Bookmark beacon system and method

ABSTRACT

A bookmark beacon system comprises a computer network, a wireless network configured to enable a wireless device to access the computer network, and a bookmark beacon that transmits a bookmark data packet to the wireless device. The bookmark data packet includes a resource address that enables the wireless device to retrieve information stored on the computer network.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a divisional of U.S. patent application Ser. No. 09/929,375, filed on Aug. 14, 2001. U.S. patent application Ser. No. 09/929,375 claims priority from and is related to the following prior application: Bookmark Beacon Method and System, U.S. Provisional Application No. 60/232,037 filed Sep. 12, 2000. These prior applications, including the entire written description and drawing figures, are hereby incorporated into the present application by reference.

BACKGROUND

1. Field of the Invention

This invention relates generally to an information beacon. More particularly, the invention provides a system and method for a bookmark beacon that enables communication with any device having access to a computer network, such as the Internet. The invention is particularly well-suited for communicating with Personal Digital Assistants, mobile communication devices, cellular telephones, and wireless two-way e-mail communication devices (collectively referred to hereinafter as “wireless devices”).

2. Description of the Related Art

Communication between a wireless device and traditionally non-wireless equipment, such as printers, facsimile machines, ATMs, etc., currently requires the equipment to be specially manufactured with wireless capabilities, such as a Bluetooth® interface. Bluetooth® is a de facto standard, as well as a specification for small-form factor, low-cost, short-range radio links between wireless devices. The manufacture of wireless-enabled equipment, however, involves increased cost, additional power consumption, and relatively complex hardware.

SUMMARY

A bookmark beacon system comprises a computer network, a wireless network configured to enable a wireless device to access the computer network, and a bookmark beacon that transmits a bookmark data packet to the wireless device. The bookmark data packet includes a resource address that enables the wireless device to retrieve information stored on the computer network.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an exemplary bookmark beacon system according to one embodiment of the claimed invention;

FIG. 2 is a block diagram showing one exemplary embodiment of the bookmark beacon;

FIG. 3 is an illustrative diagram showing an exemplary embodiment of the bookmark beacon system in which the bookmark beacon is associated with a physical location such as a commercial establishment;

FIG. 4 is a flow diagram showing an exemplary method for retrieving information on a wireless device relating to a guest device having a bookmark beacon;

FIG. 5 is an illustrative diagram showing an exemplary electronic messaging system for wireless devices that utilizes a bookmark beacon associated with a network-enabled printer; and

FIG. 6 is an illustrative diagram showing an exemplary electronic banking system that utilizes a bookmark beacon associated with a point-of-sale (POS) device.

DETAILED DESCRIPTION

Referring now to the figures, FIG. 1 is a block diagram of an exemplary bookmark beacon system 10. The system 10 includes a bookmark beacon 12, a wireless device 14, and a wireless communications network 16 through which the wireless device 14 can access the Internet 18 via a proxy server 20. In addition, the bookmark beacon 12 may be physically coupled with, or in close proximity to, a guest device 22.

Operationally, the bookmark beacon 12 transmits a bookmark data packet 24 to the wireless device 14, including information that is used by the wireless device 14 to access a network server 26 having a website 28 associated with the guest device 22. Through an Internet connection, the wireless device 14 may, for example, communicate with the guest device 22, retrieve information relating to the guest device 22, or interact with applications associated with the guest device 22. Alternatively, if the guest device 22 has a network connection, the bookmark data packet 24 may provide the wireless device 14 with the information necessary to directly access the guest device 22 (such as an IP address for the guest device 22). It should be understood, however, that the bookmark beacon system 10 is not limited to use with the Internet 18, but may be implemented using any computer network, such as a corporate Intranet or a large network operator.

The guest device 22 may be any type of device or structure, such as a store front, a printer, a facsimile machine, an ATM, or a cash register. Various embodiments of the bookmark beacon system 10 utilizing different types of guest devices are described in detail herein. Alternatively, the bookmark beacon system 10 may be implemented without a guest device 22. For instance, a bookmark beacon 12 could be used independently to communicate information, such as an advertisement, to a nearby wireless device 14.

The bookmark data packet 24 transmitted by the bookmark beacon 12 preferably includes a resource address, such as an IP address or a Uniform Resource Locator (URL), that enables the wireless device 14 to locate a network server 26 and website 28 over the Internet 18. Alternatively, the resource address may enable a network connection directly to the guest device 22. The data packet 24 may also include a limited amount of text describing the purpose of the bookmark beacon 12. The descriptive text preferably enables a wireless device user to determine if he or she is interested in further interaction with the system 10. In addition, the data packet 24 may further include data relating to the wireless device user's interaction with the guest device 22. For example, the data packet 24 might identify a cash register and the price of merchandise purchased by the wireless device user. In any case, the data packet 24 is preferably a short data stream that does not impose a heavy transmission demand on the bookmark beacon 12.

Upon receiving the bookmark data packet 24, the mobile device user is preferably given the option to then access the server 26 and website 28 or the guest device 22 identified by the resource address. Communication with the Internet is preferably achieved through an existing wireless network 16 and proxy server 20. Communications across the wireless network 16 and proxy server 20 involve operations that are commonly understood by those skilled in the art of wireless communications. Communication across the wireless network connection 16 may be facilitated on the wireless device 14 using any known software that is capable of interfacing the wireless device 14 with the proxy server 20. The proxy server 20 is then used as a gateway that allows the wireless device 22 to indirectly communicate with the website 28 or guest device 22 over the network connection. The proxy server 20 preferably communicates with the target website 28 through a Hypertext Transfer Protocol (HTTP) fetch and cache component. The target website 28 relating to the guest device 22 may operate on a range of computers, computer systems, or networks. For example, information or software applications relating to the guest device 22 could be stored in local databases, on an Intranet, or on the Internet 18. The fetch and cache component of the proxy server 20 stores the web pages that are returned from the website 28 in response to commands by the wireless device user. A wireless transport layer at the proxy server 20 then transmits the information through the wireless network connection 16 to the mobile device 14.

FIG. 2 is a block diagram 30 showing one exemplary embodiment of the bookmark beacon 12. The exemplary bookmark beacon 12 comprises a short-range serial infrared data communicator 32, a microprocessor 34, and a power source 36. The bookmark beacon 12 is preferably a wireless-enabled tag that uses the short-range serial infrared data communicator 32 to transmit the bookmark data packets 24. The data communicator 32 is preferable an IrDA (Infrared Data Association) port coupled to a microprocessor 34. The IrDA standard has been widely accepted throughout the wireless industry as a means of realizing low-power, non-interfering, interoperable data links. As a result, many commercially-available wireless devices include IrDA ports. It should be understood, however, that the bookmark beacon 12 could be implemented using any known means for transmitting data to a wireless device, such as a radio frequency transmitter. The power source 36 is preferably a battery, but could be any type of power source capable of supplying sufficient power to the processor 34.

Operationally, the processor 34 is programmed to contain the data to be included in the bookmark data packet 24. The processor 34 may, for example, be programmed through a small keyboard attached to the housing of the bookmark beacon 12, or through an external electrical interface such as a serial port, or by any means of communicating data to the bookmark beacon 12. The processor then transmits the data packet 24 through the IrDA port 32 for reception by any mobile device within wireless communication range. This transmission may be a continuous transmission, or may be configured to transmit at a periodic interval.

In an alternative embodiment, the bookmark beacon 12 may be implemented using a standard personal computer (PC) configured with an IrDA port. The transmission of data through IrDA ports is commonly understood by those skilled in the art, and is described in the “IrDA-Compatible Data Transmission Design Guide,” TELEFUNKEN Microelectronic GmbH, April 1996.

FIG. 3 is an illustrative diagram showing an exemplary embodiment 40 of the bookmark beacon system 10 in which the bookmark beacon 12 is associated with a physical location, such as a commercial establishment 42. In this embodiment 40, the bookmark beacon 12 is preferably mounted on or near the commercial establishment 42. When a wireless device user 46 approaches the establishment 42, his or her wireless device 12 receives a bookmark data packet 24 from the bookmark beacon 12. The bookmark data packet 24 may then be used by the wireless device user 46 to retrieve information relating to the commercial establishment 42.

Step 1, identified in FIG. 3 by a number one (1) enclosed in a circle, illustrates the transmission of the bookmark data packet 24 from the bookmark beacon 12 to the wireless device 14. This transmission may occur automatically as the wireless device user 44 approaches or enters the establishment 42. Alternatively, the user may select a function on his or her wireless device 12 that instructs the device 12 to receive bookmark beacon signals. If the wireless device user 44 chooses to interact with the system 40, then in step 2 the bookmark data packet 24 is used to access a web server 46 that includes web pages 48 containing information relating to the commercial establishment 42. As discussed above with respect to FIG. 1, the web server 46 and web pages 48 are preferably accessed by the wireless device 14 through a wireless network 16 that is linked to the Internet 18 by a proxy server 20. Once the web pages 48 are accessed by the proxy server 20, information relating to the commercial establishment 42 is collected, and the information is delivered to the wireless device 14 in step 3. The information delivered from the web pages could include, for example, advertisements, sales, or any other information relating to the commercial establishment.

In other exemplary embodiments of the bookmark beacon system 10, the bookmark beacon 12 may be associated with, for example, a cash register in a restaurant, a facsimile machine, a printer, a secure door, or even a tree. These exemplary embodiments are described below to illustrate the various configurations (and/or guest devices) well within the scope of the bookmark beacon system. It should be understood, however, that the bookmark beacon system is not limited to these exemplary embodiments, but may be utilized in a wide variety of applications.

1. Cash Register Example—At a restaurant, a mobile device user orders a meal (order A) and sits at table B. A waiter enters order A into a cash register with a web browser interface. The order and amounts owing are managed and maintained securely stored on a web page that is reserved for orders relating to table B. The wireless device user then completes his or her meal and initiates communication with a bookmark beacon, attached to table B, that provides the mobile device with a bookmark data packet identifying the web page associated with table B. The mobile device then accesses the web page as described above. Upon receiving the preferably secure web page, the user may, for example, be able to review his or her order, confirm the order and complete payment for such transaction. The bookmark data packet utilized in this exemplary embodiment may comprise the following information:

www.domain.tld {ID}

Wherein:

www.domain.tld=resource address containing order information; and

ID=table identifier

2. Facsimile Machine Example—A wireless device user approaches a facsimile machine that has an attached bookmark beacon. The user's wireless device then receives a bookmark data packet from the bookmark beacon attached to the facsimile machine that preferably includes a resource address containing the URL of a webpage associated with the facsimile machine. The webpage may contain, for example, the facsimile number, owner, physical address and possibly the IP address of the facsimile machine. Once the resource address has been obtained, the wireless device may, for example, send data wirelessly to the fax machine using the facsimile number, or send data to the facsimile machine over the network using the IP address. In an alternative embodiment, the bookmark data packet may contain the resource address enabling the wireless device to transmit data over the network directly to the facsimile machine without first accessing a related web page. Advantageously, this example enables legacy facsimile machines (i.e., facsimile machines that are not wireless enabled) to communicate with mobile devices.

3. Printer Example—A wireless device user approaches a computer printer that has an attached bookmark beacon. The user's wireless device then receives a bookmark data packet from the bookmark beacon that preferably includes the URL of a web page that provides the wireless device with the necessary protocols to communicate with the printer. The webpage may include, for example, the owner, physical address and IP address of the printer as well as a printer driver for communication with the printer. Once the printer information has been obtained, the wireless device may, for example, transmit data to the printer over the network using the IP address. In an alternative embodiment, the bookmark data packet may contain the printer information, enabling the wireless device to communicate directly with the printer without first accessing a web page. Advantageously, this example enables legacy printers (i.e., printers that are not wireless enabled) to communicate with mobile devices such that a user may print out documents from the mobile device without first having to forward the document to the wired network on which the printer is attached.

4. Secure Door Example—A wireless device user approaches a door having an attached security-featured bookmark beacon. The wireless device user then initiates communication with the bookmark beacon, and the bookmark beacon provides the mobile device with a bookmark data packet identifying a web page. The bookmark data packet in this exemplary embodiment may, for example, comprise the following information:

www.domain.tld {ID:PS}

Wherein:

www.domain.tld=resource address containing order information

ID=door identifier

PS=password

The bookmark beacon password is preferably generated in synchronization with a server-based password. Once the mobile device has accessed the preferably secure web page, the mobile device submits a secure password to the server. If the password submitted by the mobile device and the password encoded in the bookmark data packet are synchronized with the server-based password, then the door is unlocked.

5. Tree Example—To illustrate the wide array of applications of the bookmark beacon system, the system may be applied to such a simple item as a tree. In this exemplary embodiment, a bookmark beacon is embedded on a tree. The bookmark beacon then transmits a resource address pointing any mobile device to a web site describing the features and history of the tree and any other particular information about the tree's species to the user. In this example, the bookmark data packet may, for example, comprise the following information:

www.domain.tld

Wherein

www.domain.tld=resource address containing tree information

FIG. 4 is a flow diagram showing an exemplary method 50 for retrieving information on a wireless device relating to a guest device having a bookmark beacon. The method begins at step 52 when a wireless device comes within proximity of a bookmark beacon. In step 54 the bookmark beacon transmits a bookmark data packet that is received by the wireless device. Once the bookmark data packet is received, the wireless device stores the bookmark data packet to enable a wireless device user to retrieve the information necessary to communicate with the guest device (step 56). If the wireless device user chooses to interact with (or receive information concerning) the guest device (step 58), then the mobile device contacts a web site identified by the bookmark data packet (step 60). In step 62, the web site preferably determines the relevant information regarding the guest device such as protocols and drivers that the user requires, and then downloads that information to the user's mobile device. The information downloaded to the wireless device may preferably be in a variety of forms such as simple text, graphics and text, applets, forms, etc. Then, in step 64, the wireless device or wireless device user may act on the downloaded information as described herein.

FIG. 5 is an illustrative diagram showing an exemplary electronic messaging system 70 for wireless devices 14 that utilizes a bookmark beacon 12 associated with a network-enabled printer 72. The system 70 includes a bookmark beacon 12 attached to, or in the vicinity of, a printer 72 that is coupled to the Internet 18 or some other computer network. The printer 72 is configured to receive print jobs across the Internet 18, preferably using an Internet Printing Protocol (IPP). Operationally, the system enables a wireless device user to forward e-mail attachments that cannot be viewed on the wireless device 14 over the Internet 18 to the network-enabled printer 72.

In step 1, identified in FIG. 5 by a number one (1) enclosed in a circle, a wireless device user receives an e-mail message from a messaging server 74 that includes attachments that the messaging server 74 is unable to forward to the wireless device 14. This restriction may, for example, be due to storage limitations, formatting problems or limited viewing capability on the mobile device 14. Once the wireless device user receives the e-mail message with a notification that an attachment could not be forwarded, the system 70 then preferably gives the user the option to print the attachment on a network-enabled printer 72. If the user chooses to print the attachment, then the wireless device 14 preferably (1) searches for a signal from a bookmark beacon 12, and (2) if a signal is identified, then receives the addressing and capability information for the printer 72 in the form of a bookmark data packet (step 2). Then, in step 3, the wireless device 14 transmits a print request along with the information contained in the bookmark beacon data packet to the message server 74. Once the print request and printer data are received, the message server 74 then preferably passes the information to an attachment processor and reformatting component 76 (step 4). The attachment processor and reformatting component 76 then preferably extracts the attachment from the e-mail message and reformats the attachment for printing. The reformatting operation may be performed, for example, using the PostScript printer formatting language. Once reformatting is complete, the attachment processor establishes communication with the printer 72 over the Internet 18, and transmits the attachment to the printer using the IPP method supported by the Internet network 18 (step 5). It should be understood, however, that other printer formats could be used and other printer protocols could be employed.

FIG. 6 is an illustrative diagram showing an exemplary electronic banking system that utilizes a bookmark beacon associated with a point-of-sale (POS) device. The system includes a bookmark beacon 12 attached to, or in the vicinity of, a POS device 84 that is coupled to the Internet 18 or some other computer network. Operationally, this system may be used, for example, to authorize a credit or debit transaction for the purchase of some items.

Step 1, identified in FIG. 6 by a number one (1) enclosed in a circle, occurs when a wireless device user completes a sale of some form and is not paying cash. At the retail sale point there is a cash register 82 and a point-of-sale (POS) device 84. The POS device 84 may, for example, include a debit machine, a credit machine or a combination of both. In step 1, the POS device 84 preferably receives the amount of the sale and type of transaction from the cash register 82, and requires the wireless device user to enter a Personal Identification Number (PIN). Then, in step 2, the information received by the POS device 84 is transferred from the POS device 84 to the bookmark beacon 12, and transmitted to the user's wireless device 14 in the form of a bookmark beacon data packet. In addition, the bookmark beacon data packet preferably includes the Internet address of a Bank Server and Proxy 86 associated with the POS device 84, which is configured to process the transaction. Once the bookmark beacon data packet is received at the wireless device 14, the wireless device user preferably reviews the information and accepts or denies the transaction at step 3. If the wireless device user accepts the transaction, then in step 4, the transaction request is delivered over wireless network 16 and Internet 18 to the Bank Server and Proxy 86. The Bank Server and Proxy 86 then, in step 5, transfers the transaction information to the network location 88 of a bank or a credit/debit clearing house that records the wireless device user's account information and verifies the PIN validity. If the transaction information is verified, then the bank or clearing house 88 accepts the transaction by transmitting the necessary information directly to the POS device 84 over the Internet 18 (step 6 a).

In an alternative embodiment, the bookmark beacon 12 includes a bi-directional IrDA or RF interface utilized to avoid the need for a land-line link between the bank or clearing house 88 and every retail outlet. In this embodiment, the verification information from the bank or clearing house 88 is transmitted back to the wireless device 14 in the form of an encoded verification message as shown in step 6 b. Then, in step 7, the encoded message is transmitted by the wireless device 14 to the bi-directional interface of the bookmark beacon 12. The verification message is then transferred to the POS device 84 where the transaction is completed.

The embodiments described herein are examples of structures, systems or methods having elements corresponding to the elements of the invention recited in the claims. This written description may enable those skilled in the art to make and use embodiments having alternative elements that likewise correspond to the elements of the invention recited in the claims. The intended scope of the invention thus includes other structures, systems or methods that do not differ from the literal language of the claims, and further includes other structures, systems or methods with insubstantial differences form the literal language of the claims. 

1. A method for transmitting information associated with a physical location to a wireless device, comprising the steps of: providing a computer network; storing information associated with the physical location on the computer network; providing a wireless network configured to enable the wireless device to access the computer network; providing a bookmark beacon associated with the physical location that transmits a bookmark data packet, wherein the bookmark data packet includes a resource address that identifies the location on the computer network where the information associated with the physical location is stored; receiving the bookmark data packet on the wireless device; and accessing the computer network with the wireless device and retrieving the information associated with the physical location.
 2. The method of claim 1, wherein the physical location is a commercial establishment.
 3. The method of claim 1, wherein the wireless device automatically receives the bookmark data packet when the wireless device is within transmission range of the bookmark beacon.
 4. A method for enabling a point-of-sale device to communicate with a wireless device, comprising the steps of: providing a computer network; providing a network connection between the computer network and the point-of-sale device; entering information relating to a transaction into the point-of-sale device; storing the information relating to the transaction at a location on the computer network; providing a wireless network configured to enable the wireless device to access the computer network; providing a bookmark beacon associated with the point-of-sale device that transmits a bookmark data packet, wherein the bookmark data packet includes a resource address that identifies the location on the computer network where the information relating to the transaction is stored; receiving the bookmark data packet on the wireless device; and accessing the computer network with the wireless device and retrieving the information relating to the transaction.
 5. The method of claim 4, comprising the further step of: transmitting credit or debit information from the wireless device to the computer network.
 6. The method of claim 5, comprising the further step of: providing software executing on the computer network, wherein the software (1) receives the credit or debit information from the wireless device (2) approves or denies the transaction based on the credit or debit information, and (3) transmits the approval or denial to the point-of-sale device.
 7. The method of claim 6, wherein the information relating to the transaction is included in the bookmark data packet and is transmitted to the software along with the credit or debit information.
 8. A method for enabling a wireless device to communicate with a printer, comprising the steps of: providing a computer network; providing a network connection between the computer network and the printer, wherein the printer has a network address that enables information to be transmitted to the printer over the computer network; providing a wireless network configured to enable the wireless device to access the computer network; providing a bookmark beacon associated with the printer that transmits a bookmark data packet, wherein the bookmark data packet includes a resource address that identifies the network address of the printer; receiving the bookmark data packet on the wireless device; and transmitting data from the wireless device to the printer over the computer network using the network address.
 9. The method of claim 8, wherein the resource address also identifies a location on the computer network where information regarding the printer is stored, and further comprising the step of: retrieving the information regarding the printer from the computer network with the wireless device, wherein the information enables the wireless device to format the data before transmission to the printer over the computer network such that the data is transmitted in a format associated with the printer.
 10. The method of claim 8, wherein the resource address identifies a location on the computer network where information regarding the printer, including the network address of the printer, is stored, and further comprising the step of: retrieving the information regarding the printer from the computer network with the wireless device, wherein the information (1) provides the wireless device with the network address of the printer, and (2) enables the wireless device to format the data before transmission to the printer over the computer network such that the data is transmitted in a format that can be printed by the printer.
 11. A method for enabling a wireless device to communicate with a facsimile machine, comprising the steps of: providing a bookmark beacon associated with the facsimile machine that transmits a bookmark data packet, wherein the bookmark data packet includes a facsimile number for the facsimile machine; receiving the bookmark data packet on the wireless device; and wirelessly transmitting data from the wireless device to the facsimile machine using the facsimile number.
 12. A method for enabling a wireless device to communicate with a facsimile machine, comprising the steps of: providing a computer network; providing a network connection between the computer network and the facsimile machine, wherein the facsimile machine has a network address that enables information to be transmitted between the facsimile machine and the computer network; providing a wireless network configured to enable the wireless device to access the computer network; providing a bookmark beacon associated with the facsimile machine that transmits a bookmark data packet, wherein the bookmark data packet includes a location on the computer network where information regarding the facsimile machine is stored; retrieving the information regarding the facsimile machine from the computer network with the mobile device, wherein the information includes the network address of the facsimile machine; and transmitting data from the wireless device to the facsimile machine over the computer network using the network address of the facsimile machine.
 13. The method of claim 12, wherein the information regarding the facsimile machine also enables the wireless device to format the data before transmission over the computer network such that the data is transmitted in a format associated with the facsimile machine.
 14. A method for opening a secure door with a wireless device, comprising the steps of: providing a computer network; providing a network connection between the secure door and the computer network; providing password software operating at a location on the computer network, wherein the password software is configured to (1) receive passwords over the computer network, and (2) transmit a door open signal to the secure door when a valid password is received; providing a wireless network configured to enable the wireless device to access the computer network; providing a bookmark beacon associated with the secure door that transmits a bookmark data packet, wherein the bookmark data packet includes the location on the computer network where the password software is operating; receiving the bookmark data packet on the wireless device; transmitting a door password from the wireless device over the computer network to the password software; determining whether the door password is valid using the password software; and if the door password is valid, then (1) transmitting the door open signal from the password software to the secure door over the computer network, and (2) unlocking the secure door.
 15. The method of claim 14, wherein the password software is also configured to generate a secure door password and transmit the secure door password to the secure door, and further comprising the steps of: generating the secure door password with the password software; transmitting a copy of the secure door password to the secure door; encrypting the copy of the secure door password in the bookmark data packet; and comparing the copy of the secure door password encryped in the bookmark data packet and the door password transmitted from the wireless device with the secure door password generated by the password software to determine whether the door password is valid.
 16. A method for retrieving information on a wireless device, comprising the steps of: transmitting a bookmark data packet from a bookmark beacon, wherein the bookmark data packet includes a network address for a location on a computer network; receiving the bookmark data packet on the wireless device; accessing the computer network with the wireless device over a wireless network, and contacting the location on the computer network identified by the network address; and retrieving information that is stored at the location on the computer network identified by the network address.
 17. The method of claim 16, wherein the step of accessing the computer network is proceeding by the additional steps of: storing the bookmark data packet on the wireless device; and enabling a wireless device user to determine whether or not interact with the computer network.
 18. The method of claim 16, wherein: the bookmark beacon is associated with a device or physical location; and the information stored at the location on the computer network relates to the device or physical location.
 19. The method of claim 16, wherein the location on the computer network is an Internet website. 