310,and is not coupled to the electronic paper 310 by the coupling structure530. In an embodiment, the downloading circuit 520 includes the couplingcircuit 350 to prepare an image indicating signal, and the couplingcircuit 350 to couple the downloading circuit 340 to the electronicpaper 310 by way of the coupling structure 330. An illustrative circuit560 is coupled to the coupling structure 330 in a signal receivingrelationship, and coupled to the coupling structure 530 in a signaltransmitting relationship, so that an image indicating signaltransmitted by the downloading circuit 520 is received by the circuit560, and selectively transmitted by the circuit 560 to the electronicpaper 310.

The circuit 560 is configured to control the writing of an image tospecified regions 315A, 315B, and 315C of the electronic paper 310. Inan implementation, the circuit 560 may be configured to control thewriting of the image by an entity to the specified regions, byconditionally disenabling the entity from writing to a specific region.In an implementation, the conditional disenabling may depend upon anidentity of the region, an occurrence of an event, and/or an identity ofthe entity. In an implementation, the circuit 560 may be configurable tocontrol the substantially permanent writing to a specific region 315A,315B, and/or 315C of the electronic paper 310. The circuit 560 isconfigured to disenable the downloading circuit 520 from transmittingthe image indicating signal for these regions, depending upon criteriasuch as the entity that is endeavoring to write on the region, theidentity of the region 315A, 315B, 315C to which an entity isendeavoring to write, and an occurrence of an event.

In an embodiment, the circuit 560 is configured to fix the electronicpaper 310 from writing onto the electronic paper 310, or onto a specificregion 315A, 315B, and/or 315C of the electronic paper 310, an imagedownloaded to the electronic paper 310. The circuit 560, or anothercircuit of the downloading circuit 520, may be configured to generateand to send to the electronic paper 310, or a circuit within theelectronic paper 310, a signal indicating the pixels of the electronicpaper 310 to be fixed from being further written to, as described abovewith reference to FIGS. 1 and 2. In an embodiment, the circuit (notshown) is configured to fix the electronic paper 310 based on anidentity of the region, and/or on an identity of an entity endeavoringto write on the region.

An embodiment of the circuit 560 and the actions it is configured toperform are furthermore presently described with reference to FIGS. 6,7, 8A and 8B, and 9.

Moreover, in an embodiment, the circuit 560 includes a first circuitconfigured to fix an image within at least a portion of the first region315A by being configurable to write an image within at least the portionof the first region and to substantially disenable further input to theat least portion of the first region 130 and/or further writing to thepixels thereof. In embodiments, the first circuit illustrativelyincludes circuitry configurable to establish a non-volatile signal levelto the pixels of the portion of the first region 315A. Illustrativeimplementations include fusing circuitry, anti-fusing circuitry, lasingcircuitry, an electro-mechanical switch, and/or an electro-mechanicalcutting mechanism to disenable writing to the specified portion of thefirst region 315A. Moreover, in an embodiment the first circuit mayinclude write-once circuitry configured to permit only one image to bewritten to the portion of the first region 315A. In an embodiment, thisincludes circuitry configured to make static the at least portion of thefirst region 315A. In an embodiment, this circuitry may include fusingcircuitry, lasing circuitry, an electro-mechanical switch, anelectro-mechanical lead cutting mechanism, and/or circuitry to establisha non-volatile signal level.

The circuit 560 may be configured to disenable the image from beingwritten on the regions 315A, 315B, and/or 315C by selectivelytransmitting a received image indicating signal. The circuit 560 may beconfigured to selectively transmit the image indicating signal dependingupon criteria such as the entity that is endeavoring to write on theregions, the identity of the region 315A, 315B, 315C to which an entityis endeavoring to download an image, and the occurrence of an event.

FIG. 6 portrays an illustrative circuit 660 configured to control thewriting of an image to specific regions of an electronic paper 610.Exemplary embodiments of such a circuit 660 have been described as thecircuit 160 with reference to FIG. 1, as the circuit 360 with referenceto FIG. 3, as the circuit 460 with reference to FIG. 4, and as thecircuit 560 with reference to FIG. 5. The circuit 660 is configured tocontrol the writing of an image to specific regions of the electronicpaper 610 by conditionally disenabling an entity from writing to aregion of the electronic paper 610.

The portrayed circuit 660 may be implemented as a programmed computer,configured to respond to an application program, and having a port tocouple the computer to the electronic paper 610 (in an embodiment) andto an image indicating signal downloading circuit 620 (in anembodiment). Exemplary embodiments of an image indicating signaldownloading circuit have been described as the image indicating signaldownloading circuit 180 with reference to FIG. 1, as the downloadingcircuit 320 with reference to FIG. 3, as the circuit 420 with referenceto FIG. 4, and as the downloading circuit 520 with reference to FIG. 5.It is specifically contemplated that other embodiments of the circuit660 may be implemented in whole or in part by finite state circuitry.

Referring to FIG. 6, the circuit 660 includes a memory 640, and aprocessor unit 615. The memory 640 is to store an application program644, and data 646 for use by the circuit 660, or to be generated by theprocessor unit 615 in executing the application program 644. Theapplication program 644 describes an algorithm to be executed by thecircuit 660 in performing the described functions of the circuit 660.Embodiments of the algorithm are illustratively described below withreference to FIGS. 7, 8A and 8B, and 9. The memory unit 640 in anembodiment includes a volatile RAM memory portion, as well as anon-volatile memory portion for storing the application program 644.Though the application program 644 may be stored in the non-volatilememory portion, the application program 644 may be executed from thevolatile RAM portion after being written into the volatile RAM portion.

The processor unit 615 includes one or more processors, each capable ofgenerally executing program instructions on data and specificallyexecuting the application program 644. In an embodiment, the processorunit 615 and the memory 640, are incorporated in a general purposecomputer system, such as in a server system, a personal computer, a mainframe system, a mid-range system, and a client system. In anotherembodiment, the processor unit 615 and the memory 640 compose a standalone dedicated computer system such as an embedded computer system anda point-of-sale system.

FIGS. 7, 8A-8B, and 9 describe respective embodiments of a method 700,800, and 900 to use electronic paper. The methods 700, 800, and 900 alsodescribe an algorithm embodied in the application program 644. In anembodiment, in support of the method 700, 800, and 900, a flag or otherdevice may be maintained to indicate whether a specific entity haswritten to a specific region of the electronic paper, so that knowledgeof whether an entity has written to a specified region is obtained byreading the flag. Moreover, in an embodiment the identity of a specifiedentity, and/or a region may be determined and maintained by way of aninput from a user interface. Furthermore, in an embodiment, the identityof a specified entity and/or region may be downloaded to the circuit 660(or other circuit of the downloading circuit 620). In an embodiment inwhich an image indicating signal is downloaded to the circuit 660, theimage indicating signal may include a field to indicate the identity ofthe entity endeavoring to write to the electronic paper, and the circuit660 may be configured to read the field.

Referring now to FIG. 7, an embodiment of method 700 to conditionallydisenable an entity from writing to a specific region of an electronicpaper is portrayed. In the method 700, the disenabling depends upon anidentity of the region and/or an identity of the entity. The methodincludes in block 710, disenabling writing to a first region of anelectronic paper after a first entity has written an image on theregion. An embodiment of the method includes an action of determiningwhether the first entity has already written to the first region, basedon whether a circuit has downloaded an image to be written to the firstregion from the first entity by way of the circuit 560. In anembodiment, the action includes providing an identity of the firstregion and the first entity to an image indicating signal downloadingcircuit or a coupling circuit, to disenable the downloading of the imageindicating signal for the image to the electronic paper. In anotherembodiment, the action includes receiving the image indicating signalfrom the downloading circuit, or the coupling circuit, and nottransmitting the signal to the electronic paper if the image is for thefirst region and written by the first entity.

In block 720, the method includes writing on a second region of thepaper if the writing entity is a specific second entity. As describedwith reference to block 710, in embodiments, the circuit 660 is todetermine whether an entity is endeavoring to write to a specifiedregion of the electronic paper. If the entity endeavoring to write tothe second region is not the second entity, in one embodiment the imageindicating signal is disenabled from being downloaded to the electronicpaper. In another embodiment, the image indicating signal is downloadedto the circuit 660, but the circuit 660 does not download the signal tothe electronic paper.

In an embodiment, the method 700 includes in block 730, writing to athird region of the paper if the writing entity is a specific thirdentity. As described with reference to block 710, in embodiments thecircuit is to determine whether an entity is endeavoring to write on aspecified region of the electronic paper. If the entity endeavoring towrite on the third region is not the third entity, in one embodiment theimage indicating signal is disenabled from being downloaded to theelectronic paper. In another embodiment, the image indicating signal isdownloaded to the circuit, but the circuit does not download the signalto the electronic paper.

As described with reference to FIG. 1, in embodiments in which theelectronic paper is associated with a product, such as being attached tothe product or attached to a package of the product, the second entitymay be a vendor of the product, the third entity may be a purchaser ofthe product, and/or the first entity may be a provider of the product toa vendor of the product, such as a manufacturer of the product or adistributor or publisher of the product.

Moreover, in an embodiment, the disenabling writing action describedwith reference to block 710 includes disenabling writing to the firstregion if the first entity has already written a specific number ofimages to the first region, such as a unitary number of images, or ifthe image written by the first entity to the first region is identifiedas a last image to be written by the first entity to the first region.Thus, if an image written by the first entity to the first region is notidentified as the last image to be written on the first region, thefirst entity is not necessarily disabled from writing to the firstregion. In an embodiment, therefore, the writing to a first region ofthe electronic paper is substantially permanent, and the circuit 660 isconfigurable to substantially permanently write to a first region of theelectronic paper, because entities are disenabled from writing to thefirst region. Moreover, in an embodiment the disenabling writing actiondescribed with reference to block 710 is executed only after anoccurrence of event, such as only after a specific entity, such as afirst entity, a second entity, and/or a third entity, indicates theevent. In an embodiment, an event may be a specific quantity of timesthat the first region has been written to.

Referring now to FIGS. 8A and 8B, an embodiment of method 800 toconditionally disenable an entity from writing to a specific region ofan electronic paper is portrayed. The method 800 includes in block 810determining whether an image is to be written on a first region (or apart thereof) of an electronic paper, and if so, whether criteria todetermine whether the image is to be written to the first region (or apart thereof) are satisfied. Such criteria may include in an embodiment,the occurrence or non-occurrence of an event. Illustrative sources of anevent may be an input from a user interface, a datum indicating anevent, or an algorithmic determination of an event. In embodiments, theevent may include an image having already been written (or downloaded)to the first region a specified number of times such as one time, and/orwritten to the first region since a specified date; and/or whether aspecified entity has written (or downloaded) an image to the firstregion a specified number of times, and/or written to the first regionsince a specified date. For these illustrative events, theirnon-occurrence indicates the satisfaction of the criteria to write tothe first region or a part thereof). If the image is to be written tothe first region (or a part thereof) of the electronic paper and thecriteria have been satisfied, the YES branch is taken from block 810 toblock 820. In block 820 the method includes enabling the image to bewritten to the first region (or a part thereof). If the image is to bewritten to the first region (or a part thereof) and the criteria havenot been satisfied, the NO branch is taken from block 810 to block 830.In block 830, the method includes disenabling the image from beingwritten to the first region (or a part thereof). In an embodimenttherefore, the action of block 830 includes substantially permanentlywriting to a first region (or a part thereof) of the electronic paper,and the circuit 660 is configurable to substantially permanently writeto a first region (or a part thereof) of an electronic paper, bydisenabling writing to the first region (or a part thereof). Inperforming the actions of blocks 810, 820, and 830, circuitry isconfigurable to fix an image within at last a part of the first regionby being configurable to write an image within at least a part of thefirst region, and to substantially disenable further input to the atleast a part of the first region.

In block 840 the method 800 includes determining whether an image is tobe written on a second region of the electronic paper is from an entityauthorized to write on the second region. If an image is to be writtenon a second region and is from an entity authorized to write on thesecond region, then the YES branch is taken from block 840 and themethod includes in block 850 enabling the image to be written to thesecond region. If an image is to be written on the second region and isnot from an entity authorized to write on the second region, then the NObranch is taken from block 840 and the method includes in block 860disenabling the image from being written to the second region. Themethod 800 therefore includes not enabling writing to the second regionexcept by an authorized entity. In an embodiment, the method 800moreover includes in block 870 determining whether an image is to bewritten on a third region of the electronic paper is from an entityauthorized to write on the third region. If an image is to be written ona third region and is from an entity authorized to write on the thirdregion, then the YES branch is taken from block 870 and the methodincludes in block 880 enabling the image to be written to the secondregion. If an image is to be written on the third region and is not froman entity authorized to write on the third region, then the NO branch istaken from block 870 and the method includes in block 890 disenablingthe image from being written to the second region. The method 800therefore includes not enabling writing to the third region except by anauthorized entity.

As described with reference to FIG. 1, in embodiments in which theelectronic paper is associated with a product, such as being attached tothe product or attached to a package of the product, the entityauthorized to write on the second region may be a vendor of the product,the entity authorized to write on the third region may be a purchaser ofthe product, and/or the entity authorized to write to the first regionmay be a provider of the product to a vendor of the product, such as amanufacturer of the product or a distributor or publisher of theproduct. In embodiments that depend upon a region of the electronicpaper and an identity of an entity endeavoring to write to the region,the circuit 160 may be configured to read from the received imageindicating signal an identity of the region to be written to, and anidentity of the entity endeavoring to write to the region, and totransmit an indication of the image to the electronic paper 120 forentities enabled to write to a region.

Referring to FIG. 9, an embodiment of a method 900 includes in block 910determining whether an image is to be written to a first region of anelectronic paper, and in block 920 determining whether a specific eventhas occurred. As described with respect to FIGS. 7 and 8A-8B, such anevent may include a specific entity endeavoring to write on the region,an image already having been written to the region, and the entityhaving already written an image to the region a specified number oftimes, such as one time. If an image is to be written to a region and aspecific event has occurred, the YES branch is taken from block 930, andin block 940 an action includes disenabling writing the image to thefirst region.

In an embodiment, the method 900 includes determining if the image is tobe written to a specific other region and is from a specific entity. Ifthe image is to be written to the other region and is not from thespecific entity, the method 900 includes disenabling writing the imageto the other region.

Following are a series of flowcharts depicting implementations ofprocesses. For ease of understanding, the flowcharts are organized suchthat the initial flowcharts present implementations via an overall “bigpicture” viewpoint and thereafter the following flowcharts presentalternate implementations and/or expansions of the “big picture”flowcharts as either sub-steps or additional steps building on one ormore earlier-presented flowcharts. Those having skill in the art willappreciate that the style of presentation utilized herein (e.g.,beginning with a presentation of a flowchart(s) presenting an overallview and thereafter providing additions to and/or further details insubsequent flowcharts) generally allows for a rapid and easyunderstanding of the various process implementations.

Referring to FIG. 10, shown is a high-level logic flowchart of aprocess. Method step 1000 depicts the start of the process. Method step1002 illustrates writing data to at least one region of the electronicpaper. For example, circuit 160 and/or 220 (or various combinations orpermutations thereof within the ambit of those skilled in the art)writing a content to one or more pixels of electronic paper 120 (see,e.g., FIG. 2). Method step 1004 illustrates making the datasubstantially permanent. For example, circuit 160 and/or circuit 220 (orvarious combinations or permutations thereof within the ambit of thoseskilled in the art) activating a mechanism such that a pattern loaded toelectronic paper 120 is substantially unmodifiable (see, e.g., FIG. 2).Method step 1006 shows the end of the process.

Referring to FIG. 11, depicted is a high-level logic flowchartillustrating alternate implementations of the process of FIG. 10. Shownis that in some implementations, method step 1000 may include methodstep 1100 which depicts activating at least a portion of the electronicpaper. For example, circuit 160 and/or 220 (or various combinations orpermutations thereof within the ambit of those skilled in the art)energizing one or more pixels of electronic paper 120 such that adesired pattern, such as forming text and/or an image, is formed on thepaper (see, e.g., FIG. 2). Depicted is that in some implementations,method step 1100 may include method step 1102 which depicts activatingone or more pixels having an ink configured to rotate in response to afield. For example, circuit 160 and/or 220 (or various combinations orpermutations thereof within the ambit of those skilled in the art)energizing one or more pixels of electronic paper 120 utilizingelectrophoretic and/or electrically and/or magnetically responsive ink(see, e.g., FIG. 2). Illustrated is that in some implementations, methodstep 1100 may include method step 1104 which depicts activating at leastone electrically responsive pixel. For example, circuit 160 and/or 220(or various combinations or permutations thereof within the ambit ofthose skilled in the art) energizing one or more pixels of electronicpaper 120 utilizing electricity (see, e.g., FIG. 2). The remainingmethod steps function as shown and or described herein.

Referring to FIG. 12, illustrated is a high-level logic flowchartillustrating alternate implementations of the process of FIG. 10. Shownis that in some implementations, method step 1004 may include methodstep 1200 which depicts at least one of fusing, anti-fusing, lasing,switching, or cutting at least one input driving a display mechanism ofthe electronic paper. For example, circuit 160 and/or 220 (or variouscombinations or permutations thereof within the ambit of those skilledin the art) activating a fuse, anti-fuse, laser, switch, or cuttingmechanism respectively associated with circuitry driving one or morepixels of electronic paper 120 (see FIG. 2). Depicted is that in someimplementations, method step 1004 may include method step 1202 whichdepicts activating non-volatile signal circuitry. For example, circuit160 and/or 220 (or various combinations or permutations thereof withinthe ambit of those skilled in the art) energizing one or more pixels ofelectronic paper 120 (see FIG. 2). Illustrated is that in someimplementations, method step 1202 may include method step 1204 whichdepicts activating assisted non-volatile signal circuitry. Depicted isthat in some implementations, method step 1204 may include method steps1206-08. Method step 1206 illustrates charging a retention-assistcircuitry. For example, circuit 160 and/or 220 (or various combinationsor permutations thereof within the ambit of those skilled in the art)charging retention-assist circuitry (e.g., capacitive and/orflash-memory like circuitry) respectively associated with one or morepixels of electronic paper 120 (see FIG. 2). Method step 1208 showsengaging in at least one of fusing, anti-fusing, lasing, switching, orcutting at least one input of the retention-assist circuitry. Forexample, circuit 160 and/or 220 (or various combinations or permutationsthereof within the ambit of those skilled in the art) activating a fuse,anti-fuse, laser, switch, or cutting mechanism respectively associatedwith circuitry driving retention-assist circuitry respectivelyassociated with one or more pixels of electronic paper 120 (see FIG. 2).The remaining method steps function as shown and or described herein.

Referring to the schematic block diagram of FIG. 13, an embodiment showsan exemplary read/write e-paper accessibility scheme for a recipient oruser 10 of an item, product or service related to e-paper material 21.As disclosed herein, the e-paper material 21 may be associated with suchitem, product or service for various tracking, informational,certification and verification purposes. In some instances the e-papermaterial 21 also serves as a label attached to the associated item orproduct, and may also serve as a useful document related to theassociated service.

The embodiment of FIG. 13 provides limited accessibility shown as anaccess button 12 that enables only authorized access for therecipient/user 10 (and in some instances for an authorized third party11) through interface 14 via read decryption module 18 to an e-paperportion 16 having informational data such as encrypted descriptiveinformation for the associated item, product or service. Limitedaccessibility is also provided through interface 14 via write encryptionmodule 19 and also via read decryption module 20 to an e-paper portion17 having informational data such as encrypted usage information andlimitations that are applicable to the associated item, product orservice.

Access records 15 may be configured to be operably connected withinterface 14 in order to monitor and save pertinent informationregarding any use of the interface 14 for obtaining access to e-papermaterial 21.

The embodiment of FIG. 13 also includes verification accessibility shownas a prove-it button 13 that enables authorized access through interface14 to determine whether any alteration has been made to the descriptiveinformation on portion 16, and also to determine whether any alterationhas been made to the usage information and limitations on portion 17.

Referring to the schematic block diagram of FIG. 14, another embodimentis depicted that includes status indicators for communicatingverification output information regarding the e-paper material 21. Inthis embodiment it will be understood that different levels ofaccessibility are provided with respect to different types of data onthe e-paper material 21. With respect to non-restricted descriptiveinformation on portion 22, a read access interface 23 is available to aprimary recipient (or primary user) 24 of an item, product or serviceassociated with the e-paper material 21. The read access interface 23 isalso available to additional authorized users 25, and in some instancesto non-users 26.

Similarly with respect to non-restricted usage information andlimitations on portion 27, a read access interface 28 is available to aprimary recipient (or primary user) 30 of an item, product or serviceassociated with the e-paper material 21. The read access interface 28 isalso available to additional authorized users 31, and in some instancesto non-users 32. It will be understood that a primary recipient or userdesignated as 24 may be interested only (or especially) in reading thenon-restricted descriptive information in portion 22, and a differentprimary recipient or user designated as 30 may be interested only (orespecially) in reading the non-restricted usage information andlimitations in portion 27. However, in this embodiment the statusindicators are not configured to provide any verification feedbackregarding the data written in the non-restricted portions 22, 27.

In contrast, the embodiment of FIG. 14 provides accessibility safeguardsand verification feedback with respect to data written in the restrictedportions 33, 36 of the e-paper material 21. More particularly, theprimary recipient or user 24 has accessibility through read/verificationaccess interface 37 to the restricted descriptive information in portion36, and in addition may receive verification feedback from a firststatus indicator 38. Similarly, the primary recipient or user 30 hasaccessibility through read/verification access interface 34 to therestricted usage information and limitations in portion 33, and inaddition may receive verification feedback from a second statusindicator 38.

Detailed implementation details are shown in the embodiment depicted inthe schematic block diagram of FIG. 15, wherein the e-paper material 21is shown as part of an exemplary system implementation. In thisembodiment involving usage information and limitations entered onportion 16 of e-paper material 21 (see FIG. 13), a reader/scanner unit56 is operably coupled through a processor verification unit 53 to thefirst status indicator 38 in order to provide a verification output 60from the first status indicator 38 to a primary recipient, user orauthorized third party 61.

As shown in FIG. 15, a provider 40 of an item or product, as well as aservice provider 41, and an authorized third party 42 all may be enabledvia write access interface 43 to make data entries of plaintext visibleinformation data 44 on portion 16 of e-paper material 21. The same threeentities (or persons) may also be enabled via write access interface 45to use an encoder/encryption module 46 to make entries of protectedvisible information data 47 and protected hidden information data 48 onportion 16 of e-paper material 21. Such entries are enabled by theencoder/encryption module 46 in accordance with an appropriate securitymethodology.

Access records 49 are operably connected with the two write accessinterfaces 43, 45 in order to save pertinent access records such asdate/time of writing data 50, originator of data entry 51, and dataentered 52. Other access record data fields may be included in additionto those disclosed herein, and in some instances some of the exemplarystatus output data fields may not be deemed desirable and therefore canbe omitted. Such access records 49 are made available as shown by arrow54 to processor verification unit 53. The processor verification unit 53also receives inputs shown by arrow 55 from the read/scanner unit 56 fordifferent types of verification information including but not limited toverification confirmation for restricted data 57, and for labelauthentication indicia 58, and for coupling link readout 59.

The processor verification unit 53 can then process the various inputsin accordance with the predetermined security methodology in order togenerate selected status outputs to the first status indicator 38.Exemplary types of status output fields may include answers regardingwhether any restricted data has been altered or deleted 62, detectionresult of whether the e-paper material constitutes the original label(or a pseudo label) 63, whether a label coupling link to an attacheditem or product has been broken or altered 64, is the item or productsource verified 65, is the service provider verified 66, is the dataoriginator verified 67, and has the authorized third party been verified68. Other status output fields may be included in addition to thosedisclosed herein, and in some instances some of the exemplary statusoutput data fields may not be deemed desirable and therefore can beomitted.

Selected output versions 60 from the first status indicator 38 are madeavailable to approved entities 61 such as a primary recipient or user ofthe item, product or service, as well as to any authorized thirdparties.

Other detailed implementation details are shown in the embodimentdepicted in the schematic block diagram of FIG. 16, wherein the e-papermaterial 21 is shown as part of another exemplary system implementation.In this embodiment involving usage information and limitations enteredon portion 17 of e-paper material 21 (see FIG. 13), a reader/scannerunit 82 is operably coupled through a processor verification unit 81 tothe second status indicator 35 in order to provide a verification output95 to a primary recipient, user or authorized third party 70.

As shown in FIG. 16, an authorized entity such as a primary recipient,primary user or authorized third party 70 all may be enabled viarestricted write access interface 71 to make data entries on restricteddata access portion 73 of the e-paper material 21. Such data entrieswill be enabled by encoder/encryption module 72 in accordance with anappropriate security methodology. The same three categories of entities70 (or persons) may be enabled via restricted read access interface 75to read a list of authorized users on restricted portion 74 of e-papermaterial 21, and also may be enabled via restricted read accessinterface 77 to read informational data entries on restricted portion 76of e-paper material 21. Examples of informational data entries onrestricted portion 76 include usage data and limitations, amounts,authorizations, expiration, storage constraints, etc. Additionalauthorized users 78 may also be enabled via restricted read accessinterface 77 to read such informational data entries on restrictedportion 76.

Access records 83 are operably connected with restricted write accessinterface 71 as well as with the two restricted read access interfaces75, 77 in order to save pertinent access records such as date/time ofrestricted read access 84, date/time record of restricted write access85, and date/time record of product/service usage 86. Other accessrecord data fields may be included in addition to those disclosedherein, and in some instances some of the exemplary status output datafields may not be deemed desirable and therefore can be omitted. Suchaccess records 49 are made available as shown by an arrow to processorverification unit 81. The processor verification unit 81 also receivesinputs shown by arrow from the read/scanner unit 82 for different typesof verification information including but not limited to verificationconfirmation for the restricted data in restricted portions 74, 76.

Although write access to portion 79 containing plaintext visibleinformational data may in some instances be restricted to authorizedparties using restricted write access interface 71, the exemplaryembodiment of FIG. 16 shows that portion 79 may be generally availablethrough non-restricted read access interface 80.

The processor verification unit 81 can then process the various inputsin accordance with the predetermined security methodology in order togenerate selected status outputs to the second status indicator 35.Exemplary types of status output fields may include answers regardingwhether a third party is verified 87; whether a primary recipient orprimary user is verified 88; has an restricted data been alter ordeleted, and if so by whom 89; has the authorized user list beenchanged, and if so by whom 90; have any usage limitations been changed,and if so by whom 91; listing identity and contact information for aprimary recipient or user 92; and listing identity and contactinformation for a back-up person 93. Other status output fields may beincluded in addition to those disclosed herein, and in some instancessome of the exemplary status output data fields may not be deemeddesirable and therefore can be omitted.

Selected output versions 95 from the second status indicator 35 are madeavailable to approved entities 70 such as a primary recipient or user ofthe item, product or service, as well as to any authorized thirdparties.

A top view diagram of FIG. 17 schematically shows an exemplaryimplementation of data and authentication indicia incorporated oncombined partially overlapping data/label portions of an e-paperdocument 240. In this embodiment, encoded or encrypted descriptive data241 is surrounded (and in some instances overlies) backgroundauthentication indicia 242. Alternative or supplemental authenticationindicia 243 may be provided separate and apart from the descriptive data241.

Another top view diagram of FIG. 18 schematically shows a differentexemplary implementation of data and authentication indicia incorporatedon combined overlapping data/label portions of an e-paper document 245.In this embodiment the encoded or encrypted descriptive data designatedas 241 in FIG. 17 has been intermixed with the authentication indiciadesignated as 243 in FIG. 17 to form different customized compositeauthentication patterns 246, 247, 248.

A further top view diagram of FIG. 19 schematically shows anotherexemplary implementation of authentication indicia incorporated on ane-paper document 252 attached to an associated item 250 (or product,container, or package). The e-paper document 252 includes a data portion253 and a label portion 254. The label portion 254 includes severalimplementation examples of validating link components that are encodedor encrypted in accordance with a predetermined security methodology.The correlated link components on both the label portion 254 and item250 are shown in the following exemplary formats: separated alphanumericcomponents 255, 256; separated color (cyan, magenta, yellow)representations 257, 258; contiguous cross-boundary colorrepresentations 259; and contiguous cross-boundary patternrepresentations 260.

Arrow 261 represents generally any coupling link to the label portion254. Arrow 262 represents generally any coupling link to the dataportion 253. Arrow 265 represents generally a non-altered coupling linkto label portion 254, which creates a “positive” pixel display as an“ok” alert output on the label portion 254 when no alteration isdetected. A defective (e.g., altered, broken, detached, damaged,missing) coupling link represented generally by separated arrow heads266, 267 causes a “warning” alert output shown as a “negative” pixeldisplay on the label portion 254. Although the illustrated couplinglinks are illustrated on a top surface 251 of item 250, other surfacesof both the item and the e-paper document may be used to establish acoupling link, as better shown in FIG. 20. Pixel displays may also beused for other types of verification status outputs.

A side view diagram of FIG. 20 is a schematic illustration of acomposite unit 270 showing different types of verification couplinglinks between an e-paper document 271 and the attached or associateditem, product, container or package 250. Such coupling links could beimplemented on adjacent surfaces 272, opposite surfaces 273, facingsurfaces 274, or other surface combinations.

FIG. 21 is a schematic block diagram for an exemplary e-paperverification embodiment wherein a processor unit 275 receives input froma reader (e.g., scanner, sensor) 276 that has a capability to detectencrypted or encoded bar code indicia 277. The processor unit uses anappropriate security methodology in order to provide a status output toan alert device 278.

An exemplary embodiment of an alert device 280 is depicted in theschematic diagram of FIG. 22 wherein a warning indicator 281 can providean “ok” alert output (e.g., text, alphanumeric, symbol, audio, visual,audiovisual, color) when an e-paper system determines that noverification problem has been detected, or alternatively the samewarning indicator 281 can provide a “warning” alert output (e.g., text,alphanumeric, symbol, audio, visual, audiovisual, color) when anyverification involving multiple problem types has been detected. In thisembodiment, the warning indicator 281 provides a status indicationregarding multiple types of verification problems such as a labelverification problem 282, a data verification problem 283, and an itemor product coupling verification problem 284. Of course, other types orcombinations of e-paper verification problems could be implemented in ane-paper verification system, and the specific examples disclosed hereinare for purposes of illustration only.

Another exemplary embodiment shown in the schematic diagram of FIG. 23depicts an alert device 285 with separate status indicators respectivelyprovided for different types of e-paper verification problems. Theillustrated examples in FIG. 23 include a label problem status indicator286, a data problem status indicator 287, and an item (e.g., product)coupling problem indicator 288. As previously mentioned with respect toFIG. 22, various output techniques can be incorporated as part of “ok”and “warning” output alerts, and various other combinations and types ofverification problems could be pre-selected to be monitored anddetected.

The schematic diagram of FIG. 24 illustrates various exemplary schemes290 for integrating authentication indicia involving different types ofe-paper verification problems, such as label indicia abbreviated as “L”291, data indicia abbreviated as “D”, and item or product couplingindicia abbreviated as “C” 293. In some embodiments each type ofauthentication indicia could be displayed and/or scanned separately.

It will be understood by those skilled in the art that variousconsiderations such as security methodology and ease of detection andalert device features may dictate a preferred integration format;accordingly the exemplary schemes depicted herein are not intended to beexhaustive. By way of illustration only, a possible format could combine(e.g., intermix, integrate) the label/data authentication indicia 294while the coupling authentication indicia 295 could be a separatedisplay. Another possible format could display label authenticationindicia 296 separately while combining data/coupling authenticationindicia 297. A further possible format could display data authenticationindicia 298 separately while combining label/coupling authenticationindicia 299. An additional possible format could combine together thelabel/data/coupling authentication indicia 300. Of course in someinstances an individual type of e-paper verification problem couldnevertheless be detected, processed and identified as a result ofscanning either a separated format or an integrated format.

Referring to FIG. 25A, an exemplary embodiment may include labelauthentication indicia 400 for providing an input to detection/processorunit 401 in order to generate status information to a respective alertdevice 402. Similarly data authentication indicia 403 will provide aninput to detection/processor unit 404 in order to generate statusinformation to a respective alert device 405. Similarly couplingauthentication indicia 406 will provide an input to detection/processorunit 407 in order to generate status information to a respective alertdevice 408.

Referring to FIG. 25B, another exemplary embodiment may includecomposite authentication indicia 410 for providing an input todetection/processor unit 411 in order generate appropriate outputinformation to alert device 412. The alert device 412 includes a firststatus readout 414 for label verification, a second status readout 415for data verification, and a third status readout 416 for couplingverification. The alert device 412 of this embodiment also includes awarning indicator 418 that provides an overall status alert output, suchthat a verification problem with any type of e-paper verification willgenerate a “warning” output at indicator 418. Alternatively if noverification problem of any type is detected, an “ok” output will begenerated at indicator 418.

Referring to FIG. 25C, a further exemplary embodiment may includecombined label/data authentication indicia 430 as well as separatecoupling authentication indicia 431 which together provide input todetection/processor unite 432. A user selection feature such as selectorbutton 433 enables a user to choose readout options 434 for reviewingany and all available permissible outputs relating to e-paperverification status information.

The schematic block diagram of FIG. 26 depicts an exemplary embodimentfor an e-paper device that includes an e-paper label 436 with itsassociated (e.g., attached) item, product, container or package 435. Inthis embodiment, various components are incorporated with the e-paperdevice including a detection device 437, a processor unit 438, and astatus readout 440. The processor unit 438 uses an appropriate securitymethodology to process scanned e-paper data received from detectiondevice 437 and generate an output 439 to the status readout 440.

The schematic block diagram of FIG. 27 depicts another exemplaryembodiment for an e-paper device that includes an e-paper label 442 withits associated (e.g., attached) item, product, container or package 441.In this embodiment, a first status readout component 450 is incorporatedwith the e-paper device. A detection device 443, processor unit 444, andsecond status readout 445 are in a location separated from the e-paperdevice. The processor unit 444 uses an appropriate security methodologyto process scanned e-paper data that was obtained by detection device443 via wireless signal 446 (or other communication channel). Theprocessor unit 444 generates a first output 447 via a wirelesscommunication link 448 (or other communication channel) to the statusreadout 440, and also a second output directly to second status readout445. The two outputs could be substantially the same or significantlydifferent, based on the needs of an authorized party having access toeach status readout 450, 445.

The schematic block diagram of FIG. 28 depicts an additional exemplaryembodiment for an e-paper device that includes an e-paper label 501 withits associated (e.g., attached) item, product, container or package 500.In this embodiment, a first status readout component 512 and a detectiondevice 503 are incorporated with the e-paper device. A second statusreadout 508 is incorporated on the item, product container or package500. A processor unit 502 and third status readout 505 are in a locationseparated from the e-paper device. The processor unit 502 uses anappropriate security methodology to process scanned e-paper data that isreceived via wireless communication link 504. The processor unit 502generates a first output 510 via a wireless communication link 511 (orother communication channel) to the first status readout 512, and also asecond output 506 via a wireless communication link 507 (or othercommunication channel) to second status readout 508. The processor unit502 generates a third output directly to status readout 505. The threeoutputs could be substantially the same or significantly different,based on the needs of authorized parties having access to each statusreadout 512, 508, 505.

The schematic flow chart process 515 of FIG. 29 illustrates an exemplarye-paper document associated with a manufactured item that passes throughdifferent stages of a supply chain. At each stage, authorized entitiesand/or persons may “write” (i.e., enter) data to the e-paper documentand/or “read” (i.e., detect) data from the e-paper document. In thatregard different versions of e-paper documents associated with the sameitem may exist, some versions with identical data entries and otherversions with different data entries. Verification status checks may bemade on a periodic or programmed basis as well as randomly anywherealong the supply chain path. Such verification status checks may occurwhile the e-paper document serves as a label that is physically attachedto its associated item, and may also occur while e-paper document isseparated from its associated item.

An initial e-paper document version 517 that may bear identityinformation related to an associated group of manufactured items 516 isdepicted as being separated from its associated group of manufactureditems 516. A later updated e-paper version 519 bearing new entries maybe connected or correlated with groups of one or more tested/certifieditems 518. A further updated e-paper version 523 may be physicallyattached as a label to an individual or group of warehoused items 522.

One of the further updated e-paper versions 523 may bypass theintermediate shipping destinations en route to retailer files 532maintained by a final store destination. A duplicate updated version 523may become re-attached as a label to one or more retailer items. A finalupdated version 529 may accompany a sold item 528 to an ultimaterecipient or purchaser, wherein the final updated version 529 is shownto be attached as a label directly to the sold item 528, or its packageor container.

Other e-paper versions such as 525 may be attached or otherwise matchedwith associated shipper items 524 which proceed by various means oftransportation (see arrow 521) to become inventory retailer items 526.The inventory retailer items 526 are shown as having an attached updatede-paper label version 527. This e-paper version 527 bearing detailedshipping entries may in some instances be removed from a sold item priorto delivery to the ultimate recipient or purchaser.

The recitation of the various e-paper document and label versions asdisclosed in FIG. 29 is for purposes of illustration. Many other paths,supply chain destinations, e-paper document associations, and e-paperversions may be contemplated by those skilled in the art in order toobtain the advantages and benefits disclosed herein.

The schematic flow chart process 535 of FIG. 30 illustrates a furtherexemplary e-paper document associated with a manufactured/assembleddevice that passes through different stages of a supply chain. At eachstage, authorized entities and/or persons may “write” (i.e., enter) datato the e-paper document and/or “read” (i.e., enter) data from thee-paper document. In that regard different versions of e-paper documentsassociated with the same item may exist, some versions with identicaldata entries and other versions with different data entries.Verification status checks may be made on a periodic or programmed basisas well as randomly anywhere along the supply chain path. Suchverification status checks may occur while the e-paper document servesas a label that is physically attached to its associated item, and mayalso occur while e-paper document is separated from its associated item.

Initial e-paper document versions 537, 539, 541 may bear informationaldata related to their respective associated items shown as component536, chemical 538, and circuit 540. In this exemplary embodiment thee-paper document versions 537, 539, 541 are depicted as beingtemporarily attached to their respective associated items during themanufacturing process. These items 536, 538, 540 may be manufactured byindependent suppliers or by another internal company division forsubsequent incorporation into a manufactured & assembled device 542.Updated e-paper versions 537 a, 539 a, 541 a bearing shipping, testingor other pertinent informational data may be removed from the items andstored for future reference in manufacturer files 544.

A later composite e-paper document version 543 separated from itsassociated manufactured & assembled device 542 may incorporate someinformational data from previous versions 537, 539, 541. Such compositeversion possibly having additional updated entries and designated 543 amay be kept in government agency files 546. Such composite versionpossibly having other updated entries and designated 543 b may be keptin buyer files 548.

A final e-paper document version 549 that may contain previously enteredinformational data from versions 537, 539, 541, 543 as well as bearingfurther updated entries is shown to be physically attached as a label toa sold & installed device 550.

The recitation of the various e-paper document and label versions asdisclosed in FIG. 29 is for purposes of illustration. Many other paths,supply chain destinations, e-paper document associations, and e-paperversions may be contemplated by those skilled in the art in order toobtain the advantages and benefits disclosed herein.

An exemplary process embodiment 555 as shown in FIG. 31 provides forcreating informational data from an authorized entity, whichinformational data regarding an item or product is intended to benon-alterable (block 556). The informational data is written inencrypted or encoded format on electronic paper material (block 557).Authentication indicia may be incorporated as part of the informationaldata, wherein the authentication indicia identifies the electronic papermaterial and/or the informational data as having originated from aprovider of the particular item or product, or from an authorized thirdparty (block 558). A security methodology is provided to enableverification confirmation with respect to the electronic paper materialand/or the informational data (block 559).

The flow chart of FIG. 32 illustrates an exemplary computer programproduct embodiment 565 that provides program instructions configured toperform a process that associates information in a computer system(block 566). The process includes creating informational data regardingan item or product (block 567), and writing the informational data inencrypted or encoded format on electronic paper material attachable toor associated with the item or product. The process may further includeincorporating authentication indicia as part of the informational data,wherein the authentication indicia identifies the electronic papermaterial and/or the informational data as having originated from aprovider of the particular item or product, or from another authorizedentity (block 569). Another feature may include scanning authenticationindicia incorporated on the electronic paper material in accordance witha security methodology to enable verification confirmation with respectto the electronic paper material and/or the informational data (block570). The exemplary computer program product also providescomputer-readable signal-bearing media bearing the program instructions(block 571).

Various additional aspects are included in the exemplary process 575shown in the flow chart of FIG. 33, which provides data security forinformation on an electronic paper material attachable to or associatedwith a particular item or product (block 576). In addition to thepreviously described process blocks 557, 559, additional features mayinclude generating a status output (block 578) based on a verificationconfirmation) with respect to the electronic paper material and/or theinformational data (see block 559). The verification confirmation ofblock 559 may include providing one or more of the following types ofverification schemes to determine whether the encrypted or encoded dataindicia or other symbolic representation has been altered: code, cipher,key, checksum, hash, algorithm, and digital signature (block 577). Thoseskilled in the art will understand that other verification schemes canbe implemented in the methods and systems disclosed herein.

Other aspects of the status output may include generating a statusoutput on the electronic paper material (block 579), generating a statusoutput on a particular item or product (block 580), and generating astatus output on a container or a package for the particular item orproduct (block 581). Additional features may include generating a statusoutput based on the verification confirmation for the particular item orproduct associated with one or more of the following categories:equipment, apparatus, device, packaging, container, printed material,services, vehicle, machine, merchandise, clothing, food, chemical,medicine, raw material, article of manufacture, component, and tool(block 582). Other categories of items and products are intended to beincluded, and the listing is not intended to be exhaustive but ratherfor purposes of illustration only.

Referring to another process embodiment 585 shown in the flow chart ofFIG. 34, an exemplary process includes the previously described featuresof blocks 576, 557, 558 as well as aspects involving scanning andprocessing authentication indicia on the electronic paper material. Suchscanning and processing may be in accordance with a security methodologyto enable verification confirmation with respect to the electronic papermaterial and/or the informational data (block 586), and may involveauthentication indicia in one or more of the following formats:alphanumeric symbol, geometric design, monochrome scheme, color scheme,background, repeated pattern, random pattern, boundary cross-overrepresentation, legend, image, bar code, visible representation, andhidden representation (block 587). Of course, other formats may be usedin order to obtain the benefits of the various processes and systemsdisclosed herein.

Additional process features shown in the flow chart of FIG. 34 mayinclude incorporating a coupling link between the electronic papermaterial and an original attached item or product or container orpackage (block 588), and monitoring the coupling link to provideverification confirmation regarding such original item or product orcontainer or package (block 589).

The flow chart of FIG. 35 shows another exemplary process 590 thatincludes scanning encrypted or encoded data indicia on an e-paperdocument (block 591), making a validation determination of whether theencrypted or encoded data indicia has been altered (block 592), andproviding a status output based on a result obtained by the validationdetermination (block 593).

An exemplary computer program product embodiment 595 of FIG. 36 providesprogram instructions configured to perform a process that associatesinformation in a computer system (block 596). The process includesscanning one or more encrypted or encoded data indicia on an e-paperdocument associated with an item or product or container or package(block 597), making a validation determination of whether the encryptedor encoded data indicia has been altered (block 598), and providing astatus output based on a result obtained by the validation determination(block 599). The computer program product may further providecomputer-readable signal-bearing media bearing the program instructions(block 600).

The process embodiment 665 of FIG. 37 shows an implementation forproviding verification status for an e-paper document associated with anitem (block 666). The previously described validation determination(block 592) may include one or more following types of verificationtechniques to determine whether the encrypted or encoded data indiciahas been altered: code, cipher, key, checksum, hash, algorithm, anddigital signature (block 667).

The previously described status output (see block 593) may in someinstances be based on scanning one or more types of encrypted or encodeddata indicia on the e-paper document (block 668). As an exemplary list,one or more of the following data indicia types may be scanned: documentauthentication, data authentication, item authentication, productauthentication, packaging authentication, container authentication, iteminformation, product information, service information, usageinstruction, product ingredient, product component, service requirement,certification, testing, endorsement, warranty, legal notification,government approval, destination, delivery, document origination date,item origination date, product origination date, tracking, history,tracking history, modification history, access history, verificationhistory, validation, corporate approval, and ownership (block 669). Ofcourse, other types of data indicia may be included.

Additional aspects may include providing a separate alert responsive tothe validation determination for each type of encrypted or encoded dataindicia (block 670), providing a same alert responsive to the validationdetermination for multiple types of encrypted or encoded data indicia(block 671), and generating the same alert responsive to the validationtermination of an unauthorized alteration of any of the multiple typesof encrypted or encoded data indicia (block 672).

Another exemplary process embodiment 675 as shown in the flow chart ofFIG. 38 provides verification status for an e-paper document associatedwith an item (block 666). Features may include scanning one or moretypes of encrypted or encoded data indicia on the e-paper document(block 676), providing a status output based on a result obtained bymaking a validation determination of whether the encrypted or encodeddata indicia has been altered (block 677), and providing an alertassociated with at least one of the one or more types of encrypted orencoded data indicia (block 678).

Various aspects regarding the alert may include generating a visualalert output incorporated in a pixel display on the e-paper (block 679),providing the alert at a location separated from the e-paper document(block 680), and identifying the type of encrypted or encoded dataindicia associated with the alert (block 681).

Additional aspects regarding the alert may include generating an alertthat includes one or more of the following outputs: text, alphanumeric,symbol, audio, visual, audiovisual, and color (block 682), and may alsoinclude displaying an output that is detectable under one or more of thefollowing conditions: normal ambient light, infrared light, ultravioletlight, filtered light, specific environmental condition, specific timeperiod, placement in electromagnetic field, and customized imageprocessing (block 683). Of course, other types of outputs and othertypes of detection conditions may be included.

Referring to the flow chart of FIG. 39, another exemplary process 685includes the previously described features of blocks 666, 676, 677, 678wherein an alert is provided on the e-paper document (block 686). Suchan alert may have different exemplary implementations includinggenerating automatically on the e-paper document a detectable “warning”status alert output in the event a result of the validationdetermination indicates the encrypted or encoded data indicia has beenaltered without authorization (block 687), and/or further includinggenerating automatically at a separate location a detectable “warning”status alert output in the event a result of the validationdetermination indicates the encrypted or encoded data indicia has beenaltered without authorization (block 688).

Additional exemplary alert implementations include maintaining anongoing detectable alert output for a given period of time (block 689),providing an ongoing detectable “ok” status alert output if a result ofthe validation determination indicates the encrypted or encoded dataindicia has not been altered (block 690), providing an ongoingdetectable “warning” status alert output if a result of the validationdetermination indicates the encrypted or encoded data indicia has beenaltered (block 691), and displaying an unalterable detectable “warning”status alert output (block 692).

The high level flow chart of FIG. 40 shows another exemplary process 695that includes periodically monitoring encrypted or encoded data indiciaon the e-paper document (block 696), detecting an unauthorized accessand/or unauthorized alteration to the encrypted or encoded data indicia(block 697), and generating an automatic status output alert based on aresult obtained by said detecting (block 698).

Referring to the process embodiment 705 of FIG. 41, the previouslydescribed features of blocks 696, 697, 698 are shown with additionalfeatures for providing verification status for an e-paper documentassociated with an item (block 706). Such additional process featuresmay include initiating the periodically monitoring of block 696 underone or more of the following circumstances: upon receipt of the e-paperdocument by a different entity; prior to transferring the e-paperdocument to a different entity; prior to attachment of the e-paperdocument to the associated item; after attachment of the e-paperdocument to the associated item; after encrypted or encoded data indiciahas been added to the e-paper document; after encrypted or encoded dataindicia has been changed or deleted from the e-paper document; and upontransfer of the associated item to a new location (block 707).

Additional process features may include generating and maintaining anongoing detectable alert output for a period of time, wherein the alertoutput includes an “ok” status alert or a “warning” status alert basedon the result obtained by said detecting (block 709). Another processfeature may include optionally selecting desired output informationregarding a basis for the result obtained (block 708) by the detectingfeature (see block 697).

The processes of FIGS. 31-41 can be implemented with various types oftechnology, including but not limited to hardware, firmware and/orsoftware systems based on computerized data communications andprocessing as discussed in more detail herein. Programmedimplementations can run on multiple computer devices or run on anintegrated computer system, depending on the circumstances.

It will also be understood by those skilled in the art that the variouscommunication links can be separated into different communicationchannels or media as well as combined into an integrated broadband ornarrowband link such as wired, wireless, cable, etc. It is furtherunderstood that integrated or separate modules can be provided for userinterface functions, for writing/reading/scanning functions, forprocessing functions, for transceiver functions, and/or for outputfunctions. The particular exemplary systems disclosed herein areprovided only for illustration.

The read/write access interfaces disclosed herein for multiple users arefor purposes of illustration, and persons skilled in the art willunderstand that various types of communication links can be utilized toachieve the necessary functional interactions between authorized users(also in some instances authorized third parties) and e-paper material,as well as between authorized users (also in some instances authorizedthird parties) and the status indicators (e.g., alert devices). It willbe further understood that exemplary user interfaces are capable ofoperable connection to a communication link in order for an authorizedparty to send and receive permissible informational data relating to theverification status of e-paper material, e-paper documents, e-paperlabels, and the like.

The exemplary system and device embodiments shown in FIGS. 1-6 and 13-30along with other components, devices, know-how, skill and techniquesthat are known in the art have the capability of implementing andpracticing the methods and processes shown in FIGS. 31-41. It is to beunderstood that the methods and processes can be incorporated in one ormore computer program products with a carrier medium having programinstructions carried or stored thereon. However it is to be furtherunderstood that other systems, apparatus and technology may be used toimplement and practice such methods and processes.

It will be understood from the description and drawings herein thatvarious components, sub-components, modules, and peripherals can beincorporated in a system for protecting information on an electronicpaper device. The e-paper device may include an e-paper document ore-paper label with encoded or encrypted data relating to an associateditem or product or service or container or package. The system mayinclude a sensing device capable of reading the encoded or encrypteddata, and a processor unit operably coupled to the sensing device todetermine verification of any alteration or deletion of the encoded orencrypted data. The system may further include a status indicator thatreceives an input from the processor unit regarding a verificationstatus for the encoded or encrypted data.

In some embodiments the status indicator may be incorporated with thee-paper material. In other instances the status indicator isincorporated with the associated item or product or container orpackage. Some implementations include the status indicator as part of aunit separated from the e-paper material. Also in certain embodimentsthe status indicator is included with the processor unit, and in someimplementations may be included with the sensing device.

As disclosed herein, the sensing device may include a scanner readingthe encoded or encrypted data in one or more of the following formats:alphanumeric symbol, geometric design, monochrome scheme, color scheme,background, repeated patterns, random patterns, boundary cross-overrepresentations, legend, image, bar code, visible representation, andhidden representation.

As further disclosed herein, the sensing device in some embodiments iscapable of reading the encoded or encrypted data under one or more ofthe following conditions: normal ambient light, infrared light,ultraviolet light, filtered light, specific environmental condition,specific time period, placement in electromagnetic field, and customizedimage processing. The sensing device may further include a scanner forscanning authentication indicia on said electronic paper material toidentify said electronic paper material and/or said encoded or encrypteddata as having originated from a provider of the item or product orservice or from another authorized entity.

In some embodiments disclosed here, the e-paper verification system maybe configured (in some instances programmed) to generate an “ok” statusoutput if a verification confirmation indicates that that electronicpaper material and/or the informational data has not been altered. Thereference to “ok” is not limited to this term, but rather includes anytype of output, display, communication, or other indication that averification check has not detected or identified any apparentvalidation or authentication problem.

The e-paper verification system also may be configured (in someinstances programmed) to generate a “warning” status output if theverification confirmation indicates that that electronic paper materialand/or the informational data has been altered. The reference to“warning” is not limited to this term, but rather includes any type ofoutput, display, communication, or other indication that a verificationcheck has detected or identified an apparent validation orauthentication problem.

With respect to embodiments wherein the e-paper material is attached toan associated item or product or container or package, the sensingdevice may include a scanner for determining a status of a coupling linkwith an original attached item or product or container or package, toprovide confirmation that the electronic paper material has not beendetached from its original item or product or container or package. Insome instances the system may be programmed to monitor the coupling linkbetween the electronic paper material and an original attached item orproduct or container or package, to provide verification confirmationregarding such original item or product or container or package

The processor unit of an e-paper verification system as disclosed hereinmay include one or more of the following types of verification schemesto determine whether the encrypted or encoded data indicia has beenaltered: code, cipher, key, checksum, hash, algorithm, and digitalsignature. It is further understood that such encoded or encrypted datamay be written by or on behalf of a person or entity from one or more ofthe following categories: item source, product maker, productmanufacturer, product distributor, product wholesaler, product retailer,product dealer, service provider, service franchisee, service agency,and company subsidiary.

One aspect of the disclosed e-paper device includes encoded or encrypteddata written by or on behalf of an authorized entity regarding one ormore of the following types of informational data: documentauthentication, data authentication, item authentication, productauthentication, packaging authentication, container authentication, iteminformation, product information, services information, receiptacknowledgement, billing term, invoice data, usage instruction, productingredient, product component, service requirement, certification,testing, endorsement, warranty, legal notification, government approval,destination, delivery, document origination date, item origination date,product origination date, tracking, history, tracking history,modification history, access history, verification history, validation,corporate approval, and ownership.

One of the system components disclosed herein is reader device for usewith electronic paper material having label-type information thereon.The reader device may include a sensor that detects authenticationindicia in one or more of the following categories: alphanumeric symbol,geometric design, monochrome scheme, color scheme, background, repeatedpattern, random pattern, boundary cross-over representation, legend,image, bar code, visible representation, and hidden representation. Anaspect of the system provides such authentication indicia to establishthat the electronic paper material and/or the informational data and/oran associated item actually originated from a provider of the item orfrom another authorized entity.

A further aspect of the disclosed features provides encrypted or encodedinformational data written by or on behalf of one or more of thefollowing: a provider or maker or manufacturer or distributor or sellerof the related item.

Another aspect provides one or more of the following types ofauthentication indicia: authentication indicia at least partiallyincluded in the data portion; authentication indicia separated from thedata portion; authentication indicia intermixed with the informationaldata; authentication indicia separated from the information data;authentication indicia detectable on one surface of the electronic papermaterial, and authentication indicia on both surfaces of the electronicpaper material.

Some embodiments include a status indicator for providing an outputbased on a verification confirmation with respect to the authenticationindicia. An exemplary status indicator may include an output based onthe verification confirmation regarding the authenticity of the e-papermaterial.

Other exemplary status indicators may include an output based on theverification confirmation regarding the authenticity of theinformational data. Other status indicator outputs may be based on averification confirmation with respect to the coupling link between ane-paper document or label and its associated item, product, container orpackage.

Some coupling link implementations include a circuit link between theelectronic paper material and its associated item or product orcontainer or package. Some embodiments provide a coupling link thatincludes an encrypted or encoded symbolic representation on theelectronic paper material that correlates with another symbolicrepresentation on the related product or container or package.

Some system and method embodiments disclosed here include scanning oneor more types of encrypted or encoded data indicia on an e-paperdocument associated with an item or product or container or package, andmaking a validation determination of whether the encrypted or encodeddata indicia has been altered. A status output is provided that is basedon a result obtained by the validation determination. The aforementionedvalidation process may be incorporated in a computer program productthat includes signal-bearing media. The signal bearing media may includestorage media, and may also include communication media.

Other aspects of a process embodiment capable of being incorporated in acomputer program product include providing the status output on thee-paper document. A detectable “ok” alert may be provided on the e-paperdocument as well as on a separate unit if a result of the validationdetermination indicates the encrypted or encoded data indicia has notbeen altered. Similarly a detectable “warning” alert may be provided onthe e-paper document as well as on a separate unit if a result of thevalidation determination indicates that any of the encrypted or encodeddata indicia has been altered.

Additional process features capable of being incorporated in a computerprogram product include displaying for a period of time an ongoingdetectable “warning” alert on the electronic paper document, as well ason the item or product or container or package associated with thee-paper document. Another aspect may provide two or more status outputsat different locations, respectively, wherein different verificationinformation be displayed or communicated at each status output. In someinstances, a status alert may identify the type of encrypted or encodeddata indicia which form a basis for the result of the validationdetermination.

A further aspect of an output alert may include generating automaticallyon the e-paper document and/or at a separate location a detectable“warning” status alert output in the event a result of the validationdetermination indicates the encrypted or encoded data indicia has beenaltered without authorization.

The verification status output indicator implementation may includemultiple alert indicators, which individually can be incorporated withan associated item that is included in one or more of the followingcategories: product, equipment, apparatus, device, packaging, container,printed material, service, vehicle, machine, merchandise, clothing,food, chemical, medicine, raw material, article of manufacture,component, and tool. Of course, other categories may also be included.Such a status output indicator may include an alert device incorporatedwith a sensor device and/or with a processor unit.

Some alert indicator embodiments may provide an identity of a type ofencrypted or encoded information determined by said processor unit tohave been altered. Other aspects of an exemplary alert indicator mayinclude a pixel display on the e-paper document, and a further aspectmay include an unalterable display on the e-paper document, as well asin some instances an unalterable display on its associated item,product, container or package.

Various system and method embodiments disclosed herein are used tocontrol the writing on electronic paper (e-paper). An e-paper device mayincorporate authentication indicia as part of informational data writtenon e-paper material. The informational data is protected by a securitymethodology that is accessible to authorized entities. A reader devicemay be used to help make a verification determination of whetherencrypted or encoded data has been altered. In some instances an outputalert operably coupled to the reader device serves as a verificationstatus indicator.

It will be understood by those skilled in the art that the variouscomponents and elements disclosed in the block diagrams herein as wellas the various steps and sub-steps disclosed in the flow charts hereinmay be incorporated together in different claimed combinations in orderto enhance possible benefits and advantages.

The foregoing detailed description has set forth various embodiments ofthe devices and/or processes via the use of block diagrams, flowcharts,and/or examples. Insofar as such block diagrams, flowcharts, and/orexamples contain one or more functions and/or operations, it will beunderstood by those within the art that each function and/or operationwithin such block diagrams, flowcharts, or examples can be implemented,individually and/or collectively, by a wide range of hardware, software,firmware, or virtually any combination thereof. In one embodiment,several portions of the subject matter described herein may beimplemented via Application Specific Integrated Circuits (ASICs), FieldProgrammable Gate Arrays (FPGAs), digital signal processors (DSPs), orother integrated formats. However, those skilled in the art willrecognize that some aspects of the embodiments disclosed herein, inwhole or in part, can be equivalently implemented in standard integratedcircuits, as one or more computer programs running on one or morecomputers (e.g., as one or more programs running on one or more computersystems), as one or more programs running on one or more processors(e.g., as one or more programs running on one or more microprocessors),as firmware, or as virtually any combination thereof, and that designingthe circuitry and/or writing the code for the software and or firmwarewould be well within the skill of one of skill in the art in light ofthis disclosure. In addition, those skilled in the art will appreciatethat the mechanisms of the subject matter described herein are capableof being distributed as a program product in a variety of forms, andthat an illustrative embodiment of the subject matter described hereinapplies equally regardless of the particular type of signal bearingmedia used to actually carry out the distribution. Examples of a signalbearing media include, but are not limited to, the following: recordabletype media such as floppy disks, hard disk drives, CD ROMs, digitaltape, and computer memory; and transmission type media such as digitaland analog communication links using TDM or IP based communication links(e.g., packet links).

While particular aspects of the present subject matter described hereinhave been shown and described, it will be apparent to those skilled inthe art that, based upon the teachings herein, changes and modificationsmay be made without departing from the subject matter described hereinand its broader aspects and, therefore, the appended claims are toencompass within their scope all such changes and modifications as arewithin the true spirit and scope of this subject matter describedherein. Furthermore, it is to be understood that the invention isdefined by the appended claims. It will be understood by those withinthe art that, in general, terms used herein, and especially in theappended claims (e.g., bodies of the appended claims) are generallyintended as “open” terms (e.g., the term “including” should beinterpreted as “including but not limited to,” the term “having” shouldbe interpreted as “having at least,” the term “includes” should beinterpreted as “includes but is not limited to,” etc.). It will befurther understood by those within the art that if a specific number ofan introduced claim recitation is intended, such an intent will beexplicitly recited in the claim, and in the absence of such recitationno such intent is present. For example, as an aid to understanding, thefollowing appended claims may contain usage of the introductory phrases“at least one” and “one or more” to introduce claim recitations.However, the use of such phrases should not be construed to imply thatthe introduction of a claim recitation by the indefinite articles “a” or“an” limits any particular claim containing such introduced claimrecitation to inventions containing only one such recitation, even whenthe same claim includes the introductory phrases “one or more” or “atleast one” and indefinite articles such as “a” or “an” (e.g., “a” and/or“an” should typically be interpreted to mean “at least one” or “one ormore”); the same holds true for the use of definite articles used tointroduce claim recitations. In addition, even if a specific number ofan introduced claim recitation is explicitly recited, those skilled inthe art will recognize that such recitation should typically beinterpreted to mean at least the recited number (e.g., the barerecitation of “two recitations,” without other modifiers, typicallymeans at least two recitations, or two or more recitations).Furthermore, in those instances where a convention analogous to “atleast one of A, B, and C, etc.” is used, in general such a constructionis intended in the sense one having skill in the art would understandthe convention (e.g., “a system having at least one of A, B, and C”would include but not be limited to systems that have A alone, B alone,C alone, A and B together, A and C together, B and C together, and/or A,B, and C together, etc.). In those instances where a conventionanalogous to “at least one of A, B, or C, etc.” is used, in general sucha construction is intended in the sense one having skill in the artwould understand the convention (e.g., “ a system having at least one ofA, B, or C” would include but not be limited to systems that have Aalone, B alone, C alone, A and B together, A and C together, B and Ctogether, and/or A, B, and C together, etc.).

As a further definition of “open” terms in the present specification andclaims, it will be understood that usage of a language construction “Aor B” is generally interpreted as a non-exclusive “open term” meaning: Aalone, B alone, A and B together.

Although various features have been described in considerable detailwith reference to certain preferred embodiments, other embodiments arepossible. Therefore, the spirit or scope of the appended claims shouldnot be limited to the description of the embodiments contained herein.

1. A system for providing verification status for an e-paper documenthaving an electronically written image associated with an item,comprising: an article of manufacture including but not limited to asignal bearing medium configured by one or more instructions related to:scanning the image and encrypted or encoded data indicia on the e-paperdocument; making a validation determination using the encrypted orencoded data indicia to determine whether the image has been altered;and providing a status output based on a result obtained by thevalidation determination.
 2. The system of claim 1 wherein said articleof manufacture including but not limited to a signal bearing mediumconfigured by one or more instructions related to making the validationdetermination includes: one or more instructions related to using one ormore of the following types of data structures to determine whether theencrypted or encoded data indicia has been altered: code, cipher, key,checksum, hash, algorithm, and digital signature.
 3. The system of claim1 wherein said article of manufacture including but not limited to asignal bearing medium configured by one or more instructions related toscanning the image and encrypted or encoded data indicia on the e-paperdocument includes: one or more instructions related to scanning one ormore types of encrypted or encoded data indicia included in the image onthe e-paper document.
 4. The system of claim 3 wherein said article ofmanufacture including but not limited to a signal bearing mediumconfigured by one or more instructions related to providing the statusoutput includes: one or more instructions related to providing aseparate alert responsive to the validation determination for each typeof encrypted or encoded data indicia.
 5. The system of claim 3 whereinsaid article of manufacture including but not limited to a signalbearing medium configured by one or more instructions related toproviding the status output includes: one or more instructions relatedto providing a same alert responsive to the validation determination formultiple types of encrypted or encoded data indicia.
 6. The system ofclaim 5 wherein said article of manufacture including but not limited toa signal bearing medium configured by one or more instructions relatedto providing the same alert responsive to the validation determinationfor multiple types of encrypted or encoded data indicia includes: one ormore instructions related to generating the same alert responsive to thevalidation termination of an unauthorized alteration of any of themultiple types of encrypted or encoded data indicia.
 7. The system ofclaim 3 wherein said article of manufacture including but not limited toa signal bearing medium configured by one or more instructions relatedto scanning one or more types of encrypted or encoded data indiciaincluded in the image on the e-paper document includes: one or moreinstructions related to scanning one or more of the following types ofencrypted or encoded data indicia: document authentication, dataauthentication, item authentication, product authentication, packagingauthentication, container authentication, item information, productinformation, service information, usage instruction, product ingredient,product component, service requirement, certification, testing,endorsement, warranty, legal notification, government approval,destination, delivery, document origination date, item origination date,product origination date, tracking, history, tracking history,modification history, access history, verification history, validation,corporate approval, and ownership.
 8. The system of claim 3 wherein saidarticle of manufacture including but not limited to a signal bearingmedium configured by one or more instructions related to providing thestatus output based on a result obtained by the validation determinationincludes: one or more instructions related to providing an alertassociated with at least one of the one or more types of encrypted orencoded data indicia.
 9. The system of claim 8 wherein said article ofmanufacture including but not limited to a signal bearing mediumconfigured by one or more instructions related to providing the alertassociated with at least one of the one or more types of encrypted orencoded data indicia includes: one or more instructions related toidentifying the type of encrypted or encoded data indicia associatedwith the alert.
 10. The system of claim 8 wherein said article ofmanufacture including but not limited to a signal bearing mediumconfigured by one or more instructions related to providing the alertassociated with at least one of the one or more types of encrypted orencoded data indicia includes: one or more instructions related toproviding the alert at a location separated from the e-paper document.11. The system of claim 8 wherein said article of manufacture includingbut not limited to a signal bearing medium configured by one or moreinstructions related to providing the alert associated with at least oneof the one or more types of encrypted or encoded data indicia includes:one or more instructions related to generating the alert that includesone or more of the following outputs: text, alphanumeric, symbol, audio,visual, audiovisual, and color.
 12. The system of claim 8 wherein saidarticle of manufacture including but not limited to a signal bearingmedium configured by one or more instructions related to providing thealert associated with at least one of the one or more types of encryptedor encoded data indicia includes: one or more instructions related todisplaying an output that is detectable under one or more of thefollowing conditions: normal ambient light, infrared light, ultravioletlight, filtered light, specific environmental condition, specific timeperiod, placement in electromagnetic field, and customized imageprocessing.
 13. The system of claim 8 wherein said article ofmanufacture including but not limited to a signal bearing mediumconfigured by one or more instructions related to providing the alertassociated with at least one of the one or more types of encrypted orencoded data indicia includes: one or more instructions related togenerating a visual alert output incorporated in a pixel display on thee-paper document.
 14. The system of claim 8 wherein said article ofmanufacture including but not limited to a signal bearing mediumconfigured by one or more instructions related to providing the alertassociated with at least one of the one or more types of encrypted orencoded data indicia includes: one or more instructions related toproviding the alert on the e-paper document.
 15. The system of claim 14wherein said article of manufacture including but not limited to asignal bearing medium configured by one or more instructions related toproviding an alert on the e-paper document includes: one or moreinstructions related to generating automatically on the e-paper documentand/or at a separate location a detectable “warning” status alert outputin the event a result of the validation determination indicates theencrypted or encoded data indicia has been altered withoutauthorization.
 16. The system of claim 14 wherein said article ofmanufacture including but not limited⁻ to a signal bearing mediumconfigured by one or more instructions related to providing the alert onthe e-paper document includes: one or more instructions related tomaintaining an ongoing detectable alert output for a given period oftime.
 17. The system of claim 16 wherein said article of manufactureincluding but not limited to a signal bearing medium configured by oneor more instructions related to maintaining the ongoing detectable alertoutput includes: one or more instructions related to providing anongoing detectable “ok” status alert output if a result of thevalidation determination indicates the encrypted or encoded data indiciahas not been altered.
 18. The system of claim 16 wherein said article ofmanufacture including but not limited to a signal bearing mediumconfigured by one or more instructions related to maintaining theongoing detectable alert output includes: one or more instructionsrelated to providing an ongoing detectable “warning” status alert outputif a result of the validation determination indicates the encrypted orencoded data indicia has been altered.
 19. The system of claim 18wherein said article of manufacture including but not limited to asignal bearing medium configured by one or more instructions related toproviding the ongoing detectable “warning” status alert output includes:one or more instructions related to displaying an unalterable detectable“warning” status alert output.
 20. A first system for indicating averification status of an e-paper document having an electronicallywritten image related to an associated item, comprising: means forperforming at least one of a reception of or a transmission of one ormore instructions in relation to a second system that includes at least:sensing means for scanning encrypted or encoded information incorporatedin the e-paper document; processing means for performing a securityvalidation on the encrypted or encoded information to determine whetherthe image has been altered; and alert indicator means disposed on thee-paper document for providing a first output responsive to the securityvalidation performed by said processing means.
 21. The first system ofclaim 20 wherein said second system further includes: second alertindicator means for providing a second output responsive to the securityvalidation performed by said processing means.
 22. The first system ofclaim 21 wherein the second alert indicator means is incorporated withthe associated item.
 23. The first system of claim 22 wherein the secondalert indicator means is incorporated with the associated item that isincluded in one or more of the following categories: product, equipment,apparatus, device, packaging, container, printed material, service,vehicle, machine, merchandise, clothing, food, chemical, medicine, rawmaterial, article of manufacture, component, and tool.
 24. The first ofclaim 21 wherein the second alert indicator means is incorporated withthe sensing means and/or with the processing means.
 25. The first systemof claim 21 wherein the second output is different from the firstoutput.
 26. The first system of claim 20 wherein said alert indicatormeans is configured to generate automatically a detectable “warning”status output alert if a result of the validation determinationindicates the encrypted or encoded data indicia has been altered withoutauthorization.
 27. The first system of claim 20 wherein said sensingmeans is configured to scan multiple types of encrypted or encodedinformation; and wherein said alert indicator means is configured toprovide a “warning” alert output responsive to an alteration detected inany of the multiple types of encrypted or encoded information.
 28. Thefirst system of claim 27 wherein said alert indicator means is furtherconfigured to provide an identity of a type of encrypted or encodedinformation determined by said processing means to have been altered.29. The first system of claim 20 wherein said alert indicator means isconfigured to provide an “ok” alert output responsive to no alterationdetected in the encrypted or encoded information.
 30. The first systemof claim 20 wherein said alert indicator means includes a pixel displayon the e-paper document.
 31. The first system of claim 20 wherein saidalert indicator means includes an unalterable display on the e-paperdocument.
 32. The first system of claim 20 wherein said alert indicatormeans includes a display detectable under one or more of the followingconditions: normal ambient light, infrared light, ultraviolet light,filtered light, specific environmental condition, specific time period,placement in electromagnetic field, and customized image processing. 33.The first system of claim 20 wherein said sensing means includesscanning means capable of reading encrypted or encoded information thatincludes one or more of the following categories: alphanumeric text,symbol, geometric design, monochrome scheme, color scheme, repeatedpattern, random pattern, boundary cross-over representation, legend,image, bar code, and hidden representation.
 34. The first system ofclaim 20 where said sensing means includes scanning means a-scannercapable of reading encrypted or encoded information located on thee-paper document and/or on the associated item or product or containeror package. 35.-45. (canceled)
 46. A system for providing verificationstatus for an e-paper document associated with an item, comprising:monitoring means for periodically monitoring encrypted or encoded dataindicia on the e-paper document; detecting means for detecting anunauthorized alteration to the encrypted or encoded data indicia; andalert means for generating an automatic status output alert based on aresult obtained by said detecting.
 47. The system of claim 46 whereinsaid monitoring means for periodically monitoring includes: means forinitiating said periodically monitoring under one or more of thefollowing circumstances: upon receipt of the e-paper document by adifferent entity; prior to transferring the e-paper document to adifferent entity; prior to attachment of the e-paper document to theassociated item; after attachment of the e-paper document to theassociated item; after encrypted or encoded data indicia has been addedto the e-paper document; after encrypted or encoded data indicia hasbeen changed or deleted from the e-paper document; and upon transfer ofthe associated item to a new location.
 48. The system of claim 46wherein said alert means for generating an automatic status output alertincludes: means for generating and maintaining an ongoing detectablealert output for a period of time, wherein the alert output includes an“ok” status alert or a “warning” status alert based on the resultobtained by said detecting means.
 49. The system of claim 46 furthercomprising: selecting means for optionally selecting desired outputinformation regarding a basis for the result obtained by said detectingmeans.