摘要:
A key control system comprises the generation of a first set of predetermined keys Kp red which are then used as master keys for a plurality of respective postage meters (12). The keys are then related to a respective meter (12) in accordance with a map or algorithm. The predetermined master key K pred is encrypted with the date to yield a date dependent key K dd related to the respective meter (12). The date dependent key is encrypted with a unique identifier or the respective meter to yield a unique key K final that is by the respective meter to generate digital tokens. The Data Center (16) encrypts the date with each predetermined key K pred to yield a table of dependent keys K dd 's. The table of K dd 's are distributed to verification sites. The verification site reads a meter's identification from a mailpiece being verified to obtain the dependent key K dd of the meter (12). The verification side (34) encrypts the dependent key K dd with the unique identifier to obtain the unique meter key which is used to verify tokens generated by the meter (12). In the preferred embodiment, the master key K pred , the date dependent key K dd , and the unique key K final , in the meter are stored in the meter. In the alternate embodiment, the master key K pred is encrypted with a unique meter identifier to obtain and the unique key K final which is stored in the meter (12). The meter then generates its date dependent key K dd , which is used to generate digital tokens.
摘要:
A key control system comprises the generation of a first set of predetermined keys K pred which are then used as master keys for a plurality of respective postage meters (12). The keys are then related to a respective meter (12) in accordance with a map or algorithm. The predetermined master key K pred is encrypted with the date to yield a date dependent key K dd related to the respective meter (12). The date dependent key is encrypted with a unique identifier or the respective meter to yield a unique key K final that is by the respective meter to generate digital tokens. The Data Center (16) encrypts the date with each predetermined key K pred to yield a table of dependent keys K dd 's. The table of K dd 's are distributed to verification sites. The verification site reads a meter's identification from a mailpiece being verified to obtain the dependent key K dd of the meter (12). The verification side (34) encrypts the dependent key K dd with the unique identifier to obtain the unique meter key which is used to verify tokens generated by the meter (12). In the preferred embodiment, the master key K pred , the date dependent key K dd , and the unique key K final , in the meter are stored in the meter. In the alternate embodiment, the master key K pred is encrypted with a unique meter identifier to obtain and the unique key K final which is stored in the meter (12). The meter then generates its date dependent key K dd , which is used to generate digital tokens.
摘要:
A system and method that can detect tampering with and verify the authenticity of data capture data in a value dispensing system (10) is provided. Audit records are generated at the beginning and end of an audit period that include register values, a time stamp, and a digital signature. The audit records and data capture data are sent to a data center (40) for signature verification and reconciliation of the value dispensing system usage by comparing the register values from the audit records with the values as contained within the data capture data for the audit period. If there are no discrepancies, the data capture data is deemed to be accurate and the data can be utilized to prepare reports with a high degree of certainty that it accurately reflects the actual usage of the value dispensing system (10).
摘要:
Systems and methods are disclosed for authenticating electronic messages. A data structure is generated by a computer server which allows for the authentication of the contents and computer server identity of a received electronic message and provides a trusted stamp to authenticate when the message was sent. Data which can authenticate the message, the computer server identity, and the time the message was sent is included into a data structure which is called an Electronic PostMark (EPM).
摘要:
A system (10) for controlling the validity of printing of indicias on mailpieces from a potentially large number of users of postage meters (12) includes apparatus disposed in each said postage meter for generating a code and for printing the code on each mailpiece. The code is an encrypted code representative of the postage meter apparatus printing the indicia and other information uniquely determinative of the legitimacy of postage on the mailpieces. The keys (40, 42) for the code generating apparatus are changed to change its code generation at predetermined time intervals in each of the meters (12). A security center (16) includes apparatus for maintaining a security code database (30) and for keeping track of the keys for generating security codes in correspondence with the changes in each generating apparatus and the information printed on the mailpiece by the postage meter apparatus (12) for comparison with the code printed on the mailpiece. There may be two codes printed, one used by the Postal Service for its security checks and one by the manufacturer (22). The encryption key may be changed at predetermined intervals or on a daily basis or for printing each mailpiece.