摘要:
Fraud detection mechanisms and methods that are adapted for inconsistent data collection are provided. Data is analyzed to determine normal operational variations from ideal system behavior. Profiles are developed for each individual sender, e.g., the number of multiple scans performed per confirmation number generated by each sender, and other parameters, such as delivery areas, e.g., the number of multiple scans performed per specific geographic area. If the sender's profile differs significantly from the normal operational variations, there is an indication of potential fraudulent activity and an investigation can be initiated. By analyzing a combination of sender and delivery scan data with system wide scan data, the effect of inconsistent data is minimized to significantly reduce the number of erroneous indications of fraudulent activity while still providing a high level of fraud detection.
摘要:
A printing system is provided that dynamically adjusts the method of printing an image based on the lightness or darkness of the medium upon which the image will be printed. The reflectivity of the medium upon which an image is to be printed is determined, and the way in which the image will be printed is adjusted based on the determined reflectivity of the medium. For lighter colored mediums, on which sufficient contrast will be provided, the image can be printed directly onto the medium. For darker colored mediums, on which the ink used to print the image will not provide enough contrast with respect to the medium to produce a reliably readable image, the method of printing the image is modified to ensure that sufficient contrast is always provided to produce a reliably readable image.
摘要:
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination.
摘要:
An authentication method based on the use of an inanimate physical object that includes storing first object data in a storage medium, wherein the first object data is generated based on a first image of at least a portion of the physical object, capturing a second image of the at least a portion of the physical object, and generating second object data based on the second image. The method further includes searching the storage medium and determining that the second object data and the first object data are a match, and authenticating an individual associated with the physical object in response that determination. Also provided are embodiments of an authentication system that may be adapted to implement the method.
摘要:
Systems and methods for providing secure digital mail document storage, retrieval and use in a cloud computing environment, such as by advantageously configuring a hybrid cloud computing environment are described. In one, a privately hosted data processing system includes a private key and a PKI decryption subsystem, and a publicly hosted data processing system includes a symmetric key decryption subsystem, wherein digital documents are encrypted by a corresponding individual symmetric key and each of the symmetric keys is encrypted by a public key associated with the private key. In another configuration, document decryption is handled differently depending upon the type of client making the request.
摘要:
A method and system for processing and printing shipping labels having postage is described. In one configuration a postage dispensing system allows a shipping label reprint for a relatively short period of time. In another configuration, the system offers a refund after the second unsuccessful print attempt and logs the label identifier as an invalid identifier. If the print is successful, the identifier is logged as a successful identifier. The system occasionally receives identifiers that have been processed in the mail stream and reports fraud if an unexpected identifier is present.
摘要:
A method facilitating a transaction between a camera-phone user and a business entity. The business entity produces a printed medium indicating a transaction. The printed medium includes a barcode that includes direct contact data for communicating with the business entity. The barcode further includes specific transaction data relating to the transaction in the printed medium. Using the digital camera feature, the user captures a digital image of the barcode. The camera-phone is programmed to decode the digital image to retrieve the direct contact data and the transaction data embedded in the barcode. The camera-phone then automatically initiates a direct communication with the business entity via the mobile communications device using the decoded direct contact data. Once communications are established, the camera phone further transmits the transaction data derived from the barcode to further facilitate the transaction. The barcode includes an encrypted digital signature that can be used by the camera-phone to authenticate the identity of the business entity that created the printed medium.
摘要:
A method that allows taxing jurisdictions to collect sales and/or use taxes from sales that are made via the internet and catalogs. The method also makes it easier for sellers to comply with the taxing jurisdiction's mandated seller administrative functions. The foregoing is accomplished by using an agent to perform the sales tax administration functions of a seller, relieving the seller of as much of the burden of compliance as possible.
摘要:
A mail piece verification system for processing a mail piece having associated therewith mail piece data includes an incoming mail processing center, an outgoing mail processing center located downstream from the incoming mail processing center and a data center in operative communication with the incoming mail processing center and the outgoing mail processing center. The incoming mail processing center receives the mail piece, obtains the mail piece and uploads the mail piece data to the data center. The data center performs a verification check on the mail piece data and downloads instructions based upon the verification check to the outgoing mail processing center. The outgoing mail processing center uses the instructions to process the mail piece.
摘要:
A mail handling system for handling mail pieces in a mail handling area is presented. The system avoids breaching confidentiality of the mail pieces, and includes a view port device, for providing filtered visual access to a portion of the mail handling area while at least some information contained in the mail pieces is filtered out. The system also includes a manual access area, for allowing manual access to the mail handling area while unfiltered visual access to the mail handling area is obstructed.