摘要:
System and method for performing cryptographic operations include providing at least one processor for performing cryptographic operations, memory coupled to the processor for use in performing the cryptographic operations; and a storage component coupled to the processor for storing and retrieving information calculated and used in the cryptographic operations. The processor, memory and storage component are securely enclosed whereby direct access to the cryptographic operations is prevented. A first power source, which is external to the secure enclosure, is coupled to and supplies power to the processor, the memory and the storage component. A second power source, which is internal to the secure enclosure, is coupled to and supplies power to at least the processor. A switch is included for switching from the first power source to the second power source when the cryptographic operations are being performed and for switching from the second power source to the first power source when non-cryptographic operations are being performed.
摘要:
A system includes an accounting register; structure for creating and attaching a digital signature to a message; a memory having stored therein a plurality of different indemnification provisions and a plurality of different service rates each associated with a corresponding one of the plurality of different indemnification provisions; apparatus for selecting and associating a specific one of the plurality of different indemnification provisions to the digital signature; and a device for adjusting the accounting register, wherein at times when the specific one of the plurality of different indemnification provisions has been selected and associated with the digital signature the adjusting device accounts for a one of the plurality of different service rates that corresponds to the specific one of the plurality of different indemnification provisions.
摘要:
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.
摘要:
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination.
摘要:
A signature scheme is provided in which a message is divided into a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.
摘要:
A method and system that enables the accurate identification of the originator of a mail piece within a corporate mail room environment is provided. Each person that generates mail items is provided with tracking information to be placed on each mail item. The tracking information can include, for example, an employee identification number, an equipment identification number and a unique sequence number. When the mail item is received in the corporate mail room, the tracking information is scanned and the tracking information is associated with a unique aspect of the mail item. Utilizing the tracking information associated with each mail item, the ambiguity of origination of each mail item is removed as there is now a verifiable record of the originator and/or originating equipment.
摘要:
A method for auditing postage dispensing transactions at a postal facility includes the steps of: receiving in a secure processor based device a request to dispense an amount of postage; updating, in response to the request, accounting data within the secure processor based device to account for the amount of postage; cryptographically securing the updated accounting data in the secure processor based device; dispensing the amount of postage by generating and applying the cryptographically, secured, updated accounting data to a mailpiece. The method further includes receiving cash value for the amount of postage dispensed; sending from the secure processor based device to an administrative computer a cryptographically secure message including the updated accounting data; obtaining and comparing, at the administrative computer, the updated accounting data from the secure message with the cash value received and previous updated accounting data received from a previous secure message from the secure processor based device, and determining if any inconsistencies exist based on the comparing; and obtaining and analyzing, at a funds management computer, the updated accounting data from the mailpiece and the updated accounting data from the secure message and determining if any inconsistencies exist based on the analyzing. An apparatus incorporates the method.
摘要:
A system (10) and method of evidencing postage payment include a local postage printing system (20, 22) requesting to a remote data metering center (30) for the generation of postage evidencing information (220, 320). The request includes a postage amount to be printed on a mail piece. The remote data metering center (30) determines a postal origin (220, 320) corresponding to the request for postage evidencing information (220, 230), then accounts for the postage amount in a general account (220, 320) corresponding to the local postage printing system (20, 22) and in a payment account corresponding to the determined postal origin (240, 340). The remote metering center (30) generates postage evidencing information (220, 320) in response to the request. The postal evidencing information includes a digital token and the determined postal origin (220, 320). The remote data metering center (30) sends the postage evidencing information to the local postage printing system (20, 22) which prints the postage evidencing information and the determined postal origin on the mail piece.
摘要:
A mail piece verification system for processing a mail piece having associated therewith mail piece data includes an incoming mail processing center, an outgoing mail processing center located downstream from the incoming mail processing center and a data center in operative communication with the incoming mail processing center and the outgoing mail processing center. The incoming mail processing center receives the mail piece, obtains the mail piece and uploads the mail piece data to the data center. The data center performs a verification check on the mail piece data and downloads instructions based upon the verification check to the outgoing mail processing center. The outgoing mail processing center uses the instructions to process the mail piece.
摘要:
System and method for providing confirmation relating to the distribution of a mailpiece within a mailing system includes a determination of postal data required for postage evidencing of a mailpiece originated by a mailer. The postal data is combined with other data related to value-added services desired for the mailpiece. The value-added services data includes addressing information for a return receipt to the mailer. A digital postmark which includes the postal data and the value-added services data is created. At delivery of the mailpiece, the digital postmark is read and the value-added services data is captured from the read digital postmark. A confirmation message is sent to the mailer and/or other interested third parties, in accordance with information contained in the value-added services data.