Barcode Device

ABSTRACT

Bar codes used for various applications. A bar code can be used for biometrics, or for computer data entry. A special bar code is described that has additional information, but can be read by other readers.

This application is a continuation of U.S. application Ser. No.13/425,612 filed Mar. 21, 2012, which is a continuation of U.S.application Ser. No. 13/083,558 filed Apr. 9, 2011, now U.S. Pat. No.8,141,783 issued Mar. 27, 2012, which is a continuation of U.S. Ser. No12/103,815 filed Apr. 16, 2008, now U.S. Pat. No. 7,963,446 issued Jun.21, 2011, which is a continuation of Ser. No. 10/714,097 filed Nov. 14,2003, now U.S. Pat. No. 7,967,207 issued Jun. 28, 2011, which is adivision of Ser. No. 09/618,988 filed Jul. 18, 2000, now U.S. Pat. No.6,666,377 issued Dec. 23, 2003, the disclosures of all of which areherewith incorporated by reference in their entirety.

BACKGROUND

The present application relates to bar codes, and to scanning of barcodes and other scannable type codes to obtain and enter information.

Bar codes are often used in scanning of information. A bar code providesinformation based on sizes of its different parts.

Typical linear/one-dimensional bar codes provide white and dark barsforming a bar code image. Linear bar codes may include Universal ProductCodes (UPCs), Type 39 bar codes and type 128 bar codes. Two-dimensionalbar codes, including a “matrix” code and the “Gettysburg Address” typebar code, are also known. Bar codes have been used for many purposesincluding inventory control.

SUMMARY

The present application teaches using scanned information from ascannable code to enter special kinds of information. One embodimentdescribes using the scannable code in place of a photo. Anotherembodiment describes bar codes being sent as part of a message, wherethe message can be an advertisement, an email, or the like. Theinformation in the bar code relates to some aspect of the message. Forexample, one embodiment describes using the bar code to represent ameeting time that is described in an email. Another embodiment describesusing the bar code to represent a time and place of a function beingadvertised, e.g. an event. The bar codes can represent the informationitself, or can represent an address from a look up database whichincludes more information about the bar code.

Another embodiment describes special kinds of bar codes which storeadditional information in a different way than previously carried out.One of these information types is a progressive information type wherethe bar code can be read by either a linear or a two-dimensional barcode scanner.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other aspects will now be described in detail with respect tothe accompanying drawings, wherein:

FIGS. 1A and 1B show an image used in a cellular telephone and/or aportable computer;

FIG. 2 shows a flowchart of operation of the sensor;

FIG. 3 shows a diagram of encoding of a photo;

FIG. 4 shows a message with an associated bar code entry part;

FIG. 5 shows a client-server Internet embodiment;

FIG. 6 shows a bar code meeting system; and

FIGS. 7A-7C show new specialized bar code schemes.

DETAILED DESCRIPTION

The present application teaches using a symbolical code, such as a barcode, to enter information into a computer device. The computer devicecan be a portable computer which is described herein as being anycomputer in which the display and user interface are within the samehousing, or a personal digital assistant which is a smaller version ofthe personal computer, which again has data entry parts and displaywithin a single housing, but has outer perimeters which are sized to fitany user's hand, e.g. less than ten inches by ten inches. Anotherembodiment describes a special kind of PDA which includes a portabletelephone such as a cellular telephone, included therein.

The bar codes can be imaged/scanned in a number of different ways. Oneembodiment discloses using a camera to input and decode these bar codes.The embodiments are shown in FIGS. 1A and 1B. FIG. 1A describes using apersonal digital assistant 100 as the input device. One preferred inputdevice of this type is the Palm V™ type hand held computer. A bar codescanner can be used, such as the commercially available SymbolTechnology SPT 1700. Alternatively, a camera add-on unit can be added tothe Palm V and used as described herein. The PDA includes a screen 145and user interface 146 all within the same housing 99.

FIG. 1B shows the client being a cellular telephone which also mayinclude a screen 145 and user interface 150. The cellular telephone canbe associated with either a dedicated bar code scanner or an imagesensor 160 of the type used to obtain photographs for video telephony.

In both devices, the input device obtains either a scan of the bar code,or an image of the bar code on a medium. The medium can be a displayscreen such as a computer display screen, or can be a sheet of paper.The information in the bar code is entered into the computer.

If a dedicated bar code scanner is used, then the value of the bar codeis automatically output from the scanner by the operating systemassociated with the bar code scanner. FIG. 2 shows the flowchart whichis used to obtain scanning information from a camera.

First the scan of the barcode image is acquired at 200. This image maybe a pixel based bitmap.

Each bar code has certain rules constraining how the bar code isrecognized. In two-dimensional bar codes, the spacing/pitch/size of andbetween the black and white bars often represent the information.Certain rules constrain what is a legal bar code. One such rule is thedead space rules, which defines legal characteristics of the edges ofthe bar code. The following description defines using the dead spacerules, however, it should be understood that other constraining rulescould alternately be used.

The bitmap is processed at 205 to look for dead space 208 in the barcode. The amount of spacing, which represents sizes of white and blackparts, is then determined. The number of pixels which will representeach part can be ascertained. The image is then processed to find thenumber of white or black spaces 215, the next number of white or blackspaces 220, and continuing until the ending dead space 222. Each blankspace can be defined as being a certain number of pixels in the imagesensor 118.

Image straightening algorithms can be used to rotate the image andstraighten it in order to avoid improper values.

Then, these raw values at 210 that are indicative of the content of thebar code can be decoded by a conventional bar code decoding technique at215. This system describes using an alphanumeric bar code such as thetype 39 or type 128 bar code. 215 shows decoding these raw values toobtain the output representing the content of the bar code.

In this way, the image sensor which can be used for video output in aportable telephone, or for obtaining for digital pictures in a PDA, canbecome a bar code scanner. This system also facilitates using thespecial kinds of bar codes which are described herein with reference tothe additional embodiments.

First Embodiment Personal Identification

Personal cards such as driver license's and credit cards may include auser's personal identifying information. Signatures are conventionallyused, but can be imitated by a clever forger. Photographs can also beused. However, a forger may slice out the photograph and replace it witha duplicate in order to spoof the system. The present applicationdefines printing a bar code on the personal identification card. The barcode can be encrypted, and can include additional personal identifyinginformation.

U.S. Pat. No. 5,420,924 describes putting a bar code on a personalidentification card. However, this system recognized that not enoughinformation can be stored. Therefore, this system took a slice of theoverall image.

The information which is stored using this technique can include anypersonal identifying information, including a picture of the user'sface, fingerprint information, dynamic information about the user'ssignature, i.e. the way that the user actually makes the signature. Thiscan include the speed of signing, the technique of holding the pen, andthe like. These latter features are more difficult for a forger to copy.This information is stored as data (e.g. dv/dt of the pen, time, angles,etc.) and stored in the bar code. If an image is used, the image shouldbe of reduced resolution e.g. 20 by 20 pixels. Fingerprints can bestored as vectorized images of the fingerprint (e.g. using AdobeStreamline) or the like. The information is also preferably encryptedusing a one way code e.g. such as public key cryptography. All of thepublic, that is every decoding station, is given the decoding key. Onlyauthorized coders, such as the issuers of the cards are given theencoding key. An unauthorized user cannot make an authorized item ofinformation in this way.

Each item of information can be tested using a hash function. Onlyinformation from the authorized user will pass the hash function.

The system described herein uses a type 39 bar code. A typical type 39bar code has an unlimited number of total digits. Each digit canrepresent any of 0 through 9, A through Z or any of five punctuationcharacters. According to the present system, it is recognized that thiscombination provides the possibility of 41 different values for eachdigit.

FIG. 3 also shows the encoding operation. The bytes representing thecode, shown as 320, are converted into a base N number at 305, where Nis preferably the highest base that can be represented by all of thedigits of the bar code or at least 80% of the digits. Here, a base 41number is used. The digits zero through 9 represent their own value zerothrough 9, A through Z represent 10.sub.41 through 37.sub.41, and thepunctuation characters represent, respectfully, 38.sub.41 through41.sub.41. This same scheme can be used for any base of numbers.

At 310, the file representative of the personal information is convertedto base 41. This is then encoded as a type 39 bar code at 315. The valueis then encrypted at 320 using a one way function, and stored on thecredit card at 325. Since the type 39 bar code has no limit on length,any amount of information can be stored in this way.

The bar code is read out and reconverted back to the original number at330 and is used to drive a display device shown as 335 to display thecharacteristics. In the case of dynamic signature information or othersuch information, the stored characteristics may be directly comparedagainst the sample instead of being displayed.

Alternatively, the information can represent a pointer to a database,e.g. a publicly available database. This database can later be accessedas part of an information transfer.

In this system, the information can represent an address, e.g. a numberthat is associated with a special function. The address is used toaccess a publicly available information network, e.g. by directconnection or by the Internet. As an example, the bar code may store anaddress command AD, followed by a base 39 alphanumeric value 4DMKDP. Thebar code is scanned to obtain the command to obtain the image fromaddress 4DMKDP. The value 4DMKDP may be converted to hex or binary priorto the request.

The database returns the image of the person.

Another embodiment shown in FIG. 4 uses bar codes to enter informationinto the computer. The FIG. 4 embodiment stores scannablenon-alphanumeric information, e.g. bar code information, as some part ofa communication—here an advertisement. The advertisement can be a printadvertisement, a television advertisement, or an Internet advertisementfor example. The advertisement 400 includes a bar code 405 therein. Thebar code 405 is associated with the advertisement, and includes someadditional information about the advertisement. For example, the barcode may include the web site address of the company preparing theadvertisement, or appointment information about the advertisement, or a“vcf file” or the like which is an importable file with addressinformation about the company or author sponsoring the advertisement.

In operation, the user brings one of the clients, either the cellulartelephone 310 or PDA 315, into range of the bar code 405. The clientreads the bar code and decodes it as noted above. The decodedinformation can represent ASCII information, a compressed file such as azip file, G code information, or any other compressed or non-compressedinformation. The contents are automatically input into the client. Thecontents can directly represent that information, in which case theinformation is input into the client. For example, the information candirectly represent the ASCII information indicating the website.Alternatively, the information can represent a pointer to a database,e.g. a publicly available database. This database can later be accessedas part of an information transfer.

For example, Palm systems enable a hot sync where the portable computeris synced with another computer that is running hot sync software.

In this system, the information can represent a cue, e.g. a number, thatis associated with a special function. The cue is used during a hot syncto access a publicly available information network, e.g. by directconnection or by the Internet. The cue 431 is sent over the Internet 432to the server 450, and addresses more detailed information in a memoryof the server. The server returns that information as 455, and theclient receives the more detailed information.

As an example, the bar code may store an cue command CX, followed by abase 39 alphanumeric value 4DMKDP. The bar code is scanned to obtain thecommand to cue to value 4DMKDP during the next hot sync. The value4DMKDP may be converted to hex or binary prior to the hot sync.

During hot sync, the database returns the full text of the detailedinformation, e.g., “visit the website athttp://www.pdascan.com/.about.more to get a free gift.” Any desiredlength or size of information can be returned.

As described above, therefore, this system enables the information inthe bar code to be used as an address for look up address from adatabase. The database can be accessible over the Internet. During alater hot sync, this information can be translated into more detailedinformation which can be returned from the hot sync.

This information can be a hyperlink. The hyperlink can also use thetechniques disclosed in co-pending application No. 60/161,700, entitledInternet Browsing From A Television, in which the origin of thehyperlink is included within the hyperlink itself. In this embodiment, ahyperlink may be stored for later visitation. The hyperlink also includea code therein which indicate the source from which the hyperlinkoriginated. For example, the source may indicate the name of the printmagazine, or the web page from which the hyperlink originated, or thelike. In this way, the advertisement service can keep track of whichadvertising forms produce the best results. In addition, thisfacilitates a paradigm whereby the advertiser pays an advertising feewhich is based on the number of website visits from the advertisement.

FIG. 5 shows using this system as part of a communication which is anemail. A displayable bar code 500, in image format, e.g. a GIF, JPEG orPDF, is stored as part of the message. This bar code is then displayedin the specified format to a user. The bar code includes the informationdescribed above.

FIG. 6 shows an alternative display which is presented to a user. Theemail is displayed with its usual text part 600, which describes text ofthe message. The text indicates information about something to happen inthe future e.g. a meeting. If the user wants to go to the meeting, theyare invited to scan the bar code 605. The bar code, once scanned istranslated into information for a PDA, e.g. in Palm or Outlook format.The information may say “bar code meeting”; Thursday 4:00-6:00 p.m. Thisinformation is then automatically input into the PDA. As above, thistext can represent the actual text information, as is shown in FIG. 6.It can represent a compressed form of the actual information, such ascompressed using G code. Alternatively, the information can represent acue address to be used for a look up table during a hot sync or otherinformation transfer, as previously described herein. This informationcan be printed, and scanned off the printer, or can be scanned directlyoff the screen. The system shown in FIG. 6 shows scanning the code toinput the information.

The communication can also include auxiliary codes 610. A first code canbe scanned to send an automatic acceptance or declining by email. Theformat for the email acceptance can also be included within the code, orcan simply be a pre-stored email saying a user name A (filled in by thescanning software) has accepted your meeting B (filled in from theinformation from the bar code).

The present system defines using bar codes to enter relatively largeamounts of information into the computer. FIGS. 7A through 7C showsspecial new bar codes which are described according to the presentsystem, which enable this storage of additional information.

Many different kinds of bar codes, that allow storing larger amounts ofinformation, are known. One such bar code is the “Gettysburg Address”type matrix code. This requires, however specialized scanning equipment.This equipment represents a capital investment and has been slow tocatch on. The present system teaches, in FIG. 7A, a special bar codewhich includes increased capacity bar code information, as well asbackwards compatibility with previous bar code scanners. The code shownin FIG. 7A includes two parts. A first part 710 is found as legal whenscanned for linear codes. A second part 710 registers as invalid/illegalwhen scanned in this way.

The linear part 700 is a standard and commercially available linear barcode such as a UPC, Type 39 or Type 128 bar code. A conventional linearbar code reader will read and decode this portion. Part of the standardfor these bar codes includes certain spacing requirements. For example,dead space at the edges of the bar code may be one of the requiredcharacteristics. These are shown as 702, 704. When this dead space isdetected, and all other aspects of the bar code are detected, the barcodes can be read and decoded, shown as 711.

The remainder of the bar code may be a code which fails the decodingrequirements for the linear bar code 700. This failure type bar code canrepresent a matrix code, for example, of any desired type. For example,this can be a Gettysburg Address or Vericode type matrix code. Inaddition, however, it can be a special kind of matrix code in which eachbar shown as 720 is itself made up of another bar code extending in thevertical direction. The spacing between the bars 720, 722, 724 may alsoinclude information. Within each bar 720, for example, the pattern alsoprovides additional information. In this way, the bar code is actuallyformed of two different bar code scans. A scan in the direction 730obtains first information, and a scan across each line in the direction732 obtains additional information. After scanning the line 732, thesystem scans along the line 734 to obtain the next item of information.If this is obtained from a camera, however, the whole image can beobtained and later processed using processing techniques to obtain thescan information. In addition, scan information can be obtained from thelinear bar code part 700. FIG. 7A shows the linear part taking upapproximately twenty-five percent of the area of the entire bar code.However, the two-dimensional scan can take up much less area, e.g. aslittle as five to ten percent. When scanning with a conventional barcode scanner of the linear type, the bottom portion may be scanned toobtain the two-dimensional bar code information. Enhanced bar codeinformation can be obtained from the additional portion. This enhancedinformation can be additional information, or it can be the sameinformation as in the first bar code portion, as well as additionalinformation.

In the context of this system, the linear bar code information canrepresent an address for look up code of the type described above withreference to FIG. 4. The enhanced or non-linear information 710 canrepresent the total information. A person with a sufficiently advancedbar code scanner can read the entire information. A person with only alinear bar code scanner, however, may scan only the information 700, andthen updates the information via a hot sync.

An additional way of using this information, for example for scanningproducts, is also contemplated. Scan part 700 may include a UniversalProduct Code or UPC. Scanning part 710 may include additionalinformation about the product, such as a description, or picture. Thepicture of the product may be displayed to the sales clerk, so that thesales clerk can verify that the product being purchased is actually theproduct that the user is presenting. Both parts of the bar code mayrepresent information about the product. The part 700 represents basicinformation and the part 710 represents advanced information.

A second enhanced bar code shown in FIG. 7B is a standard linear barcode or two-dimensional bar code with additional information stored inthe gray scale. FIG. 7B show the system configured as a two-dimensionalbar code. A first stripe 700 represents a dark (i.e. non-white) stripe.A second stripe 702 represents a white stripe and a third stripe 704representing another dark stripe. Similarly, the code 699 alternatesbetween white stripes and dark stripes throughout the entire code. Inthis embodiment, however, the dark stripes 700 are not actually black,but may be a color that is a shade of gray. For example, 16 or 256different grayscale levels may be defined. Each time a code is detected,its grayscale value is obtained as a numeric value. Similarly, the whitestripes 702, 706 may actually be a shade of gray. In this system, ratherthan simply obtaining spacing information, spacing information andgrayscale information are both obtained from the scanning of the code.The gray scale information can be obtained when a camera type imager isused, since the color of the stripes can be obtained in addition to thespacing of the stripes. An alternative is that the white areas 702 arenot pure white, but are rather some shade of white which can becharacterized between zero and sixteen for example.

Information is obtained from both the shade(s) of gray of the darkportion(s), the white portion(s), and the spacing.

In one embodiment, the sequence of the numbers defining the gray scalelevels provides the information. For example, hex value is defined bygrayscale values of each gray line. This information is used totallyseparately from the information that is obtained from the linear barcodeinformation.

Yet another alternative does not use black portions and white portions,but rather uses alternating grayscale portions, with each alternatingportion representing a grayscale value. Preferably a system is usedwhereby the gray scale is itself coded as either the gray scale or thecompliment of the gray scale to provide maximum contrast between thebars 700, 702.

An alternative system shown in FIG. 7C uses color bars in the bar code.Not only is the spacing between the bars determined, but also thenumerical value representing the bar values themselves. For example,each color can be represented by an eight bit value. That eight bitvalue is obtained, and used as part of the retrieved information. Theeight bit value can represent 2 hex digits. Again, this information canbe used as supplemental to the spacing information obtained by the barcode.

In the latter two systems, color is described as being used with atwo-dimensional bar code but can also be used with a three-dimensionalbar code. In addition, in this system, the color and the spacing canboth be used. By taking the available number of digits, and representingthe color by that available number of digits, a number in base n, wheren can be a very large number, can be obtained. This facilitates storingeven more information into a bar code.

These codes preferably follow the paradigm described above, thatscanning with a monochrome scanner may return only a part of theinformation, e.g. an address to be later used for lookup. The color/greyscale information can be used to provide the actual information. Forexample, the digits represented by the grey scales or colors can beconcatenated to form the overall information. Scanning the code givesthe bar code information; while looking at the detailed informationgives the enhanced information.

Any of these enhanced information codes can be used with the dualinformation code described above.

Other embodiments are contemplated.

What is claimed is:
 1. A method of scanning a barcode comprising: usinga barcode scanner to scan a barcode, wherein said barcode is displayedon a display screen of a mobile device; decoding by said barcode scannerthe barcode to obtain information relating to the identity of a person;and contacting a remote server and using said information relating tothe identity of a person to access a memory on the remote server andobtain additional information related to the person.
 2. The method ofclaim 1, wherein said information relating to the identity of a personis a value.
 3. The method of claim 1, wherein said barcode includesimage information.
 4. The method of claim 1, wherein said barcode isencrypted.
 5. The method of claim 1, wherein said barcode is atwo-dimensional barcode.
 6. A computer program product, tangibly storedon a computer-readable storage medium, comprising machine-readableinstructions which cause a computer to perform operations comprising:receiving a barcode via an electronic communication over a channel;displaying the barcode to a user on a display screen, wherein saidbarcode is displayed as an image on said display screen; wherein saidbarcode represents information relating to the identity of a person; andwherein said displaying said barcode allows said barcode to be scannedfrom said display screen by a barcode scanner.
 7. The computer programproduct of claim 6, wherein said barcode is encrypted.
 8. The computerprogram product of claim 6, wherein said barcode includes imageinformation.
 9. The computer program product of claim 6, wherein saidcomputer program product is stored on a mobile device that has acomputer-readable storage medium capable of storing said barcode. 10.The computer program product of claim 6, wherein said informationrelating to the identity of a person represents a value that isassociated with identifying information in a database.
 11. The computerprogram product of claim 6, wherein said barcode is accompanied byadvertising information.
 12. The computer program product of claim 11,wherein said advertising information further includes addressinformation relating to the advertiser.
 13. The computer program productof claim 6, wherein said barcode scanner is a dedicated barcode scanner.14. A barcode system comprising: a mobile device operable to make atelephone call over a channel; an electronic communication receivingpart receiving a barcode via an electronic communication over thechannel; a display screen displaying said barcode to a user on a displayscreen, wherein said barcode is displayed as an image on said displayscreen; wherein said barcode represents information relating to theidentity of a person; and wherein said displaying said barcode allowssaid barcode to be scanned from said display screen by a barcodescanner.
 15. The system of claim 14, wherein said barcode is encrypted.16. The system of claim 14, wherein said barcode includes imageinformation.
 17. The system of claim 14, wherein said barcode isaccompanied by advertising information.
 18. The system of claim 14,wherein said barcode is a two-dimensional barcode.
 19. The system ofclaim 14, wherein said information relating to the identity of a personrepresents a value that is associated with identifying information in adatabase.
 20. The system of claim 14, wherein said barcode furthercomprises information relating to address information.