摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier. The carrier service as part of issuing the unique identification may: charge the mailer's account of other fund depository for the carrier service charges associated with the mailpiece; and/or, assign a destination delivery code; and/or, provide address hygiene for the mailpiece; and/or change of address processing. When the unique identifier is obtained from the mailpiece, a delivery point destination code may be printed on the mailpiece, based on the corrected address. As an alternative, the destination delivery code may be provided to the mailer with the unique mailpiece identifier to be printed on the mailpiece by the mailer. Various cryptographic techniques may be employed to authenticate the mailer and the carrier service and to protect the transmitted information between the parties. The payment for the carrier services can be implemented prior in time to the entry of the mailpieces to the carrier service mailstream. Unauthorized mailpieces may be out sorted early in the carrier service processing procedure.
摘要:
A method of manufacturing a secure box in a Key Management System that includes a plurality of functionally distinct secure boxes initializes a first manufacturing box if one does not exist. The method creates in a manufacturing box at least one logical security domain including encryption keys needed to perform Key Management System processes within the domain, and provides a target secure box with the capability to perform at least one Key Management System function from a plurality of functions required by the Key Management System. The method authenticates the target secure box to the manufacturing box, installs a unique secure box identification in the target secure box, and creates at least one logical security domain in the target secure box corresponding to a logical security domain in the manufacturing box. The method sends a command from a Key Management System computer to initialize the target secure box to perform a domain process for at least one of Key Management System functions provided within the target secure box, and initializes the target secure box in each domain process indicated in the command from the Key Management System computer. The method installs in the target secure box the encryption keys required to perform a key generation process within the domain. For example, target secure box may be provided with at least one of a key verification function, a key installation function, a token verification function, a key registration function, or a secure box manufacturing function.
摘要:
A closed loop postage metering system includes networked meters that provide mailers and/or recipients the capability to request additional or modified services during processing of a mail piece by a carrier. The networked meter allows the Post to charge the mailer, or even the recipient for these services or to provide them with a refund or credit. The services can include changing the processing of the mail piece. Further, the closed loop postage metering system enables more precise methods of paying for services when multiple carriers handle a mail piece. A special case of such multiple carriers handling is the handling of international mail.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier. The carrier service as part of issuing the unique identification may: charge the mailer's account of other fund depository for the carrier service charges associated with the mailpiece; and/or, assign a destination delivery code; and/or, provide address hygiene for the mailpiece; and/or change of address processing. When the unique identifier is obtained from the mailpiece, a delivery point destination code may be printed on the mailpiece, based on the corrected address. As an alternative, the destination delivery code may be provided to the mailer with the unique mailpiece identifier to be printed on the mailpiece by the mailer. Various cryptographic techniques may be employed to authenticate the mailer and the carrier service and to protect the transmitted information between the parties. The payment for the carrier services can be implemented prior in time to the entry of the mailpieces to the carrier service mailstream. Unauthorized mailpieces may be out sorted early in the carrier service processing procedure.
摘要:
Radio frequency identification tags are placed on mail contained in trays or tubs to locate and reroute mail that is misdirected, i.e., being routed to the incorrect destination. The method involves the carrier reading the identifying information contained in the radio frequency identification tags on each mail piece while each mail piece is in the trays or tubs and removing one or more mail pieces in the tray or tub that are to be routed differently than that routing information contained on the outside of the trays or tubs.
摘要:
A method for controlling a postage metering system (1) defines a first set of postage parameters P1, P2, P3 to Pn associated with the generation of postage evidence in a postage metering system (10) and then initializes the postage metering system (10) with a subset of the first set of postage parameters F1, F2, F3 to Fn. The subset F1, F2, F3 to Fn defines a combination of the postage parameters for which the generation of postage evidence is not authorized. When a request for postage evidence is received, the request includes a second set of postage parameters P1, P2, P3 to Pn that are combined to form a postage parameter vector (PPV). The generation of postage evidence is inhibited when at least one of the postage parameters P1, P2, P3 to Pn in the second set matches one of the postage parameters in the first set F1, F2, F3 to Fn. When none of the postage parameters P1, P2, P3 to Pn in the second set matches one of the postage parameters in the first set F1, F2, F3 to Fn the requested postage evidence is generated. In an alternative method the subset defines a combination of the postage parameters for which the generation of postage evidence is authorized, and the requested postage evidence is generated when each of the postage parameters in the first set matches one of the postage parameters in the second set.
摘要:
A method and system for providing services to a mail delivery point are presented. According to the method, a delivery point identifier is acquired from a device located at the delivery point. Then, delivery point data is accessed corresponding to the delivery point identifier, and mail delivery services are provided in response to the delivery point data. The delivery point data are modifiable by a recipient who receives physical mail at the delivery point, and the delivery point data includes recipient preferences.
摘要:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
摘要:
Methods for generating and reading a two-dimensional barcode comprised of a number of data modules for storing a first encoded set of binary data and a second encoded set of binary data. The first set of binary data is encoded using a first data module size and the second set of binary data is encoded using a second data module size, wherein the first data module size is larger than the second data module size. Mail metering and verification systems for implementing the methods are also disclosed.