Graphically encoded icons having intrinsic attributes embedded therein and systems and methods for using same

ABSTRACT

A user instrument for engaging in a transaction includes a graphically encoded icon having a static portion, and an intrinsic portion comprising an area of stimuli-responsive material defining a first machine-readable indicia. At least a portion of the stimuli-responsive material transforms from a first state to a second state in response to a trigger. The transformation from the first state to the second state of the portion of the stimuli-response material results in a second machine-readable indicia. The transformation of the stimuli-responsive material from the first state to the second state is semi-irreversible. The second machine-readable indicia comprises information to permit or deny the user to engage in a second transaction via the user instrument.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/667,552, filed Oct. 29, 2019, which is pending and which iscontinuation-in-part of U.S. patent application Ser. No. 16/198,522,filed Nov. 21, 2018, which granted as U.S. Pat. No. 10,460,222 on Oct.29, 2019, and which claims priority to U.S. Provisional PatentApplication No. 62/590,117, filed Nov. 22, 2017, and U.S. Provisionalpatent Application No. 62/640,142, filed Mar. 8, 2018, the disclosuresof each of which are incorporated herein by reference in theirentireties.

FIELD OF THE DISCLOSURE

The disclosure relates generally to the field of graphically encodedicons. More specifically, the disclosure relates to graphically encodedicons having intrinsic attributes embedded therein, and to systems andmethods for using such graphically encoded icons.

SUMMARY

The following presents a simplified summary of the invention in order toprovide a basic understanding of some aspects of the invention. Thissummary is not an extensive overview of the invention. It is notintended to identify critical elements of the invention or to delineatethe scope of the invention. Its sole purpose is to present some conceptsof the invention in a simplified form as a prelude to the more detaileddescription that is presented elsewhere herein.

In one embodiment, a graphically encoded icon comprises a label attachedto an object. The label includes a static portion and an intrinsicportion. The static portion has an area of machine-readable indicia. Theintrinsic portion includes at least one area comprising astimuli-responsive material. The stimuli-responsive material isconfigured to change from a first state to a second state in response toa trigger, and the change in state is based on an attribute about theobject.

In another embodiment, a system for providing and responding to a visualindication of an attribute about an object includes a graphicallyencoded icon secured to an object and a computing device. Thegraphically encoded icon includes a static portion comprising staticmachine-readable indicia; and an intrinsic portion comprising at leastone area comprising a stimuli-responsive material configured to changefrom a first state to a second state in response to a trigger. Thechange in state is based on an attribute of the object. The computingdevice includes a processor in data communication with an input device,an output device, and computer memory. The computer memory has a programhaving machine readable instructions that, when effected by theprocessor, performs the following steps: (a) determine the change instate of the stimuli-responsive material; (b) determine if the change instate has reached a predetermined threshold; and (c) if the change instate has reached the predetermined threshold, activate the outputdevice to provide a controlled response to the change in state.

According to still another embodiment, a user instrument for engaging ina transaction includes a graphically encoded icon having a staticportion, and an intrinsic portion comprising an area ofstimuli-responsive material defining a first machine-readable indicia.At least a portion of the stimuli-responsive material transforms from afirst state to a second state in response to a trigger. Thetransformation from the first state to the second state of the portionof the stimuli-response material results in a second machine-readableindicia. The transformation of the stimuli-responsive material from thefirst state to the second state is semi-irreversible. The secondmachine-readable indicia comprises information to permit or deny theuser to engage in a second transaction via the user instrument.

In a further embodiment, a user instrument includes a graphicallyencoded icon having a static portion and an intrinsic portion comprisingan area of stimuli-responsive material defining a first machine-readableindicia. At least a portion of the stimuli-responsive materialtransforms from a first state to a second state in response to atrigger. The transformation from the first state to the second state ofthe portion of the stimuli-response material results in a secondmachine-readable indicia. The transformation of the stimuli-responsivematerial from the first state to the second state is semi-irreversible.

In still a further embodiment, a security system includes a userinstrument, a reader, and a signal generator. The user instrument isassociated with a user and includes a graphically encoded icon which hasan area of stimuli-responsive material defining a first machine-readableindicia. The reader is configured to read and decode the graphicallyencoded icon. The signal generator is configured to generate a signaloperable to transform at least a portion of the stimuli-responsivematerial from a first state to a second state, wherein thetransformation of the portion of the stimuli-responsive material resultsin a second machine-readable indicia. Each of the first machine-readableindicia and the second machine-readable indicia comprises information topermit or deny a user to engage in a transaction using the userinstrument. If the reader determines that the respectivemachine-readable indicia comprises information to permit the user toengage in the transaction using the user instrument, the user ispermitted to engage in the transaction.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Illustrative embodiments of the present disclosure are described indetail below with reference to the attached drawing figures and wherein:

FIG. 1 shows a PRIOR ART one dimensional barcode together with a scannertherefor.

FIG. 2 shows a PRIOR ART two-dimensional barcode together with a scannertherefor.

FIG. 3A shows a top side of a label having a graphically encoded iconaccording to an embodiment of the present disclosure.

FIG. 3B shows a bottom side of the label of FIG. 3A.

FIGS. 4A-4B show a top side of labels having a graphically encoded iconof the type shown in FIG. 3A.

FIG. 5 shows a top side of a label having a graphically encoded iconcomprising a fuzzy field, according to an embodiment.

FIGS. 6A-6C each show a container with the label of FIG. 5 disposedthereon.

FIG. 7 shows an alternate embodiment of the label of FIG. 5 comprising atwo-dimensional fuzzy field.

FIG. 8A-8B show a label having sections that are configured to bemanually triggered.

FIG. 9 shows a computing system for reading and processing the variousgraphically encoded icons disclosed herein.

FIG. 10 shows an embodiment of a label disposed on a container.

FIG. 11 shows a side view of the label of FIG. 10.

FIG. 12 shows a graphically encoded icon according to another embodimentof the invention.

FIG. 13 shows yet another graphically encoded icon according to anembodiment of the invention.

FIG. 14 shows a picture of an embodiment of a graphically encoded icondisposed on a salt shaker according to an embodiment of the invention.

FIG. 15 shows a one-dimensional graphically encoded icon according tostill another embodiment of the invention.

FIG. 16 shows a two-dimensional graphically encoded icon according tostill yet another embodiment of the invention.

FIG. 17 shows a plurality of graphically encoded icons disposed on athree-dimensional object according to a further embodiment of theinvention.

FIG. 18 shows a plurality of graphically encoded icons incorporated intoa label according to yet another embodiment of the invention.

FIGS. 19A-B show an exemplary embodiment of a graphically encoded iconaccording to various aspects of the invention included as part of abandage.

FIG. 20 illustrates a further embodiment of a graphically encoded iconaccording to various aspects of the invention included as part of acredit card.

FIG. 21 illustrates still yet another embodiment of a graphicallyencoded icon according to various aspects of the invention included aspart of a security badge.

DETAILED DESCRIPTION

The history of scanning, surveilling, dissecting, categorizing,decoding, and resolving information has been evolving for decades. Thereare many surveillance systems available today that are used formonitoring movement and identification of people or objects. Systemsexist today that utilize fixed position observation as well as movingpoints of perspective. System input sources can range from a singlecamera to multiple points of observation. One exemplary way thatsurveillance systems have been used is in the tracking of inventory.

Up until the late 1800s, commercial establishments tracked theirinventory primarily by hand. Such manual tracking of inventory waslaborious and time consuming. Manual entry of large amounts of data andtracking thereof was also prone to error. Efforts were therefore made todevelop machine readable indicia that could be used in large scaleapplications.

Punch cards, which typically comprised pieces of paper with holespunched therein, were invented in 1890 and allowed for inventory to betracked more efficiently. Customers identified the products they hadselected by removing the corresponding punch cards from a punch cardcatalog. The punch cards were then handed to the checkout clerk whopassed the punch cards through a reader. The reader comprised an opticallight and an optical sensor, and the punch card was placed in the readersuch that the optical light and the optical sensor were on opposingsides of the card. If the optical sensor detected light passing throughthe card, i.e., through a hole punched therein, the reader would outputa one; alternately, where the optical sensor detected no light, thereader would output a zero to indicate the absence of a punched hole.

Barcode scanning systems, which are configured to identify and decodeinanimate objects and markers, were then invented in the 1950 s andrevolutionized the way in which inventory was tracked. The planarperspective of these systems can be categorized into dimensionalperspectives (e.g. one, two, three, and multi-dimensional). The moredimensions of planar perspective available, the greater the ability toresolve more reliable information and greater yields of meaningfulintelligence. FIG. 1 shows an example of a one-dimensional barcode 10 asis known in the art. The prior art example barcode 10 includes aplurality of slots 12. Each slot 12 contains a predefined number ofstripes 14, including both black stripes 14A and white stripes 14B. Allslots 12 have the same width, and all stripes 14 have the same width. Aunique pattern of black and white stripes is associated with each digitfrom zero to nine. For example, one digit may be represented by twowhite stripes, two black stripes, two white stripes, and one blackstripe, whereas another digit may be represented by two white stripes,one black stripe, two white stripes, and two final black stripes, etc.The barcode 10 is readable by a barcode scanner 16. The scanner 16shines LED, laser, projector, photonic semiconductor or other light ontothe barcode 10. Light reflects back off barcode 10 into alight-detecting electronic component of the scanner 16, e.g., aphotoelectric cell thereof. White stripes 14B reflect more light ascompared to the black stripes 14A, which allows the scanner 16 toquickly decode the code. As the scanner 16 moves past the barcode 10,the cell generates a pattern of on-off pulses that correspond to theblack and white stripes. An electronic circuit attached to the scanner16 converts these on-off pulses into binary digits (zeros and ones) todecode the barcode 10.

Barcode 10 is typically referred to as a one dimensional or linearbarcode. This is because the information in the code is organizedhorizontally and is read from left to right. The data in aone-dimensional barcode 10 is limited in practice because addition ofdata thereto requires an increase in the physical length of the barcode10. It is this limitation of the one-dimensional barcode that in thelate 1980s led to the advent of two dimensional barcodes.

Two dimensional barcodes, such as a Quick Response (QR) code, aDatamatrix code, a PDF417 code, an Aztec code, etc., are configured tohold information in both the vertical and horizontal directions. Data isencoded in such two-dimensional barcodes in patterns, matrices, squares,hexagons, dots, and other shapes. Because the data is encoded in boththe vertical and horizontal directions, a two-dimensional barcode canstore much more information (e.g., 200 times more information) ascompared to a similarly sized one dimensional barcode.

FIG. 2 shows a QR code 20 as is known in the art. Each QR code includesmodules that contain static information required to read the QR code 20.For example, the illustrated QR code 20 includes three edge modules 22A,22B, and 22C (i.e., the three large squares) which tell the scannerwhere the edges of the QR code 20 are, and an alignment marker 22D thatacts as reference points for the scanner. The QR code 20 also containsother modules and zones, such as timing pattern markers to define thepositioning of the rows and columns, formatting markers to outlinewhether the QR code 20 contains numbers, text, symbols, or somecombination thereof, a quiet zone, etc. Data and error correctioninformation is encoded in a data encoding portion 24 of the QR code 20.As is known, QR code 20 can be read using a smart phone 30 or anotherdevice having an imager. To read the QR code 20, the imager of the QRcode reader 30 is used to capture an image of the QR code 20. Theprocessor of the QR code reader 30 then decodes the image and convertsit into information meaningful to humans.

Machine readable indicia, such as the barcode 10 and the QR code 20, canbe read by computing systems quickly (as compared to Arabic numerals,for example). However, humans are typically unable to decipher suchmachine-readable indicia using the naked eye. To this end, machinereadable indicia may be accompanied with static information that can bereadily comprehended by the naked eye. For example, the barcode 10 mayinclude at the bottom (or elsewhere) a sequence of Arabic numerals,Greek numerals, Chinese numerals, etc. that corresponds to themachine-readable indicia of the barcode 10 and allow the barcode 10 tobe read both by humans and by machines. Or, for instance, where machinereadable indicia on the QR code 20 translates to a product codecontaining letters of the English alphabet, these letters may be listedunderneath the machine-readable indicia to allow a human to comprehendthe information stored in the QR code 20 with the naked eye.

Associating machine-readable indicia with static human readable indiciahas several benefits. For example, if the barcode 10 or QR code 20 isdeformed or is otherwise rendered unreadable by a computing system, auser may read the static human readable information provided with thebarcode 10 and the QR code 20, respectively, and manually enter sameinto the computing system (e.g., a point of sale or other system). Thestatic human readable information may also be used for error detectionand correction, validation of the machine-readable data, security,encryption, etc.

While the one-dimensional barcodes represent a significant advance overthe punch cards of old and the two-dimensional barcodes represent asignificant advance over one-dimensional barcodes, the prior art one andtwo-dimensional barcodes are limited in that the information representedthereby is static. That is, once the prior art barcode 10 and the priorart QR code 20 are printed, they become fixed in form and cannot be usedto convey variable information. As discussed herein, machine-readableindicia that includes both static and variable information can have wideranging applicability. This is particularly so when the variableinformation conveyed by the machine-readable indicia: (a) is tied to anintrinsic attribute, e.g., of an object associated with the machinereadable indicia; and/or (b) can be readily comprehended both by thenaked eye and by computing systems.

Focus is directed to FIGS. 3A and 3B, which respectively show an uppersurface 302U and a lower surface 302L of a label 300 according to anembodiment of the present disclosure. The lower surface 302L of thelabel 300 may include an adhesive 308, e.g., at the edges there of orelsewhere, to allow the label 300 to be permanently or removably adheredto an object.

The upper surface 302U of the label may contain a graphically encodedicon 310. In an embodiment, the graphically encoded icon 310 isconfigured to be deciphered by a machine (e.g., a bar code scanner, animager, etc.) in its entirety and portions thereof are furtherconfigured to readily convey meaningful information about an attributeof an object associated with the label 300 to the naked eye. In someembodiments, a portion of the graphically encoded icon 310 is configuredto be deciphered by a machine, another portion of the graphicallyencoded icon 310 is configured to convey information to the naked eye,and yet another portion of the graphically encoded icon 310 is readableby a machine and is further configured to convey meaningful informationabout an attribute of an object associated with the label 300 to thenaked eye.

In the illustrated example, the graphically encoded icon 310 includes astatic portion 312 and an intrinsic attribute portion 314. The staticportion 312 comprises static machine-readable indicia, such as atraditional one-dimensional barcode, a traditional two-dimensionalbarcode, a three-dimensional barcode, etc. In embodiments, the staticportion 302 may also include information readily decipherable by thenaked eye; for example, where the static portion 302 is atwo-dimensional barcode, the static portion 302 may include a listing ofnumerals, alphabets, etc. that corresponds to the staticmachine-readable indicia.

The intrinsic attribute portion 314 may, in embodiments, be fully orpartially encapsulated by the static portion 312. The intrinsicattribute portion 314 may be configured to convey information about anattribute of an object to which the label 300 is adhered. Inembodiments, indicia in the intrinsic attribute portion 314 may bemachine readable and may further be configured to convey meaningfulinformation about the attribute of the object associated with the label300 to the naked eye.

In embodiments, indicia in the intrinsic attribute portion 314 maychange states based on a trigger. For example, in embodiments, indiciain the intrinsic attribute portion 314 may initially appear invisible tothe naked eye and to the scanner (e.g., a computing system having animager), and may thereafter change states based on a trigger to conveymeaningful information about an attribute associated with an object towhich the label 300 is adhered.

In embodiments, the intrinsic attribute portion 314 may includestimuli-responsive polymers 316 and/or other such materials that exhibita change in a characteristic thereof in response to a known stimulus.The change effectuated by the trigger may be one that is discernible bythe naked eye. For example, the intrinsic attribute portion 314 may, inembodiments, include thermochromic (i.e., temperature sensitive ink)that changes colors based on temperature. Or, for instance, theintrinsic attribute portion 314 may contain smart polymers and smartpolymer solutions that exhibit a visible change based on factors such ashumidity, pH, the wavelength and/or intensity of impinging light, anelectrical field, a magnetic field, etc. The artisan understands thatsmart polymers, e.g., poly propyl (acrylic acid), poly(ethacrylic acid),PMMA-PEG copolymer, polysilamine, poly(4-vinylpyridine),poly(2-vinylpyridine), poly(2-diethylaminoethyl methacrylate), etc.,which exhibit a visible change based on their environment arecommercially available in the marketplace today and that much researchis underway to develop additional stimuli-responsive materials. Thestimuli-responsive polymers 316 used in the present disclosure may, inembodiments, respond to one or more such factors by altering theircolor, transparency, or other physical attributes.

In embodiments, the response of the stimuli-responsive polymers in theintrinsic attribute portion 314, once triggered by the triggeringstimulus, may be permanent. Such stimuli-responsive polymers may bereferred to herein as irreversible stimuli-responsive polymers. In otherembodiments, the response of the stimuli-responsive polymers may bereversible. Such stimuli-responsive polymers may be referred to hereinas reversible stimuli-responsive polymers. Consider, for example, astimuli-responsive polymer that is initially transparent to the nakedeye but changes color, e.g., changes from being transparent to appearingin a red hue, when the environment in which it is located reaches atemperature equal to or greater than a triggering temperatureT_(trigger). If this example polymer can respond to the stimulus morethan once, e.g., turns red when the temperature reaches T_(trigger) andturns transparent again after the temperature reaches below T_(trigger),it may be referred to herein as a reversible stimuli-responsive polymer.Alternately, if this polymer maintains its changed state once theresponse is triggered notwithstanding any other changes in theenvironment, e.g., if the polymer turns red when the temperature reachesT_(trigger) and remains red even when the temperature goes belowT_(trigger), it may be referred to herein as an irreversiblestimuli-responsive polymer. It shall be understood that thestimuli-responsive polymer may be irreversible under normal operatingconditions, yet be reversed in response to a controlled stimulus (e.g.,to “reset” the polymer). Thus, the stimuli-responsive polymer may besemi-irreversible in certain embodiments. Depending on the application,embodiments of the present disclosure may employ a reversiblestimuli-responsive polymer, an irreversible stimuli-responsive polymer,a semi-irreversible stimuli-responsive polymer, or any combination ofthe three.

The graphically encoded icons disclosed herein, e.g., the graphicallyencoded icon 310, may have wide ranging applicability, and may beemployed in any application where it is desirable to readily convey anintrinsic attribute of an object associated with the graphically encodedicon 310 to the naked eye and/or to a machine.

Assume, for example, that containers carrying seafood (e.g., shrimp)from various locations are shipped to another location (e.g., to awarehouse). As is known, shrimp is preferably stored at a temperature of−22 degrees Fahrenheit. In the prior art, a one or two-dimensionalbarcode may be adhered to each of the various containers. The prior artbarcodes may outline, e.g., the shipping location, the location of theultimate recipient, the product code associated with the shrimp, andother such information. The prior art barcodes, however, do not outlinewhether the shrimp container was maintained at a desirable storagetemperature during transit.

FIG. 4A shows example shrimp containers 401 and 401′ that are to beshipped form a shipping location to a recipient. The example containers401 and 401′ are each shown as having a label 400 adhered thereto. Label400 is an example of the label 300 and includes a graphically encodedicon 410 of the type shown in FIGS. 3A and 3B. The graphically encodedicon 410 includes a static portion 412 containing staticmachine-readable indicia and an intrinsic attribute portion 414encapsulated by the static portion 412. In embodiments, care may betaken to ensure that the intrinsic attribute portion 414 is in the dataencoding portion of the graphically encoded icon (e.g., in embodiments,the intrinsic attribute portion 414 does not cover the edge modules, thealignment markers, etc.). Such may ensure that the indicia in the staticportion 412 and the intrinsic attribute portion 414 is readable by amachine.

In this example, the intrinsic attribute portion 414 contains anirreversible (or semi-irreversible) stimuli-responsive polymer 416configured to change its state when the temperature of the environmentexceeds −22 degrees Fahrenheit (or another temperature). That is, thetrigger in this example is a maximum temperature T_(trigger(max)). Asdiscussed herein, in other embodiments, the trigger may be a minimumtemperature or another factor. The irreversible stimuli-responsivepolymer 416 may initially appear transparent and may change to black,red or a different hue when the temperature of the environment exceeds−22 degrees Fahrenheit.

FIG. 4B shows the example shrimp containers 401 and 401′ as received bythe recipient. The label 400 on the container 401, and particularly theintrinsic attribute portion 414 thereof, now displays a triggernotification 420 (an X in this example). The trigger notification 420apprises the recipient that the shrimp container 401, during transit orat another time, was placed in an environment where the temperatureexceeded −22 degrees Fahrenheit. The recipient may therefore easilyobserve that the shrimp in the container 401 may be spoiled. Such mayallow the recipient to discard the shrimp container 401 without havingto open the container 401. Conversely, the intrinsic attribute portion414 of the container 401′ shown in FIG. 4B does not display the triggernotification 420. The recipient may therefore definitively observe thatthe shrimp container 401′ was maintained at a proper temperature duringtransit.

The trigger notification 420, shown as an X in FIG. 4B, may inembodiments be a different visible notification. For example, inembodiments, the trigger notification 420 may comprise the text “S” forspoiled. Or, for instance, the trigger notification 420 may be a square,circle, dashed line, or other shape or pattern that is visiblymanifested when the trigger condition is met. As noted, the triggernotification 420 may, in embodiments, be machine readable. For example,in embodiments, a computing system having an imager may be configured todecode the trigger notification 420 to determine whether the shrimp inthe various shrimp containers is spoiled. In these embodiments, a humanmay optionally verify the results using the naked eye. For instance, allshrimp containers flagged by the computing system as potentiallycontaining spoiled shrimp may be routed to an inspection area, andpersonnel may visually inspect these containers to ensure that thetrigger notification 420 has not been identified by the computing systemin error. Such may allow for the verification of spoilage of goods withgreater accuracy without having to inspect the goods themselves. FIG. 18illustrates a label having a plurality of graphically encoded icons withmachine readable and human readable information, including indicatingthat the temperature is within an acceptable range for the application.Thus, a user can easily verify that the temperature is acceptable, andthis may be further confirmed by the machine-readable indicia.

While the label 400 containing the graphically encoded icon 410 isillustrated above for a particular application (i.e., for shrimpcontainers), the artisan will understand from the present disclosurethat labels having graphically encoded icons disclosed herein may beused in other applications where it is desirable to determine whether atrigger condition is met. For example, in an embodiment, a label havinga graphically encoded icon of the type shown in FIGS. 3A-3B may beconfigured such that the intrinsic attribute portion 314 displays atrigger notification when the temperature equals or exceeds a particulartemperature T_(trigger(max)). For instance, in an example application,the T_(trigger(max)) may be 32 degrees Fahrenheit (or anothertemperature), and this label may be placed on paint containers. If theintrinsic attribute portion displays a trigger notification, such mayindicate that the paint in the container has undergone at least onefreezing cycle and is likely unfit for use. The label may thereforefacilitate the discarding of unusable paint without having to open thecontainer in which the paint is housed.

The graphically encoded icons 310 having an irreversiblestimuli-responsive polymer may serve, in effect, as single use orpermanent memory. The graphically encoded icons 310 having asemi-irreversible stimuli-responsive polymer may serve, in effect, assemi-permanent memory during normal operating conditions. Thesegraphically encoded icons 310 may be used, e.g., in applications wherethe relevant question is whether the trigger condition was met at somepoint in time; the current state of the environment, conversely, isunimportant. For example, if the label 400 is placed on a shrimpcontainer that has at one time (e.g., a day before, an hour before,etc.) been placed in an environment in which the temperature exceedsT_(trigger(max)), it may not matter than the shrimp container iscurrently in a suitable environment. In other embodiments, thegraphically encoded icon 310 may have a reversible stimuli-responsivepolymer, and may serve, in effect, as volatile memory. In theseapplications, the focus may be on the current state of the environmentand it may be unimportant to determine whether the trigger condition waspreviously met.

For example, in embodiments, the intrinsic attribute portion 314 of thegraphically encoded icon 310 may comprise a reversiblestimuli-responsive polymer, and this graphically encoded icon 310 may beplaced, via a label or otherwise, on bottles of water or other suchnon-perishable drinks in a restaurant. The stimuli-responsive polymermay be configured to exhibit a visible change when the temperature ofthe environment goes above 50 degrees Fahrenheit (i.e., in this example,the trigger is a maximum temperature and the value of T_(trigger(max))is 50 degrees Fahrenheit (or a different temperature). For instance, thestimuli-responsive polymer may appear to be transparent until thetemperature reaches T_(trigger(max)), at which point its hue may changeto red (or another color). When the bottle of water is to be served to acustomer, the server at the restaurant may visibly inspect thegraphically encoded icon 310, and where the intrinsic attribute portion314 thereof is transparent, the server may easily observe that the wateris appropriately cold and may be served to the customer. Alternately, ifthe intrinsic attribute portion 314 appears red, the server maydetermine that the bottled water is not suitably cold and should not beserved to the customer. The server may therefore place the bottle ofwater in a refrigerator or ice bucket and serve it to a customer whenthe reversible stimuli-responsive polymer in the intrinsic attributeportion 314 appears transparent. If the intrinsic attribute portion 314of the graphically encoded icon turns transparent and subsequently turnsred again, the server may place the bottle in the refrigerator onceagain. And so on.

Such graphically encoded icons 310 may likewise be used on bottles ofwater (or other drinks) being served in a vending machine. The vendingmachine may contain a computing system having an imager or otherscanner, and the computing system may vend a bottle of water only if thegraphically encoded icon 310 associated therewith appears transparent.Conversely, if the graphically encoded icon 310 associated with a bottleof water in the vending machine is red, the vending machine may vend adifferent bottle of water to a user; alternately, the vending machinemay apprise the user that cold bottled water is currently unavailablefor purchase.

In embodiments, the intrinsic attribute portion 314 of the graphicallyencoded icon 310 may comprise a reversible stimuli-responsive polymerconfigured to change its state when the temperature goes below a certaintemperature T_(trigger(min)). Such a graphically encoded icon 310 may,for example, be associated with coffee, tea, or other drinks to ensurethat these drinks, when served, are appropriately hot.

In some example embodiments discussed above, the graphically encodedicon 310, and particularly the intrinsic attribute portion 314 thereof,may employ Boolean logic. That is, the intrinsic attribute portion 314may have a binary value. For example, if the intrinsic attribute portion314 contains an irreversible stimuli-responsive polymer that isconfigured to change its state when a trigger condition is met, theintrinsic attribute portion 314 will either: (a) appear in one (e.g., achanged) state if the trigger condition is met; or (b) appear in another(e.g., an original) state if the trigger condition is unmet. Similarly,if the intrinsic attribute portion 314 contains a reversiblestimuli-responsive polymer, the intrinsic attribute portion 314 willeither: (a) appear in one (e.g., a changed) state if the triggercondition is currently being met; or (b) appear in another (e.g., anoriginal) state if the trigger condition is currently unmet. In someembodiments of the present disclosure, and as discussed in more detailherein, the intrinsic attribute portion 314 may employ many-valued logic(as opposed to Boolean logic). For example, in embodiments, theintrinsic attribute portion 314 may comprise a fuzzy field that may bein one state at one time, a second state at another time, a third stateat yet another time, and so on. In other embodiments still, theintrinsic attribute portion 314 may comprise each of a binary field anda fuzzy field.

FIG. 5 shows a top side of a label 500, which is another example of thelabel 300. The label 500 includes a graphically encoded icon 510comprising static portions 512A and 512B. The static portions 512A and512A each include static machine-readable indicia. The illustratedgraphically encoded icon 510 includes an intrinsic attribute portion514, which may be situated between the static portions 512A and 512B orelsewhere. In embodiments, the graphically encoded icon 510 may includea solitary static portion 512 and a solitary intrinsic attribute portion514. In other embodiments, the graphically encoded icon 510 may includea plurality of intrinsic attribute portions 514 and a solitary staticportion 512.

The illustrated intrinsic attribute portion 514 may be a fuzzy field.The illustrated fuzzy field 514 has ten possible levels 516(1) to516(10), although any number of levels may likewise be employed. Thefuzzy field levels may but need not be visibly demarcated. As discussedherein, the fuzzy field 514 may, in embodiments, be configured to be“filled in” by a substance. That is, in some embodiments, the intrinsicattribute portion 514 may be configured to directly delineate a quantityof a substance in a container to which the label 500 is adhered. Thesubstance may be a solid (e.g., candies, powdered salt, etc.), liquid(e.g., oil, coffee drinks, water, etc.), or gas (e.g., chlorine,nitrogen dioxide, etc.) that is visible to the naked eye. The fuzzyfield 514 may (but need not) be transparent or generally transparent soas to allow the level of a substance to be ascertained as discussedherein.

FIGS. 6A-6C show one example application of the label 500. Assume, forexample, that an entity (e.g., a commercial establishment such as arestaurant, a household, etc.) carries in a refrigerator or elsewhere acontainer 600 of salad dressing. Assume further that the entity wishesfor additional salad dressing to be ordered when the level of saladdressing in the container 600 falls below a certain level (e.g., fallsbelow the midway point). FIG. 6A shows the container of salad dressing600 with the label 500 adhered thereto. The container 600 shown in FIG.6A has no salad dressing therein. FIG. 6B, conversely, shows thecontainer 600 when it is generally full of salad dressing. And FIG. 6Cshows the container 600 that is only partially full.

The refrigerator (or the cupboard, kitchen, or other location) in whichthe container 600 is housed may contain or have associated therewith acomputing system having an imager. The imager may be configured tocapture an image of the container 600 periodically (e.g., once a day,once a week, etc.). The computing system may decode the graphicallyencoded icon 510 of the label 500, and particularly the fuzzy field 514thereof, to determine whether additional salad dressing is to beordered. For example, when the imager captures an image of the container600 in FIG. 6C, the computing system may determine that the level ofsalad dressing in the container 600 has fallen below a midway point. Thecomputing system may be in communication with a network and use same toorder an additional salad dressing container (e.g., the computing systemmay be in communication with the world wide web and use same toautomatically order another salad dressing from a grocery store). Or,for instance, the computing system may alert the user that a new saladdressing container is needed and/or add a salad dressing container to agrocery list communicated to the user. Alternately, when the imagercaptures an image of the container 600 in FIG. 6B, the computing systemmay determine that ordering of an additional salad dressing container isnot yet required. In this way, the label 500, and specifically the fuzzyfield 514 thereof configured to be filled in by a substance (saladdressing in this example), may ensure that the entity maintains therequired supply of salad dressing. The artisan will appreciate thatcontainers of salad dressing are but one example, and that the fuzzyfield 514 may likewise be used to track the quantity of other substances(e.g., milk in a refrigerator, oil in an oil tank, salt in a saltshaker, ketchup in a bottle, lotion in a tube, lint in a dryer, toner ina printer, etc.).

From time to time, the fuzzy field output may be between two discretelevels, e.g., may be between level 516(5) and 516(6). In embodiments,the computing system may be configured to round the output up or down byascertaining whether the output is closer to level 516(5) or level516(6). In other embodiments, an output between two levels may always berounded up or be rounded down.

The fuzzy field 514 of the label 500 illustrated in FIG. 5 is onedimensional. In other embodiments, the fuzzy field may be twodimensional, three dimensional, etc. FIG. 7 shows a label 700 that is anexample of the label 300. The label 700 has an intrinsic attribute areathat contains a fuzzy field 714 arranged as a two-dimensional matrix.The illustrated two-dimensional matrix has ten rows and four columns716A-716D.

In embodiments, each column 716A-716D may be adapted to convey the sameinformation and thus provide a mechanism to verify the reading of one ofthe columns 716A-716D. For example, the label 700 may be placed on thesalad dressing container of FIGS. 6A-6C and the computing system mayorder a new salad dressing container if at least three of the fourcolumns 716A-716D indicate that the salad dressing in the container hasfallen below the midway point (or another level). Assume, for instance,that the salad dressing container is generally empty but that a portionof salad dressing is stuck to the container walls, e.g., at level 8 ofcolumn 716A. If the fuzzy field 514 were one dimensional and containedonly column 716A, the computing system may have erroneously determinedthat the salad dressing in the container is at level 8, andconsequently, no salad dressing would have been ordered. The pluralityof fuzzy field columns 716A-716D may ensure that an accurate assessmentof the quantity of salad dressing in the container is obtainednotwithstanding the faulty reading of column 716A.

In embodiments, the computing system may be configured to average thereadings from the multiple columns 716A-716D, and the decision basedthereon (e.g., the decision to order a new salad dressing container) maybe based on this average. In other embodiments, integration and timestabilizing techniques may be used to normalize the fuzzy field outputs.

In embodiments, at least two of the columns 716A-716D may be configuredto convey different information. For example, column 716A may beconfigured to convey an amount of a substance and another column 716Dmay be configured to convey whether a trigger condition is met (e.g.,whether the temperature is below a certain temperature T_(trigger(min)).The multiple columns 716A-716D may be provided with different colorsthat are printed using the same or different printing techniques.

FIG. 8A shows a label 800 that is an alternate embodiment of the label300. The label 800 is substantially similar to the embodiment 200,except as specifically noted and/or shown, or as would be inherent.Further, those skilled in the art will appreciate that the embodiment300 (and thus the embodiment 800) may be modified in various ways, suchas through incorporating all or part of any of the various describedembodiments, for example. For uniformity and brevity, correspondingreference numbers may be used to indicate corresponding parts, thoughwith any noted deviations.

The example label 800 is shown as having a plurality of sections802A-802L. Each section 802A-802L may be configured to convey distinctinformation. For example, in the illustrated example, section 802Aconveys that a substance is extremely poisonous, section 802B conveysthat a substance is relatively explosive, section 802C conveys that asubstance is fairly poisonous, and so on. The trigger for each section802A-802L may (but need not) be the same. In this embodiment, thetrigger event may be one that is configured to be applied manually(i.e., the trigger event may be unlikely or impossible to occur on itsown). For example, the trigger may be a temperature of 150 degreesFahrenheit or another such trigger. Each section 802A-802J may initiallybe transparent, but may become visible when the trigger is appliedthereto. For example, FIG. 8B shows the label 800 in which sections 802Aand 8021 are manually triggered whereas the remaining sections appearinvisible to the naked eye.

The manually triggerable sections 802A-8021 may allow a user to use thelabel 800 to convey different information at different times. Forexample, the label 800 may be placed on a truck that typically carrieshazardous materials. If the material currently being carried by thetruck is highly poisonous and relatively flammable, only sections 802Aand 8021 may be triggered and the remaining sections may appear blank tothe naked eye. Similarly, if a different material is being transported,the appropriate sections may be triggered and the remaining sections mayremain deactivated. The warning indicia in each section 802A-8021 may bemaintained in its changed state using electronics or other means. Inorder to maintain standards throughout the industry, the Department ofTransportation has indicia (or labels) that are acceptable for eachpotential attribute of a hazardous material. Accordingly, the warningindicia revealed (or activated) for the material may be an approvedDepartment of Transportation indicium (or label) for the particularattribute of the hazardous material in order to avoid confusion.

In embodiments, it may not be necessary for the label to carry machinereadable indicia. Rather, the label may be singularly configured toprovide meaningful information about an attribute of an objectassociated with the label to the naked eye. FIG. 10 shows a label 1000according to an embodiment of the invention. The label 1000 issubstantially similar to label 300 except as is shown and described. Thelabel 1000 includes a graphically encoded icon 1010 having a one or moreportions 1015 a, 1015 b, 1015 c (generally 1015), and each portion mayinclude stimuli-responsive particles which may be embedded, for example,in a laminate or other transparent material. In one embodiment, each ofthe portions 1015 may have a plurality of static programmableelectrochromic (“SPEC”) non-volatile particles (hereinafter referred toas “SPECink”) distributed within the portion 1015 configured to change aparticular color upon a triggering event. In another embodiment, eachportion 1015 has a SPECink distributed therein, wherein each portion isconfigured to change to a different color upon a triggering event.

In FIG. 10, the label 1000 is configured for use on a container forholding leftover food (although the label 1000 may be used on othercontainers as well, and the container may hold items other than food).Here, the graphically encoded icon 1010 is divided into three portions1015 a, 1015 b, and 1015 c. Each of the portions 1015 a, 1015 b, and1015 c is coated (or partially coated, e.g., in a pattern) instimuli-responsive SPECink particles 1100 (FIG. 11) that changes a colorbased on a triggering event. Each of the portions 1015 a, 1015 b, and1015 c selectively change to a different color based on the triggeringevent. For example, portion 1015 a may be selectively green. Portion1015 b may be selectively yellow. And portion 1015 c may be selectivelyred. Optionally, a central portion 1020 is configured as a display (oruser interface) for providing information to a user.

The SPEC particles 1100 may form a non-volatile, semi-permanent SPECinkthat responds to a stimulus (e.g., electrical, magnetic, etc.) causingthe particles to switch between a first colored-state and a secondcolored-state (e.g., a white-state). The SPECink is consideredsemi-permanent because, once the SPEC particles have switched, e.g.,from the colored-2 state to the colored-1 state (or vice versa), theSPEC particles remain in that state until a stimulus (e.g., electrical)causes the SPEC particles to switch to the other state (e.g., from thecolored-1 state to the colored-2 state). The SPEC particles 1100 may belaminated between layers of film to form the top of the label 1000. Thecomposite layers contained within label 1000 may allow for scanningmodes of operation based on reflective, transmissive, or emittedwavelengths of energy (e.g. reflected light, transmitted filtered light,emissivity of IR thermal energy wavelengths, black-light,electroluminescence, UV, etc.)

In an embodiment, the triggering event is dependent on a predeterminedperiod of time, e.g., the time that the food in the container remainsedible. A user may place the label 1000 on the container having the foodtherein. Pressure sensors disposed within the label 1000 may allow theuser to interact with the user interface 1020 to toggle between numbersof days that the particular food may remain in the container (e.g., 2days, 3 days, 4 days, 5 days, 10 days, 30 days, etc.). Once the user hasselected the predetermined number of days that the food may remain inthe container, the portion 1015 a may turn green, and the container maybe placed in the refrigerator or cupboard, as the case may be. A timer1130 (FIG. 11) disposed within the label 1000 may keep track of theelapsed number of days, and upon reaching the half-life (e.g., 5 daysfor a label set for 10 days), the portion 1015 a may switch from thegreen-state to a white state (or a second colored state), and theportion 1015 b may switch from a white-state (or a second colored state)to a yellow-state. This readily alerts the user that the food in thecontainer is nearing the end of its edible life. The timer 1130continues to monitor the elapsed number of days, and upon reaching thepredetermined number of days, the portion 1015 b may switch from theyellow state to the white state, and the portion 1015 c may switch fromthe white state (or a second colored state) to a red-state. The user maythen readily see that the food in the container is deemed no-longer safeto eat, and the food may be disposed accordingly. The label 1000 may bereusable by simply toggling through the options to reach a “0” day,which may reset the label 1000 for later use.

Optionally, the label 1000 may include a communications module 1125. Thecommunications module 1125 may be configured to communicate (e.g., viaRFID, Bluetooth, near-field communication, or other data exchangefunction now known or later developed) with the user's phone, or withthe refrigerator (e.g., where the refrigerator is configured with adisplay). For example, at the half-life of the food in the container,the portions 1015 a and 1015 b may change as described above, and analert may additionally be sent to the user's phone to alert the userthat the food item is nearing expiration.

In some embodiments, the label 1000 may include one or more sensors 1135configured to determine the identity of the food in the container (or anattribute about the food in the container). Upon determining the food inthe container, the sensors 1135 may transmit the information (e.g., viathe communications module) to a processor 1140, which may access adatabase 1145 having information regarding spoilage information for avariety of food items. Upon locating the correct food item, theprocessor may cause the user interface 1020 to display information aboutthe food item (e.g., the number of recommended days for that food itemto be stored before spoilage), and the timer 1130 may be automaticallyset accordingly. In embodiments, the user may be required to confirm thedisplay information by, for example, touching the label 1000 (e.g., onetap indications confirmation, two taps causes the display to begin totoggle through the number of days).

Additional, or alternate, sensors may be incorporated into the label1000. For example, temperature sensors, bacteria sensors, humiditysensors, motion detectors, IR sensors, or any other sensor relevant tothe environment of the label, whether now known or later developed, maybe included as part of the label. The sensors may be configured todetermine various attributes about the environment of the label. Forexample, in embodiments where the label is incorporated into foodcontainers, a bacteria sensor may tell if harmful bacteria is present,or likely to be present (e.g., due to humidity conditions as measured bya humidity sensor). In other embodiments, such as where the label 1000is placed, for example, on a wall in a bathroom, a bacteria sensorincorporated into the label may detect the presence of bacteria in therestroom. In embodiments, the connection with the communications module1125 as described above may permit the label 1000 to be configured toprovide a dynamic controlled response to eliminate or reduce thebacteria. In such embodiments, an output device, such as a UV-A, UV-B,and/or UV-C light (or other appropriate output device for a particularsensor), which may be configured as part of the label 1000, or aseparate device in communication with the label 1000, may be activated.Activation of the UV-A, UV-B, and/or UV-C light (or other output device)may thus be triggered based on information received from a sensor. TheUV-A, UV-B, and/or UV-C light (or other output device) may remainactivated for a predetermined period of time (and thus may also be incommunication with the timer). Additionally, or alternately, the UV-A,UV-B, and/or UV-C (or other output device) may be automaticallyactivated after a particular time-lapse and may therefore not be relianton information from a sensor. For example, in an embodiment where thelabel is placed in the UV-A, UV-B, and/or UV-C light may be activated atthe half-life of a food item to ensure that the food remains healthy fora user to consume. In another embodiment, where the label is placed, forexample, on a wall in the bathroom, the UV-A, UV-B, and/or UV-C light,in connection with the timer, may be programmed to activate for, e.g., 5minutes every hour, 30 minutes between 12:00 a.m. and 1:00 a.m., etc. Toprevent harmful ultraviolet rays from reaching humans, a motion detectorin communication with the label 1000 may confirm that there are nohumans in the room before the UV-A, UV-B, and/or UV-C lights areactivated.

Because the power required to cause the particles to switch states islow, a lithium battery 1120 (or other type of battery such as anultra-capacitor, supercapacitor, or batteries having energy-harvestingcapabilities, for example) may be sufficient to cause the electricalstimulus needed to activate the particles. The battery 1120,communication module 1125, timer 1130, other sensors 1135, processor1140, and database 1145 may be (but need not be) embedded in a flexiblecircuit board 1110 which may be disposed at a backside of the label1000, as shown in FIG. 11. In embodiments, the one or more sensors maybe configured as an adhesive layer 1115. Here, the adhesive may beconfigured to act as a pressure sensor to allow the user to set thetimer as described herein. In an embodiment, the adhesive 1115 mayfurther act as a heater or defroster. The heater or defroster may beconfigured to defrost a portion of the container to allow the user tosee inside of the container. Exemplary adhesives are described in U.S.patent application Ser. Nos. 15/365,923 and 15/678,392, for example.

While the label 1000 is described as being adhered to a container forstoring food, it shall be understood that the label 1000 may beconfigured for other purposes, including placement on freight packaging,shelf displays, etc. The label 1000 may, but need not includecomputer-readable information as described herein. As will be understoodby those of skill in the art, the user interface (via the processor) maybe configured to provide information relevant to the environment inwhich the label 1000 is deployed, and is not limited by the descriptionprovided herein.

It shall be further understood that the SPEC particles may beincorporated for use in many additional applications. It shall be clearfrom the above discussion that the SPEC particles have color changingattributes. The particles may be programmable, reprogrammable,transmissive, reflective, visible within the human visible range, and/oremissive within the infrared and/or ultraviolet spectrums. Inembodiments, the particles may be virtually invisible to human viewersin one mode (e.g., an “off” mode) and in another mode (e.g., an“activated” mode) the particles may become visible. In furtherembodiment, the particles may be incorporated into liquid crystaldisplays (LCD), light emitting diode (LED) displays, electroluminescent(EL) displays, and/or organic light emitting diode (OLED) displays.

Among other reasons, the SPEC particles having color changing attributesmay make the particles particularly useful in human-engagingapplications where real-time information and/or safety is key. The SPECparticles may be deposited on virtually any surface. In embodiments, theSPEC particles may be laminated between layers of transparent substrateor film. The resultant substrate having the SPEC particles may beincorporated as, for example, a book cover, a page in a book, or may beinserted into a pocket formed into a folder or book. The SPEC particlesmay be uniformly deposited, deposited in a pattern, etc. In oneembodiment, a plurality of SPEC particles having identicalcolor-changing attributes may be deposited onto or within the substrate(e.g., all particles are a first color in a first mode (a “resting”mode) and a second color in a second mode (an “activated” mode)). Inanother embodiment, a plurality of a first type of SPEC particles havinga first color changing attribute, and a plurality of a second type ofSPEC particles having a second color changing attribute, may bedeposited onto or within the substrate. The first and second types ofparticles may be deposited in a particular pattern. Additional types ofSPEC particles may optionally be included. As described herein, power tothe particles may be provided via a flexible circuit board which may beprovided behind the particles, or embedded between layers of particles.The flexible circuit board may have a variety of components (e.g.,batteries, memory, processors, communication modules, etc.) as is knownin the art. The communication modules may allow the particles to reactin response to a remote signal. Consider for example, an embodimentwhere a plurality of particles is deposited on a substrate that isincorporated into a folder or binder for students in a school. A firstportion of the particles may be selectively activated by the student todisplay the student's favorite color. The substrate (e.g., via thecommunications module) may be in communication with an alert system atthe school. In an emergency situation, the alert system may beactivated, and the communications modules of each of the substrates mayreceive an alert. The alert may cause the first portion of the particlesto selectively transition to the “resting” mode (e.g., a color-2 mode,or a white mode). A second portion of the particles (e.g., beingselectively red in an activated state) may then be activated to alertthe students to the emergency situation. In embodiments, the particles,in communication with the alert system, may be programmed to provide aninstruction message to the students (e.g., “Take cover in closet”,“Remain in place”, etc.). Optionally, the second portion of theparticles may “flash” between the activated state and the resting stateto provide the student with a visual, eye catching alert. Thus,emergency situations may be easily, quickly, and quietly communicated tostudents throughout a school.

Of course, the substrate may be incorporated into various devices withina home, workplace, public destination, outdoor environment, etc. Severalfurther examples are provided below, which are intended to be exemplaryin nature only and not intended to be limiting.

In one embodiment, the SPEC particles are incorporated into a paint,SPECink, or adhesive that may be used to provide color changingattributes to, for example, beverage or food containers. For example,consider a traditional Diet-Coke® can. The red ink on the can may bereplaced by SPECink comprising the SPEC particles. In a “rest” state,the particles may appear as a red ink, similar to what is shown on atraditional can. Upon activation, however, the particles may “flash”between a colored-1 state (e.g., red) and a colored-2 state (e.g.,white, or another color). Such flashing may cause attention to be drawntowards the can, providing increased branding recognition. Inembodiments, sensors may optionally be distributed at or near the can(or within the ink itself) to measure, for example, the amount of liquidin the can. When the can is full, the particles may show the ink in a“rest” state. As the contents in the can are depleted, the particles maybegin to flash, for example, slowly at first, and more quickly as thecan approaches emptiness. Thus, in a retail environment, it may bepossible for a waiter to quickly and easily tell whether a customer isin need of another drink (e.g., similar to the fuzzy field graphicallyencoded icons described above) while the user sees an aestheticallypleasing and intriguing can exterior.

Similarly, the particles may be distributed, for example, on the outsidesurface of a flower pot (e.g., as a paint). Moisture sensors may also bedistributed at or near the flower pot. As the water evaporates leavingthe plant dry (as measured by the sensors), the particles may begin toflash between a colored-1 state and a colored-2 state. In embodiments,the sensors may be distributed along a vertical line in or on the pot.As the water evaporates, the sensors may cause the particles to switchfrom a colored-1 state to a colored-2 state. The sensors may bepre-programmed to cause the particles to switch at a predeterminedmoisture content (e.g., at or below 10% moisture) Therefore, a viewermay be able to readily tell the moisture content of the soil in the pot,and may thus provide water. In certain embodiments, a plurality ofparticles having different colored-1 and colored-2 states may bedeposited on the pot (e.g., different shades of green). When themoisture content is at 100%, a first particle may be activated to showthe pot as, for example, Kelly green. As the moisture content decreases,the first type of particles may be deactivated (e.g., flip to acolored-2 state, such as white or black) and a second-type of particlemay be activated, thereby changing the apparent color of the pot.

In another embodiment, the SPEC particles may be utilized as a paint,SPECink, distributed within a film, or laminated within a substrate foruse on displays such as road signs or traffic cones. Of course, otherdisplays (e.g., store displays) may additionally utilize such particlesto draw attention to a particular product, sale, etc. Here, portions ofa display, such as a road sign, may have particles distributed in apattern known to drivers. For example, consider object markers used onthe road today (road signs having a yellow background with blackdiagonal stripes). Here, particles may be programmed such that in afirst state, the particles distributed in the traditionally yellowsection are viewable to the user as “yellow” and the particlesdistributed in the traditionally black section are viewable to the useras “black.” When the particles are activated (e.g., via a temporalsensors, light sensors, etc.), the particles in the traditionally yellowsection may flash to black, and the particles in the traditionallyyellow section may flash to yellow. The flashing may occur in successionfor a predetermined period of time. Similarly, a stop sign may beconfigured to flash between white and red. In embodiments, it may beparticularly useful if the particles have a reflective attributes. Thus,attention is drawn to traffic signals such that drivers may be madeincreasingly aware of the hazard or instruction.

In still another embodiment, the particles may be utilized as a paint,ink, distributed within a film, or laminated within a substrate for usewith tiles (e.g., floor tiles, tiles for a counter top, etc.). This maybe particularly useful in retail environments (e.g., grocery stores)where hazards may occur that are not readily identifiable by shoppers.For example, a substrate having the particles dispersed therein may be alayer of a tile. The tile may include one or more of a variety ofsensors (e.g., moisture, bacteria, temperature, etc.). In an embodiment,the tile is configured for use on a floor. Moisture sensors disposed onor within the substrate may detect when a spill is affecting aparticular tile. If the sensor detects that there is moisture on thetile, the particles in the substrate may change from a colored-1 stateto a colored-2 state to alert customers that the tile is not safe andthat an alternate route should be taken. In another embodiment, the tileis configured for use on a countertop. Here, bacteria sensors disposedon or within the substrate may detect the presence of harmful bacteria.If the sensor detects that there is harmful bacteria, the particles inthe substrate may change from a colored-1 state to a colored-2 state toalert the user that the tile is not safe and that the tile should bethoroughly cleaned. Optionally, when the bacteria sensor identifies thepresence of harmful bacteria, a bacteria-killing light (e.g., UV-A,UV-B, and/or UV-C, which may be a part of the substrate or remotelypositioned such that the light contacts the substrate, for example,under the upper cabinets) may be activated to remedy the situation.

The floor tiles may include sections of sidewalks at intersections(e.g., the corner sections). The particles may be distributed to provideinformation to a user such as to flash red if it is not safe to crossthe road, or to provide direction indicators (e.g., arrows). In someembodiments, the sidewalks may include additional programmable smartmaterial particles, such as particles configured to heat up (e.g., so asto melt snow at busy cross-sections).

It shall thus be understood that the particles may be utilized in avariety of different applications, and further non-limiting applicationsinclude use with fishing lures, as an additive to nail polish, on shoes,purses, sunglasses, sportswear, military gear, and other fashion forwarditems, in building materials such as wall-paint, on baseboards, ondoors, shingles, etc. The particles may additionally be utilized toprogram machine readable indicia on the graphically encoded iconsdescribed herein.

For example, consider again FIGS. 3A, 4A, 4B, 5, 6A-C, 7, as well asFIGS. 12 and 13. FIGS. 12 and 13 represent exemplary configurations ofgraphically encoded icons 600 having a non-rectangular shape. Within thegraphically encoded icons 600 are machine readable sections 610 havingareas of programmability. Here, the dark-colored dots are arranged in apattern so as to provide information about an object to which thegraphically encoded icon 600 is attached. The dots may be areas of SPECparticles that are “activated” (i.e., turned to a color state), and thewhite areas likewise correspond to areas of SPEC particles that are“deactivated” (i.e., turned to a white state). The black dots can be“deactivated” and one or more portions of the white area can be“activated” from time to time in order to convey updated informationabout the object. For example, on a shipping pallet the information maybe updated to provide each location where the pallet was loaded orunloaded onto a carrier, the length of time spent at each location, theparties involved in the transaction, etc. Accordingly, the graphicallyencoded icons can dynamically provide information to a user.

Thus it is clear that graphically encoded icons can be encoded inseveral modes, including passive, proactive, and dynamic. Thegraphically encoded icons allow for readings of attributes about anobject (e.g., container, surface, or system) which can be presented asgeometrically predictable and decodable icons, images, or patterns inorder to express qualitative and/or quantitative data. The SPECparticles may be configured to form lattice or lattice-work structuresthat can be formed into the geometric shapes forming the graphicallyencoded icons. In embodiments, the lattice-work can be programmed toform a structural array of elements (or node particles) that can beformed in one-, two-, or three-dimensional groupings.

While prior art systems provide means by which information can bepresented to, and encoded by, humans and machine, such information islimited to numerical strings. However, in certain applications, it maybe important for the information to convey not a number, but an actualattribute of the product or item that one is attempting to encode forscanning purposes by an observer. For example, and similar to thedressing container described above, a salt shaker (FIG. 14) on the tablemay contain a label that has a vertical gradient pattern that resemblesindustry standard bar code patterns. There may be a desire to scanintrinsic attributes related to the contents of the salt shakercontainer. The fields of information (e.g., the area in which the blackdots occur) may be structured and encoded in such a manner that thelevel and contents of the salt shaker can be qualitatively examined by ascanning and decoding system without digitally acquiring the contentlevel of the container. In this example, the white salt may contrastagainst a darker printing of a graphically encoded icon “frame” that isstrategically placed onto the container. The mixed-mode of quantifieddata fields, along with qualified fuzzy fields (or analog data—the areain which one can see through the container and into the contents of thecontainer) may be advantageous when the goal is to read naturallyoccurring physical attributes. The patterns and placement of thegraphically encoded icon frame may increase the probability of decodinga reliable reading of the fuzzy fields.

In embodiments, a scanning voting system such as a simple 3-of-5 readingand scoring system may be employed to improve reliability of the scanneddata. If the fuzzy fields yield varying results over time via multiplescans, in embodiments, a computing system may average and/or accept themore prevalent result of the fields that are scanned. These techniquesmay assist in reliability for qualitative fuzzy fields and increasereliability of scanned quantitative fields. A quantitative field may beone that is fixed (e.g., is in one of two states). In embodiments,reliability may be enhanced by a mathematical cross-checking system suchas checksums, CRC, etc.

Qualitative fields may be enhanced in reliability by comparing sets ofanalog data in adjoining contiguous fuzzy fields such as a gray-scalereading of the salt shaker in a vertical range of the graphicallyencoded icon overall frame. The relative readings of analog grayscale(and/or, in embodiments, colors in RGB) may assist in finding thespecific granularity of reading the content layer of salt. This mayallow anomalies such as dirt or other data-noise to prevent falsereadings. In embodiments, it may be desirable to exclude the fuzzyfields from the mathematical calculations that are used to validate thequantitative fields.

Multiple versions of the encoded data set may be made available to theobserver during scanning and decoding. One version of information (e.g.,passive) may be a strictly digital and quantitative perspective thatexcludes the fuzzy bits entirely. Another version (e.g., proactive) mayinclude all bits and fields but the fuzzy bits are triggered by a 50%(or other level) decision of logic for their data result for each fuzzyfield. A more advanced mode (e.g., dynamic) may incorporate one or moreof the techniques above such as multiple scan, voting, and CRC errordetection and correction. In an embodiment, the computing system in aRAW mode stores an image of the overall icon for further processing;this data may be sent to the cloud for processing and system levelanalysis.

A passive mode graphically encoded icon may be as simple as a line thathas markings at measurable points along a line. The quantified datarepresented by the graphically encoded may be a wider marking at acertain location along the line as compared to the other unit markingsalong the line. FIGS. 15 and 16 below provide examples of a onedimensional and a two dimensional graphically encoded icon,respectively. In FIG. 15, the graphically encoded icon can be read asnumber 8. In FIG. 16, the graphically encoded icon can be read as aseries of numbers 3, 5, 8, 11.

In embodiments, multiple dimensions may exist with different colors orvaried printing techniques that reflect based on excitation wavelengthsof light or energy waveforms (such as radio frequencies (RF)). Focallengths may be used to increase the perceivable and recognizabledimensions of graphically encoded icon recognition.

Quantitative data encoding may yield specific information in the form ofnumerical values that can be mathematically validated. This may be inthe form of checksums, CRC algorithms, or other techniques such asredundant bit stuffing relying on statistical probability to yield aresulting probable error percentage in GEI data decoding. Thesetechniques are generally used for error detection or data fieldvalidation. However, one of the major benefits beyond Error Detectionwhen encoding quantitative (or digital) data may be the potentialability to provide Error Correction to fields of data (rows, columns,shapes, lines, dashes, etc.) where a questionable reading has occurred.

In embodiments, qualitative or fuzzy logic data may be encodedintentionally or naturally based on material properties. An example ofqualitative data (or fuzzy bits) may be an observer examining thescratched part of the CD and reporting the “best guess” of whether thescratched portion should be replaced by a one or a zero. Another examplewould be a sequence of encoded numbers for 1, 2, 3, 4, and 5, but theobserver reads 1, 2, 3, ?, 5. If the observer takes several readings andthe questionable data field is close to “4” then four is likely thecorrect answer. This would be a case of a qualitative review forconsideration as a resolution to the fuzzy field of data.

As described above, smart materials such as SPECink, may be utilized toexist on or within a substance (or structure) in such a way that cancreate a grid or pattern of graphically encoded icon fields. Each areaof SPECink may be switchable to be dark or light based on a desiredstate of information for a graphically encoded icon field. In anembodiment, a graphically encoded icon field or group of fields maychange color based on vibration, exposure to bacteria, moisture, aging,etc. These fields may generally be envisioned as fuzzy fields. However,in some cases the natural function and reliability of programmablematter may be deterministic and viewed as pseudo-digital (i.e., it canbe reliably read as “on” or “off” with minimal unknown status). In thesecases, the encoding system may treat such fields as qualitative buthighly reliable. Or, in advanced systems, the error detection andcorrection calculations may have an active mode that changes a checksumfield state based on intrinsic field fuzzy readings or trigger levels.In embodiments, integration and time stabilizing techniques may be usedto normalize the fuzzy field trigger decisions.

One of the limitations of data acquisition and collection is the limitednumber of access points throughout the universe and on planet Earthtoday. Current methods strive to apply blanket coverage of ubiquitousaccess points of data collection opportunity to allow an overlappingmesh grid for SCADA and IoT communication globally. However, it isimportant to note that graphically encoded icons (or encoded patterns)can be utilized in nearly any environment to provide information to auser. In embodiments, roadways may have surface patterns that include orresemble a QR code that contains some fixed quantitative graphicallyencoded icon fields, while other fields may comprise programmableparticles within the asphalt or concrete itself.

One goal of graphically encoded icon usage in the mass deployment andintrinsic mode is to allow many mobile collection nodes (e.g., cameras,phones, cars safety systems, roadway traffic scanners, energy managementsystems, self-driving highway systems, etc.) to scan at will throughopportunistic free-will. This concept may be encoded beyond just thestructure of the graphically encoded icon field shapes and purposes. Inan embodiment, one goal is to setup fields on the graphically encodedicon patterns in such a way as to attract an observer to scan manygraphically encoded icon images into a device that is at a knownphysical location, at a known time, from a known entity (e.g., machine,person, system, etc.). The scan may encode an end-node identifier foritself and a routing target destination (i.e. www.ioTwebpaae.com) butappend with supplemental fields of information such as sensor readings,trending data alerts, and requests to the higher-level system.

Data resulting from the user's scan may include post critical andintrinsically available data along with location, time, and locallyimportant data/alerts. The user may then receive a resulting webpageincluding information about the area he is visiting or a coupon for theclosest restaurant. The combination of multi-purpose media and networkusage along with redundant network scanning reinforcement may providehundreds of readings each day to the same end-nodes for data collectionpurposes. Additionally, there may be a back-channel such as localizedBluetooth or WiFi that provides a limited link for data to be returnedto the end-node while the user is nearby in the scanning session. Thismay all occur in real-time as a user's car drives by a specific milemarker on the highway.

Mass scanning of end-nodes from multiple opportunistic network taps mayenhance security and provide a more stable access path to millions ofend nodes. Furthermore, the fuzzy intrinsic fields may be resolved morereliably with multiple devices and network access methods being utilizedin real-time. The concept of “data analytics in the cloud” may berealized more easily with such a mass collection system as opposed to amassive web-mesh system. All of these techniques may be usedinterchangeably.

Security may be enhanced by providing fragments of data that havelimited perspective and may be encrypted in a rolling system over timeand contain different encryption keys, methods, and data stuffingtechniques per end-node. By positioning hundreds of data fragments onvarying networks and having obscure purpose for each node, the dataitself can become very benign. Furthermore, the output for the user canevolve to be socially appealing and the data backchannels may becomeessentially seamless, and extremely low-cost to operate.

In embodiments, groupings and distribution of multiple graphicallyencoded icon patterns as an array or composite set may be useful tocreate patterns that are duplicating and replicated based on the scale(or zoom level) of the observer. Techniques such as fractal encoding maybe used to create repeating patterns over scale zoom levels that canhelp with broad phase alignment, authentication, and decodingsynchronization.

Patterns of graphically encoded icons may be planar or 3D geometricallyshaped such as a sphere or buckyball polygon with three-dimensionaldistribution of fields (e.g., FIG. 17). Distribution of planar fields ona three-dimensional multi-planar surface such as a sphere (or geodesicdome) may create a concave or convex distribution of planar fields. Theembedded and encoded geometric patterns may be used to enhance theplanar integrity of the graphically encoded icon, or graphically encodedicons within the three-dimensional space. Mathematical techniques may beused to adjust and correct the perspective of planar distortion andimplied or inferred geometric patterning. Individual data fields mayalso contain geometric patterns or shapes within one-dimensional,two-dimensional, or three-dimensional perspective, and may not need tobe a specific dot in space. Thus, a data field may actually be a subsetof a fractal encoded environment.

Data field elements within the graphically encoded icon may be passivesuch as reflective or transmissive of a particular color or pattern.Each data field may also contain a geometric shape or pattern of motionor attribute that changes over time. An example of this could be aspecific data field that is a resonant molecule or cluster of moleculesthat is vibrating or rotating at a specific vibration or resonantfrequency pattern (including harmonics).

Graphically encoded icons can be utilized with systems within themacro-, micro-, and/or nano-scale. An example of a nanoscaleimplementation may include an outer definition of the graphicallyencoded icon geometry made up of carbon nanotubes that could contain adistribution or lattice of C-60 (i.e., Buckyballs) that could encode aspecific pattern of data wherein the Buckyballs create the individualdata fields and a three-dimensional perspective may be representedthrough the resonance or vibration of regionally positioned carbonmolecules.

A macroscale implementation may have galactic applications. Imagine adistribution within a galaxy of pulsars where the pulsars are theencoded data field positions within the graphically encoded iconpattern. Each pulsar may be transmitting a series of information beaconsby varying their magnetic rotation or position including color orradiation pattern. The combination of static fields such as starpositions of particular color temperature may be used to identifyorientation and position of the graphically encoded icon while theindividual data fields may be encoded as a composite of the informationintended to be decoded by the viewer. A simple example would be multiplepulsars that are transmitting different bits of information such as theone's place is transmitted by Pulsar A, the two's place is transmittedby Pulsar B, and the four's place is transmitted by pulsar C. Thesynchronicity of the informational asynchronous composite of graphicallyencoded icon(s) may provide complex information transmission that can besampled over time by the viewer.

A more micro perspective could be a segment of magnetic tape thatcontains a two-dimensional grid of magnetic particles such as ferricoxide that contain a gradient of electromagnetic poles similar to amagnetic strip or magnetic audio tape. But in a graphical application,there may be a fixed position of two-dimensional geometric patterns thatcan be scanned without requiring a sequential swiping of the tapeitself. Each magnetic particle can become a graphically encoded icondata field, while the composite of the magnetic pattern can make up thegraphically encoded icon geometric definition or shape.

It is thus evident that graphically encoded icons can be utilized inmany different scenarios and for many different purposes in order tosend and receive information securely and in a way that the informationcan be readily identified and updated as necessary. Graphically encodedicons may be utilized in one-dimensional, two-dimensional, or eventhree-dimensional form. Different embodiments of graphically encodedicons, such as icons 310, 410, 510, 500, and/or 1010 can be developedand utilized depending on the situation, and it should be understoodthat multiple versions of graphically encoded icons may be utilized inany given situation.

For example, FIGS. 19A-B illustrate a bandage 2000 having a graphicallyencoded icon 2010. The graphically encoded icon 2010 may besubstantially similar to graphically encoded icon 310, 410, 510, and/or1010, for example. The graphically encoded icon 2010 may include atleast one static portion 2012 and at least one intrinsic portion 2014.The intrinsic portion 2014 may be configured to provide informationabout a person wearing the bandage, and in some embodiments, may bereconfigurable as described herein. For example, one or more areas ofthe intrinsic portion 2014 may change states based on a trigger. Forexample, in embodiments, indicia in the intrinsic attribute portion 314may initially appear invisible to the naked eye and to the scanner(e.g., a computing system having an imager), and may thereafter changestates based on a trigger (e.g., an input, such as from a doctor) toconvey meaningful information about an attribute associated with theperson with which the graphically encoded icon 2010 is associated.

As with embodiment 300, the intrinsic attribute portion 2014 may includestimuli-responsive polymers and/or other such materials that exhibit achange in a characteristic thereof in response to a known stimulus. Forexample, and as discussed above regarding embodiment 1000, the bandage2000, may include a communications module 2125. The communicationsmodule 2125 may be configured to communicate (e.g., via RFID, Bluetooth,near-field communication, or other data exchange function now known orlater developed) with a computing device, such as a physician's computeror a user's phone. For example, the physician may complete imaging scanson a person wearing the bandage, and the intrinsic portion 2014 may beupdated to include information about the most recent scan. When thegraphically encoded icon 2010 is thereafter read (e.g., via an imagingdevice at a later doctor visit), the information about the patient canbe readily scanned and ascertained by the doctor without having to pullthe patient's files, thus saving time and effort. In embodiments, theresponse of the stimuli-responsive polymers in the intrinsic attributeportion 2014, once triggered by the triggering stimulus, may bepermanent, semi-permanent, and/or reversible.

In some embodiments, the GEI 2012 may include one or more sensors 2135configured to determine an attribute about an area underlying thebandage 2000. Upon determining the attribute (e.g., presence ofbacteria), the sensors 2135 may transmit the information (e.g., via thecommunications module) to a processor 2140. The processor 2140 may storethe information in a database 2145. In some embodiments, the bandage2000 may include a networking device 2150 configured to communicate overa network with a third party, such as a treating physician. Thus,information may be easily transmitted between the person wearing thebandage 2000 and the physician without having to rely on the person torelay information to the physician themselves.

Additional, or alternate, sensors may be incorporated into the bandage2000. For example, temperature sensors, bacteria sensors, humiditysensors, motion detectors, IR sensors, imaging sensors, or any othersensor relevant to the environment of the bandage 2000, whether nowknown or later developed, may be included. The sensors may be configuredto determine various attributes about the environment of the bandage2000.

In embodiments, the connection with the communications module 2125 asdescribed above may permit the bandage 2000 to be configured to providea dynamic controlled response to eliminate or reduce a scenario, eitherautomatically or in conjunction with a treating physician. For example,where it is determined that certain harmful bacteria is present, anoutput device 2155, such as a UV light (or other appropriate outputdevice for a particular sensor), which may be configured as part of thebandage 2000, or a separate device in communication with the bandage2000, may be activated. Activation of the output device 2155 may thus betriggered based on information received from a sensor 2135. However, insome embodiments, the physician may be required to communicate with thebandage 2000 (e.g., remotely over a network via the networking device2150) to activate the output device 2155.

A battery 2120 (or other type of battery such as an ultra-capacitor,supercapacitor, or batteries having energy-harvesting capabilities, forexample) may be sufficient to cause the electrical stimulus needed toactivate the bandage 2000, and particularly the particles of theintrinsic portion 2014, the sensors 2135, the output device 2155, and/orany other component of the bandage 2000. The battery 2120, communicationmodule 2125, other sensors 2135, processor 2140, and database 2145 maybe (but need not be) embedded in a flexible circuit board.

FIGS. 20 and 21 illustrate still further embodiments of accessoriesincorporating graphically encoded icons (e.g., such as graphicallyencoded icons 310, 410, 510, 1010, etc.) to increase security byutilizing cryptography, namely, GEIs, to encrypt data that is bothdynamic and verifiable. In FIG. 20, a credit card 3000 includes a chip3005 typical with modern-day credit cards, and a graphically encodedicon 3010, which may be substantially similar to graphically encodedicon 310, 410, 510, and/or 1010, as described herein. The graphicallyencoded icon 3010 may thus include a static portion 3012, and anintrinsic portion 3014 that includes at least one area that may changestates based on a trigger. The trigger may be, for example, theinteraction of the credit card with the credit card reader. In otherwords, when the credit card is used to complete a transaction, theintrinsic portion 3014 may be updated. Thus, the intrinsic portion 3014may include a permanent, semi-permanent, or reversible record of thetransactions associated with the card. In some embodiments, theintrinsic portion 3014 includes an embedded key validator that allowsthe user and/or the system (e.g., the GEI reader) to validate thecurrent transaction and/or future transactions. In some embodiments, aembedded key validator may be a validation area 3020, which may beincorporated directly into the GEI 3010, or may be separate therefrom.The validation area 3020 may provide a visual indicator, which may behuman readable and/or machine readable, that a transaction is verifiedas being authentic, skeptical, and/or fraudulent. In embodiments, thevalidation area 3020 may include SPEC particles that are programmable toturn color, provide an image, or otherwise indicate the current statusof the card. The validation area 3020 may be triggered via the cardreader during a transaction. For example, if the card 3000 is used topurchase an item in a location that is atypical for the card user, thenthe validation area 3020 may be triggered to provide a “skeptical”indication. The intrinsic area 3014 may be updated to record thetransaction, and may further be updated to include a record that thecard was flagged as having potential unauthorized activity as a resultof the transaction.

In some embodiments, the “skeptical” indication will be dynamic suchthat an unauthorized user will not be aware that the card is flagged.When the user attempts to use the card 3000 at another location or foranother transaction, the store employee may be prompted (e.g., via thecomputer system) to look for a particular “skeptical” indication and tofurther verify if the user is authorized for the transaction. This mayrequire the user to call his or her credit card company to verify thathe or she is travelling and that the charges are authorized. In someembodiments, when the card is flagged, the user may be prevented fromfurther using the card. In some embodiments, a GEI reader at a store maybe able to read the GEI 3010 and alert the employee as to an issue withthe card, with or without the verification area 3020. In someembodiments, the card 3000 may be equipped with an RFID tag 3025, suchas any RFID tag now known or later developed. The RFID tag 3025 mayinclude information about the card 3000 and/or the user of the card3000, and may be used to track the location of the card 3000,information about the card 3000, and/or information about the user ofthe card 3000, as is known to those of skill in the art. In embodiments,the RFID tag 3025 provides still another level of security capability tothe credit card 3000. Here, in some scenarios, an RFID signal may bereceived and processed by the RFID tag 3025, and the tag 3025 mayprovide a signal in response, verifying the information on the tag 3025.However, in some instances, the signal from the RFID tag 3025 may beweak or the RFID reader may be unavailable. Here, the GEI 3010 mayprovide the necessary information to verify the authenticity of atransaction. A GEI reader, such as a camera or any other reader capableof reading and processing the GEI 3010, may scan the card 3000 for theGEI 3010, and upon determining the presence thereof, ascertain theinformation about the card 3000 and/or the user necessary to validatethe transaction. Thus, even when the RFID tag 3025 does not work, it isstill possible to provide extra validation security to the credit cardtransaction. In still other embodiments, the RFID tag 3025 and the GEI3010 work together in a RFID-GEI hybridized system to provideuni-directional and/or bi-directional communication to and from the card3000 and a computing system to validate transactions.

It should be understood that while the GEI, the validation area 3020,and the RFID tag 3025 are shown as being incorporated with a credit card3000, such components can be also, or alternately, be incorporated intoany article where it is desirable to know and/or provide informationabout the thing to which the article is attached, or the article itself.For example, a clothing tag (or any other type of tag) may incorporate aGEI (such as GEI 310, 410, 510, 1010, etc.), an RFID tag, and/or one ormore verification areas.

In another example, illustrated in FIG. 21, a security badge 4000incorporates a GEI 4010, which may be substantially similar to GEI 310,410, 510, 1010, et cetera. Accordingly, the GEI 4010 includes a staticportion 4012 and an intrinsic portion 4014. The intrinsic portion 4014may be configured to change state based on a trigger. In embodiments,the badge 4000 further includes an RFID tag 4025. The RIFD tag 4025 maybe an active or a passive RFID tag, as is known in the art, and may beutilized as is known in the art, for example, to track the location ofthe badge 4000. As has been described herein, the GEI 4010 may beconfigured to change state based on a trigger. In this example, considerthat the badge owner is a maintenance worker at ABC Corporation. Theworker (John Smith) may not be authorized to enter all areas of ABCCorp. at all times. Rather, John may be permitted to enter only thoseareas that are in need of maintenance. One or more signal generatorsand/or GEI reading devices (which may be combined into a single device)may be located throughout ABC Corp. When it is determined that John isneeded in a particular area, the signal generator may be sent to hisbadge 4000 (i.e., as identified by the RFID tag) to update the GEIintrinsic portion 4014 to allow entry into that particular area. WhenJohn approaches the area, a GEI reading device may see the GEI on John'sbadge 4000, ascertain that access has been granted, and open the doorfor John to enter the restricted area. After John has completed the job,the intrinsic portion 4014 may be “reset” to again prevent John fromentering the restricted location. The reading devices throughout ABCCorp. may be configured to identify information on a GEI to allow ordeny entry into various locations. Thus, access to various areas withina restricted zone can be easily and quickly granted and restricted basedon the immediate needs of that area.

Unfortunately, occasionally badges 4000 will be lost or stolen andaccess to certain restricted areas could be unintentionally granted tothe wrong person. Accordingly, in some embodiments, cameras within theorganization may be configured to scan an area and provide facialmapping, spatial mapping, etc. to verify that the badge 4000 isassociated with the correct person. As John moves throughout ABC Corp.,the cameras placed thereabout may continuously map his location withinthe corporation, and through facial recognition, confirm that it isindeed John that is wearing the badge 4000. If at some point it becomesclear that the badge 4000 is being worn by someone other than John,entry into certain areas may be restricted, even though the GEI maystill be configured to allow the wearer of the badge 4000 access to therestricted area. Thus, multiple forms of security may be easily andseamlessly employed to ensure the safety of personnel throughout anorganization.

Of course, the security badge 4000 need not be a badge exclusive to acompany. In embodiments, the badge 4000 may be a driver's license,passport, or any other identification card. Further, the security badge4000 may be a user instrument (e.g., a card) comprising a GEI that maybe updated to provide admission to a particular event, such as aconcert, or game, or amusement park, or to provide access to services,such as a boarding pass for travel. Each time the card is scannedproviding the user entry, the GEI may be automatically updated toprevent re-entry and/or reuse of the card without appropriateauthorization.

Moving on, FIG. 9 is a functional block diagram of a computing system900 which may be used to implement the various graphically encoded iconembodiments according to the different aspects of the disclosure. Thecomputing system 900 may be, for example, a smartphone, a laptopcomputer, a desktop computer, a flexible circuit board, or othercomputing device whether now known or subsequently developed.

The computing system 900 includes a processor 902, a memory 904, a userinterface 906, a communication module 908, and a dataport 910. Thesecomponents are communicatively coupled together by an interconnect bus912. The processor 902 may include any processor used in smartphonesand/or other computing devices, including an analog processor (e.g., aNano carbon-based processor, magnetic, photonic, pneumatic, hydraulic,thermal, convection, biochemical, gravimetric, etc.). In certainembodiments, the processor 902 includes one or more other processors,such as one or more microprocessors, and/or one or more supplementaryco-processors, such as math co-processors.

The memory 904 may include both operating memory, such as random accessmemory (RAM), as well as data storage, such as read-only memory (ROM),hard drives, optical, flash memory, or any other suitable memory/storageelement. The memory 904 may include removable memory elements, such as aCompactFlash card, a MultiMediaCard (MMC), and/or a Secure Digital (SD)card. In certain embodiments, the memory 904 includes a combination ofmagnetic, optical, and/or semiconductor memory, and may include, forexample, RAM, ROM, flash drive, and/or a hard disk or drive. Inembodiments incorporating SPEC particles, memory may include the visualaspects of the color change itself (e.g., the particles remain in acolored-1 or colored-2 state until stimulated into another state). Theprocessor 902 and the memory 904 each may be located entirely within asingle device, or may be connected to each other by a communicationmedium, such as a USB port, a serial port cable, a coaxial cable, anEthernet-type cable, a telephone line, a radio frequency transceiver, orother similar wireless or wired medium or combination of the foregoing.For example, the processor 902 may be connected to the memory 904 viathe dataport 910.

The user interface 906 may include any user interface or presentationelements suitable for a smartphone and/or other computing device, suchas a keypad, a display screen, a touchscreen, a microphone, and aspeaker. The communication module 908 is configured to handlecommunication links between the computing system 900 and other, externaldevices or receivers, and to route incoming/outgoing data appropriately.For example, inbound data from the dataport 910 may be routed throughthe communication module 908 before being directed to the processor 902,and outbound data from the processor 902 may be routed through thecommunication module 908 before being directed to the dataport 910. Thecommunication module 908 may include one or more transceiver modulesconfigured for transmitting and receiving data, and using, for example,one or more protocols and/or technologies, such as GSM, UMTS (3GSM),IS-95 (CDMA one), IS-2000 (CDMA 2000), LTE, FDMA, TDMA, W-CDMA, CDMA,OFDMA, Wi-Fi, WiMAX, BLE, 5G-IoT, or any other protocol and/ortechnology.

The dataport 910 may be any type of connector used for physicallyinterfacing with a smartphone, GEI (graphically encoded icon) reader914, and/or other device, such as a mini-USB port or an IPHONE®/IPOD®30-pin connector or LIGHTNING® connector. In other embodiments, thedataport 910 may include multiple communication channels forsimultaneous communication with, for example, other processors, servers,and/or client terminals.

The GEI reader 914 may be in data communication with the computingsystem 900. The GEI reader 914 may be a scanner, such as one-dimensionalbarcode scanner, an imager, or other reader that allows for the variousgraphically encoded icons discussed herein to be read by the computingsystem 900 for decoding. In embodiments, the reader 914 is merely acamera capable of picking up and analyzing the information from thegraphically encoded icon and transmitting that information to the system900. As discussed herein, in further embodiments, the GEI reader mayinclude a RFID reader, or an RFID reader may be additionallyincorporated into the system in conjunction with a GEI reader. The RFIDreader may be capable of receiving RFID signals from an RFID tag, andmay additionally be configured to read and transmit data from agraphically encoded icon that incorporates an RFID tag or RFIDtechnology, as described above.

The memory 904 may store instructions for communicating with othersystems, such as a computer. The memory 904 may store, for example, aprogram (e.g., computer program code) adapted to direct the processor902 in accordance with the present embodiments. The instructions alsomay include program elements, such as an operating system. Whileexecution of sequences of instructions in the program causes theprocessor 902 to perform the process steps described herein, hard-wiredcircuitry may be used in place of, or in combination with,software/firmware instructions for implementation of the processes ofthe present embodiments. Thus, unless expressly noted, the presentembodiments are not limited to any specific combination of hardware andsoftware.

In embodiments, the memory 904 may include software 905. The software905 may contain machine readable instructions configured to be executedby the processor 902. The software 905 may, e.g., process data obtainedfrom the GEI reader 914. In embodiments, the software 905 may cause thecomputing system 900 to dynamically respond to a reading obtained by theGEI reader 914. For example, the software 905 may order an item based ona reading obtained by the GEI reader 914. Alternately or in addition,the software 905 may round up, round down, integrate, stabilize,average, and/or otherwise mathematically manipulate the outputs of thevarious fuzzy fields. The software 905, e.g., one or more modulesthereof, may also be used for error correction.

The computing system 900 may be in data communication with a remotestorage 916 over a network 917. The network 917 may be a wired network,a wireless network, or comprise elements of both. The remote storage 916may be, e.g., the “cloud” or other remote storage in communication withother computing systems. In embodiments, data (e.g., readings obtainedby the GEI reader 914 and the dynamic responses of the computing system900 thereto) may be stored in the remote storage 916 for analytics.

While graphically encoded icons are described above as a separatephysical embodiment such as a label, coating, paint, etc., it shall beunderstood that a graphically encoded icon is more broadly a collectionof visually identifiable matter (or energy fields) that can be used toobserve meaningful information about an object, an assembly of objects,etc. Graphically encoded icons may therefore also be naturally occurring(e.g., patterns that occur naturally on/in an object, waveform patterns,anomalous biological cells, traffic patterns, antenna arrays, thermalscans, etc.) and may occur in clusters that are identifiable at asmaller scale but provide information about a larger scale assembly ofobjects.

Accordingly, graphically encoded icons may be incorporated into abroader scanning and surveillance system that gathers informationdirectly from an object itself acting as the graphically encoded icon,or from the object in conjunction with a physically separate graphicallyencoded icon, such as the labels described herein. The graphicallyencoded icons may be recognizable and readable via video surveillancesystems. Video surveillance systems are known in the art. Over time,video surveillance has evolved from the use of low-resolution, fixedfocus, fixed focal-length cameras to fully adaptive intelligentpan-tilt-zoom 360-degree domes. The flexibility of multidimensionalscanning systems (e.g. advanced surveilling equipment) can be utilizedto perform visual identification of people, animals, vehicles, inanimatefixed position objects, and complex moving objects that are moving inunpredictable manners.

Combining surveillance and scanning technologies may provide a universalscanning system that can operate in multiple dimensions and identifysubjects including individuals (and attributes of the individual),animals, and objects in a location (e.g., building materials in aparticular location). Scanning of uniquely identifiable shapes (e.g.,GEIs) and movement trending data (e.g., movement of individuals and/oranimals) can yield a complete spectrum of indicators the can be used toidentify the presence, location, and meaning of all subjects beingscanned. In some embodiments, as described herein, one or more camerasmay be utilized to develop and/or recognize three-dimensional images ofpersons or spaces (e.g., facial mapping and/or spatial mapping) toverify a person's identity and/or the precise location of a particularperson or graphically encoded icon. Together with the graphicallyencoded icon (e.g., graphically encoded icon 310, 410, 510, 600, 1010,etc.), the mapping may allow for an automatic two-step authentication ofa user. In scanning for information, varying abilities to focus, zoom,and planar alignment can yield unreliable and unpredictable imageinformation on a single scan which can be improved by providing clearlyidentifiable graphical indicators of a coarse nature as well asredundant repetitive image icons that occur at varying scale-levels. Forexample, the repeating pattern of a specific shape within other smallerscale shapes (e.g., fractal geometry) can be a trigger for recognizing apattern that is out of frame from the observer's view to provideparticular (e.g., redundant, preemphasis, forward error correction,cyclical error detection, encrypted, cross-media data striping, etc.)information about a subject. These techniques, as well as mathematicalpredictive techniques, can be used to provide rapid and reliablerecognition of image intelligence. The net result of stacked and scaledpatterns can yield localized quantified results that contain the samestatistical character as the whole graphically encoded icon at varyingzoom levels as well as partial field view graphically encoded iconobservation. For example, when observing a full-frame image of the wholegraphically encoded icon, the observer may identify a pattern ofapparent black and white dots. However, if the observer where to zoom-in(or angularly align) on a particular dot pattern within the graphicallyencoded icon, it may become clear that there is finer granularity (e.g.,resolution) imagery contained within the dot itself. Furthermore, it ispossible that the dot image may contain a micro-scaled (or macro-scaled,subset, superset) version of the entire content imagery of thegraphically encoded icon itself. These scaled and optionally redundantpatterns may repeat in scale to many levels that grow into macro, micro,and nano-scale. These techniques of encoding may be utilized to provideease of identification, authentication, security validation, encryption,and minimized re-scanning of the graphically encoded icon. It isimportant to note that strategic encoding techniques within a dotpattern (e.g., internal content(s) within a graphically encoded iconimage or dot) can be utilized to encode intentional averaging ofgray-scale, color, or thermal imagery as an integrated view by a coarsewide-angle (e.g., low resolution) observation. This means that the dotsor apparent image attributes may appear as simple resolvable dots butmay contain multiple layers (e.g. multiple dimensioned arrays) ofcomplex composite information within each apparent dot.

By utilizing and exploiting natural and unnatural patterns in arecursive pattern of shapes the encoded information can be packed insuch a way as to provide scalable decoding at various zoom levels,angular planar views, and focus levels. Information encoded in geometricpatterns that are fractal encoded (or other recursive patterns) canexploit shapes that either are naturally occurring in nature or are notnaturally occurring in nature to encode and modulate recognizablepatterns related to the intelligence of information encoded within thecomposite shapes (e.g. GEIs). Shapes and geometric patterns may beenhanced or accentuated utilizing reinforcing waveform and media typessuch as varying colors, wavelengths of transmissive and/or reflectivematerials, magnetic, radioactive, thermal, electrical, and physicallyoscillating materials (e.g. quartz crystals), fluorescing materials(biological films, bacteria, etc.), position changing actuators,magnetic tape, laser reflection (CD-ROM/DVD like surfaces), etc.Geometric shaped encoding methods may be used to allow a GEI to becomemathematically resolvable in order to correct for non-ideal focallengths, planar alignment, and non-ideal image framing.

In embodiments, the full implementation of a scanning system could thusprovide the ability to provide scanning, surveilling, dissecting,categorizing, decoding, and resolving of all subjects (or selectedcategory of subjects) within an observer's (or scanning device's) fieldof view in the system. Optionally, the observed subjects can besuperimposed with unique identifying markers known as 3D spatialmarkers. The marking content can be graphical in the form of iconicencoded information that is identifiable by scanning algorithm methods.

Thus, as has been described, the graphically encoded icons disclosedherein may represent a significant advance over the traditional machinereadable indicia embedded in one dimensional, two dimensional,multi-dimensional and other such barcodes. Many different arrangementsof the various components depicted, as well as components not shown, arepossible without departing from the spirit and scope of the presentinvention. Embodiments of the present invention have been described withthe intent to be illustrative rather than restrictive. Alternativeembodiments will become apparent to those skilled in the art that do notdepart from its scope. A skilled artisan may develop alternative meansof implementing the aforementioned improvements without departing fromthe scope of the present invention. Not all steps listed in the variousfigures need be carried out in the specific order described.

1. A user instrument for engaging in a transaction, comprising: agraphically encoded icon, comprising: a static portion; an intrinsicportion comprising an area of stimuli-responsive material defining afirst machine-readable indicia; wherein: at least a portion of thestimuli-responsive material transforms from a first state to a secondstate in response to a trigger; the transformation from the first stateto the second state of the portion of the stimuli-response materialresults in a second machine-readable indicia; and the secondmachine-readable indicia comprises information to permit or deny theuser to engage in a transaction via the user instrument.
 2. The userinstrument of claim 1, wherein: the user instrument is a credit card;the trigger is a transaction using the credit card; and the secondmachine-readable indicia comprises information relating to thetransaction using the credit card.
 3. The user instrument of claim 1,wherein: the user instrument is a security badge; the trigger is asignal operable to transform the stimuli-responsive material from thefirst state to the second state; and the second machine-readable indiciacomprises information that allows or denies the user entry into arestricted location.
 4. The user instrument of claim 1, wherein the userinstrument is a label.
 5. The user instrument of claim 1, furthercomprising a second area of stimuli-responsive material configured totransform in response to a trigger, wherein the transformation of thestimuli-responsive material of the second area results in human readableindicia.
 6. The user instrument of claim 5, wherein the second area ofstimuli-responsive material forms a part of the graphically encodedicon.
 7. The user instrument of claim 1, wherein the machine-readableindicia is non-human readable.
 8. A graphically encoded icon,comprising: a label attached to an object, the label comprising a staticportion and an intrinsic portion; wherein: the static portion comprisesmachine-readable indicia; the intrinsic portion comprises an area ofstimuli-responsive material; and the stimuli-responsive material isconfigured to change from a first state to a second state in response toa trigger, the change in state being based on an attribute about theobject.
 9. The graphically encoded icon of claim 8, wherein the changein state of the stimuli-responsive material results in machine-readableindicia.
 10. The graphically encoded icon of claim 9, wherein themachine-readable indicia of the stimuli-responsive material is non-humanreadable.
 11. The graphically encoded icon of claim 10, wherein themachine-readable indicia of the static portion is non-human readable.12. The graphically encoded icon of claim 8, wherein the trigger is achange in temperature, and wherein the trigger occurs when the change intemperature is above or below a predetermined threshold.
 13. Thegraphically encoded icon of claim 8, wherein the trigger occursautomatically based on a predetermined condition about the attribute ofthe object.
 14. The graphically encoded icon of claim 8, wherein thetransformation of the stimuli-responsive material is a change inreflection of the stimuli-responsive material.
 15. The graphicallyencoded icon of claim 8, wherein the transformation of thestimuli-responsive material is a change in the transparency of thestimuli-responsive material.
 16. An article, comprising: a userinstrument associated with a user, the user instrument comprising agraphically encoded icon, the graphically-encoded icon comprising anarea of stimuli-responsive material defining a machine-readable indicia;wherein: the stimuli-responsive material is configured to change from afirst state to a second state in response to a trigger; and after thechange of the stimuli-responsive material from the first state to thesecond state, the machine-readable indicia comprises information topermit or deny a user to engage in a transaction using the userinstrument.
 17. The article of claim 16, wherein the user instrument isselected from the list consisting of: a label, a credit card, and abadge.
 18. The article of claim 16, wherein the machine-readable indiciais non-human readable.
 19. The article of claim 16, wherein the triggeroccurs automatically based upon a predetermined condition.
 20. Thearticle of claim 16, wherein the graphically encoded icon is configuredas a QR code.