摘要:
In a franking system (100), a postal security device (PSD) (110) is used to account for postage dispensation, and generate digital signatures (738) for inclusion in postage indicia to authenticate the postage indicia. In accordance with the invention, the PSD (110) includes multiple crypto processors (225-1, 225-2, ... 225-N) which participate in franking transactions and generate the digital signatures (738) in a multiplex manner. Each crypto processor (225-1, 225-2, ... 225-N) verifies the accounting of postage dispensation leading to and including the transactions in which the crypto processor (225-1, 225-2, ... 225-N) participates. In addition, the crypto processors (225-1, 225-2, ... 225-N) re-create transaction records and store them therein in a distributed manner (745).
摘要:
In an improved electronic postage scale system, non-key-board devices are used to select shipping service options provided by the system. For example, a bar-code scanner, a voice-recognition device or a remote computer is configured to emulate keycodes from the system keyboard and can be operatively connected through a keyboard interface to select shipping options.
摘要:
In an improved electronic postage scale system, non-key-board devices are used to select shipping service options provided by the system. For example, a bar-code scanner, a voice-recognition device or a remote computer is configured to emulate keycodes from the system keyboard and can be operatively connected through a keyboard interface to select shipping options.
摘要:
In an improved postage scales system, soft-selection keys are used for selecting options including shipping service options provided by the system. The soft keys are multi-function, being assigned a function according to previous selections input through the soft keys. A changeable indication of the function of each soft key appears on teh screen in alignment therewith. The system is capable of interfacing and communicating with other devices such as a printer, a remote computer, an optical scanner, an integrated circuit (IC) card, etc. Certain data and code for use in the system can be updated by downloading new data and code from IC cards to the system. A security measure is instituted such that, after an update of the data or code, a system user is required to enter a valid authorization number in order to enable the system. Such a measure is, in part, necessary for deterring unauthorized copying of software of the system onto another similar system.
摘要:
In an improved postage scales system, soft-selection keys are used for selecting options including shipping service options provided by the system. The soft keys are multi-function, being assigned a function according to previous selections input through the soft keys. A changeable indication of the function of each soft key appears on teh screen in alignment therewith. The system is capable of interfacing and communicating with other devices such as a printer, a remote computer, an optical scanner, an integrated circuit (IC) card, etc. Certain data and code for use in the system can be updated by downloading new data and code from IC cards to the system. A security measure is instituted such that, after an update of the data or code, a system user is required to enter a valid authorization number in order to enable the system. Such a measure is, in part, necessary for deterring unauthorized copying of software of the system onto another similar system.
摘要:
In an improved postage scales system, soft-selection keys are used for selecting options including shipping service options provided by the system. The soft keys are multi-function, being assigned a function according to previous selections input through the soft keys. A changeable indication of the function of each soft key appears on teh screen in alignment therewith. The system is capable of interfacing and communicating with other devices such as a printer, a remote computer, an optical scanner, an integrated circuit (IC) card, etc. Certain data and code for use in the system can be updated by downloading new data and code from IC cards to the system. A security measure is instituted such that, after an update of the data or code, a system user is required to enter a valid authorization number in order to enable the system. Such a measure is, in part, necessary for deterring unauthorized copying of software of the system onto another similar system.
摘要:
In an improved postage scales system, soft-selection keys are used for selecting options including shipping service options provided by the system. The soft keys are multi-function, being assigned a function according to previous selections input through the soft keys. A changeable indication of the function of each soft key appears on teh screen in alignment therewith. The system is capable of interfacing and communicating with other devices such as a printer, a remote computer, an optical scanner, an integrated circuit (IC) card, etc. Certain data and code for use in the system can be updated by downloading new data and code from IC cards to the system. A security measure is instituted such that, after an update of the data or code, a system user is required to enter a valid authorization number in order to enable the system. Such a measure is, in part, necessary for deterring unauthorized copying of software of the system onto another similar system.
摘要:
In an improved postage scales system, soft-selection keys are used for selecting options including shipping service options provided by the system. The soft keys are multi-function, being assigned a function according to previous selections input through the soft keys. A changeable indication of the function of each soft key appears on teh screen in alignment therewith. The system is capable of interfacing and communicating with other devices such as a printer, a remote computer, an optical scanner, an integrated circuit (IC) card, etc. Certain data and code for use in the system can be updated by downloading new data and code from IC cards to the system. A security measure is instituted such that, after an update of the data or code, a system user is required to enter a valid authorization number in order to enable the system. Such a measure is, in part, necessary for deterring unauthorized copying of software of the system onto another similar system.