Device for transfering data between an unconscious capture device and another device

ABSTRACT

Apparatuses and methods are disclosed for accessing and distributing data that includes a portable first device and a second device wherein both devices have unconscious capture capability. The first device has a first memory wherein at least one document is stored in the first memory of the first device. The first device has a transceiver, an identifier, and a public key to access a second device.

PRIORITY

This is a continuation of U.S. Pat. No. 7,181,013, issued on Feb. 20, 2007, entitled “A Device for Transferring Data Between an Unconscious Capture Device and Another Device,” which is a continuation of U.S. Pat. No. 7,085,384, issued on Aug. 1, 2006, entitled “A Device for Transferring Data Between an Unconscious Capture Device and Another Device,” which is a continuation of U.S. Pat. No. 6,772,338, issued on Aug. 3, 2004, entitled “A Device for Transferring Data Between an Unconscious Capture Device and Another Device,” all assigned to the corporate assignee of the present invention and incorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates generally to devices capable of unconscious capture capability. More specifically, the invention relates to the unconscious capture of documents with a portable electronic device and the transfer of such documents using the portable device.

2. Description of Related Art

Electronically transferring documents between various devices has become an integral part of the work environment. However, the capability to transfer documents between mobile devices is very limited. Usually, in order to send or receive documents with mobile devices, an individual must make a conscious decision to transfer the information. That is, documents are not transferred until the individual performs some action or actions that enable the transfer to occur. Increasingly, it is desirable to have devices capable of unconsciously transferring documents between a mobile device and another device without an individual making a conscious decision to do so and, thus, without the individual having to take action(s) to cause the transfers to occur.

Systems for accessing and distributing electronic documents are well known in the art. For example, U.S. Pat. No. 5,862,321 issued to Lamming describes a system in FIG. 1 in which a portable device transfers a Universal Resource Locator (URL) to office equipment such as a copier, a facsimile machine, or a printer. Referring to FIG. 1, the office equipment uses the URL to access a document stored on a server. For example, the portable device sends a URL to a printer, which accesses the document from a document database using the URL, in order to print the document. One problem with the system of the '321 patent is that when the document is stored on a network system, the document is not secure from others that have access to the network system. In other words, the document is being transferred to the printer and its only security is based on whether the URL is known or not. Another difficulty in the system of the '321 patent is that the operation of the portable device receiving a URL is performed in response to an explicit user request. To request the device to perform its function, the user must enter some recognizable user identification to the device. Thus, the operation of the device is not unconscious, but instead is conscious.

Another prior art device referred to as the “HP CapShare 910” manufactured by Hewlett Packard Corporation of Palo Alto, Calif., is a device that is also capable of transferring a document to a facsimile machine. The HP CapShare 910 system includes a scanner for scanning information and transferring the scanned image to the facsimile machine. This device has the same limitations as the device described above with respect to the system in the '321 patent. Additionally, the user of this device must have authorization by way of user identification to transfer a document to a facsimile machine. Accordingly, conventional devices are limited in that a document must be stored on a second device before an act is performed on the document by the second device. Additionally, these devices do not operate with unconscious capture capability. Therefore, it is desirable to have a system capable of transferring documents between unconscious capture devices.

SUMMARY OF THE INVENTION

A portable apparatus as described. In one embodiment, the portable apparatus comprises a wireless transceiver, a memory, and a processor. The wireless transceiver receives, via wireless communication, a document being unconsciously captured by a first device and to transmit the document to a second device, such that communication of the document occurs between the first and second devices. The memory is coupled to the transceiver and stores the document. The processor is coupled to the transceiver and the memory, and controls the transceiver to cause the transceiver to receive the document unconsciously from the first device and to transfer the document as part of being downloaded to the second device.

BRIEF DESCRIPTION OF THE DRAWINGS

The features, aspects, and advantages of the invention will become more thoroughly apparent from the following detailed description, appended claims, and accompanying drawings in which:

FIG. 1 is a prior art system which transfers URLs to devices that access the document using the URLs; and

FIG. 2 is a block diagram illustrating one embodiment of a system having an unconscious capture device.

FIG. 3 is a block diagram of an alternative embodiment of the SMA that synchronizes files between two or more PC's.

DETAILED DESCRIPTION OF THE INVENTION

The present invention relates to accessing and transferring data from a device with unconscious capture to a portable device and then from the portable device to a third device. In one embodiment, the portable device has a memory capacity to store at least one document and a transceiver for receiving documents and transferring documents to another device, such as a personal computer.

Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.

It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.

The present invention also relates to apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.

The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.

Overview

In one embodiment, the portable device is a Shuttle Memory Appliance (SMA) that may be used for unconscious transfer of documents between office appliances (e.g., devices, equipment, peripherals, etc.) and document databases. In one embodiment, the SMA is packaged as a device carried on a belt (like a pager). The SMA has a mechanism for wireless communication and data transfer, a buffer memory (e.g., flash, disk, etc.), and a processor. The SMA is carried by users of SMA-capable unconscious capture devices, such as, for example, photocopiers, facsimile machines, multifunction machines, etc. In the case of the photocopier, when the users make copies on the photocopier, the scanned electronic versions of the copied documents are transferred unconsciously to the SMA. When the user returns to their personal computer (PC), the data on the SMA is unconsciously downloaded to a memory in the PC. In one embodiment, automatic indexing software is triggered on the PC and prepares the document for later retrieval.

In another embodiment, the transfer is conscious; the original devices (copier, fax, printer, PC) may contain a user interface that is used to confirm data should be transferred to the SMA before the transfer occurs. For example, the user walks up to the copier, it detects there is an SMA present, and indicates this on the console. The user has the opportunity to confirm transfer to the SMA before it occurs.

Using the SMA is advantageous in that it solves a significant security problem for users of unconscious capture devices. The images that are created do not have to exist on a local area network. They can be stored only on the user's PC. The user can then enforce whatever security protection on access to the document they desire. Using the SMA also solves the user identification and routing problem for users of unconscious capture devices. In one embodiment, users are not required to identify themselves to the device by, for example, pressing a button. The SMA performs this identification function automatically when the SMA is within communication range with the unconscious capture device.

In the following description, numerous specific details such as various parameters, steps, etc. are set forth in order to provide a thorough understanding of the invention. One skilled in the art will recognize that these details need not be specifically adhered to in order to practice the claimed invention. In other instances, well known steps, etc. are not set forth in order to avoid obscuring the invention.

FIG. 2 illustrates a system having an SMA-capable office appliance (OA), an SMA and a PC. Referring to FIG. 2, the SMA-capable office appliance 201 includes a multifunction machine with unconscious capture capability 201A, a wireless transceiver 202B, a processor 201C, and a memory 201D. The unconscious capture capability 201 refers to the ability and (functionality) of appliance 201 to create a copy of the document, such as for archival purposes, whenever the device is performing its normal function. For more information on unconscious devices, see U.S. patent application Ser. No. 08/754,721 entitled “Automatic and Transparent Document Archiving,” filed Nov. 21, 1996, assigned to the corporate assignee of the present invention and incorporated herein by reference.

In one embodiment, appliance 201 comprises a digital copier. Appliance 201 performs unconscious capture in that an electronic version of a document is created for archival purposes while making a copy of the document (in the case of a copier). Appliance 201 could also be a scanner. Such a scanner could be an expensive high speed device. In an alternative embodiment, appliance 201 may comprise a facsimile (fax) machine, or a printer, etc.

In one embodiment, the transceiver 202B comprises a radio frequency (RF) transceiver. Such an RF transceiver may include a highly directional antenna and a proximity detector for use in distinguishing SMA 202 from other SMAs.

In one embodiment, appliance 201 includes processor 201C which controls operation of appliance 201. Processor 201C may be used to encrypt the data before it is transmitted to SMA 202. A public key system could be used with the public key being transmitted to appliance 201 by SMA 202.

In one embodiment, appliance 201 includes a touchscreen user interface to indicate when appliance 201 detects more than one possible destination SMA. The user could indicate the correct destination. In another embodiment, the touchscreen user interface indicates the identity of the destination SMA or its registered user. The user could confirm the identification prior to the data being transferred between the appliance 201 and the SMA 202. The user might also be required to enter a password to confirm his identity.

SMA 202 eliminates the need for a network connection. Users of SMA 202 would also not be required to explicitly indicate the destination for the scanned documents. This would be performed implicitly by SMA 202.

In one embodiment, SMA 202 includes a processor 202A, a wireless transceiver 202B (preferably RF), a buffer memory 202C, and a touchscreen or a simple display (not shown) plus a keypad (not shown). Processor 202A manages the communication process, including sending the public key of the user to appliance 201 as necessary. Processor 202A also performs the required memory management functions. The operating system and any application-like software run on SMA 202 may include open source alternatives like Linux.

A document is stored in appliance 201 and may be transferred to SMA 202 through an RF link, through an infrared (IR) link, or any wireless communication machine. If an IR link is used, appliance 201 and SMA 202 have IR ports that must be in a direct line of vision in order to transfer the document. If an RF link is used, the signal coming from appliance 201 to SMA 202 simply needs to be transmitted without requiring ports to be directly aligned. Prior to document transfer, SMA 202 transmits information to appliance 201 for identification. In one embodiment, this information is used by appliance 201 to select an encryption scheme which the user desires to use or is able to determine its use. In one embodiment, the identification information allows appliance 201 to identify which public key to use to encrypt the document prior to transfer to SMA 202.

In one embodiment, buffer memory 202E comprises a flash memory or a Smartmedia memory from Delkin Devices of San Diego, Calif. for storing documents received from appliance 201. The user interface on appliance 201 allows the user to indicate an action to be performed on the data once it reaches PC 203. Actions might include electronic mailing or faxing. In this manner, the user can specify an operation to be performed on the stored document as soon as it is downloaded to PC 203.

In one embodiment, SMA 202 also sends information notifying appliance 201 not to archive the document being copied, printed, faxed, etc., onto the network. This information may be the same as the identification information. That is, the fact that an SMA 202 is in proximity to appliance 201 and sends information to appliance 201 may cause appliance 201 to automatically stop the automatic retention of an electronic version of the document.

In one embodiment, once document transfer has been completed, SMA 202 sends a signal to appliance 201 and informs the user that the document transfer has been completed. Appliance 201 may inform the user in a variety of methods. For example, appliance 201 may have a display with a graphical user interface that may be used for informing the user that the document transfer has been completed. An icon, textual information, or other communication machine may be shown on the display. In another embodiment, appliance 201 may emit a sound to indicate that document transfer has been completed.

After receiving a document from appliance 201, the SMA 202 may be used to specify an operation to be performed on the document. The operation may include printing the document, e-mailing the document, faxing the document, encrypting the document, storing the document, or any other type of operation, such as transferring the document to a third device or multiple devices. The user may specify the operation using an input device (e.g., keypad, styles, etc.) on SMA 202. After SMA 202 specified one or more operations to be performed on the document, SMA 202 may optionally encrypt the document and then transfer the document to PC 203. PC 203 then stores the document as a new document or replaces the old document with the document transferred from SMA 202 and performs the specified operation(s).

In one embodiment, PC 203 is equipped with a wireless transceiver 203A compatible with SMA 202 as well as the necessary driver and application-level software (not shown). This software runs in the background, e.g., as a Windows Service or Unix daemon. In one embodiment, in normal operation, the software would monitor a specific frequency and periodically attempt to establish communication with its SMA. If successful, it would query whether there are any new documents on SMA 202. If there is one or more new documents, they would be transferred to PC 203. Once stored on PC 203, the documents could optionally be decrypted and stored. In this manner, the downloads can be performed unconsciously for the user.

In one embodiment, initialization of SMA 202 is performed by software on the PC 203. In one embodiment, at initialization, this software prompts the user for the serial number of SMA 202 as well as the user's public key. Using this information, the software establishes communication with SMA 202 and sends it the appropriate initialization commands. A user's interaction with SMA 202 could be very limited, it may be as little as changing batteries or tending to certain error conditions, such as memory overflow or hardware reset.

In one embodiment, SMA 202 and PC 203 may be coupled in communication using a cable. However, in such a case, the download is no longer unconscious. The documents might also undergo optical character recognition and be indexed for later retrieval.

An SMA system could be used to synchronize data between PC's, exclusive of any office appliances. This would allow users to seemlessly maintain the same data on their office PC and their PC at home. FIG. 3 is a block diagram of an alternative embodiment of the SMA that synchronizes files between two or more PC's. This is useful for ensuring that the same data is present on the PCs. Every time a user sits down in front of such a PC and opens a file (e.g., a Microsoft Word document), the contents of that file are guaranteed to be the same, no matter which PC the file is opened on. The state-of-the-art requires a manually operated (i.e., conscious) step. Users must insert a device in a cradle, aim a device at an IR receiver and press a button, insert a disk into a disk drive, etc. The system of FIG. 3 eliminates this bothersome and error-prone process by communicating unconsciously with two or more PCs 301 and 303. Every time PC 301 is in proximity to SMA 302, files are transferred to PC 303 via SMA 302 over a wireless communication link using wireless transceiver 301B (e.g., wireless transceiver PCI bus card) of PC 301 and wireless transceiver 302A of SMA 302. At this time, files on SMA 302 that had been uploaded to it by PC 303 (and stored in buffer memory 302C) for transfer to PC 301 are sent to PC 301 over a wireless communication link using wireless transceiver 301B and wireless transceiver 302A. The analogous operations are performed when SMA 302 is in proximity to PC 303.

In one embodiment, software is installed on each PC that uses an SMA for file synchronization. Files may be synchronized between more than two PCs. In one embodiment, this application may contain a user interface, a data structure, an operating system upgrade, and software for communication with an SMA. Upon installation on a first PC (e.g., PC 301), a user indicates (using the user interface) his/her identity, encryption/decryption passwords, files that should be exported from the PC, as well as the identity of at least one SMA that are to be used to transfer data between various PCs. The user can also indicate the identity of other PCs (e.g., PC 303) that are to receive data from the first PC. This could be entered manually or it could be selected from a list of alternatives downloaded from SMA 302. In one embodiment, this list includes PCs (other than 301) that communicated with SMA 302 in the past. The data downloaded from SMA 302 may also indicate whether the other PCs (e.g., PC 303) are ready to export any files or directories. In one embodiment, the user indicates whether he/she would like to receive them.

In one embodiment, the destination on PC 301 where files from PC 303 are stored is indicated on the user interface. This destination may be exactly the same location the file is stored on PC 303. In this case, the system maintains a mirror (location and contents being the same) of those files and directories. Alternatively, the destination where the files from PC 303 are stored on PC 301 is different (e.g., C:\PC303).

The files or directories that a user would like to export from any particular PC are selected with the user interface. Specific files or directories, or entire directory hierarchies may be selected. For example, a user might indicate that every file in the C:\PROGRAMS hierarchy should be exported. The target PC and destination directory for these files on the target PC can also be selected at this time.

The data structure maintained by the software application on PC 301 includes a description of the files and directories that are being exported and imported. This description includes their location (e.g., path name), size, date of last modification, date of last transfer to (or receipt from) SMA 302, and one or more checksum values (e.g., MD5 and CRC are well known checksum algorithms). The data structure also maintains information about other PCs (e.g., PC 303) that communicate with PC 301 via SMA 302. In one embodiment, this includes the identifies of those PCs, information about the status of the communication between them (e.g., the last time files were exchanged was 5 days ago), and information about the update status of individual files and directories on PC 303 (e.g., C:\PROGRAMS\WORD\WORD.DLL was last modified 23 days ago).

In one embodiment, an operating system upgrade is included to trigger another application whenever a FILE SAVE operation is performed. A modification to the file system performs an interrupt every time a file is saved to disk. The interrupt service routine is passed the name of the file being saved. The interrupt service routine passes this name to the communications software and returns control to the calling application. In an alternative embodiment, a modification to the disk controller driver software performs an interrupt every time it writes a block to a physical disk drive. The interrupt service routine is passed an identification for the block and information that allows it to identify the file in which the block occurs. The interrupt service routine passes this identification to the communications software and returns control to the calling application. In both cases (file system trigger or disk controller trigger), the data structure may be queried and the interrupt performed if the data being written occurs in a file that is being exported or imported. This check could also be done in the interrupt service routine, thereby preventing unnecessary calls to the communications software. In any case, every time a file or block is written, the system data structure is updated and a dirty bit for that file indicating the file or block has been written is set to 1. A value of 1 for the dirty bit indicates that the file has been changed, but the data in the file has not been written to an SMA yet.

The communications software on the PC establishes communication with SMAs in its vicinity, as described earlier, and transfers data between the PC and the SMA. After communication is first established (after some interruption), the PC asks the SMA whether it has any files that need to be downloaded. These candidates are files that were uploaded to the SMA at some time in the past (by some other PC) and have never been downloaded to the PC. The SMA supplies the PC the names of these files, their destinations (if known), their last date of modification, their sizes, and their checksums. The communications software compares the information for each candidate file to copies of the candidate file on the PC (if they exist). Information about the copies can be extracted from the data structure. If the last modification time of the candidate file is newer than its copy on the PC and the files are different (e.g., as indicated by the checksum, difference in sizes, or a direct comparison), the candidate file overwrites the copy. Instead of overwriting the file, the candidate might be maintained as a copy on the PC, perhaps indicated by a modified file name and such as an appended version number. The user might also be prompted for confirmation before any file is overwritten.

In one embodiment, the PC dynamically uploads data to the SMA. In one embodiment, this procedure includes an initialization mode and a continuous mode. After establishing communication (after some interruption) and performing the download as described above, the communications software enters upload initialization mode. Any files the data structure indicates have either never been uploaded or changed since the last time they were uploaded are now transferred to the SMA. The data structure is modified to indicate this has occurred. In one embodiment, this includes setting the dirty bit for these files to 0.

Continuous upload mode is entered after initialization is complete and maintained for as long as communication is maintained between the PC and the SMA. Every time a file is modified (as directed by the operating system update), either the entire file or a portion of it is transformed to the SMA. The entire file is transferred if no copy of it exists on the SMA. Otherwise, a file differencing utility is applied to the PC and SMA versions, where the SMA version is the previous version sent to the SMA and only the differences are transferred to the SMA. This can significantly reduce bandwidth usage on the PC bus and in the wireless channel. If this is not a significant consideration, the entire file might be transferred every time it is changed.

In one embodiment, the upload mode described herein is dynamic. Previous methods for the synchronization require that an explicit conscious operation be performed (docking, insertion of diskette, pressing a button, etc.) before a user leaves the console of a PC. Dynamic updating, performed unconsciously, allows the user to leave from the console of a PC without performing any conscious act and still allow files to be synchronized with a different PC at some later time.

The SMA performs communications between unconscious capture devices and PCs while ensuring that the documents are only stored on the PC and not on a network. The use of the SMA also identifies the user of an unconscious capture device and eliminates the requirement of having the user log in.

In one embodiment, the SMA and/or PC may comprise a network attached server that receives documents from unconscious capture devices. One embodiment of such a server is described in U.S. patent application Ser. No. 09/410,494, entitled “An Appliance to Mingle Content from an Unconscious Capture and Retrieval System and an Internet Portal,” filed Sep. 30, 1999, assigned to the corporate assignee and incorporated herein by reference.

In the preceding detailed description, the invention is described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. 

1. A portable apparatus comprising: a wireless transceiver to receive, via wireless communication, a document subjected to unconscious capture by a first device and to transmit the document to a second device, such that communication of the document occurs between the first and second devices; a memory coupled to the transceiver to store the document; and a processor coupled to the transceiver and the memory, the processor controlling the transceiver to cause the transceiver to receive the document unconsciously from the first device and to transfer the document as part of being downloaded to the second device.
 2. The portable apparatus defined in claim 1 wherein the processor sends a key to the first device and the document is received encrypted with the key.
 3. The portable apparatus defined in claim 1 wherein unconscious capture of the document into the memory occurs without user intervention.
 4. The portable apparatus defined in claim 1 wherein the first device comprises a multifunction machine.
 5. The portable apparatus defined in claim 1 wherein the first device comprises a copier.
 6. The portable apparatus defined in claim 1 wherein the first device comprises a facsimile machine.
 7. The portable apparatus defined in claim 1 wherein the first device comprises a scanner.
 8. The portable apparatus defined in claim 1 wherein the first device comprises a printer.
 9. The portable apparatus defined in claim 1 when the second device comprises a computer system.
 10. The portable apparatus defined in claim 1 wherein the memory comprises at least one flash memory.
 11. The portable apparatus defined in claim 1 wherein the memory comprises at least one disk memory.
 12. The portable apparatus defined in claim 1 wherein the transceiver comprises a radio frequency (RF) transceiver.
 13. The portable apparatus defined in claim 1 wherein the transceiver comprises a modem.
 14. The portable apparatus defined in claim 1 wherein the transceiver comprises an infrared (IR) transceiver.
 15. The portable apparatus defined in claim 1 further comprising a proximity detector to determine when the transceiver is near the second device.
 16. The portable apparatus defined in claim 1 further comprising a directional antenna coupled to the transceiver.
 17. A cell phone comprising the portable apparatus defined in claim
 1. 18. A method comprising: a portable device sending a first key to a first unconscious capture device; the portable device receiving a first encrypted version of a document without user intervention from the first unconscious capture device, the first encrypted version of the document having been encrypted with the key; the portable device storing of the first encrypted version of the document internally in memory; the portable device receiving a query requesting an indication as to whether the portable device contains one or more documents to be downloaded; and the portable device transmitting the document to complete its downloading without user intervention.
 19. The method defined in claim 18 further comprising the portable device decrypting the first encrypted version of the document using a second key.
 20. The method defined in claim 19 further comprising: sending the first key to a first device prior to receiving the encrypted version of the document; encrypting the document with a second key; and sending a second encrypted version of the document to the first device for designing the first key.
 21. The method defined in claim 20 wherein the first key comprises a public key and the second key comprises a private key.
 22. A method comprising: a portable device receiving a document without user intervention from the first unconscious capture device; the portable device storing of the first document internally in memory; the portable device receiving a query requesting an indication as to whether the portable device contains one or more documents to be downloaded; and the portable device transmitting the document to complete its downloading without user intervention.
 23. A method of transferring a document stored in a first memory in a portable device to a second device, the portable device having unconscious capture capability and being physically separate from the second device, the method comprising: the second device receiving a public key from the portable device; the second device receiving a document from the portable device without user intervention; the second device performing at least one operation on the document the transaction being one from the group consisting of an encrypting operation, a printing operation, an electronic mailing operation, and a faxing operation.
 24. The method of claim 23 further comprising transferring an identifier to identify a user.
 25. The method of claim 23, further comprising determining whether the second device is capable of processing the document.
 26. The method of claim 23, further comprising determining whether the second device has completed an operation on the document.
 27. The method of claim 23, further comprising the second device encrypting data from the document.
 28. The method of claim 23, further comprising encrypting a document token.
 29. A method of synchronizing first and second devices comprising: the first device determining whether a memory appliance is in proximity; the memory appliance receiving an electronic document via wireless transmission; the second device determining whether the memory appliance is in proximity; signaling the memory appliance to download the electronic document in response to the signaling.
 30. A system comprising: a memory appliance having a wireless transceiver; an office appliance with unconscious capture functionality, the appliance having a proximity detector and a wireless transceiver with a directional antenna, the office appliance sending an unconsciously captured electronic document to the memory appliance using the wireless transceiver after the proximity detector determines the memory appliance is within a predetermined distance from the office appliance; and a computer having a wireless transceiver to receive the electronic document from the memory appliance unconsciously to a user of the memory appliance. 