System and method for selecting an external user interface using spatial information

ABSTRACT

A method and system for selecting an external user interface using spatial information is described. In one configuration the floor space of a mailroom is mapped using a two dimensional grid. At least one machine is located on the mapped grid and an associated control zone is defined for that particular machine. The machine includes a wireless transceiver for providing user interface access. An external portable processor with a wireless transceiver is provided with user interface logic for the machine. A user then moves the external portable processor into the control zone of the machine. An indoor positioning system is utilized to provide relative or absolute position information relating to the machine and the external processor. The system determines that the external processor is in the machine control zone and allows the external processor to function as a user interface for the machine.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of commonly owned, U.S. patentapplication Ser. No. 11/752,746, filed on May 23, 2007, entitled SYSTEMAND METHOD FOR SELECTING AN EXTERNAL USER INTERFACE USING SPATIALINFORMATION (now U.S. Pat. No. 7,756,988), which is a Continuation ofcommonly owned U.S. patent application Ser. No. 10/064,293, filed onJun. 28, 2002, entitled SYSTEM AND METHOD FOR SELECTING AN EXTERNAL USERINTERFACE USING SPATIAL INFORMATION (now U.S. Pat. No. 7,225,262 B2),both of which are hereby incorporated by reference in their entirety.

This application is related to U.S. patent application Ser. No.10/064,294, filed on Jun. 28, 2002, entitled SYSTEM AND METHOD FOR AWIRELESS USER INTERFACE FOR BUSINESS MACHINES (now U.S. Pat. No.6,920,557), which is hereby incorporated by reference in its entirety.

BACKGROUND

The illustrative embodiments disclosed in the present application areuseful in systems including those for providing user interfaces forbusiness machines and more particularly are useful in systems includingthose for providing interchangeable co-located wireless user interfacesusing position information for user interface selection.

There are several categories of conventional business machines inubiquitous use today. The typical large office environment may includecentralized business machine centers that often include copy machines,facsimile machines, printers, and mailing machines. These environmentsmay include postage meters, weighing scales and mail processing machinessuch as inserters, folders and sorters. Large mail creation machines mayinclude many subsystems including web printers, cutters, inserters,folders, stuffers and postage meters. Additionally, business machinesmay be found in satellite locations such as convenience centers invarious locations, and may be located in individual offices andcubicles. In a typical small home office environment, business machinesare often located in a single office and may include multi-functionbusiness machines such as a combined printer/scanner/copier/facsimileunit.

Business machines are also found in other environments such asproduction mail facilities and copy centers. Business machine usageaccounting systems are often utilized in multi-user settings fortracking usage of the business machines according to various criteria.Such criteria may include a user identification number, a clientidentification number and/or a particular matter identification number.The usage accounting systems typically employ a separate accountingprocessor connected to the business machine having a separate userinterface.

Mailing machines are commercially available from Pitney Bowes Inc. ofStamford, Conn. Mailing machines are available in a range of unitshaving increasing functionality. A mailing machine may include a varietyof modules or sub-systems for performing tasks such as singulatingmailpieces from a stack, weighing a mailpiece, sealing the flap of anenvelope, applying evidence of postage, printing information on themailpiece, accounting for postage used, printing labels and stackingfinished mailpieces. The mailing machine often includes a transportmechanism for feeding mailpieces through successive stages of themailing machine. Mailing machines may include a postage meter that mayaccount for and apply evidence of postage used for a mailpiece. Atypical mailing machine will include various software modules forperforming functions such as machine control, accounting and reportingfunctions. Certain mailing machines have multiple features and areconfigured so that the mailing machine may be provided with only asubset of the features enabled. Such a mailing machine would typicallyrequire that the user interface support all of the features of themachine.

Additionally, certain users may be experienced in the operation of aparticular mailing machine and may not require an elaborate userinterface. However, certain other users may require a more elaborateuser interface. The typical mailing machine provides a sufficientlyelaborate user interface for use by both the experienced and noviceuser. Accordingly, a user interface may be more complicated than aparticular user requires it to be.

SUMMARY

The present application describes a system for providing a wirelessexternal user interface for a business machine.

In one illustrative embodiment, the system determines positioninformation for an external user interface. It uses that information indetermining whether to provide user interface access to the externalprocessor for a particular machine. In an alternative, the external userinterface logic is provided to the external processor by the machine.

In another illustrative embodiment, a portable processor is used toselect a file to be processed. Portable processor position informationis used to select a machine to process the file.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of an illustrative user interface systemused in an embodiment of the present application.

FIG. 2 is a schematic representation of an illustrative user area anduser interface system in accordance with an embodiment of the presentapplication.

FIG. 3 is a schematic representation of two illustrative user areas inaccordance with another embodiment of the present application.

FIG. 4 is a schematic representation of a portion of an illustrativeuser area in accordance with another embodiment of the presentapplication.

FIG. 5 is a flow chart showing an illustrative process for fileprocessing according to an embodiment of the present application.

FIG. 6A is a flow chart showing an illustrative process for userinterface selection according to an embodiment of the presentapplication.

FIG. 6B is a flow chart showing an illustrative process for userauthentication according to an embodiment of the present application.

FIG. 7 is a block diagram of an illustrative machine interface accordingto an embodiment of the present application.

DETAILED DESCRIPTION OF EMBODIMENTS

Wireless network devices are available that allow portable computers toaccess a network using wireless protocols such as BLUETOOTH. Additionalsystems that comply with hardware layer protocols such as the versionsof the IEEE 802.11 wireless systems standards are available as aresystems that are also WI-FI compliant. Typical wired network interfacecards (NIC) utilize the Ethernet protocol in which each individualEthernet card produced is assigned a unique address. An address issuingauthority ensures that the individual addresses assigned to the variousEthernet card manufacturers are unique.

Wireless systems utilizing IEEE 802.11b, 802.11g, or 802.11a typicallyprovide wireless LAN access through a wireless access point. Similarly,Internet access may be provided using a wireless access point connectedto a gateway. BLUETOOTH systems may also be utilized for LAN access andare also often utilized for Personal Area Network systems. BLUETOOTHsystems range from class 1 systems that provide approximately 10-meterrange through class 3 systems that typically provide 30-meter range andoperate at approximately 1 Mbit/s. IEEE 802.11 systems typically provide100-meter range with 802.11b operating at 10 Mbit/s and 802.11aoperating at 54 Mbit/s. Profile based protocols such as Wi-Fi enableacross-vendor compatibility for systems.

Systems employing protocols such as BLUETOOTH and 802.11b are generallywireless systems operating in the RF bands. Wired networks generallymust be physically tapped for eavesdropping. However, an appropriatereceiver, such as one located in a parking lot, may intercept wirelesssystems communications.

A system for a wireless mailroom having a gateway server to allow remoteaccess is described in commonly owned U.S. patent application Ser. No.10/021,583, filed Oct. 29, 2001 and incorporated herein by reference inits entirety. The embodiments described in the present applicationutilize network systems. It is to be understood that segments or all oflocal networks described in the embodiments could be assigned individualglobal addresses. It is also possible that one or more gateways or proxyservers could be utilized so that a sub-network of many devices usingone addressing scheme could be provided access to another networkthrough a gateway that has a single address for each gateway from theperspective of a device on the network higher up the hierarchy chain.

The wireless communication channels described typically operate in the2.4 GHz spread spectrum frequency bands, but any wireless communicationschannel could be utilized. Radio frequency channels are preferable for acommunications channel in a mailroom crowded with machines and people.However, other bandwidths may be used as well, particularly in thepositioning systems utilized.

A reference directed toward a Mailing Machine Disabling aKeyboard/Display of a Resident User Interface Which Has Function Keysand the Keyboard/Display if an External User Interface is Connected isdescribed in U.S. Pat. No. 5,935,221 to Felmus, et al. and isincorporated herein by reference in its entirety. The Felmus patentdescribes a system for disabling the internal keyboard and display of amailing machine in the presence of an external user interface. Theembodiments described therein may be alternatively utilized with theembodiments described herein.

A reference directed toward a Universal Access Photocopier system isdescribed in U.S. Pat. No. 6,243,682 to Eghtesadi, et al. and isincorporated herein by reference in its entirety. The Eghtesadi patentdescribes a system for providing voice control of a photocopier machine.The embodiments described therein may be alternatively utilized with theembodiments described herein.

A reference directed toward a System Using Position detector toDetermine Location and Orientation Between Computers to SelectInformation to be Transferred Via Wireless Medium is U.S. Pat. No.6,374,306 to Tognazzini and is incorporated herein by reference in itsentirety. The Tognazzini patent describes a system for determiningposition information of a handheld device relative to a desktop computerusing an ultrasound system, an infrared system or a Polhemus-type sixdegree of freedom locator. The reference describes holding a handheld infront of a portion of a computer screen that is displaying a computerfile icon. A portion of the computer screen display bleeds through tothe handheld and a user can then select the file for transfer to thehandheld. Such a positioning system may be utilized with the embodimentsherein.

The Global Positioning System (GPS) includes a system of satellitespositioned in earth orbit that transmit microwave signals to GPSreceivers that receive the signals from one or more of the satellites.The receiver uses GPS signal information to determine the absoluteposition of the receiver in latitude and longitude, usually to withinseveral feet accuracy. The system may also be utilized to determineother parameters including the speed of the receiver and the altitude ofthe receiver. However, GPS signals travel a great distance and are veryweak when received on Earth. For example, receivers often cannot utilizeGPS signals indoors because of the further attenuation of the signalsdue to interference from the structure of buildings. Additionally,multi-path reflection errors often degrade the location determinationperformance of a receiver in a city environment. GPS repeaters may beutilized to boost signals into an indoor environment, but such systemmay not provide precise location data. In automotive applications, otherdata sources such a compass and gyroscope may be used to provideadditional data.

Radio navigation systems such as LORAN have been in use in the maritimeindustry in which the radio navigation beacons are utilized with theirknown stationary positions in order to use positioning algorithms suchas triangulation to determine the position of a receiver. In somesystems, GPS systems and radio navigation systems are used together toprovide more data regarding position.

Centimeter accuracy indoor navigation systems using GPS-like Pseudolitesare known and may be utilized to provide absolute or relative positioninformation for a receiver connected to a portable processor such as alaptop, PDA, WAP, tablet-computing device or wireless telephone such asa JAVA phone. Positioning systems have been developed for use in 911positioning systems.

Known radio frequency, ultrasonic and infrared techniques may beutilized for providing position information relating to the absolute orrelative position of an external processor. For example, the externalprocessor could be a PDA being used as an external user interface for amachine such as a copier. Such a PDA could also be used for otherfunctions. A reference directed toward describing a system for a LowCost Indoor Positioning System, by C. Randall and H. Muller is shown inUbicomp 2001: Ubiquitous Computing, pp. 42-48, Springer-Verlag, 2001, G.Abowd, ed. and is incorporated herein by reference.

In one embodiment, a system and method for providing discriminating userinterface access to a business machine is shown for reconfigurableexternal user interfaces in an environment having several businessmachines. A handheld computer with wireless access uses Java toreconfigure the handheld as a user interface for different types ofbusiness machines and different units of the same type in a crowdedmailroom. The mailroom is equipped with a centimeter accuracy wirelesspositioning system. The floor of the mailroom is organized in a grid andeach business machine is assigned a portion of the grid. When a handheldis in the machine control grid, it controls the machine. The businessmachine can update the handheld user interface. There is also a conflictresolution system to ensure that people passing by the machine controlactive box for a business machine do not interfere with the currentuser.

The present application describes several new and useful systems andmethods for using position information to select an external userinterface. Additionally, modifications to known positioning techniquesand new positioning techniques are described.

External Processor Reported Position

Referring to FIG. 1, a first illustrative embodiment of a systemaccording to the present application is described. An external userinterface processing system 1 is shown. Authentication servers 60 andapplication logic servers 62 are connected to the Internet 10 usingcommunications channels 14, 12 respectively. Here, network 10 is theInternet and connections 12, 14 are T1 lines. Mailroom server 20 isconnected to Internet 10 using connection 16 that is a T1 line. User 30has a portable processor 40. Here, the portable processor is a pen-basedcomputer with a BLUETOOTH wireless transceiver and an indoor positioningsystem receiver. Alternatively, a handheld computer such as a PALM orHANDSPRING computer may be utilized. Similarly, a notebook computer orWINDOWS® CE platform machine could be utilized. The indoor positionsystem (not shown) provides position information regarding the handheld40 to server 20.

In this embodiment, the external processor 40 includes a receiver thatdetermines position information such as x-y coordinates in a relative orabsolute mapped grid in a mailroom. The mailroom has a grid in whichmachines 50, 52 have control areas 32, 34 respectively defined on themapped grid. Machine 50 has communications connections to the server 20,machine 52 and handheld 40 across a BLUETOOTH network using connections24, 29 and 28 respectively. Similarly, machine 52 has BLUETOOTHconnections 29, 27 and 32. Handheld 40 connects to machines 50, 52 usingBluetooth connections 28, 27 respectively, and to server 20 usingconnection 26.

In this embodiment, the handheld sends position information to theserver 20. The server stores data defining the control areas 32, 34 onthe grid and determines when a handheld 40 is in a particular controlgrid. As shown, Handheld 40 is in grid 32 and will control machine 50.Here, server 20 has a BLUETOOTH gateway for access to other third partyservers. The server 20 then provides a shared secret such as theBLUETOOTH passkey to the machine 50 and handheld 40 so that they canpair. Here, the handheld 40 is a master and the machines are the slavesin the machine control connection. The handheld 40 is the master andserver 20 the slave in the position information and key transferconnections. Bonding could be utilized as well.

After the passkey is transferred, the handheld 40 and machine 50 pairand then machine 50 transfers control to the handheld 40 until atimeout, explicit relinquishment of control, or positionalrelinquishment of control which occurs when handheld 40 leaves thecontrol area. Additionally, the machine may be instructed to removemachine 50 from control by a priority processor such as server 20 thatprioritizes the handheld connections.

Alternatively, the handheld 40 could dock with the server for keyinformation for all the machines 50, 52. Then the machines 50, 52 couldallow user interface access based upon position data.

Alternatively, a system such as 802.11b can operate in a peer-to-peermode. However, because such a system is not an ad-hoc network, theserver must manage the connections. In the preferred embodiment,BLUETOOTH systems provide an ad-hoc network with little user setup.

Alternatively, as can be appreciated, the position information may besent to the handheld 40, machines 50, 52, the server 20, or anycombination thereof. Additionally, other appropriate wireless and wirednetworks and connections may be utilized. As can be appreciated, variouscommunication flows may be utilized, some of which will be chattier thanothers.

Here, it is contemplated that different portable processors may beutilized in the system. Accordingly, the machines or user interfaceservers utilize the capabilities of the portable processor to determinewhat user interface logic to present to a user. Additionally, userpreferences could be utilized to pre-configure the user interface andthe user may be allowed to store personal macros for each type ofmachine that is to be operated. It is understood that a portablecomputer used as an external user interface may store more than one userinterface logic program that could then each be selected when necessary.

In an alternative, the system utilizes SyncML over BLUETOOTH to ensurethat the most recent version of the particular user interface beingutilized is loaded in the portable computer.

Server Reported Position

Referring to FIG. 2, another embodiment of the present application isdescribed with a schematic representation of a mailroom. In a secondembodiment, an external user interface processing system 200 is shown ina mailroom 201. The mailroom 201 includes walls 204 that define an outerperimeter of a mapped grid area. The mailroom 201 has a door 202 andfloor space that is mapped into a grid. Positioning transducers 210,212, 214, 216 and reference transducer and reference point 218 providepositioning signals to the room 201.

The transducers utilize ultrasonic and RF technology using knowntechniques. Various levels of grids may be defined. Here, a room grid201 encompasses the entire room area. Area 220 encloses the copiercontrol area and is for a group of identical or similar machines. Eachcopier 282, 284, 286, 287, 288 and 289 has associated a defined controlgrid 222, 224, 226, 227, 228, and 229 respectively. Here, facsimiles250, 254 each have control grids 252, 256 respectively. Here, printers240, 244 each have control grids 242, 246 respectively. It is to beunderstood that many different configurations of machines may beutilized. Users 260, 262, 264 and 266 each have handheld externalprocessors (not shown) that may be used for external user interfacepurposes for one or more of the machines among other uses. Server 270 isconnected to the machines and the user external processors (not shown)using an ad-hoc BLUETOOTH network. Alternatively, an 802.11 peer-to-peernetwork may be configured and utilized. Here, the server is reportinghandheld position to the machines and informing the machines whichhandheld to provide access to. The server may instruct the machine,which handheld to provide access to using a 48 bit unique MAC addresses,or a piconet address. Here, the server may instruct that user 262 havepriority over 264 due to his position in the control grid.

As can be appreciated, known software update systems may be used toensure that the handhelds have the latest or acceptable version of theuser interface. As described below, customization of the interface ispossible for each handheld as well as data reporting and authenticationof a user. Here, when a user 266 enters a room 201, the server 270 makessure the user has all required software. Then when a user enters a groupcontrol area 220, the appropriate user interface is loaded. Then incontrol area 228, the copier provides real time status data andtransfers user interface control to user 262. Release procedures arediscussed herein. Each machine is provided at least a power and/oremergency stop button as a user interface.

Alternatively, priority can be determined based upon a hierarchalstructure of handhelds or handheld users.

Machine Relative Position

Referring to FIG. 3, another embodiment of the present application isdescribed with a schematic representation of two mailrooms on differingfloors of a building. In this embodiment, a building 300 may havemultiple mailrooms 302, 303 in a perimeter 301. In this embodiment, themachines include a receiver capable of direction finding and distancedetermination on a signal such as a beacon. In this example, theexternal processor utilizes a beacon that includes identificationinformation in the beacon signal. As can be appreciated, the otherpositioning systems described could be used as well.

The mailrooms 302, 303 include positioning systems 316, 318, and 312,314 respectively. Mailroom 302 includes machines 384, 386 having 3-Dcontrol areas defined as 324, 326 respectively. Similarly, mailroom 303has machines 380, 382 having 3-D control areas defined as 320, 322respectively.

In an alternative, the positioning systems resolve position informationin three dimensions so that the two mailrooms do not interfere with eachother.

In another embodiment, each positioning system is on a separate channelor has a differentiating code to avoid interference. Here user 362 isgiven control of copier 380, but not 384. Also, user 360 is not givencontrol of copier 382 which may have that x-y position in its controlgrid, but not the y position.

In this example, the copiers 380, 382, 384 and 386 include an externaluser interface access system. The copier includes a BLUETOOTHtransceiver and can provide user interface logic to a properlyauthenticated external user interface if the external processor does nothave a usable external user interface logic program suitable for thecopier. Here, the external processor includes a BLUETOOTH transceiverfor communications with the business machines and servers and gateways,but also includes a radar signal transmitter that emits a radar signalusing known low power radar transmission techniques. The copier includesa passive radar receiver that determines the direction and distance ofthe external processor. The copier is assigned a control grid relativeto the copier. For example, the two dimensional floor space around thecopier is defined in terms of distance and direction in radialcoordinate space. The control zone may be defined in radial coordinatesor be converted into Cartesian coordinates. The copier may utilize amulti-channel receiver to track several external user interface devices.

For example, a Bluetooth master transceiver in the copier may keep theclosest 7 external processors as active slaves and all the rest asinactive slaves. If access to the inactive parked slaves is required,one or more of the active slave slots may be utilized.

In one alternative, the copier could be assigned likely approach pathsand ignore signal sources from other directions such as the rear of thecopier. Each external processor is assigned a unique identificationsignal that is sent in the radar pulse. The copier may then utilize theinformation to determine a BLUETOOTH address for the external processorin order to set up pairing with the external processor. The copier maythen also require additional authentication of the user before providinguser interface access to the external processor. However, in anotherembodiment, the identification information could be provided by anothercommunications channel such as by an infrared link.

Alternatively, each external user interface is assigned a time slice forsending the radar signal. Accordingly, the time information could beused to identify the external processor and the BLUETOOTH transceiver ofthe external processor is paired with the copier and the copier thenallows the external processor to control the copier as its external userinterface.

As shown in FIG. 3, the Z dimension can be added using altitudemeasurements to enable a multi floor mailing facility or satellitefacilities around a building. As can be appreciated, a purely signalstrength RF distance locating system with an omnidirectional signal mayhave overlap between the machines and be unable to select the userinterface and accurately position the devices. However, triangulationsystems may be utilized.

Conflict Resolution

Referring to FIG. 4, a partial floor grid 401 of a mailroom 400 is shownincluding machines 480 and 482. In this illustrative alternative,applicable with any of the embodiments, a two-tier position basedpriority scheme is shown. It is possible that more than one user, eachhaving an external processor, may be present in the control zone 423 fora machine 482. For example, user A and user B (both not shown), withexternal processor AP and BP (not shown) respectively are in the controlzone 423 of copier 482. Here, a priority section 422 of the control zone423 is defined as having precedence over the other areas of the fullcontrol zone 423. Accordingly, if user A is in zone 422, and user B isin the control zone 423, but not in the priority zone 422, user A willbe given control of the machine 482. In an alternative, if both usersare in the control zone 423, they are given access on a first-come firstserved basis and maintain control until relinquished. In anotheralternative, users in the control zone 423 that do not have priority areprovided machine status data, but not control ability.

In another example, user A was in the control zone first and willmaintain control of copier 482 until user A leaves the control zone withexternal user interface AP.

Postage meters may be characterized as operating in an open meter manneror a closed meter manner. A typical closed system postage meter includesa dedicated printer for printing evidence of postage used. A typicalopen system meter may utilize a general-purpose printer. Postal fundsare often stored in a postal security device (PSD) that may employ asecure accounting vault. Here, postage machines may be the machines thatare being controlled by the user and may utilize funds accounting localto the handheld or external to the handheld.

In an alternative applicable in any embodiment, the handheld couldprovide biometric authorization, accounting, personal macro storage anddata file storage such as files to be printed. Each machine has areconfigurable access grid and groups of like machines are assignedgroup grids. A mailroom assigns a mailroom grid for group of unlikemachines. The centimeter accuracy positioning system has transmitters, areference point and a controller. Each handheld can resolve positionabsolutely or relatively in the system. When the employee enteres themailroom, the handheld could check that all user interfaces are up todate by querying the machines or the controller. The handheld couldutilize Wi-Fi or BLUETOOTH for the wireless connections. A group ofcopiers can have a first zone defined such that inside the zone thecopier interface is loaded. Then when the handheld enters a particularmachine zone, the appropriate machine is selected and currentoperational parameters downloaded.

In an alternative, a mailroom employee could have a single PDF file thathas black and white and color pages. The employee could store the fileon the handheld and print the black and white pages by walking to theblack and white copier/printer 482. The employee could start the job,then walk to the color copier/printer 480 and start printing that partof the job.

File Selection and Manipulation

Referring to FIG. 5, an embodiment of the present application isdescribed in which a computer file is selected for processing. Theprocess may be utilized with any of the systems described including theone of FIG. 2. The user has a PDA with BLUETOOTH access to a file serveror other network device storing a desired file. The network access couldbe direct or through a gateway. The process 500 starts in step 510 andproceeds to step 520. In step 520, the handheld connects to a fileserver or gateway. In step 522, the user searches for the file. The usermay utilize the familiar graphical interface of the PDA to search forthe desired file. When the user has located the desired file on thenetwork, the user selects the file. In step 524, 526, the user decideswhether to download the file to the handheld. In step 528, the userenters the control zone of a machine such as a printer and processes thefile. In step 530, the user launches the process and the file ismanipulated. In step 532, the process determines if additionalprocessing is required. If so, control returns to step 528 and if not,the process ends.

In the alternative embodiment, the selected computer file is downloadedto the handheld and may be manipulated be user programs before beingprocessed by a machine. For example, the user could utilize the handheldto access a file server or desktop computer that stores a reportcomputer file. The user could edit the file or split it into parts forprocessing. In an alternative, a BLUETOOTH personal area network andgateway can be used to allow the handheld user to select files from adesktop or server file storage device and also select where to printsuch as by walking into the printer access box.

Position and Authentication

Referring to FIG. 6A, an embodiment of the present application isdescribed in which user position is determined. The process 600 beginsin step 601 and proceeds to step 602 to determine position informationfor users. Several methods may be utilized. For example, a server couldtrack multiple handheld devices. Additionally, a handheld could reportits location to a machine. Furthermore, a machine could track handhelddevices. In step 604, the process polls to determine if any user is inthe control zone of a machine. In step 606 the user is authenticated. Instep 608, the process determines if more than one user is in a controlzone. If so, user priority is determined and control is passed to theonly user who has priority. If there is only one user, control is passedto that user. The machine then polls to determine whether to removecontrol access from the handheld in step 614. If the user relinquishescontrol, the process 600 loops to the beginning to look for new users.

As an alternative, many priority schemes may be used. A pure timeoutcould be used; a hierarchal system may also be used.

Referring to FIG. 6B, an embodiment of the present application isdescribed in which authentication is determined. The process 650 beginsin step 651 and proceeds to step 652 to connect with an authenticationserver. In step 654, the process authenticates a handheld or handhelduser. In step 656 the process determines if new user interface logic orother data or logic is required for processing or security and if so itis downloaded in step 658. In step 660, the server downloads new keys orpassword information and in step 662, the process determines if themachines need any updates to code, keys or other data. If so, they areupdated in step 664 and the process ends.

Machine Access System

Referring to FIG. 7, a block diagram for a machine access controller isshown. Here machine 780 has Copier User Interface Access system 781. Theserver 770 has wireless Bluetooth access to the interface 781 using aBLUETOOTH Processor and Transceiver 785 for many levels of the networkmodel and also security processes. Similarly, users 760 have access tothe processor 785. The machine 780 may have a location processor 784.There is authentication logic 783 and copier glue logic 782 to provideaccess from the user interface to the copier control systems.

In an alternative applicable to any of the embodiments, the externaluser interface may allow customization of each machine user interfacelogic program stored in the external processor. Here, the externalprocessor may also store macros and other interface logic that is nottypically provided in the user interface. For example, the externalprocessor could provide accounting system features that are typicallyprovided by another accounting processor that is attached to a copierand has a separate user interface.

In another alternative applicable to any of the embodiments, theexternal processor comprises a Wi-Fi capable hand-held pocket PC such asthe Toshiba e740 Pocket PC. Furthermore, differing types of processorsand logic systems may be supported. For example, Java based PALM OSdevices may be utilized. The user interface logic could be provided inJAVA or PALM OS format. Similarly, other portable computing devices suchas laptop computers, tablet computers and Windows CE based portablewireless capable computers could be utilized.

In another alternative applicable to any of the embodiments, the machinebeing controlled requires that the data being sent be cryptographicallyprotected from tampering before being placed into any encryptedcommunications packet such as WEP. For example, the machine beingcontrolled may include a mailing machine having a postage meter forprinting indicia as evidence of postage paid. As described in therelated application, the printer in the mailing machine may be securedusing cryptographic techniques to defeat fraud attacks such as duplicateprints of the same indicia. Similarly, impersonation attacks could bedefeated with such a system.

The present application describes illustrative embodiments of a systemand method for selecting an external user interface using spatialinformation. The embodiments are illustrative and not intended topresent an exhaustive list of possible configurations. Where alternativeelements are described, they are understood to fully describealternative embodiments without repeating common elements whether or notexpressly stated to so relate. Similarly, alternatives described forelements used in more than one embodiment are understood to describealternative embodiments for each of the described embodiments havingthat element.

The described embodiments are illustrative and the above description mayindicate to those skilled in the art additional ways in which theprinciples of this invention may be used without departing from thespirit of the invention. Accordingly, the scope of each of the claims isnot to be limited by the particular embodiments described.

1. A method for selecting an external processor as a user interface to amachine comprising: accessing control grid position information for themachine, wherein the control grid position information provides acontrol grid of the machine comprising a subset of an effectivepositioning space covered by a positioning system; obtaining positioninformation for the external processor using the positioning system; andusing the control grid position information and the external processorposition information to determine if the external processor is in thecontrol grid of the machine, and only if the external processor islocated in the control grid of the machine, providing user interfacecontrol of the machine to the external processor.
 2. The method of claim1 wherein: the user interface control of the machine is provided to theexternal processor to the exclusion of the internal user interface ofthe machine.
 3. The method of claim 1 further comprising: authenticatingthe external processor before transferring user interface control. 4.The method of claim 1 wherein: the machine is located in a space thatincludes a floor having a plurality of additional machines and thecontrol grid corresponds to a defined portion of the floor space inproximity to the machine that does not overlap with space occupied bythe plurality of additional machines.
 5. The method of claim 1 wherein:authentication information is obtained from a user of the externalprocessor.
 6. The method of claim 1 wherein: the control grid is definedin three dimensions.
 7. The method of claim 1 further comprising:obtaining position information for a second external processor; anddetermining whether to give priority of control to the externalprocessor or the second external processor based upon the position ofeach of the external processor and the second external processor.
 8. Themethod of claim 1 further comprising: obtaining position information fora second external processor; and obtaining hierarchal priorityinformation for the external processor and the second externalprocessor; and using the hierarchal priority information to determinewhether to give priority of control to the external processor or thesecond external processor.
 9. The method of claim 1 further comprising:downloading user interface logic data to the external processor inresponse to the obtained position information of the external processorwhen the external processor enters a machine group control area thatincludes an area occupied by a plurality of similar machines.
 10. Themethod of claim 1 further comprising: obtaining updated positioninformation for the external processor; and using the updated positioninformation in determining whether to cease providing user interfacecontrol of the machine to the external processor.
 11. A method formanipulating a file using a portable processor and a machine comprising:selecting a file with the portable processor using a wirelesscommunications channel; and selecting the machine to process the fileusing position information relating to the portable processor using apositioning system having an effective positioning area, wherein themachine is located in the effective positioning area and is associatedwith a machine control space that is a subset of the effectivepositioning area.
 12. A system for selecting a user interface to amachine comprising: a positioning system operative for providingpositioning information in an effective positioning space; a controlgrid data field comprising control grid position information associatedwith the machine, wherein the control grid position informationcomprises a control grid defined as a subset of the effectivepositioning space that is in proximity to the machine; an externalprocessor configured to selectively operate as a user interface of themachine, wherein the positioning system is operative for providingexternal processor position data associated with the external processor;and a processor configured to obtain the control grid positioninformation and the external processor position data and for providingat least a portion of user interface control of the machine to theexternal processor only if the external processor is located in thecontrol grid of the machine.
 13. The system of claim 12 furthercomprising: the processor configured to authenticate the externalprocessor before providing user interface control.
 14. The system ofclaim 13 wherein: the machine is located in a space that includes afloor having a plurality of additional machines and the control gridcorresponds to a defined portion of the floor space in proximity to themachine that does not overlap with space occupied by the plurality ofadditional machines.
 15. The system of claim 12 further comprising: asecond external processor configured to selectively operate as a userinterface of the machine, wherein the positioning system is operativefor providing second external processor position data associated withthe second external processor; and the processor configured toselectively transfer control to the external processor or the secondexternal processor based upon priority using the position of each of theexternal processor and the position of the second external processor.16. The system of claim 15 further comprising: obtaining hierarchalpriority information for the external processor and the second externalprocessor; and the processor configured to selectively transfer controlto the external processor or the second external processor based uponpriority using the position of each of the external processor and thesecond external processor and the hierarchal priority information. 17.The system of claim 12 further comprising: the processor configured fordownloading user interface logic data to the external processor inresponse to the obtained position information of the external processorwhen the external processor enters a machine group control area thatincludes an area occupied by a plurality of similar machines.
 18. Thesystem of claim 12 further comprising: the processor configuredobtaining updated position information for the external processor andfor using the updated position information in determining whether tocontinue providing user interface control of the machine from theexternal processor back to the machine.
 19. The system of claim 12wherein: the positioning system comprises an indoor electromagnetic wavepositioning system.
 20. The system of claim 12 wherein: the control gridis defined in three dimensions.