System and method for selecting an external user interface using spatial information

ABSTRACT

A method and system for selecting an external user interface using spatial information is described. In one configuration the floor space of a mailroom is mapped using a two dimensional grid. At least one machine is located on the mapped grid and an associated control zone is defined for that particular machine. The machine includes a wireless transceiver for providing user interface access. An external portable processor with a wireless transceiver is provided with user interface logic for the machine. A user then moves the external portable processor into the control zone of the machine. An indoor positioning system is utilized to provide relative or absolute position information relating to the machine and the external processor. The system determines that the external processor is in the machine control zone and allows the external processor to function as a user interface for the machine.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of commonly owned, U.S. patent application Ser. No. 11/752,746, filed on May 23, 2007, entitled SYSTEM AND METHOD FOR SELECTING AN EXTERNAL USER INTERFACE USING SPATIAL INFORMATION (now U.S. Pat. No. 7,756,988), which is a Continuation of commonly owned U.S. patent application Ser. No. 10/064,293, filed on Jun. 28, 2002, entitled SYSTEM AND METHOD FOR SELECTING AN EXTERNAL USER INTERFACE USING SPATIAL INFORMATION (now U.S. Pat. No. 7,225,262 B2), both of which are hereby incorporated by reference in their entirety.

This application is related to U.S. patent application Ser. No. 10/064,294, filed on Jun. 28, 2002, entitled SYSTEM AND METHOD FOR A WIRELESS USER INTERFACE FOR BUSINESS MACHINES (now U.S. Pat. No. 6,920,557), which is hereby incorporated by reference in its entirety.

BACKGROUND

The illustrative embodiments disclosed in the present application are useful in systems including those for providing user interfaces for business machines and more particularly are useful in systems including those for providing interchangeable co-located wireless user interfaces using position information for user interface selection.

There are several categories of conventional business machines in ubiquitous use today. The typical large office environment may include centralized business machine centers that often include copy machines, facsimile machines, printers, and mailing machines. These environments may include postage meters, weighing scales and mail processing machines such as inserters, folders and sorters. Large mail creation machines may include many subsystems including web printers, cutters, inserters, folders, stuffers and postage meters. Additionally, business machines may be found in satellite locations such as convenience centers in various locations, and may be located in individual offices and cubicles. In a typical small home office environment, business machines are often located in a single office and may include multi-function business machines such as a combined printer/scanner/copier/facsimile unit.

Business machines are also found in other environments such as production mail facilities and copy centers. Business machine usage accounting systems are often utilized in multi-user settings for tracking usage of the business machines according to various criteria. Such criteria may include a user identification number, a client identification number and/or a particular matter identification number. The usage accounting systems typically employ a separate accounting processor connected to the business machine having a separate user interface.

Mailing machines are commercially available from Pitney Bowes Inc. of Stamford, Conn. Mailing machines are available in a range of units having increasing functionality. A mailing machine may include a variety of modules or sub-systems for performing tasks such as singulating mailpieces from a stack, weighing a mailpiece, sealing the flap of an envelope, applying evidence of postage, printing information on the mailpiece, accounting for postage used, printing labels and stacking finished mailpieces. The mailing machine often includes a transport mechanism for feeding mailpieces through successive stages of the mailing machine. Mailing machines may include a postage meter that may account for and apply evidence of postage used for a mailpiece. A typical mailing machine will include various software modules for performing functions such as machine control, accounting and reporting functions. Certain mailing machines have multiple features and are configured so that the mailing machine may be provided with only a subset of the features enabled. Such a mailing machine would typically require that the user interface support all of the features of the machine.

Additionally, certain users may be experienced in the operation of a particular mailing machine and may not require an elaborate user interface. However, certain other users may require a more elaborate user interface. The typical mailing machine provides a sufficiently elaborate user interface for use by both the experienced and novice user. Accordingly, a user interface may be more complicated than a particular user requires it to be.

SUMMARY

The present application describes a system for providing a wireless external user interface for a business machine.

In one illustrative embodiment, the system determines position information for an external user interface. It uses that information in determining whether to provide user interface access to the external processor for a particular machine. In an alternative, the external user interface logic is provided to the external processor by the machine.

In another illustrative embodiment, a portable processor is used to select a file to be processed. Portable processor position information is used to select a machine to process the file.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of an illustrative user interface system used in an embodiment of the present application.

FIG. 2 is a schematic representation of an illustrative user area and user interface system in accordance with an embodiment of the present application.

FIG. 3 is a schematic representation of two illustrative user areas in accordance with another embodiment of the present application.

FIG. 4 is a schematic representation of a portion of an illustrative user area in accordance with another embodiment of the present application.

FIG. 5 is a flow chart showing an illustrative process for file processing according to an embodiment of the present application.

FIG. 6A is a flow chart showing an illustrative process for user interface selection according to an embodiment of the present application.

FIG. 6B is a flow chart showing an illustrative process for user authentication according to an embodiment of the present application.

FIG. 7 is a block diagram of an illustrative machine interface according to an embodiment of the present application.

DETAILED DESCRIPTION OF EMBODIMENTS

Wireless network devices are available that allow portable computers to access a network using wireless protocols such as BLUETOOTH. Additional systems that comply with hardware layer protocols such as the versions of the IEEE 802.11 wireless systems standards are available as are systems that are also WI-FI compliant. Typical wired network interface cards (NIC) utilize the Ethernet protocol in which each individual Ethernet card produced is assigned a unique address. An address issuing authority ensures that the individual addresses assigned to the various Ethernet card manufacturers are unique.

Wireless systems utilizing IEEE 802.11b, 802.11g, or 802.11a typically provide wireless LAN access through a wireless access point. Similarly, Internet access may be provided using a wireless access point connected to a gateway. BLUETOOTH systems may also be utilized for LAN access and are also often utilized for Personal Area Network systems. BLUETOOTH systems range from class 1 systems that provide approximately 10-meter range through class 3 systems that typically provide 30-meter range and operate at approximately 1 Mbit/s. IEEE 802.11 systems typically provide 100-meter range with 802.11b operating at 10 Mbit/s and 802.11a operating at 54 Mbit/s. Profile based protocols such as Wi-Fi enable across-vendor compatibility for systems.

Systems employing protocols such as BLUETOOTH and 802.11b are generally wireless systems operating in the RF bands. Wired networks generally must be physically tapped for eavesdropping. However, an appropriate receiver, such as one located in a parking lot, may intercept wireless systems communications.

A system for a wireless mailroom having a gateway server to allow remote access is described in commonly owned U.S. patent application Ser. No. 10/021,583, filed Oct. 29, 2001 and incorporated herein by reference in its entirety. The embodiments described in the present application utilize network systems. It is to be understood that segments or all of local networks described in the embodiments could be assigned individual global addresses. It is also possible that one or more gateways or proxy servers could be utilized so that a sub-network of many devices using one addressing scheme could be provided access to another network through a gateway that has a single address for each gateway from the perspective of a device on the network higher up the hierarchy chain.

The wireless communication channels described typically operate in the 2.4 GHz spread spectrum frequency bands, but any wireless communications channel could be utilized. Radio frequency channels are preferable for a communications channel in a mailroom crowded with machines and people. However, other bandwidths may be used as well, particularly in the positioning systems utilized.

A reference directed toward a Mailing Machine Disabling a Keyboard/Display of a Resident User Interface Which Has Function Keys and the Keyboard/Display if an External User Interface is Connected is described in U.S. Pat. No. 5,935,221 to Felmus, et al. and is incorporated herein by reference in its entirety. The Felmus patent describes a system for disabling the internal keyboard and display of a mailing machine in the presence of an external user interface. The embodiments described therein may be alternatively utilized with the embodiments described herein.

A reference directed toward a Universal Access Photocopier system is described in U.S. Pat. No. 6,243,682 to Eghtesadi, et al. and is incorporated herein by reference in its entirety. The Eghtesadi patent describes a system for providing voice control of a photocopier machine. The embodiments described therein may be alternatively utilized with the embodiments described herein.

A reference directed toward a System Using Position detector to Determine Location and Orientation Between Computers to Select Information to be Transferred Via Wireless Medium is U.S. Pat. No. 6,374,306 to Tognazzini and is incorporated herein by reference in its entirety. The Tognazzini patent describes a system for determining position information of a handheld device relative to a desktop computer using an ultrasound system, an infrared system or a Polhemus-type six degree of freedom locator. The reference describes holding a handheld in front of a portion of a computer screen that is displaying a computer file icon. A portion of the computer screen display bleeds through to the handheld and a user can then select the file for transfer to the handheld. Such a positioning system may be utilized with the embodiments herein.

The Global Positioning System (GPS) includes a system of satellites positioned in earth orbit that transmit microwave signals to GPS receivers that receive the signals from one or more of the satellites. The receiver uses GPS signal information to determine the absolute position of the receiver in latitude and longitude, usually to within several feet accuracy. The system may also be utilized to determine other parameters including the speed of the receiver and the altitude of the receiver. However, GPS signals travel a great distance and are very weak when received on Earth. For example, receivers often cannot utilize GPS signals indoors because of the further attenuation of the signals due to interference from the structure of buildings. Additionally, multi-path reflection errors often degrade the location determination performance of a receiver in a city environment. GPS repeaters may be utilized to boost signals into an indoor environment, but such system may not provide precise location data. In automotive applications, other data sources such a compass and gyroscope may be used to provide additional data.

Radio navigation systems such as LORAN have been in use in the maritime industry in which the radio navigation beacons are utilized with their known stationary positions in order to use positioning algorithms such as triangulation to determine the position of a receiver. In some systems, GPS systems and radio navigation systems are used together to provide more data regarding position.

Centimeter accuracy indoor navigation systems using GPS-like Pseudolites are known and may be utilized to provide absolute or relative position information for a receiver connected to a portable processor such as a laptop, PDA, WAP, tablet-computing device or wireless telephone such as a JAVA phone. Positioning systems have been developed for use in 911 positioning systems.

Known radio frequency, ultrasonic and infrared techniques may be utilized for providing position information relating to the absolute or relative position of an external processor. For example, the external processor could be a PDA being used as an external user interface for a machine such as a copier. Such a PDA could also be used for other functions. A reference directed toward describing a system for a Low Cost Indoor Positioning System, by C. Randall and H. Muller is shown in Ubicomp 2001: Ubiquitous Computing, pp. 42-48, Springer-Verlag, 2001, G. Abowd, ed. and is incorporated herein by reference.

In one embodiment, a system and method for providing discriminating user interface access to a business machine is shown for reconfigurable external user interfaces in an environment having several business machines. A handheld computer with wireless access uses Java to reconfigure the handheld as a user interface for different types of business machines and different units of the same type in a crowded mailroom. The mailroom is equipped with a centimeter accuracy wireless positioning system. The floor of the mailroom is organized in a grid and each business machine is assigned a portion of the grid. When a handheld is in the machine control grid, it controls the machine. The business machine can update the handheld user interface. There is also a conflict resolution system to ensure that people passing by the machine control active box for a business machine do not interfere with the current user.

The present application describes several new and useful systems and methods for using position information to select an external user interface. Additionally, modifications to known positioning techniques and new positioning techniques are described.

External Processor Reported Position

Referring to FIG. 1, a first illustrative embodiment of a system according to the present application is described. An external user interface processing system 1 is shown. Authentication servers 60 and application logic servers 62 are connected to the Internet 10 using communications channels 14, 12 respectively. Here, network 10 is the Internet and connections 12, 14 are T1 lines. Mailroom server 20 is connected to Internet 10 using connection 16 that is a T1 line. User 30 has a portable processor 40. Here, the portable processor is a pen-based computer with a BLUETOOTH wireless transceiver and an indoor positioning system receiver. Alternatively, a handheld computer such as a PALM or HANDSPRING computer may be utilized. Similarly, a notebook computer or WINDOWS® CE platform machine could be utilized. The indoor position system (not shown) provides position information regarding the handheld 40 to server 20.

In this embodiment, the external processor 40 includes a receiver that determines position information such as x-y coordinates in a relative or absolute mapped grid in a mailroom. The mailroom has a grid in which machines 50, 52 have control areas 32, 34 respectively defined on the mapped grid. Machine 50 has communications connections to the server 20, machine 52 and handheld 40 across a BLUETOOTH network using connections 24, 29 and 28 respectively. Similarly, machine 52 has BLUETOOTH connections 29, 27 and 32. Handheld 40 connects to machines 50, 52 using Bluetooth connections 28, 27 respectively, and to server 20 using connection 26.

In this embodiment, the handheld sends position information to the server 20. The server stores data defining the control areas 32, 34 on the grid and determines when a handheld 40 is in a particular control grid. As shown, Handheld 40 is in grid 32 and will control machine 50. Here, server 20 has a BLUETOOTH gateway for access to other third party servers. The server 20 then provides a shared secret such as the BLUETOOTH passkey to the machine 50 and handheld 40 so that they can pair. Here, the handheld 40 is a master and the machines are the slaves in the machine control connection. The handheld 40 is the master and server 20 the slave in the position information and key transfer connections. Bonding could be utilized as well.

After the passkey is transferred, the handheld 40 and machine 50 pair and then machine 50 transfers control to the handheld 40 until a timeout, explicit relinquishment of control, or positional relinquishment of control which occurs when handheld 40 leaves the control area. Additionally, the machine may be instructed to remove machine 50 from control by a priority processor such as server 20 that prioritizes the handheld connections.

Alternatively, the handheld 40 could dock with the server for key information for all the machines 50, 52. Then the machines 50, 52 could allow user interface access based upon position data.

Alternatively, a system such as 802.11b can operate in a peer-to-peer mode. However, because such a system is not an ad-hoc network, the server must manage the connections. In the preferred embodiment, BLUETOOTH systems provide an ad-hoc network with little user setup.

Alternatively, as can be appreciated, the position information may be sent to the handheld 40, machines 50, 52, the server 20, or any combination thereof. Additionally, other appropriate wireless and wired networks and connections may be utilized. As can be appreciated, various communication flows may be utilized, some of which will be chattier than others.

Here, it is contemplated that different portable processors may be utilized in the system. Accordingly, the machines or user interface servers utilize the capabilities of the portable processor to determine what user interface logic to present to a user. Additionally, user preferences could be utilized to pre-configure the user interface and the user may be allowed to store personal macros for each type of machine that is to be operated. It is understood that a portable computer used as an external user interface may store more than one user interface logic program that could then each be selected when necessary.

In an alternative, the system utilizes SyncML over BLUETOOTH to ensure that the most recent version of the particular user interface being utilized is loaded in the portable computer.

Server Reported Position

Referring to FIG. 2, another embodiment of the present application is described with a schematic representation of a mailroom. In a second embodiment, an external user interface processing system 200 is shown in a mailroom 201. The mailroom 201 includes walls 204 that define an outer perimeter of a mapped grid area. The mailroom 201 has a door 202 and floor space that is mapped into a grid. Positioning transducers 210, 212, 214, 216 and reference transducer and reference point 218 provide positioning signals to the room 201.

The transducers utilize ultrasonic and RF technology using known techniques. Various levels of grids may be defined. Here, a room grid 201 encompasses the entire room area. Area 220 encloses the copier control area and is for a group of identical or similar machines. Each copier 282, 284, 286, 287, 288 and 289 has associated a defined control grid 222, 224, 226, 227, 228, and 229 respectively. Here, facsimiles 250, 254 each have control grids 252, 256 respectively. Here, printers 240, 244 each have control grids 242, 246 respectively. It is to be understood that many different configurations of machines may be utilized. Users 260, 262, 264 and 266 each have handheld external processors (not shown) that may be used for external user interface purposes for one or more of the machines among other uses. Server 270 is connected to the machines and the user external processors (not shown) using an ad-hoc BLUETOOTH network. Alternatively, an 802.11 peer-to-peer network may be configured and utilized. Here, the server is reporting handheld position to the machines and informing the machines which handheld to provide access to. The server may instruct the machine, which handheld to provide access to using a 48 bit unique MAC addresses, or a piconet address. Here, the server may instruct that user 262 have priority over 264 due to his position in the control grid.

As can be appreciated, known software update systems may be used to ensure that the handhelds have the latest or acceptable version of the user interface. As described below, customization of the interface is possible for each handheld as well as data reporting and authentication of a user. Here, when a user 266 enters a room 201, the server 270 makes sure the user has all required software. Then when a user enters a group control area 220, the appropriate user interface is loaded. Then in control area 228, the copier provides real time status data and transfers user interface control to user 262. Release procedures are discussed herein. Each machine is provided at least a power and/or emergency stop button as a user interface.

Alternatively, priority can be determined based upon a hierarchal structure of handhelds or handheld users.

Machine Relative Position

Referring to FIG. 3, another embodiment of the present application is described with a schematic representation of two mailrooms on differing floors of a building. In this embodiment, a building 300 may have multiple mailrooms 302, 303 in a perimeter 301. In this embodiment, the machines include a receiver capable of direction finding and distance determination on a signal such as a beacon. In this example, the external processor utilizes a beacon that includes identification information in the beacon signal. As can be appreciated, the other positioning systems described could be used as well.

The mailrooms 302, 303 include positioning systems 316, 318, and 312, 314 respectively. Mailroom 302 includes machines 384, 386 having 3-D control areas defined as 324, 326 respectively. Similarly, mailroom 303 has machines 380, 382 having 3-D control areas defined as 320, 322 respectively.

In an alternative, the positioning systems resolve position information in three dimensions so that the two mailrooms do not interfere with each other.

In another embodiment, each positioning system is on a separate channel or has a differentiating code to avoid interference. Here user 362 is given control of copier 380, but not 384. Also, user 360 is not given control of copier 382 which may have that x-y position in its control grid, but not the y position.

In this example, the copiers 380, 382, 384 and 386 include an external user interface access system. The copier includes a BLUETOOTH transceiver and can provide user interface logic to a properly authenticated external user interface if the external processor does not have a usable external user interface logic program suitable for the copier. Here, the external processor includes a BLUETOOTH transceiver for communications with the business machines and servers and gateways, but also includes a radar signal transmitter that emits a radar signal using known low power radar transmission techniques. The copier includes a passive radar receiver that determines the direction and distance of the external processor. The copier is assigned a control grid relative to the copier. For example, the two dimensional floor space around the copier is defined in terms of distance and direction in radial coordinate space. The control zone may be defined in radial coordinates or be converted into Cartesian coordinates. The copier may utilize a multi-channel receiver to track several external user interface devices.

For example, a Bluetooth master transceiver in the copier may keep the closest 7 external processors as active slaves and all the rest as inactive slaves. If access to the inactive parked slaves is required, one or more of the active slave slots may be utilized.

In one alternative, the copier could be assigned likely approach paths and ignore signal sources from other directions such as the rear of the copier. Each external processor is assigned a unique identification signal that is sent in the radar pulse. The copier may then utilize the information to determine a BLUETOOTH address for the external processor in order to set up pairing with the external processor. The copier may then also require additional authentication of the user before providing user interface access to the external processor. However, in another embodiment, the identification information could be provided by another communications channel such as by an infrared link.

Alternatively, each external user interface is assigned a time slice for sending the radar signal. Accordingly, the time information could be used to identify the external processor and the BLUETOOTH transceiver of the external processor is paired with the copier and the copier then allows the external processor to control the copier as its external user interface.

As shown in FIG. 3, the Z dimension can be added using altitude measurements to enable a multi floor mailing facility or satellite facilities around a building. As can be appreciated, a purely signal strength RF distance locating system with an omnidirectional signal may have overlap between the machines and be unable to select the user interface and accurately position the devices. However, triangulation systems may be utilized.

Conflict Resolution

Referring to FIG. 4, a partial floor grid 401 of a mailroom 400 is shown including machines 480 and 482. In this illustrative alternative, applicable with any of the embodiments, a two-tier position based priority scheme is shown. It is possible that more than one user, each having an external processor, may be present in the control zone 423 for a machine 482. For example, user A and user B (both not shown), with external processor AP and BP (not shown) respectively are in the control zone 423 of copier 482. Here, a priority section 422 of the control zone 423 is defined as having precedence over the other areas of the full control zone 423. Accordingly, if user A is in zone 422, and user B is in the control zone 423, but not in the priority zone 422, user A will be given control of the machine 482. In an alternative, if both users are in the control zone 423, they are given access on a first-come first served basis and maintain control until relinquished. In another alternative, users in the control zone 423 that do not have priority are provided machine status data, but not control ability.

In another example, user A was in the control zone first and will maintain control of copier 482 until user A leaves the control zone with external user interface AP.

Postage meters may be characterized as operating in an open meter manner or a closed meter manner. A typical closed system postage meter includes a dedicated printer for printing evidence of postage used. A typical open system meter may utilize a general-purpose printer. Postal funds are often stored in a postal security device (PSD) that may employ a secure accounting vault. Here, postage machines may be the machines that are being controlled by the user and may utilize funds accounting local to the handheld or external to the handheld.

In an alternative applicable in any embodiment, the handheld could provide biometric authorization, accounting, personal macro storage and data file storage such as files to be printed. Each machine has a reconfigurable access grid and groups of like machines are assigned group grids. A mailroom assigns a mailroom grid for group of unlike machines. The centimeter accuracy positioning system has transmitters, a reference point and a controller. Each handheld can resolve position absolutely or relatively in the system. When the employee enteres the mailroom, the handheld could check that all user interfaces are up to date by querying the machines or the controller. The handheld could utilize Wi-Fi or BLUETOOTH for the wireless connections. A group of copiers can have a first zone defined such that inside the zone the copier interface is loaded. Then when the handheld enters a particular machine zone, the appropriate machine is selected and current operational parameters downloaded.

In an alternative, a mailroom employee could have a single PDF file that has black and white and color pages. The employee could store the file on the handheld and print the black and white pages by walking to the black and white copier/printer 482. The employee could start the job, then walk to the color copier/printer 480 and start printing that part of the job.

File Selection and Manipulation

Referring to FIG. 5, an embodiment of the present application is described in which a computer file is selected for processing. The process may be utilized with any of the systems described including the one of FIG. 2. The user has a PDA with BLUETOOTH access to a file server or other network device storing a desired file. The network access could be direct or through a gateway. The process 500 starts in step 510 and proceeds to step 520. In step 520, the handheld connects to a file server or gateway. In step 522, the user searches for the file. The user may utilize the familiar graphical interface of the PDA to search for the desired file. When the user has located the desired file on the network, the user selects the file. In step 524, 526, the user decides whether to download the file to the handheld. In step 528, the user enters the control zone of a machine such as a printer and processes the file. In step 530, the user launches the process and the file is manipulated. In step 532, the process determines if additional processing is required. If so, control returns to step 528 and if not, the process ends.

In the alternative embodiment, the selected computer file is downloaded to the handheld and may be manipulated be user programs before being processed by a machine. For example, the user could utilize the handheld to access a file server or desktop computer that stores a report computer file. The user could edit the file or split it into parts for processing. In an alternative, a BLUETOOTH personal area network and gateway can be used to allow the handheld user to select files from a desktop or server file storage device and also select where to print such as by walking into the printer access box.

Position and Authentication

Referring to FIG. 6A, an embodiment of the present application is described in which user position is determined. The process 600 begins in step 601 and proceeds to step 602 to determine position information for users. Several methods may be utilized. For example, a server could track multiple handheld devices. Additionally, a handheld could report its location to a machine. Furthermore, a machine could track handheld devices. In step 604, the process polls to determine if any user is in the control zone of a machine. In step 606 the user is authenticated. In step 608, the process determines if more than one user is in a control zone. If so, user priority is determined and control is passed to the only user who has priority. If there is only one user, control is passed to that user. The machine then polls to determine whether to remove control access from the handheld in step 614. If the user relinquishes control, the process 600 loops to the beginning to look for new users.

As an alternative, many priority schemes may be used. A pure timeout could be used; a hierarchal system may also be used.

Referring to FIG. 6B, an embodiment of the present application is described in which authentication is determined. The process 650 begins in step 651 and proceeds to step 652 to connect with an authentication server. In step 654, the process authenticates a handheld or handheld user. In step 656 the process determines if new user interface logic or other data or logic is required for processing or security and if so it is downloaded in step 658. In step 660, the server downloads new keys or password information and in step 662, the process determines if the machines need any updates to code, keys or other data. If so, they are updated in step 664 and the process ends.

Machine Access System

Referring to FIG. 7, a block diagram for a machine access controller is shown. Here machine 780 has Copier User Interface Access system 781. The server 770 has wireless Bluetooth access to the interface 781 using a BLUETOOTH Processor and Transceiver 785 for many levels of the network model and also security processes. Similarly, users 760 have access to the processor 785. The machine 780 may have a location processor 784. There is authentication logic 783 and copier glue logic 782 to provide access from the user interface to the copier control systems.

In an alternative applicable to any of the embodiments, the external user interface may allow customization of each machine user interface logic program stored in the external processor. Here, the external processor may also store macros and other interface logic that is not typically provided in the user interface. For example, the external processor could provide accounting system features that are typically provided by another accounting processor that is attached to a copier and has a separate user interface.

In another alternative applicable to any of the embodiments, the external processor comprises a Wi-Fi capable hand-held pocket PC such as the Toshiba e740 Pocket PC. Furthermore, differing types of processors and logic systems may be supported. For example, Java based PALM OS devices may be utilized. The user interface logic could be provided in JAVA or PALM OS format. Similarly, other portable computing devices such as laptop computers, tablet computers and Windows CE based portable wireless capable computers could be utilized.

In another alternative applicable to any of the embodiments, the machine being controlled requires that the data being sent be cryptographically protected from tampering before being placed into any encrypted communications packet such as WEP. For example, the machine being controlled may include a mailing machine having a postage meter for printing indicia as evidence of postage paid. As described in the related application, the printer in the mailing machine may be secured using cryptographic techniques to defeat fraud attacks such as duplicate prints of the same indicia. Similarly, impersonation attacks could be defeated with such a system.

The present application describes illustrative embodiments of a system and method for selecting an external user interface using spatial information. The embodiments are illustrative and not intended to present an exhaustive list of possible configurations. Where alternative elements are described, they are understood to fully describe alternative embodiments without repeating common elements whether or not expressly stated to so relate. Similarly, alternatives described for elements used in more than one embodiment are understood to describe alternative embodiments for each of the described embodiments having that element.

The described embodiments are illustrative and the above description may indicate to those skilled in the art additional ways in which the principles of this invention may be used without departing from the spirit of the invention. Accordingly, the scope of each of the claims is not to be limited by the particular embodiments described. 

What is claimed is:
 1. A method for selecting an external processor as a user interface to a machine comprising: accessing control grid position information for the machine, wherein the control grid position information provides a control grid of the machine comprising a subset of an effective positioning space covered by a positioning system; obtaining position information for the external processor using the positioning system; and using the control grid position information and the external processor position information to determine if the external processor is in the control grid of the machine, and only if the external processor is located in the control grid of the machine, providing user interface control of the machine to the external processor, wherein, the user interface control of the machine is provided to the external processor to the exclusion of the internal user interface of the machine; and obtaining position information for a second external processor; and determining whether to give priority of control to the external processor or the second external processor based upon the position of each of the external processor and the second external processor.
 2. The method of claim 1 further comprising: authenticating the external processor before transferring user interface control.
 3. The method of claim 1 wherein: authentication information is obtained from a user of the external processor.
 4. The method of claim 1 wherein: the control grid is defined in three dimensions.
 5. A method for selecting an external processor as a user interface to a machine comprising: accessing control grid position information for the machine, wherein the control grid position information provides a control grid of the machine comprising a subset of an effective positioning space covered by a positioning system; obtaining position information for the external processor using the positioning system; and using the control grid position information and the external processor position information to determine if the external processor is in the control grid of the machine, and only if the external processor is located in the control grid of the machine, providing user interface control of the machine to the external processor, wherein, the user interface control of the machine is provided to the external processor to the exclusion of the internal user interface of the machine; and obtaining position information for a second external processor; and obtaining hierarchal priority information for the external processor and the second external processor; and using the hierarchal priority information to determine whether to give priority of control to the external processor or the second external processor.
 6. The method of claim 1 further comprising: downloading user interface logic data to the external processor in response to the obtained position information of the external processor when the external processor enters a machine group control area that includes an area occupied by a plurality of similar machines.
 7. The method of claim 1 further comprising: obtaining updated position information for the external processor; and using the updated position information in determining whether to cease providing user interface control of the machine to the external processor.
 8. A method for selecting an external processor as a user interface to a machine comprising: accessing control position information for the machine, wherein the control position information provides a control space of the machine comprising a subset of an effective positioning space covered by a positioning system; obtaining position information for the external processor using the positioning system; and using the control position information and the external processor position information to determine if the external processor is in the control space of the machine, and only if the external processor is located in the control space of the machine, providing user interface control of the machine to the external processor, wherein, the machine is located in a space that includes a floor having a plurality of additional machines and the control space corresponds to a defined portion of the floor in proximity to the machine that does not overlap with space occupied by the plurality of additional machines.
 9. The method of claim 8 further comprising: authenticating the external processor before transferring user interface control.
 10. The method of claim 8 wherein: authentication information is obtained from a user of the external processor.
 11. The method of claim 8 wherein: the control space is defined in three dimensions.
 12. The method of claim 8 further comprising: obtaining position information for a second external processor; and determining whether to give priority of control to the external processor or the second external processor based upon the position of each of the external processor and the second external processor.
 13. The method of claim 8 further comprising: obtaining position information for a second external processor; and obtaining hierarchal priority information for the external processor and the second external processor; and using the hierarchal priority information to determine whether to give priority of control to the external processor or the second external processor.
 14. The method of claim 8 further comprising: downloading user interface logic data to the external processor in response to the obtained position information of the external processor when the external processor enters a machine control area.
 15. The method of claim 8 further comprising: obtaining updated position information for the external processor; and using the updated position information in determining whether to cease providing user interface control of the machine to the external processor.
 16. A method for selecting an external processor as a user interface to a machine comprising: accessing control position information for the machine, wherein the control position information provides a control space of the machine comprising a subset of an effective positioning space covered by a positioning system; obtaining position information for the external processor using the positioning system; and using the control position information and the external processor position information to determine if the external processor is in the control space of the machine; and only if the external processor is located in the control space of the machine, providing user interface control of the machine to the external processor; obtaining position information for a second external processor; and determining whether to give priority of control to the external processor or the second external processor based upon the position of each of the external processor and the second external processor. 