Mms text messaging for hand held indicia reader

ABSTRACT

A method of operating a reader system includes: establishment a hand held reader configured to read an information bearing medium at an establishment and accepting text message communications from the establishment; reading the information bearing medium at the establishment with the reader; and, sending at least one text message communication to an operator of the reader at the establishment on the reader GUI from the establishment when the establishment recognizes a need for a specific notice requirement after reading the information bearing medium.

FIELD OF THE INVENTION

The present invention relates to indicia reading devices, and moreparticularly to a method of operating an indicia reader.

BACKGROUND

Indicia reading devices (also referred to as scanners, laser scanners,image readers, indicia readers, etc.) typically read data represented byprinted or displayed information bearing indicia (IBI), (also referredto as symbols, symbology, bar codes, etc.) For instance one type of asymbol is an array of rectangular bars and spaces that are arranged in aspecific way to represent elements of data in machine readable form.Indicia reading devices typically transmit light onto a symbol andreceive light scattered and/or reflected back from a bar code symbol orindicia. The received light is interpreted by a processor which performssignal and/or image processing to extract the data represented by thesymbol. Optical indicia reading devices typically utilize visible orinfrared light. Laser indicia reading devices typically utilizetransmitted laser light.

One-dimensional (1D) indicia readers are characterized by reading datathat is encoded along a single axis, in the widths of bars and spaces,so that such symbols may be read from a single scan along that axis,provided that the symbol is sampled with a sufficiently high resolutionalong that axis.

In order to allow the encoding of larger amounts of data in a single barcode symbol, a number of 1D stacked bar code symbologies have beendeveloped which partition encoded data into multiple rows, eachincluding a respective 1D bar code pattern, some or all of which must bescanned and decoded, then linked together to form a complete message.Scanning still requires relatively higher resolution in one dimensiononly, but multiple linear scans at different locations on a seconddimension are needed to read the whole symbol.

A class of bar code symbologies known as two dimensional (2D) matrixsymbologies have been developed which require image based reading andoffer greater data densities and capacities than 1D symbologies. 2Dmatrix codes encode data as dark or light data elements within a regularpolygonal matrix, accompanied by graphical finder, orientation andreference structures.

Often times an indicia reader may be portable and wireless in naturethereby providing added flexibility. In these circumstances, suchreaders form part of a wireless network in which data collected withinthe terminals is communicated to a host computer situated on a hardwiredbackbone via a wireless link. For example, the readers may include aradio or transceiver for communicating with a remote computer.

Efforts regarding such systems have led to continuing developments toimprove their versatility, practicality and efficiency.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an exemplary indicia reader system.

FIG. 2 is a simplified schematic block diagram of an exemplary indiciareader.

FIG. 3 is an exemplary flow chart for operating an indicia reader.

DETAILED DESCRIPTION

Reference will now be made to exemplary embodiments which areillustrated in the accompanying drawings. Other embodiments may be invarious forms and the exemplary embodiments should not be construed aslimited to the embodiments set forth herein. Rather, theserepresentative embodiments are described in detail so that thisdisclosure will be thorough and complete, and will fully convey thescope, structure, operation, functionality, and potential applicabilityto those skilled in the art. Wherever possible, the same referencenumbers will be used throughout the drawings to refer to the same orlike parts. The term “scan” or “scanning” used herein refers to readingor extracting data from an information bearing indicia (or symbol). Theterm imaging used herein refers to the taking or creation of anelectronic image.

Exemplary methods may be conceived to be a sequence of steps or actionsleading to a desired result and may be implemented as software. While itmay prove convenient to discuss such software as if were embodied by asingle program, most implementations will distribute the describedfunctions among discrete (and some not so discrete) pieces of software.These pieces are often described using such terms of art as “programs.”“objects.” “functions.” “subroutines,” “libraries,” “.dlls.” “APIs.” and“procedures.” While one or more of these terms may find favor in thepresent description, there is no intention to limit the invention to thedescribed configurations.

In general, the sequences of steps in the present methods requirephysical manipulation of physical quantities. These quantities take theform of optical, electrical or magnetic signals capable of being stored,transferred, combined, compared or otherwise manipulated. Those ofordinary skill in the art conveniently refer to these signals as “bits”,“values”, “elements”, “symbols”, “characters”, “images”, “terms”,“numbers”, or the like. It should be recognized that these and similarterms are to be associated with the appropriate physical quantities andare merely convenient labels applied to these quantities.

With respect to the software described herein, those of ordinary skillin the art will recognize that there exist a variety of platforms andlanguages for creating software for performing the methods outlinedherein. Those of ordinary skill in the art also recognize that thechoice of the exact platform and language may be often dictated by thespecifics of the actual system constructed, such that what may work forone type of system may not be efficient on another system. It shouldalso be understood that the methods described herein are not limited tobeing executed as software on a computer or DSP (Digital SignalProcessor), but may also be implemented in a hardware processor. Forexample, the methods may be implemented with HDL (Hardware DesignLanguage) in an ASIC.

FIG. 1 illustrates an exemplary scanning system, wherein a plurality ofindicia readers 112 operated and utilized where information bearingindicia (IBI) are present. The indicia readers may be stationary orhand-held and may be either laser indicia reading devices (or laserscanners) utilizing transmitted laser light or optical indicia readingdevices utilizing image capturing devices for extracting data from IBIs.

An exemplary embodiment of a laser scanning system includes acentrally-positioned double-sided rotating mirror or central spinner, afirst and second deflector or directional mirror, a first and secondwobbling mirror, and a plurality of pattern mirrors. A scanning systemand the foregoing components may be mounted in stationary or fixedhousings 80, wherein patterns mirrors may be positioned and aligned todirect the two scanning patterns in different directions towards acommon scanning field. Exemplary stationary or fixed-mount retailscanners may combine both vertical and horizontal laser output windows81, 83 respectively that view a single common scanning field or regionfor reading barcode targets on products that may be located on thebottom or sides of the products.

An operator may aim a hand-held indicia reader 112 at a targetcontaining an IBI, dataform, text, or other data to be collected andactuate a button or trigger 115 on the indicia reader to control full orpartial operation of the reader, such as to activate scanning of an IBI.An IBI or dataform may be an originally machine generated symbology thatmay be also machine readable, such as a 1-D barcode, a 2-D barcode, a1-D stacked barcode, a logo, glyphs, color-codes, and the like.

An exemplary indicia reader 112 may be a mobile device, such as a handheld scanner, a portable data terminal (PDT), personal digital assistant(PDA), mobile device, etc. A Portable Data Terminal, or PDT, may betypically an electronic device that may be used to enter or retrievedata via wireless transmission (WLAN or WWAN) and may also serve as anindicia reader used in stores, warehouse, hospital, or in the field toaccess a database from a remote location. Personal Digital Assistants(PDAs) are handheld devices typically used as a personal organizer, andmay have many uses such as calculating, use as a clock and calendar,playing computer games, accessing the Internet, sending and receivingE-mails, use as a radio or stereo, video recording, recording notes, useas an address book, and use as a spreadsheet. An exemplary indiciareader may have a graphic user interface (GUI) such as touch screendisplay 116. An exemplary indicia reader 112 may have a number ofsubsystems provided within a housing 117 configured to be hand held. Forexample, the reader may have a handle portion 111.

Exemplary indicia readers may be in communication (wired or wireless) toa local transaction processing system 140, such as a cash register,customer station or employee station or local host/server 122 directlyor through a charging station or base 138. An exemplary local server 122or indicia reader 112 may be in communication with network 120 and or aremote/web server 134.

Referring to FIG. 2, an exemplary indicia reader 112 may comprise anumber of exemplary subsystems, such as laser scan engine 380 or laserscanning reader system for reading indicia on a target T. The laserscanning reader system may comprise a laser controller 384 forcontrolling a laser generator 388 for generating a laser light beamwhich may be directed onto a folding mirror 390 which then directs thelaser light beam to an oscillating or rotating scan mirror 392 toproject a scanning pattern onto target T. The laser scanning pattern maybe reflected off of the target and redirected by scan mirror 392 into areceive path comprising a laser light pass filter 396, a photodiode 400,an amplifier 404 and a digitizer 408.

Laser light may be described as a spatially coherent, narrowlow-divergence beam of light.

Digitizer 408 may convert an analog signal output by the photodiode intoa digital signal representative of the light reflected off of thetargets.

Exemplary laser scanners use a laser beam as the light source and employeither a reciprocating mirror or a rotating prism to scan the laser beamback and forth across the IBI. One or more photodiodes are used tomeasure the intensity of the light reflected back from the bar code. Thelight emitted by the reader may be rapidly varied in brightness with adata pattern and the photodiode receive circuit may be designed todetect only signals with the same modulated pattern.

An exemplary photodetector or photosensor may be comprised of one ormore photodiodes that converts incident light energy into electriccharge that may be an output signal representative of light reflectedoff an IBI. The output of the photodetector may be processed utilizingone or more functions or algorithms to condition the signalappropriately for use in further processing downstream, includingdecoding of IBIs.

An exemplary indicia reader 112 may comprise one or more optical imageengines (image indicia reader systems or optical scan engines) 610 forreading indicia on a target T. Optical image engines capture and readimages to detect and decode IBIs located within the captured images. Theoptical image indicia reader systems may comprise one or moreillumination source(s) 618 for illuminating an IBI with a beam orpattern of incoherent light in the form of an illumination pattern andan image sensor 626 for converting light reflected off a target T havingan IBI provided thereon into representative output signals thereof. Theoutput signal of the image sensor may be processed utilizing one or morefunctions or algorithms to condition the signal appropriately for use infurther processing downstream, including decoding of IBIs.

An exemplary image sensor converts light or other electromagnetic energyreflected off of a target and provides an output signal representativethereof. Image sensors may be an array of pixels adapted to operate in aglobal shutter or full frame shutter, mode or alternately operate in arolling shutter mode. It may be a color, monochrome or monocolor 2Dsolid state image sensor implemented in any of CCD, CMOS, NMOS, PMOS,CID, CMD, back-illuminated technologies. The reader may be able tooperate in either a progressive scan or interleaved scan mode. The imagesensor may contain an array of light sensitive photodiodes (or pixels)that convert incident light energy into electric charge. Many solidstate image sensors also allow regions of a full frame of image data tobe addressed.

Other exemplary reader subsystems or components supported by the housingmay include one or more local or on board processor(s) 170, local memory172, a battery 218, a display 116, a key pad 214 and a wirelesscommunications module 180. The subsystems may communicate via one ormore bus 168, data lines or other signal or data communication form. Theindicia reader may communicate with one or more host processor(s) 118, alocal host/server 122, local memory 166, network 120 or remote serverhost/server 134.

Communications module 180 may provide a communication link from imagingreader 112 to other indicia readers or to other systems such as aserver/remote processor 134.

The processor(s) may be located on board or within the housing withother subsystems. The particulars of the functionality of theprocessor(s) and the reader may be determined by or based upon certainconfiguration settings or data which may be stored in firmware, remoteor local memory. Configuration settings may be arranged as storedparameter tables.

An exemplary processor may be a mixed-signal array with on-chipcontroller devices designed to replace multiple traditional MCU-basedsystem components with one single-chip programmable device. It mayinclude configurable blocks of analog and digital logic, as well asprogrammable interconnects.

The subsystems in the reader may be connected by one or more bus 168,data lines or other signal or data communication form. Exemplary formsmay be an Inter-IC bus such as a two wire interface (TWI), dedicateddata bus, RS232 interface, USB, etc.

The processor(s) may include a predetermined amount of memory forstoring firmware and data. The firmware may be a software program or setof instructions embedded in or programmed on the processor(s) whichprovides the necessary instructions for how the processor(s) operate andcommunicate with other hardware. The firmware may be stored in the flashmemory (ROM) of the processor(s) as a binary image file and may beerased and rewritten. The firmware may be considered “semi-permanent”since it remains the same unless it may be updated. This firmware updateor load may be handled by a device driver.

The processor(s) may be utilized to perform a number of functionaloperations, which may involve the performance of a number of relatedsteps, the particulars of which may be determined by or based uponcertain configuration settings stored in firmware or memory which may beany one of a number of memory types such as RAM, ROM, EEPROM, etc. Inaddition some memory functions may be stored in memory provided as partof the processor(s).

Exemplary functions of the processor(s) may be controlling operation thescan engine, decoding functions and operator interface functions.Operating software may be utilized to operate the processor(s) for suchfunctions seemingly simultaneously or in a multitasking role. Anexemplary image reader operating software architecture may be organizedinto processes or threads of execution.

Processor(s), memory and associated circuitry which perform or controlthe exemplary scan and decoding functions may be provided in the scanengine or on associated circuit boards which are located within thehousing of the reader. Decoding may be a term used to describe theinterpretation of a machine readable code contained in the photodetectoroutput signal.

An exemplary function of the processor(s) may be to decode machinereadable symbology provided within the target or captured image. Onedimensional symbologies may include very large to ultra-small, Code 128,Interleaved 2 of 5, Codabar, Code 93, Code 11, Code 39, UPC, EAN, MSI,or other 1D symbologies. Stacked 1D symbologies may include PDF, Code16K, Code 49, or other stacked 1D symbologies. 2D symbologies mayinclude Aztec, Datamatrix, Maxicode, QR-code, or other 2D symbologies.

Operation of the decoding, which may be executed in a user or factoryselectable relationship to a scanning routine, may be governed byparameters or configuration settings. Combinations of scanning anddecoding parameters together define scanning-decoding relationships ormodes which the reader will use. Two exemplary modes may be continuousor discontinuous. In the continuous mode (also referred to as continuousscanning mode, continuous streaming mode, streaming mode, fly-byscanning mode, on the fly scanning mode or presentation mode) the readermay be held in a stationary manner and targets (such as symbols locatedon packages) are passed by the reader. In the continuous mode, thereader takes continuous scans one after another (seriatim) andcontinuously decodes or attempts to decode some or all scanned targets.Discontinuous mode may be a mode wherein scanning and/or decoding stopsor may be interrupted and initiated with an actuation event, such aspulling of a single pull trigger 115, a timeout, or a successful read torestart. An exemplary utilization of the reader in discontinuous modemay be via hand held operation. Decoding stops once the indicia readermay be no longer triggered. The discontinuous mode may be typicallyinitiated because the operator knows a symbol may be present.

Exemplary indicia readers may use memory or firmware to store certainreader settings or reader configuration settings. Exemplaryconfiguration settings may be selection of scanning distance, triggerfunctionality, pre-defined bar code output data based on the scan input,continuous scanning mode, discontinuous scanning mode or routine,decoding mode or routine, I/O configurations, symbology enablement,output interface functionality, min/max symbology character lengths,scan engine selection, illumination functionality, settings that affectthe functional operation of the processor(s), which codes are enabledfor processing, aimer operation, engine orientation, illumination,photosensor functionality, software control, sales tracking or warrantytracking, reader capabilities, etc.

Readers and a host system may be equipped with the ability toautomatically query and communicate data, such as configuration settingsor firmware amongst each other. Upgrading firmware from host to readerand duplicating configuration settings may be performed without humanintervention to ensure readers are operating at the same revision andhave the same configuration settings reduces user frustration, downtime, data integrity and increase efficiencies.

At predetermined time intervals a host system may broadcast variousinformation, such as firmware revision, configuration settings, etc. Thehost may then download the newer files and update readers during a timeof inactivity. Readers may use on board memory or firmware flash memoryto store certain configuration settings.

Readers may be configured via serial connection using serial commands. Agraphic user interface (GUI) interface may be utilized for creating orreading serial commands, such as Visual Menu or similar such product.This may be done locally or remotely by connecting the optical readereither directly or through a network (such as the internet) to a remotecomputer and having the remote computer provide software upgrades.

Software upgrades may be necessary for migration from one reader to newor other readers, possibly different manufacturers. Upgrading may besimplified if the configuration of the reader being replaced may bematched or matches the configuration of the equipment that it may bereplacing.

If reader software may be replaced, the reader may have the ability toautomatically read out configuration settings information in memory andallow the software to adapt and use different methods of control, ordifferent methods of decoding, etc.

An exemplary embodiment for upgrading may be to provide a PC basedsoftware tool to read out the non-default configuration settings from atarget reader device (the one being replaced) through a serialcommunication and then to flash the same or equivalent settings into thereplacement equipment. This may be considered a direct configurationmapping method, that is, reading the configuration settings on a (old)Device A and flashing them into a (new) Device B.

Another exemplary embodiment may be to provide a PC based software toolthat analyzes output scanned data of a known information bearing indiciafrom a target reader (the one being replaced) and compares it with theoutput scanned data from the replacement reader. The software tool mayinterpret how the existing device may be configured based on thedifference between the two sets of scanned data. After interpolation ofthe configuration settings of the replacement reader, the software toolwould configure the replacement reader to match the old or replacementreader. This may be considered indirect mapping, wherein the softwaretool interpolates the inner settings of an existing device from itsoperation, rather than by direct read out from memory or firmware.

Either exemplary embodiment may be integrated with a cross-browser,client-side DHTML menu builder such as Visual Menu. The configuration ofa reader may be read out once and then propagated many times usingwireless or over-the-net configuration utilities, hard copy or videodisplay menuing or other suitable means.

A user may update or replace one or more stored configuration settingsor configuration setting data utilizing a remote updating system whichmay be done by connecting the reader either directly or through anetwork (such as the internet) to a remote processor. With appropriatesoftware, the remote processor may be programmed to read certainconfiguration settings from the reader, such as software configuration.The remote processor may read the configuration setting data and utilizethat data when downloading updates or new software. An operator mayrequest from the remote processor for a software update. The requestwould be received by either computer, which could read the currentsoftware configuration resident on the optical reader and determine theappropriate update or replacement software. Certain bar code symbologytypes have special data codewords or characteristics which identify themas to be used for configuration. Bar codes which are created utilizingthese codewords or characteristics are commonly referred to asconfiguration bar codes, menuing bar codes, or menuing informationbearing indicia (IBI). Typically, a scanning device will come with amanual which has configuration bar codes inside which are used tospecifically configure that device. The data contained in theconfiguration bar code may be used to identify which setting to address,and what value to load for that setting. In some cases if the settinghas a range of acceptable values which may be very large, severalconfiguration bar codes, one which addresses the setting and one or moreothers which define the value, are scanned in succession to configurethe setting.

As described herein, POT scanners may incorporate LCD displays thatproduce several benefits to an operator, including the ability tocontrol the device and communicate with other devices and systems.

Text messaging or texting refers to the exchange of brief writtenmessages between fixed-line mobile device or mobile device and fixed orportable devices over a network. The term refers to messages sent usingthe Short Message Service (SMS) and messages containing image, video,and sound content (known as Multimedia Message Services or MMSmessages). Multimedia Message Services is different from SMS (ShortMessage Service) because it include photos, video etc. The sender of atext message is known as a texter, while the service itself hasdifferent colloquialisms depending on the region, it may simply bereferred to as a text in North America, India, Australia, thePhilippines and the United Kingdom, an SMS in most of Europe, and a TMSor SMS in the Middle East and Asia.

Text messages may be used to interact with automated systems, such asordering products and services for mobile devices, or participating incontests. Advertisers and service providers use texts to notify mobiledevice users about promotions, payment due dates and othernotifications.

Text Messaging by mobile devices or mobile devices may include all 26letters of the alphabet and 10 numerals, i.e. alpha-numeric messages ortext to be sent by texter or received by the textee.

MMS may be a store-and-forward method of transmitting graphics, videoclips, sound files and short text messages over wireless networks usingthe WAP protocol. Carriers deploy special servers, dubbed MMS Centers(MMSCs) to implement the offerings on their systems. MMS also supportse-mail addressing providing that a device may send e-mails directly toan e-mail address. MMS may be used for communication between scannersand scanning mobile devices such as POT scanners, mobile devices, PDTs,PDAs, etc.

MMS message refers to a multimedia message, which contains text, audio,video various other multimedia content sent via mobile devices in amobile device network.

MMS message extends the capacity of SMS sending, which may be limitedonly to text messages up to 160 or 70 characters in length. Because oftheir extended content, MMS messages are sent differently from SMSmessages. The sending device first encodes the message, then it forwardsto a MMS Center (MMSC). The MMSC informs a recipient device of themessage. The recipient device downloads the content from the MMSC anddisplays the content. Some mobile devices are unable to display MMScontent, because their screens may only show texts. If the recipientdevice may be incapable of showing the message, the MMSC sends a textmessage including the URL (the address of web pages) where the MMSmessage may be opened and viewed.

A MMS message may be compatible to be sent from different media. BesidesGSM mobile devices, MMS services enable specialized MMS Gateways totransfer MMS. Enterprises use automated MMS sending by installing an MMSGateway software into their systems. Such software may be suitable forsending both SMS and MMS contents.

MMS Gateways set up a GPRS link and download the MMS messages from theMMSC. As the download occurs a unique message ID may be assigned to themessage. It may be important to know that incoming MMS messages are madeup from individual files, such as JPG and GIF pictures, WAV files andTXT content. They are the attachments of the messages with ID and savedto the same download directory as the messages. Entering the inbox themessage ID with the attachment list are displayed and may be found inthe download directory.

MMS messages may also be received by subscribing for MMS services. Thesubscriber sends a code to a preset mobile device number and receivesthe MMS with the content. MMS messages may contain ringtones,wallpapers, pictures, photos, videos or music. After saving them to theGSM device, the usage of the MMS content becomes possible. Visuals maybe set as background pictures and files that with videos and music maybe used as ringtones.

MMS messages may offer unlimited ways of communication, self expressionand information mediation. MMS messages are useful tools for commerceand business as they demonstrate the content more explicitly and leavesno gaps in content. Visuals and audios help to underline the meaning ofa simple text message, which would otherwise arouse no interest.

Wireless Application Protocol (WAP) may be an open internationalstandard. A WAP browser may be a commonly used web browser for smallmobile devices.

MMS, however, may be not the same as e-mail. MMS is based on the conceptof multimedia messaging. The presentation of the message may be codedinto the presentation file so that the images, sounds and text aredisplayed in a predetermined order as one singular message. MMS does notsupport attachments as e-mail does.

MMS text messaging may be utilized on a scanning device such as abarcode scanner at a POT.

MMS is a descendant of SMS (Short Messaging Service). MMS extends textmessaging to include longer text, graphics, photos, audio clips, videoclips, or any combination.

Short Message Service (SMS) is the text communication service componentof mobile device, web or mobile communication systems, usingstandardized communications protocols that allow the exchange of shorttext messages between fixed line or mobile device devices, usuallybetween cell mobile devices, or from a PC or handheld to a cell mobiledevice. The term SMS is used as a synonym for all types of short textmessaging as well as the user activity itself in many parts of theworld. The “short” part refers to the maximum size of the text messages,such as 160 characters (letters, numbers or symbols in the Latinalphabet).

Mobile devices are constantly sending and receiving information, talkingto a cell mobile device tower over a pathway called a control channel.The reason being so that the cell mobile device system knows which cella mobile device is in so that a mobile device may change cells as it ismoved around. Every so often, the mobile device and a cell tower willexchange a packet of data that confirms operable communicationconditions.

The mobile device also uses a control channel for call setup. Whensomeone tries to call a mobile device, the cell tower sends the mobiledevice a message over the control channel that tells the mobile deviceto play its ringtone. The tower also gives the mobile device a pair ofvoice channel frequencies to use for the call.

The control channel also provides the pathway for SMS messages. When aSMS message is sent, the message flows through the SMSC, then to thetower, and the tower sends the message to the mobile device as a littlepacket of data on the control channel. In the same way, the mobiledevice sends it to the tower on the control channel and it goes from thetower to the SMSC and from there to its destination.

MMS may be used to send photos and videos from camera mobile devices toother MMS mobile devices or email accounts MMS platforms may supportSMIL, which allows various parts of an MMS message to be arranged into asmall multimedia “slideshow” to be viewed on another SMIL-capable MMSmobile device.

MMS messages are delivered in a different way from SMS messages. Thefirst step is for the sending device to encode the multimedia content ina fashion similar to sending a MIME e-mail (MIME content formats aredefined in the MMS Message Encapsulation specification). The message isthen forwarded to the carrier's MMS store and forward server, known asthe MMSC. If the receiver is on another carrier, the relay forwards themessage to the recipient's carrier using the Internet.

Once the MMSC has received a message, it first determines whether thereceiver's handset is “MMS capable”, that is it supports the standardsfor receiving MMS. If so, the content is extracted and sent to atemporary storage server with an HTTP front-end. An SMS “controlmessage” containing the URL of the content is then sent to therecipient's handset to trigger the receiver's WAP browser to open andreceive the content from the embedded URL. Several other messages areexchanged to indicate status of the delivery attempt. Before deliveringcontent, some MMSCs also include a conversion service that will attemptto modify the multimedia content into a format suitable for thereceiver. This is known as “content adaptation”.

If the receiver's handset is not MMS capable, the message is usuallydelivered to a web based service from where the content may be viewedfrom a normal internet browser. The URL for the content is usually sentto the receiver's mobile device in a normal text message. This behavioris usually known as the “legacy experience” since content may still bereceived by a mobile device number, even if the mobile device itselfdoes not support MMS.

The method for determining whether a handset is MMS capable is notspecified by the standards. A database is usually maintained by theoperator, and in it each mobile device number is marked as beingassociated with a legacy handset or not. It may be a bit hit and misssince customers may change their handset at will and this database isnot usually updated dynamically.

E-mail and web-based gateways to the MMS (and SMS) system may beestablished. On the reception side, the content servers may typicallyreceive service requests both from WAP and normal HTTP browsers, sodelivery via the web is simple. For sending from external sources tohandsets, most carriers allow MIME encoded message to be sent to thereceiver's mobile device number with a special domain. An example ofthis would be PTN@messaging.carrier.com, where PTN is the publictelemobile or mobile device number. Typically the special domain name iscarrier specific.

With MMS, handset configuration may cause problems sending and receivingMMS messages. Also, content multimedia content created by one brand ofMMS mobile device may not be entirely compatible with the capabilitiesof the recipient's MMS mobile device. In the MMS architecture, therecipient MMSC is responsible for providing content adaptation (e.g.,image resizing, audio codec transcoding, etc.), if this feature isenabled by the mobile network operator. When content adaptation issupported by a network operator, its MMS subscribers enjoy compatibilitywith a larger network of MMS users than would otherwise be available.

MMS requires a number of handset parameters to be set. Poor handsetconfiguration is often blamed as the first point of failure for manyusers. Service settings are sometimes preconfigured on the handset, butmobile operators are now looking at new device management technologiesas a means of delivering the necessary settings for data services (MMS,WAP, etc.) via over-the-air programming (OTA).

Few mobile network operators offer direct connectivity to their MMSCsfor content providers. This has resulted in many content providers usingWAP push as the only method available to deliver ‘rich content’ tomobile handsets. WAP push enables ‘rich content’ to be delivered to ahandset by specifying the URL (via binary SMS) of a pre-compiled MMS,hosted on a content provider's web server. Although the standard doesnot specify a maximum size for a message, 300 kB is the currentrecommended size used by networks due to some limitations on the WAPgateway side

With regard to barcode scanners utilized in establishments with point oftransaction (POT) locations, each barcode scanner may have its ownunique text or lane number. This lane number may receive full textmessages that will be immediately displayed on the unit's display thatis only visible to the operator. An audible beep or blinking light maynotify the user that a message has been received, which serves as adiscrete method to notify a user, such as a cashier, of a price orsecurity alert message. With scanners having MMS, SMS message or textcommunication capability, an entire store may be in discretecommunication from the store managing office to the check out counters.Exemplary embodiments of utilization of a discrete messagingcommunication tool may be: identifying a customer in line that writesbad checks; identifying a customer buying excessive amounts of suspectsubstances such as butane, sedatives, nitrous oxide products, tobacco,etc.; providing reminders such as a “ASK FOR I.D.” for cigarettes oralcohol” message, “ASK TO SEE SIGNATURE” message, etc.

In an exemplary embodiment, a person employed by an establishment suchas a store may send a retrieved price check scan from his/her ownpersonal cell mobile device or store owned mobile device rather thanhaving to walk up to the POT or store front to provide scanned priceinformation.

In an exemplary embodiment, an establishment recognizes information ordata is obtained from an information bearing medium, such as a cardhaving a magnetic strip (mag strip) or symbol indicia (such as one ortwo dimensional symbologies), an RFID instrument, biometric informationsuch as a fingerprint or retina, etc. The establishment then retrievesidentification information, (such as drivers license information,address information, a photo, a picture, etc.) of the bearer (i.e.customer) of the information bearing medium from either an establishmentserver or a remote server and sends that identification information viaa message to the scanner present at the location of the bearer, such asat a POT.

An exemplary flowchart for operating a scanning system in FIG. 3 beginswith a customer at POT 510. While the customer is at the POT, theestablishment sends a message to a scanner at the POT 514 and signalsthe scanner operator that a message has been sent 518. The scanneroperator reads the message 522 and is either told or decides 526 tocontinue with the transaction 530 or terminate the transaction 534.

In an exemplary embodiment, an establishment recognizes information ordata is obtained from an information bearing medium, such as a cardhaving a magnetic strip (mag strip) or symbol indicia (such as one ortwo dimensional symbologies), an RFID instrument, biometric informationsuch as a fingerprint or retina, etc. The establishment then retrievesidentification information, (such as drivers license information,address information, a photo, a picture, etc.) of the bearer (i.e.customer) of the information bearing medium from either an establishmentserver or a remote server and sends that identification information viaa message to a scanner other than the scanner present at the location ofthe bearer or in addition to the scanner present at the location of thebearer. The identification information may be sent to multiple scannersin the establishment for security purposes.

What is described herein is a method of operating an indicia readerproviding a display on an indicia reader adapted for hand held operationto read information bearing indicia (IBI) at a point of transaction(POT); configuring the indicia reader to accept an establishmentspecific notice; reading an IBI at a POT with the indicia reader; and,providing at least one MMS, SMS or other text communication to anoperator of the indicia reader at the POT on the indicia reader displayfrom the establishment when the establishment recognizes the need for aspecific notice requirement according to a predetermined set of rules,an algorithm, observation, or other input recognizing a security risk.

It should be understood that the programs, processes, methods andapparatus described herein are not related or limited to any particulartype of computer or network apparatus (hardware or software). Varioustypes of general purpose or specialized computer apparatus may be usedwith or perform operations in accordance with the teachings describedherein. While various elements of the preferred embodiments have beendescribed as being implemented in software, in other embodimentshardware or firmware implementations may alternatively be used, andvice-versa. The illustrated embodiments are exemplary only, and shouldnot be taken as limiting the scope of the present invention. Forexample, the steps of the flow diagrams may be taken in sequences otherthan those described, and more, fewer or other elements may be used inthe block diagrams. Also, unless applicants have expressly disavowed anysubject matter within this application, no particular embodiment orsubject matter is considered to be disavowed herein.

1. A method of operating an indicia reader system comprising: providinga graphic user interface (GUI) on an indicia reader to read informationbearing indicia (IBI) at a point of transaction (POT) at anestablishment; configuring the indicia reader to accept a text messagecommunication from the establishment; reading an IBI at the POT with theindicia reader; and, sending at least one text message communication toan operator of the indicia reader at the POT on the indicia reader GUIfrom the establishment when the establishment recognizes a need for aspecific notice requirement.
 2. A method in accordance with claim 1,wherein the text message communication is a multimedia message services(MMS) text.
 3. A method in accordance with claim 1, wherein the textmessage communication is a short message services (SMS) text.
 4. Amethod in accordance with claim 1, wherein the text messagecommunication includes a picture of the person at the POT.
 5. A methodin accordance with claim 1, further comprising retrieving identificationinformation about the person at the POT and sending a picture of theperson at the POT.
 6. A method in accordance with claim 1, furthercomprising retrieving identification information about the person at thePOT and sending address information of the person at the POT.
 7. Amethod in accordance with claim 1, further comprising terminating atransaction attempted by a person at the POT.
 8. A method in accordancewith claim 1, further comprising audibly signaling the operator that atext message communication has been sent.
 9. An indicia reader systemcomprising: an indicia reader adapted to read information bearingindicia (IBI) at a point of transaction (POT) at an establishment, theindicia reader having a graphic user interface (GUI); the indicia readerconfigured to accept a text message communication from theestablishment; the establishment sending at least one text messagecommunication to an operator of the indicia reader at the POT on the GUIfrom the establishment when the establishment recognizes a need for aspecific notice requirement after the indicia reader reads an IBI at thePOT.
 10. An indicia reader according to claim 9 wherein the text messagecommunication is a multimedia message services (MMS) text.
 11. Anindicia reader according to claim 9 wherein the text messagecommunication is a short message services (SMS) text.
 12. An indiciareader according to claim 9 wherein the text message communicationincludes a picture of a person at the POT.
 13. An indicia readeraccording to claim 9 wherein identification information about the personat the POT is retrieved and sent with a picture of a person at the POT.14. An indicia reader according to claim 9 further comprising retrievingidentification information about the person at the POT and sendingaddress information of a person at the POT.
 15. An indicia readeraccording to claim 9, wherein a transaction attempted by a person at thePOT is terminated after receipt of the text message communication.
 16. Amethod of operating a reader system comprising: a reader configured toread an information bearing medium at an establishment and acceptingtext message communications from the establishment; reading theinformation bearing medium at the establishment with the reader; and,sending at least one text message communication to an operator of thereader at the establishment on the reader GUI from the establishmentwhen the establishment recognizes a need for a specific noticerequirement after reading the information bearing medium.
 17. A methodaccording to claim 16, further comprising sending the at least one textmessage communication to multiple hand held readers.
 18. A methodaccording to claim 16, wherein the text message communication instructsthe operator to terminate a transaction in progress.