Universal portable unit

ABSTRACT

In general, a portable unit and method are described for storing user information for subsequent recovering. For one embodiment, the portable unit comprises a casing, an antenna and logic employed within the casing. The logic may comprise a wireless transceiver coupled to the antenna, a processing unit coupled to the wireless transceiver, and a remote transceiver coupled to a plurality of device drivers and a memory unit. The memory unit is configured to store remote codes, user identification information and user transaction information.

This application claims the benefit of priority on U.S. ProvisionalApplication No. 60/244,847.

FIELD

The present invention relates to the field of communications. Inparticular, this invention relates to a universal portable unit thatprovides digital identification and remote locking and unlockingfunctionality.

GENERAL BACKGROUND

In today's electronic world, individuals tend to carry a number ofcredit, debit and identification cards in their possession. Forinstance, many individuals commonly carry a drivers license or stateidentification cards, an automated teller machine (ATM) card, amembership card, a credit/debit card and an insurance card. Similarly,these individuals also carry a number of keys to open and close theirhome and office doors and carry remote controls in their possession toopen and close their garage door and/or activate automobile theftcontrol mechanisms. Clearly, it would be advantageous to eliminate theneed for carrying all these cards, keys and remote controls in favor ofconsolidating these operations into a portable communication device.

BRIEF DESCRIPTION OF THE DRAWINGS

The features and advantages of the present invention will becomeapparent from the following detailed description of the presentinvention in which:

FIG. 1 is a first exemplary embodiment of a network in accordance withthe invention.

FIG. 2 is an exemplary embodiment of a portable unit of FIG. 1.

FIG. 3 is an exemplary embodiment of the general architecture ofinternal logic and the flow of information within the portable unit ofFIG. 2.

FIG. 4 is an exemplary embodiment of a process for uploading userinformation from an entity into a portable unit.

FIG. 5 is an exemplary embodiment of a process for uploading driverslicense information to a portable unit.

FIG. 6 is an exemplary embodiment of the process of uploadingATM/credit/debit card information via a link between the portable unitand a computer at an authorized financial institution or kiosk location.

FIG. 7 is an exemplary embodiment of the process of uploading credit,debit and other identification cards issued by a business entity such asan authorized department store, library or gym into the portable unit ofFIG. 3.

FIG. 8 is an exemplary embodiment of the process of uploading cardinformation remotely via wireless, satellite, Internet or another linktype into the portable unit of FIG. 3.

FIG. 9 is an exemplary embodiment of a digital ID menu function andsub-features that will be added to the portable unit of FIG. 3.

FIG. 10 is an exemplary embodiment of the process by which a useraccesses and utilizes a digital drivers license already downloaded andstored in the portable unit of FIG. 3.

FIG. 11 is an exemplary embodiment of the process of accessing andutilizing the digital ATM, credit and debit cards for variousPoint-of-Sale (POS) transactions.

FIG. 12 is an exemplary embodiment of a user accessing and utilizing thedigital card information stored in the portable unit for processing awireless transaction over the Internet.

FIG. 13 is an exemplary embodiment of the programmability of the remotecontrol transmission codes into the portable unit.

FIG. 14 is an exemplary embodiment of the process of uploading remotecontrol transmission codes/signals into the portable unit via a link.

FIG. 15 is an exemplary embodiment of a digital remote menu function andsub-features employed by the portable unit of FIG. 3.

FIG. 16 is an exemplary embodiment of the process by which a useraccesses and utilizes the remote control code/signal already downloadedand stored in the portable unit of FIG. 3 for opening/closing variousremote control locking mechanisms.

DETAILED DESCRIPTION

An exemplary embodiment of the invention relates to a universal portableunit and technique for downloading, storing, accessing and utilizinginformation for identification, commercial transactions and/or remotelocking controls. This information may include, but is not limited orrestricted to drivers license information, ATM, credit/debit cardnumbers and expiration dates, membership numbers, departmental storeaccount numbers and the like. Herein, well-known circuits are not setforth in detail in order to avoid unnecessarily obscuring the invention.

In the following description, certain terminology is used to describefeatures of the invention. For example, a “processing unit” includeshardware controlled at least in part by software to perform certainoperations. The software is executable code configured as an operatingsystem, an application, or a downloadable applet, for instance. Examplesof a processing unit include a digital signal processor, a generalmicroprocessor, a micro-controller, a state machine, an applicationspecific integrated circuit and the like. A “link” is broadly defined asone or more information-carrying mediums to establish a communicationpathway. For instance, the information-carrying medium may supportwireless communications (e.g., infrared “IR”, laser, radio frequency“RF”, cellular, satellite, etc.) or communications over physical mediumsuch as electrical wire, optical fiber, cable, bus traces and the like.

In addition, the term “information” is defined as data (e.g., audio,video or text), address, and/or control. One type of information isdenoted as “user information,” namely information related toidentification of the user or transactions involving the user. Userinformation includes, but is not limited or restricted to “useridentification information” and/or “user transaction information”. Forinstance, user identification information includes drivers license data(name, address, age, date of birth, picture, drivers license number,biometrics data, expiration date, etc.), social security number,passport information, birth certificate data, corporate identificationbadge, school or library identification data, building access card,insurance card, frequent flier card and the like. User transactioninformation includes credit/debit/ATM card information such as the nameon the card, picture of the card holder, card number, expiration date,and the like. For clarity, the user information stored or illustrated bya card (e.g., drivers license, social security, credit/debit/ATM card,membership card, insurance card, library card, state or student ID,retail store card, service station card, etc.) is referred to as “cardinformation”.

For transmission, the user information may be transmitted as a file(e.g., any selected grouping of information). The file may be asuccessive transfer of information packets, a stream of information, andthe like.

Referring to FIG. 1, a first exemplary embodiment of a network 100 inaccordance with the invention is illustrated. The network 100 comprisesa link 110 based on a physical medium. Herein, the link 110 may be partof a wired or wireless backbone that includes a network resource 120.The network resource 120 is a server or other device capable of storinga database of all styles, models and various kinds of software, hardwareand other features built into universal portable units from differentmanufacturers. The network 100 may further include one or more readers130 ₁-130 _(N) (“N” representing a positive whole number, N≧1) thatsupport communications with one or more universal portable units 150(hereinafter referred to as a “portable unit”). For this embodiment, theportable unit 150 communicates with the reader 130 ₁ via a link 140.

The portable unit 150 includes any electronic device that comprises aprocessing unit (e.g., a processor, micro controller, state machine,etc.) and operates to provide user information and/or remote control keyfunctionality as described below. The portable unit may be produced in avariety of form factors such as a mobile computer (e.g., a laptopcomputer, a hand-held inclusive of a personal digital assistant such asa PALM PILOT®, etc.), communications equipment (e.g., cellulartelephone, mobile telephone, etc) or any other portable electronicdevice, for example.

The reader 130 _(x) (“x”=1, . . . or N) is a device that providesbi-directional communications between one or more portable units,computers, networks or the wired backbone. An example of a readerincludes a small, portable docking station and/or another portable unitsuitably adapted to interface with the portable unit 150 and to readuser information. This would allow authorized personnel (e.g., localpolice, governmental official, merchant, etc.) to retrieve the userinformation from the portable unit.

The reader may have a physical connection to the wired backbone (e.g.,link 110) as illustrated by reader 130 ₁ or a wireless connection backto the wired backbone as illustrated by reader 130 _(N). The wiredand/or wireless mode of operation may provide local area network (LAN)or wide area network (WAN) connectivity. The link 110 may be adapted forany network type, including Ethernet, token ring, asynchronous transfermode and the like.

Referring now to FIG. 2, an exemplary embodiment of the portable unit150 of FIG. 1 is shown. For illustrative purposes, the portable unit 150comprises an antenna 200, a display 210 and an alphanumeric keypad 220integrated with a casing 230. More specifically, the antenna 200 enablesthe reception of incoming information and the transmission of outgoinginformation. The display 210 may be a flat panel display such as aliquid crystal display for instance. While the display 210 may be usedas an output device in one embodiment, it is contemplated that thedisplay 210 may be used as an input/output device such as a touch screendisplay, thereby eliminating the need for the alphanumeric keypad 220.The casing 230 is made of an inflexible material such as hardenedplastic. The casing 230 provides a barrier to protect logic placedtherein from damage and contaminants.

FIG. 3 is an exemplary embodiment of the general architecture ofinternal logic and the flow of information within the portable unit ofFIG. 2. For this embodiment, the portable unit 150 includes some or allof the following logic: antenna 200, a processing unit 240, an internalmemory 250, a wireless transceiver 260, device driver 270, one or moreoptional tertiary device drivers 275, an input/output (I/O) interface280 with one or more corresponding I/O ports 285, remote controltransceiver 288, and tertiary devices 295 such as single inline module(SIM) cards or memory sticks for instance.

Coupled to the processing unit 240, the internal memory 250 may beimplemented as non-volatile memory (e.g., flash, battery-backed randomaccess memory “RAM”, any type of read-only memory such as ROM, PROM,EPROM, etc.). Of course, in lieu of or in addition to non-volatilememory, the internal memory 250 may be implemented with volatile memory(e.g., dynamic RAM).

In one embodiment, the internal memory 250 is segmented into protectedand non-protected areas 251 and 252. The non-protected area 252 may beconfigured to contain (i) transaction confirmations such as credit ordebit card receipts and (ii) card information having a lower level ofsecurity (e.g., library card numbers, gym membership data, etc.). Thenon-protected area 252 may also be loaded with software that enables theprocessing unit 240 to packetize and depacketize data upon receipt ortransmission over the wireless transceiver 260, the I/O interface 280and/or the remote control transceiver 288. The protected area 251 may beconfigured to contain (i) user information (e.g., drivers license data,social security number, ATM/credit/debit card numbers and expirationdates etc.), and/or (ii) security features (e.g., remote control codes,user identification “UserID”, password, digital signatures, digitalcertificates, etc.). The manner of delivering and/or retrieving useridentification information or security features to/from the portableunit 150 is a design choice (e.g., using encryption, password control,etc.). The digital signatures and certificates may be used to protectthe integrity and verify the authenticity of information stored withinthe internal memory 250 or information downloaded by the portable unit150 via the antenna 200/wireless transceiver 260, the I/O interface 280and/or the remote control transceiver 288.

If tertiary devices 295 and tertiary device drivers 275 are employedwithin the portable unit 150, memory associated with the tertiarydevices 295 may be similarly segmented into protected and non-protectedareas. Different types of information can be stored in these areas asdescribed above. The use of tertiary devices 295 provides greaterflexibility for use of the same user information or security features inmore than one portable unit.

The wireless transceiver 260 is coupled to the processing unit 240 andthe antenna 200. In cooperation with the processing unit 240, thewireless transceiver 260 controls the assembly/packetization of datapackets transmitted and received over the antenna 200 as well as anyencoding and decoding operations. Normally, this is accomplished bycontrolling the modulated frequency at the antenna 200. Thus, theportable unit 150 is capable of supporting Code Division Multiple Access(CDMA), Global System for Mobile Communications (GSM) and other types ofwireless communication protocols.

As shown in FIG. 3, the I/O interface 280 provides one or more I/O ports285 to establish communications with a destination device via a linkhaving one end coupled to the I/O port 285 and another end coupled tothe destination device. For example, in one embodiment, the I/Ointerface 280 includes an I/O port 285 that enables information to betransmitted to and/or received from a peripheral. The I/O port 285 maybe configured as a serial port, a parallel port, a Universal Serial Bus(USB) port and the like. When a destination device, such as a printerfor example, is coupled to the I/O interface 280 via a link 290, theuser is able to print out receipts, confirmations and the like. Othertypes of destination devices that may be coupled to the I/O interface280 include a facsimile machine, another reader, another portable unit,computer, network, Point-of-Sale (POS) system, ATM, modem (for wired webaccess), or any other peripheral configured appropriately.

In one embodiment of the invention, the remote control transceiver 288may be coupled to the device driver 270 and/or tertiary device drivers275. The remote control transceiver 288, which can be configured withmemory for programmability, is capable of processing a variety oftransmission formats such as any modulated signal, light pulses, ordigital packet transmissions, for example.

Referring back to FIGS. 1 and 2, the reader 130 ₁ may be an ATM, POSsystem or another portable unit adapted to receive or obtain informationstored internally within the casing 230 of the portable unit 150 orstored externally from the casing 230. The reader 130 ₁ includes eitheran interface to connect to an I/O port of the I/O interface 280 or awireless receiver to communicate with the wireless transceiver 260 ofthe portable unit 150.

Referring back to FIG. 3, the processing unit 240 executes softwareresponsible for (i) initializing, maintaining and controlling thedisplay 210, the internal memory 250, the wireless transceiver 260, theremote control transceiver 288, the device driver 270 and/or thetertiary device drivers 275; (ii) executing all the standard andproprietary communication protocols needed for performing variousportable unit functions; (iii) maintaining all the state informationrequired by any communication protocols; (iv) transmitting, receiving,packetizing or depacketizing data; and (v) storage and maintenance ofsecure information (e.g., certain user information, security features,etc.) and/or non-secure information (e.g., transaction confirmations andinformation with low level security).

For example, software running on the processing unit 240 is coded tocoordinate communications between the device driver 270, tertiary devicedrivers 275 and the wireless transceiver 260 for transmitting/receivinginformation and maintaining any kind of signaling between them.Likewise, additional software may be used to generate various menus,which allows the user to select and activate or inactivate variousfeatures of the portable unit 150.

As an additional example, the processing unit 240 may execute softwarethat is responsible for handling cryptographic (e.g., encryption,decryption, etc.) and other security-based operations. These operationsmaintain secure transactions and secure storage through verification ofdata integrity and authentication of the user.

As another example, the processing unit 240 may execute software that isresponsible for electronic mail (e-mail) and web processing. All thecommunication protocol processing and transaction processing requiredfor email/web access and electronic commerce is performed by theprocessing unit 240, including addressing all the security requirementswhile performing transactions online.

Yet another example, the processing unit 240 may execute software thatis responsible for sending and receiving secure and insecure digitalfiles. This allows authenticated users of the portable unit 150 toreceive files from providers (e.g., financial institutions or their websites, etc.). This also allows for transferring files from the portableunit 150 via I/O interface 280 and/or wireless transceiver 260 to thevarious POS systems and ATMs, for processing user transactions.

Yet even another example, the processing unit 240 may execute softwarethat is responsible for establishing wireless communications with anelectrical or electromechanical locking mechanism. These communicationsmay be used to upload a code to lock/unlock the locking mechanism. Thecode may be one or more digital signals, one or more analog signalsmodulated within a selected frequency range, optical signals (e.g.,series of infrared pulses or laser) and the like. It is optional thatthe communications involve the exchange of cryptographic materials suchas keys, digital signatures and/or digital certificates. The code may bestored within (i) protected areas 251 of internal memory 250, (ii)tertiary devices 295, (iii) the remote control transceiver 288 or (iv)any combination thereof.

As a further example, the software running on the processing unit 240 isresponsible for receiving, programming, storing, accessing and utilizingunique remote control code(s). The software controls the digital remotemenu functions and controls the accessing and retrieval of stored remotecontrol code(s). The software is also responsible for accessing theappropriate remote code(s) from protected areas of internal memory 250and/or tertiary devices 295 and sending those code(s) to the remotecontrol transceiver 288 via the device driver 270 and/or tertiary devicedrivers 275. When the remote control transceiver 288 within the portableunit 150 releases the appropriate code(s), the remote control lockingmechanism, whether built into an automobile, home, office or garagedoor, will lock/unlock.

It is contemplated that the electrical or electromechanical remotelocking mechanisms built into the home, office or garage door may havesuitable connectivity to telephone lines or electrical lines. This mayenable the remote control transceiver 288 in the portable unit 150 totransmit the remote code(s) via wireless and/or land based telephonelines to the locking mechanism. Thus, control of the locking mechanismmay be performed remotely.

Various peripheral systems may be placed in communication with theportable unit, including but not limited or restricted to POS, ATM orlocking mechanisms. These peripheral systems will also be loaded withapplication software, system software and/or communication software thatis required to communicate with the portable unit and its applications.

The processes described in FIGS. 4-16 below, when implemented insoftware, are programs (applications, applets, routines or sub-routines)that perform tasks. The programs can be stored in machine-readablemedium. The “machine readable medium” may include any medium that canstore or transfer information. Examples of machine readable mediuminclude an electronic circuit, a semiconductor memory device, a readonly memory (ROM), a flash memory, an erasable programmable ROM (EPROM),a floppy diskette, a compact disk (CD-ROM), an optical disk, a hard diskor a fiber optic medium.

Referring now to FIG. 4, an exemplary embodiment of a process foruploading information into a portable unit from an entity is shown. Ingeneral, the “entity,” as referred to herein, may be a governmentalagency, a financial institution, a commercial enterprise, a non-profitenterprise, a kiosk and the like. The user of the portable unitestablishes communications with the entity (block 410). For example, theuser may physically take the portable unit along with his or heridentification (e.g., drivers license, credit card, etc.) to anoffice/kiosk of the entity. An authentication agent (e.g., an employeeof the entity, kiosk computer itself, etc.) verifies and authenticatesthe user of the portable unit (block 420). Such verification andauthentication may be accomplished through any identification process(e.g., handwritten signature verification with accompanyingidentification such as a drivers license, social security number ormother's maiden name, password entry, biometrics, digitalsignature/certificates, etc.).

If the information maintained or accessible by the entity does not matchthe information provided by the user, the requested upload is denied andis not conducted (blocks 430 and 440). However, if the informationmatches the maintained information, the authentication agent accessesthe desired information and uploads the information for storage inprotected, non-volatile memory of the portable unit (blocks 450 and460). It is contemplated, however, that the uploaded information may bestored in the internal memory and/or in the tertiary devices. The userof the portable unit is not allowed to make any changes to any uploadedinformation. Instead, the portable unit prompts the user to optionallyset up a UserID and password for subsequent access attempts (block 470).

Referring now to FIG. 5, an exemplary embodiment of a process foruploading user information from an entity, specifically drivers licenseinformation from the Department of Motor Vehicles “DMV” to a portableunit is shown. The owner of the portable unit establishes communicationswith the entity by physically delivering the portable unit along withhis or her current drivers license to a clerk at the DMV (block 510).The DMV clerk verifies and authenticates the user of the portable unit(block 520).

If the DMV records match the user identification information provided bythe user, an authorized DMV clerk accesses the DMV records and uploadsthe complete drivers license information into protected memory. The“protected memory” includes protected area of the internal memory and/orprotected area of tertiary devices of the portable unit (blocks 540, 550and 560). Herein, the downloaded drivers license information includes adigital picture of the user, digital picture of the drivers license, adrivers license number, user name, age, date of birth, address, sex,height, weight, color of hair, indication of corrective lenses or anycombination thereof.

In order to prevent unauthorized access to the drivers licenseinformation, the portable unit may prompt the user to set up a UserIDand password for accessing the drivers license information (block 570).The prevention of unauthorized access using the UserID and password isan optional feature exercised by the user as represented by dashedlines.

In general, the entity's computer/s that are authorized to downloaddigital user information into a portable unit would be configured withappropriate software and procedures. The portable unit will also beloaded with appropriate software for receiving, processing and storinginformation from the entity.

It should be appreciated that a number of other techniques and processescan be easily devised by people skilled in the art fordownloading/uploading card information into the portable unit. Forexample, there are a number of magnetic card readers with differentdesigns and technologies currently available in the market place thatcan read card information contained in the magnetic strip of thesecards. The card may be swiped into the magnetic card reader and thecaptured information can be converted into a digital format and uploadedinto the portable unit. Another example includes placement of the cardinformation into the memory chip of the smart cards that can be read bya smart card reader and converted to digital data and downloaded intothe portable unit.

Yet another example for uploading card information into the portableunit is through an independent processing agent that receives cardscontaining the user information such as drivers license, ATM, credit,debit cards and the like. The independent processing agent may be anindependent company, manufacturer, wholesaler, distributor, retailerand/or the service provider for the portable unit. The consumer mayprovide the cards to the independent processing agent at the time ofpurchase of the portable unit or at the time of signing up with aservice provider or at any subsequent time. The cards may be receivedeither from the consumer or directly from the card issuers or acombination thereof. Thereafter, the card information is converted intodigital format and uploaded into the internal memory unit and/ortertiary devices of the portable unit.

Referring now to FIG. 6, an exemplary embodiment of the process ofuploading ATM/credit/debit card information via a link between theportable unit and a computer at an authorized financial institution isshown. The user physically takes the portable unit to an authorizedfinancial institution (block 610). An authorized representative at thefinancial institution verifies and authenticates the user of theportable unit (blocks 620 and 630). This may be accomplished throughidentification processes as described above.

If the user is verified, then the authorized representative willinitiate communications with the card issuer's computer and/or arepresentative at the card issuer via any communication link such as theInternet, telephone, facsimile machine and the like (block 640).Thereafter, the card information is downloaded to a computer controlledby the financial institution (block 650). This would enable thefinancial institution to upload the card information into the portableunit or memory associated therewith (block 660).

As an illustrative example, a financial institution issued a credit cardto John Doe and John Doe wishes to download the credit card informationinto his portable unit. John Doe takes his portable unit and his creditcard to his bank. An authorized bank representative verifies andauthenticates John Doe's identify. Thereafter, upon successfulverification, the bank's computer and/or an authorized bankrepresentative communicates with the financial institution's computerand/or an authorized representative from the financial institution andprovides appropriate identification and credit card information for JohnDoe. If the information regarding John Doe provided by the bank matchesthe information locally accessible by the financial institution'scomputer, the financial institution will release and upload John Doe'scredit card information to a designated bank's computer. Now, the bankcan upload the credit card information into John Doe's portable unit.All ATM, credit and debit card information received by the portable unitfrom any financial institution computer will be stored in secure,protected and non-volatile memory.

The user of the portable unit will not be allowed to make any changes toany card information received from the financial institution and storedin the internal memory and/or tertiary devices of the portable unit. Asan optional feature, the portable unit may prompt the user to set up aUserID and password for card information associated with each cardstored in internal memory and/or tertiary devices (block 670). Althoughnot shown, it is contemplated that the upload process may be preventedif the UserID and password are not set up in a timely manner.

Referring now to FIG. 7, an exemplary embodiment of the process ofuploading card information for cards issued by a business entity isshown. The upload is performed by physical connectivity between theportable unit and the issuer's computer. The user provides the portableunit to an authorized representative of a business entity. The “businessentity,” as generally referred to herein, may be a commercial enterpriseas described above such as a retail store, a department store, alibrary, a school, a gym, a kiosk and the like (block 710). Anauthorized representative at the business entity that honors the cardverifies and authenticates the user of the portable unit (block 720). Ifthe user is verified, then the authorized representative uploads thecard information to the internal memory and/or tertiary devices of theportable unit (blocks 730 and 740). Otherwise, the upload process may beprevented (block 760). Thereafter, a UserID and password may beoptionally established (block 750).

Occasionally, the issuer may have to communicate via Internet, satelliteetc. with the card issuer's central computer and/or a representative atthe actual card issuer's central office and download the cardinformation from the issuer's central computer to the computer at thelocation of the business entity. The business entity can then upload thecard information to the portable unit either to the internal memoryand/or the tertiary devices.

As an alternative embodiment, although not shown, the card informationmay be recovered from a magnetic card reader that can read and captureinformation encoded into the magnetic strip of a card. The capturedinformation can be converted into digital format and downloaded into theportable unit. Similarly, card information contained in a memory chip ofa smart card can be read by a smart card reader and converted to digitaldata and downloaded into the portable unit.

Referring to FIG. 8, an exemplary embodiment of the process of uploadingcard information (e.g., drivers license information, ATM/credit/debitcard numbers and expiration dates, store credit card number, etc.)remotely via wireless, satellite, Internet or another link type isshown. The user accesses the website of the card issuer from aweb-enabled portable unit or a Plain Old Telephone System (POTS)telephone (block 805). When the user dials into the card issuer'swebsite, the user may be prompted to provide identification informationsuch as mothers maiden name, social security, unique portable unitidentifier, phone number of the portable unit, and the like (block 810).The process of matching the provided identification information withprestored information or any other process for verifying andauthenticating the user and their portable unit prior to uploading adigital card file (e.g., digitized information normally placed on theface of or stored in a ATM, credit or debit card and also referred to ascard information) remotely via wireless, Internet or any othercommunication pathway may be performed.

For example, the user may have provided his/her mother's maiden name,social security number, phone number/web address of the portable unit,user's primary electronic mail (e-mail) address, unique portable unitidentifier. This information may be included in the applicationsubmitted for obtaining the original paper, plastic, digital and/orsmart card. This personal information is already stored in databasesaccessible by the issuer.

If the personal information provided by the user at the time ofdownloading the digital card file matches with the information submittedwith the application (which has already been processed and approved bythe card issuer), then the card issuer authenticates the user and his orher portable unit and starts the uploading process remotely viaInternet, satellite, etc. (block 815). The digital card file will beuploaded either to the portable unit user's primary e-mail address orInternet website address (generally referred to as “Internet Protocol(IP) address”) or directly to their portable unit as selected (blocks820 and 825). Otherwise, access is denied (block 830).

The portable unit is loaded with software that enables the user toupload the digital card file from the issuer's website and/or e-mail tohis or her portable unit. The digital card file to be downloaded viaInternet, wireless etc. may be encrypted and may include some or all ofthe personal information such as the phone number of the portable unit,e-mail address, and unique portable unit identifier. This personalinformation ensures that the digital card file is being transmitted toan authorized recipient. Otherwise, a request is issued to connect tothe card issuer's website and begin re-authentication (block 835).

Once the uploading is successful and complete, the portable unit willautomatically notify the card issuer's computer (blocks 840 and 845). Ifthe upload is not successful, the portable unit will initiate the uploadprocess again and after three attempts, the card issuer's computer mayprompt the portable unit user to visit a physical branch or location toupload the digital card file via direct connectivity to a computer atthe branch/location (block 850). If the digital card file is uploaded toan e-mail or website address, the program may be written to allowuploading to the portable unit from the e-mail or website address only acertain number of times and then automatically destroy the file afteruploading a specified number of times as requested by the user. Thiswill ensure that the digital card file may not be stolen, copied ordownloaded from the e-mail or website address into unauthorized portableunits.

Once the digital card file is downloaded into the portable unit, theprocessing unit programs the information received and stores it eitherin the internal memory and/or in the tertiary devices. As an option, theportable unit may prompt the user to set up his or her UserID andpassword for each digital card file received and stored in the portableunit (block 855).

Just as issuing multiple cards having the same card number andexpiration date but different names (e.g., same corporate name and cardnumber but different employee names), digital card files can be uploadedto multiple portable units. The same process described above may be usedfor uploading into each portable unit either remotely or via direct linkto a computer at an entity.

Now that the digital card file is uploaded into the portable unit, theuser needs to access and utilize the digital card information stored inthe portable unit for identification and other commercial transactions.FIG. 9 illustrates the various menu functions and features to be builtinto the portable unit for accessing and utilizing the digitalidentification, digital cards, digital remote control keys and the like.It is contemplated that these menu functions and features may also beset up as additional function keys, new buttons, etc.

In particular, FIG. 9 illustrates an exemplary embodiment of a processfor digital ID menu function 900 and sub-features added to the portableunit. Various features and choices are provided under each newsub-function. When the user presses the menu and selects a particularfunction or feature, the selected function or feature is activated. Eachfunction/feature may have further sub-functions and sub-features. Forexample, various sub-functions 910 under digital cards include ATM 920,credit cards 930, debit cards 940, drivers license 950 and other cards960. Under each sub-function, the user may be given various choices suchas the ATM sub-function 920 featuring a list of all ATM cards 921 ownedby the user. The user can scroll down the appropriate ATM card andactivate that digital card file by inputting the UserID and/or password.The activation enables the card information to be downloaded from theportable unit or shown on its display. Similarly, the credit cardsub-function 930 provides a listing of all credit cards owned by theuser. Under each of these sub-functions, further choices may beavailable to the user.

Referring still to FIG. 9, the user may have further choices as to thepayee such as John Doe (husband), Jane Doe (wife), John Doe, Jr. (son)and the like. Multiple digital cards with the same number but differentnames may be stored in the portable unit. This accommodates for thesituation when the same portable unit may be used by husband, wife andchildren at different times. Note that each of these digital cards maybe protected by their own unique UserID and password so that a childusing the portable unit cannot access/use his or her father's card thatmay have a higher credit limit without his/her father's authorization(block 970).

FIG. 10 illustrates an exemplary embodiment of the process by which auser accesses and utilizes a digital card file such as a digital driverslicense already downloaded and stored in the portable unit. When theuser scrolls down and presses the appropriate function key to select the“Digital ID”, the portable unit will display the various sub-functionssuch as digital drivers license, digital social security, and the like(block 1000). When the user selects the sub-function digital driverslicense (block 1005), the names associated with all digital driverslicenses stored in the portable unit will be displayed. The user scrollsdown to select the appropriate digital drivers license name, selects theparticular drivers license and optionally enters the UserID and password(blocks 1010 and 1015). If the UserID and password for the selecteddigital drivers license name matches information prestored in theportable unit (block 1020), the portable unit accesses the digitaldrivers license information stored either in internal memory and/ortertiary devices. This information is routed to either the display,wireless transceiver/antenna or the I/O interface, per user's request.Otherwise, access is denied (block 1025).

When the user selects a particular digital drivers license name, theportable unit may give several choices, including Display, Upload, orPrint (blocks 1030, 1035 and 1040). If the user selects “Display”, it iscontemplated that the information pertaining to a portion or entiredigital drivers license may be accessed from internal memory and/ortertiary devices for display (block 1045). This information includes oneor more of the following: (i) a digital picture, (ii) drivers licensenumber, (iii) name, (iv) address, (v) date of birth, (vi) sex, (vii)hair color, (viii) eye color, (ix) height, (x) weight, (xi) expirationdate, and/or (xii) a designation of corrective lenses. The informationmay be displayed in just one screen or separately in multiple screensdepending on the size of the screen, size of fonts in the display, sizeof the memory and the like. It is further contemplated that the user maybe able to control the size, font and clarity of the display bydisplaying all information in one or multiple screens (such as thedigital picture in one screen and the drivers license information inanother screen).

If the user chooses “Download”, the user is provided with options fordownloading the drivers license information from portable unit. Theseoptions include (i) physical connectivity (block 1050) (ii) electronicmail (e-mail) or website address (block 1055). For instance, if the userchooses to upload the digital drivers license information via e-mail orwebsite, the portable unit queries the user for further information suchas e-mail and/or website address, method of transmission (e.g.,satellite, Internet, etc.) as shown in block 1060. The selectedinformation to be downloaded is routed to the I/O interface 280 orwireless transceiver 260 and transmitted via antenna 200 to theappropriate e-mail, Internet or website address via the method oftransmission selected by the user (block 1065). This will enable theuser to send a copy of their digital drivers license to a third partyand facilitate various personal and commercial transactions. Otherwise,a connection is made and the authentication and operation selectionrepeats (block 1070).

As an example, in the event that an entity (e.g., an authorized lawenforcement agency personnel) wants access to a digital drivers licensestored in the portable unit, the user may display the entire digitaldrivers license on the display of the portable unit. Alternatively,another portable unit/computer with suitable physical connectivity tothe portable unit may be adapted to read the digital drivers licensefrom the portable unit. Yet, another alternative approach is to uploadthe digital drivers license as a read only file for purposes ofstoring/printing as a data file only. It is contemplated, however, thatthe system architecture and/or software of the portable unit may beconfigured to prevent a digital drivers license or any other userinformation to be uploaded from one portable unit to another unless theother unit is a portable reader 130 _(X) in possession of an authorizedentity (e.g., card issuer, agent of the issuer, law enforcement, etc.).

If the user chooses the “Print” option, then the digital drivers licenseis sent to the I/O interface and can be printed directly from theportable unit (if a printer is built into the portable unit) or throughan external printer (blocks 1040 and 1075).

Referring now to FIG. 11, an exemplary embodiment of the process ofaccessing and utilizing card information associated with an ATM, creditand debit cards for various transactions is shown. Of course, thedigital card file(s) pertaining to the ATM, credit and debit cards havebeen previously downloaded and stored in protected areas of internalmemory and/or tertiary devices as read only file(s). The user scrollsdown the menu function and selects the function titled, “Digital Cards”and scrolls down the various choices and selects an appropriate digitalcard (ATM, credit or debit card) for a transaction (block 1100).

The portable unit prompts the user to optionally enter the appropriateUserID and password for the selected digital card as represented bydashed lines (block 1105). If the UserID and/or password entered by theuser does not match with the user information stored in internal memoryand/or tertiary device(s), the portable unit will reject access andperhaps display “Access Denied” on its display (blocks 110 and 1115). Ifthe UserID and password matches the user information stored in memory,the portable unit will access the appropriate read-only digital cardfile from internal memory and/or tertiary device(s) and transmit thecard information to the I/O interface (blocks 1110, 1120 and 1125).

A suitable connectivity between a transactional entity and the I/Ointerface of the portable unit is configured to enable propercommunication between the transactional entity and the portable unit.The “transactional entity,” as referred to herein, may be an ATM of afinancial institution, a POS system, a computer at an entity, a portablecomputer, another portable unit configured as a reader, a kiosk and thelike. The card information (e.g., name of the card, card number, fullname on the card, expiration date, etc.) that is necessary forprocessing the transaction will be transmitted to the transactionalentity via the I/O interface (block 1130). It is contemplated that thetransactional entity will be set up with appropriate software/hardwareto receive the ATM, credit or debit card information digitally via theI/O interface of the portable unit in addition to receiving the cardinformation via the magnetic/smart card reader.

Once the ATM, credit or debit card information is transmitted to thetransactional entity, the transactional entity will process and completethe transaction the same way it is processed currently in the marketplace. In today's transactions, the magnetic card reader reads theinformation contained in the magnetic strip of the plastic cards and thetransactional entity processes and completes the transaction. Similarly,the portable unit will transmit/release all the necessary cardinformation to the transactional entity digitally via the I/O interfaceor through wireless communication techniques, and the transactionalentity will process and complete the transaction.

A physical copy of the receipt may be downloaded by the transactionalentity to the portable unit, showing the final debited or creditedamount. In one embodiment, this may be accomplished by the transactionalentity initiating a query to the portable unit to determine if the userrequests a digital receipt (block 1135). If the user responds “Yes” bypressing the appropriate key, then a digital receipt of the transactionmay be downloaded from the transactional entity to the portable unit forstorage in non-protected area of the internal memory or tertiarydevice(s) as shown in blocks 1140 and 1145).

Referring to FIG. 12, an exemplary embodiment of a process for a useraccessing and utilizing the card information stored in the portable unitfor processing a wireless transaction over the Internet/satellite isshown. Herein, using the portable unit, the user accesses a website andscrolls through the website, processes a transaction (such as buying anitem from the website etc.) and decides to use a digital card stored inthe portable unit for processing the transaction (block 1200). The userscrolls down the function keys and selects a digital card (block 1205)and optionally enters the UserID and password as represented by dashedlines (block 1210). If the UserID and password are incorrect, theportable unit rejects the transaction and perhaps displays “AccessDenied” (blocks 1215 and 1220).

If the UserID and password matches with the information stored in theportable unit, the portable unit queries the user for furtherinformation such as method of transmission (e.g., satellite, Internet,etc.) as shown in block 1225. The selected information to be downloadedis routed to the I/O interface or wireless transceiver and transmittedvia an antenna to the appropriate e-mail, Internet or website addressvia the method of transmission selected by the user (block 1230).

A physical copy of the receipt may be downloaded by the target recipientto the portable unit, showing the final debited or credited amount. Inone embodiment, this may be accomplished by the target recipientinitiating a query to the portable unit to determine if the userrequests a digital receipt (block 1235). If the user responds “Yes” bypressing the appropriate key, then a digital receipt of the transactionmay be downloaded from the target recipient to the portable unit forstorage in non-protected area of the internal memory or tertiarydevice(s) as shown in blocks 1240 and 1245.

Referring now to FIG. 13, an exemplary embodiment of a process for auser programming the remote control code(s) into the portable unit isshown. When the user presses the menu function “remote control” andchooses the “program” option, the portable unit displays a list ofcontrollable items such as auto, garage, home, office or othercategories (blocks 1300, 1305, 1310). For each selected choice, the useris provided additional choices such as “add” or “change/delete” (blocks1315 and 1320).

For example, if the user chooses a controllable item and “add”, theportable unit prompts the user to add an alphanumeric description forthe selected item (block 1325). The portable unit then prompts the userto enter the appropriate remote control transmission code foropening/closing the selected item (block 1330). The portable unit savesthe remote control transmission code/s in protected areas of memoryand/or remote transceiver (block 1332). The user then enters the UserIDand password, if desired (block 1335).

It is appreciated that there are numerous types of electromechanicalgarage door openers with different kinds of technologies based ondifferent data delivery techniques. A simple and commonly used garagedoor opener is based on matching codes/frequencies between the remotecontrol and locking mechanism. It is contemplated that the portable unitwill be loaded with proper software/hardware that will convert thedigital remote control code(s) into appropriate transmission formatsnecessary for communication with the locking mechanism.

FIG. 13 further shows the process of changing/deleting remote controlcodes and descriptions already stored in the portable unit. When theuser selects the remote control code or description to bechanged/deleted by pressing the appropriate function and sub-functionkeys, the portable unit prompts the user to enter the UserID andpassword (blocks 1340 and 1345). If the UserID and password matches theinformation stored in the protected areas of the internal memory and/ortertiary device(s), the portable unit allows the user to delete orchange the existing remote control transmission code and/or description(blocks 1350 to 1385).

Referring now to FIG. 14, an exemplary embodiment of a process ofdownloading remote control code(s) from an entity's computer or otherelectronic equipment is shown. As shown, in one embodiment, the userprovides the portable unit to the entity (block 1400). The entityauthenticates the portable unit user by verifying appropriate documentssuch as drivers license (block 1405). If the user is authenticated, thenthe entity downloads a remote control transmission code(s) from acomputer or other electronic equipment (e.g., programmable universalremote) of the entity into the portable unit (blocks 1410 and 1415). Asdescribed above, normally, the remote control transmission code(s) maybe stored in internal memory or tertiary device(s) of the portable unit.The portable unit prompts the user to enter a description for eachremote control transmission code(s) just received into the portable unit(block 1420). The user then enters a UserID and password, if desired(block 1425).

It is contemplated that the portable unit is loaded withsoftware/hardware for receiving, programming, storing, accessing andutilizing the remote control code(s) into protected areas of theinternal memory, tertiary devices and/or remote control transceiver. Itis also contemplated that the entity's computer and/or other electronicequipment will also be set up with appropriate software/hardware foruploading the remote control transmission code(s) into the portableunit.

FIG. 15 illustrates the various menu functions and features that will beadded to the portable unit for accessing and utilizing the remotecontrol transmission code(s). These menu functions may be associatedwith a selected menu shown on the display or may be provided through theimplementation of additional function keys and buttons on the portableunit.

In particular, an exemplary embodiment of a digital remote menu functionand sub-features added to the portable unit is shown. Various featuresand choices are provided under each new sub-function. When the userpresses the menu and selects a particular function or feature, theselected function or feature is entered or activated (blocks 1500, 1505,1510 and 1515). Each function or feature may have further sub-functionsand sub-features (blocks 1520). For example, the user may be givenvarious choices under the sub-function “activate digital remote” such asAuto, Garage, Home, Office and/or Other, for example (blocks 1510 and1520). Under each sub-function, the user may be given various choicessuch as a list of all autos whose remote control transmission code(s)are stored in the portable unit (blocks 1525). When the user enters theappropriate UserID and password for the selected sub-function andchoice, the selected remote control code is activated (blocks 1530 and1535).

Referring now to FIG. 16, an exemplary embodiment of the process ofaccessing and utilizing a remote control transmission code foropening/closing a remotely operated locking mechanism is shown. Ofcourse, the necessary remote control code(s) have been previouslydownloaded or programmed and stored in protected areas of internalmemory, tertiary device(s) and/or remote control transceiver as readonly file. The user scrolls down the menu function, selects the functiontitled, “digital remote” and presses the sub-function key(s) to activatethe appropriate remote control code (block 1600).

The portable unit optionally prompts the user to enter the appropriateUserID and password for the selected digital remote control transmissioncode (block 1605). If the UserID and password entered by the user doesnot match with the user information stored in internal memory and/ortertiary device(s), the portable unit will reject access and perhapsdisplay an alphanumeric message to denote that access is denied (blocks1610 and 1615). If the UserID and password matches with the stored userinformation, the portable unit prompts the user whether to transmit theselected remote codes locally or via wireless (block 1620). If the userchooses “local transmission”, the portable unit accesses the appropriateread-only, digital remote transmission control code(s) either frominternal memory and/or tertiary device(s) and transmits the code(s) tothe remote control transceiver (blocks 1625 and 1630). Of course, if theremote control transmission code(s) is stored within the remote controltransceiver, the software will authorize the remote control transceiverto release the remote control transmission code(s). When the remotecontrol transceiver releases the appropriate remote control transmissioncode(s), the locking mechanism (whether built into an automobiledoor/window, home/office door, garage door etc.) will transfer from anopen/unlocked state to a closed/locked state or alternatively from theclosed/locked state to the open/unlocked state.

If the user chooses “wireless transmission,” the portable unit willprompt the user to dial the telephone number that has connectivity tothe locking mechanism (block 1635). If a suitable telephone connectionis established, the processing unit will access the selected remotecontrol transmission code(s) from internal memory, tertiary device(s) orthe remote control transceiver and send the remote control transmissioncode(s) via the wireless transceiver and antenna to the lockingmechanism via the established telephone channel (blocks 1640 and 1645).The locking mechanism transfers from an open/unlocked state to aclosed/locked state or alternatively from the closed/locked state to theopen/unlocked state upon receipt of the appropriate remote controltransmission code(s) as shown in block 1650.

It is contemplated that the remote control transmission code(s) storedas digital data will be converted to the appropriate transmissionformats such as RF, IR, laser and the like, either by hardware and/orsoftware loaded in the portable unit (e.g., the remote controltransceiver). It is possible that the remote control transceiver may beconfigured to internally store all the remote control transmissioncode(s) rather than store it in the internal memory or tertiarydevice(s) of the portable unit. It should be appreciated that a numberof other techniques, processes and configurations can be easily devisedby people skilled in the art for downloading, programming, storing,accessing and utilizing these remote control transmission code(s) intothe portable unit for operating various locking mechanisms.

While certain exemplary embodiments have been described and shown in theaccompanying drawings, it is to be understood that such embodiments aremerely illustrative of and not restrictive on the broad invention, andthat this invention not be limited to the specific constructions andarrangements shown and described, since various other modifications mayoccur to those ordinarily skilled in the art.

What is claimed is:
 1. A method for transmitting information between ahand-held portable unit and an entity, comprising: verifying andauthenticating a user of the portable unit by the entity located at afirst location, the portable unit comprises internal memory including afirst area to contain user information; and uploading user informationinto the portable unit only after the user is verified and authenticatedby the entity, the user information being subsequently provided by theportable unit to a business entity located at a second location for useduring a transaction, the business entity being different than theentity.
 2. The method of claim 1, wherein the user information includesa drivers license number of the user and the method further comprisesprompting the user to select either displaying, downloading or printingthe user information where the display of the user information includesdisplaying a digital picture of the user, the drivers license number,name and physical characteristics of the user and the downloading of theuser information can be restricted to read-only.
 3. The method of claim2, wherein the user identification information further includes a cardnumber and an expiration date from the entity being a credit card issuerand the method further comprises downloading at least the card number tothe business entity for use during the transaction being a commercialtransaction.
 4. The method of claim 1, wherein the verifying andauthenticating of the user includes receiving for review useridentification information printed on a separate document.
 5. The methodof claim 1, wherein the uploading of the user information includesaccessing records stored on a computer of the entity and uploading theuser information into the portable unit via an input/output (I/O) portof the portable unit.
 6. The method of claim 5, wherein the uploading ofthe user information further includes transferring the information intothe first area of the internal memory being a protected memory area ofthe internal memory within the portable unit.
 7. The method of claim 5,wherein the uploading of the user information further includestransferring the information into the first area of the internal memorybeing a protected memory area of a tertiary device within the portableunit.
 8. The method of claim 1, wherein the uploading of the userinformation includes swiping a magnetic stripped card into a magneticcard reader, convening information stored within the magnetic strippedcard into digital information and uploading the digital information intothe portable unit via an input/output (I/O) port of the portable unit.9. The method of claim 1, wherein the uploading of the user informationfurther includes swiping a smart card into a smart card reader,convening information stored within the chip of the smart card intodigital information and uploading the digital information into theportable unit via an input/output (I/O) port of the portable unit. 10.The method of claim 1 further comprising prompting the user of theportable unit to set up at least one of a user identification and apassword after completion of the uploading of the information, the useridentification and the password being used to regulate access to theuser information within the first area of the internal memory.
 11. Themethod of claim 1 further comprising denying access to the informationif the user is unable to be verified and authenticated.
 12. The methodof claim 1, wherein the entity is one of a financial institution, agovernmental agency, a commercial enterprise, a non-profit enterpriseand a kiosk.
 13. The method of claim 1, wherein the establishing ofcommunications includes establishing an internet connection with a website of the entity.
 14. The method of claim 13, wherein the uploading ofthe user information includes uploading a file to an electronic mailaddress or web site accessible by the portable unit.
 15. The method ofclaim 1, wherein the uploading of the user information occurs over thewireless telephone link.
 16. The method of claim 1 further comprisinguploading of remote codes into the portable unit, if the user isverified and authenticated, includes accessing the remote codes storedon a computer of an entity and uploading the remote codes into theportable unit via an input/output (I/O) port of the portable unit. 17.The method of claim 16, wherein the uploading of the remote codesincludes accessing the remote codes stored on a computer of an entityand uploading the remote codes into the portable unit via aninput/output (I/O) port of the portable unit.
 18. The method of claim16, wherein the uploading of the remote codes includes uploading theremote codes from a universal programmable remote control.
 19. Themethod of claim 16, wherein the uploading of the remote codes includesmanually inputting the remote codes into the portable unit using thekeypad.
 20. The method of claim 16, wherein the remote codes include atransmission format including at least one of digital signals, one ormore analog signals modulated within a selected frequency range, seriesof infrared pulses, radio frequency, optical signals and laser.
 21. Themethod of claim 16, wherein the uploading of the remote codes includestransferring the remote codes into a protected memory area of aninternal memory within the portable unit.
 22. The method of claim 16,wherein the uploading of the remote codes further includes transferringthe remote codes into a remote control transceiver within the portableunit.
 23. A method comprising authenticating a user of a portable unit,the portable unit comprises a display, a wireless transceiver, aprocessing unit and a non-volatile memory contained within a casing; anduploading drivers license information into the portable unit for storagewithin the memory, the drivers license information includes a digitalpicture of the user, a user name and a drivers license number; andrestricting access to the drivers license information by displaying thedrivers license information on the display of the portable unit whenselected by the user or downloading the drivers license information withrestricted read-only viewing privileges.
 24. The method of claim 23,wherein the uploading of the drivers license information is stored in aprotected area of the memory.
 25. The method of claim 23 furthercomprising; prompting the user to set tip a user identification and apassword for accessing the drivers license information.
 26. The methodof claim 23, wherein the drivers license information is a read onlyfile.
 27. The method of claim 23, wherein the drivers licenseinformation further comprises a digital picture of a drivers license ofthe user.
 28. The method of claim 23, wherein the drivers licenseinformation farther comprises an age of the user, a date of birth of theuser, and an indication of corrective lenses.
 29. The method of claim23, further comprises selecting one of a plurality of options todownload the drivers license information, the plurality of optionsinclude (i) physical connectivity where an input/output port of theportable unit is connected to a device to receive the downloaded driverslicense information, and (ii) remote connectivity where the driverslicense information is transmitted to an Internet address.
 30. A methodcomprising: authenticating a user of a portable unit, the portable unitbeing a cellular phone that comprises a display, a wireless transceiver,a processing unit and a non-volatile memory contained within a casing;and uploading drivers license information and credit card informationfor storage within the non-volatile memory, the drivers licenseinformation includes a digital picture of the user, a user name and adrivers license number while the credit card information includes acredit card number and an expiration date; downloading the driverslicense information for verification of the user during a commercialtransaction after the drivers license information has been uploaded andstored; and displaying the drivers license information on the display ofthe portable unit upon request by the user after the drivers licenseinformation has been uploaded and stored.
 31. The method of claim 30,wherein the uploading of the drivers license information and the creditcard information is stored in a protected area of the memory, theprotected area of the memory precluding a user from accessing andaltering of either the drivers license information or the credit cardinformation.
 32. The method of claim 30, wherein the drivers licenseinformation is a read only file.