摘要:
An envelope used in voting by mail includes a signature area on which the signature is affixed and a concealing portion structured to cover the signature area thereby concealing the signature. The concealing portion includes a concealing layer that is preferably positioned on top of a protective layer. The protective layer is positioned between the signature area and the concealing layer when the concealing portion covers the signature area. The concealing layer is formed from a material that is normally opaque but becomes at least partially transparent when one or more chemicals are applied to the concealing layer. The protective layer protects the signature from the one or more chemicals since the protective layer is impermeable to the one or more chemicals.
摘要:
A vote-by-mail return envelope that includes a pouch portion for containing the ballot and a stub portion on which the voter applies his/her signature and method for processing are provided. Each portion of the envelope contains a respective barcode that identifies the respective portion. When the envelope is received at the vote-counting location, the stub is separated from the pouch, thereby separating the voter's signature, name, etc. from the ballot. The signature is then verified from the stub, and subsequent processing of the pouch uses the pouch barcode identifier as a link to the stub barcode identifier and/or to the result of the signature verification, to determine whether the ballot in the pouch is eligible for counting or whether some remedial procedure is necessary.
摘要:
Print quality is ensured in a postage meter system employing an ink system and having settable modes of printing operation by detecting the type of ink system employed in the postage meter system, setting a first mode of printing operation for the postage meter system when the detected ink system is of a first type and setting a second mode of printing operation for the postage meter system when the detected ink system is of a second type. The detected information may be communicated to a data center to obtain modes of operation for the postage meter system and other corrective actions may be implemented. The method and system are applicable to other consumable item systems employing various types of consumable items.
摘要:
A monitoring system for a corporate network includes a client that exchanges information with a target server to establish an SSL communication channel through which cryptographically protected data is exchanged between the client and the target server using an SSL protocol and a monitoring server through which the cryptographically protected data is routed as part of its exchange between the client and the target server. The client sends enabling data to the monitoring server that enables the monitoring server to read the cryptographically protected data received at the monitoring server as decoded cryptographically protected data. The monitoring server also analyzes the decoded cryptographically protected data to determine if it is suspect data, and at times when the monitoring data determines that the decoded cryptographically protected data is suspect data the monitoring server prevents the transmission of the cryptographically protected data between the client and the target server.
摘要:
A system and method are described for establishing and managing a vendor inventory of emergency business supplies for a business. The vendor is compensated for costs of maintaining the inventory. The business supplies are released periodically, for discount sale, after they have been in the vendor inventory for a period of time expiring when a release condition occurs. The vendor inventory is then restocked, and the vendor is compensated at least partially for the discount provided in the discount sale.
摘要:
A system, method, and medium, the method including receiving parameter information associated with a mailer, associating the parameter information with a mailing, receiving statistical information, the statistical information including historical performance data of at least one carrier, determining a delivery sequence for the mailing based on the received mailer parameter information and the statistical information, and outputting the determined delivery sequence for the mailing.
摘要:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
摘要:
A method, and deterministic random bit generator system operating in accordance with the method, for generating cryptographic keys and similar secret cryptographic inputs which are hard to guess. A seed is input from an entropy source; and an initial state is generated as a function of the seed. When a request to generate a cryptographic key is received a current state, where the current state is initially the initial state, is mixed to generate an out put string and a next state and the current state is set to the next state. The requested cryptographic key is generated from the string; and output. These steps can be repeated to generate successive output strings with assurance of forward and backward secrecy. An encryption system including such a generator is also disclosed.
摘要:
A method and deterministic random bit generator system operating in accordance with the method, for generating cryptographic keys and similar secret cryptographic inputs which are hard to guess. A entropy is input from an entropy source; and an initial seed is generated as a function of the entropy input. When a request to generate a cryptographic key is received a temporary seed is generated by applying the function to the seed. The requested cryptographic key is generated by applying a second function to the temporary seed; and output. A new seed is then generated by applying a third function to the temporary seed. In one embodiment of the subject invention all three functions are carried out by applying the same operator to appropriate inputs. In another embodiment of the subject invention new entropy is incorporated into the seed from time to time.
摘要:
A method includes scanning a check to generate image data representative of an image of the check. The method further includes detecting at least one security feature of the check. The method also includes transforming the image data to include at least one encoded indication of the detected at least one security feature of the check.