摘要:
The present invention provides a method for verifying an unreadable information-based indium that has been generated by a postal security device (PSD) for information-based indium comprising a 2-D bar code, certain human-readable information, a digital signature and a certificate. The method comprises the steps of attempting to read the 2-D bar code using sophisticated digital image processing when the 2-D bar code is not readable; and continuing normal processing when the 2-D bar code is readable with the sophisticated digital image processing. When the 2-D bar code is not readable two independent processes are used to determine the indicium certificate. A first process includes reading human readable information by optical character recognition using context, syntax, and redundancy in the human readable information to obtain a PSD-ID; and using the PSD-ID to look up in a certificate database a certificate corresponding to the information-based indicium. A second process includes interpreting partial bar code data and extracting a “best guess” of the certificate and searching the certificate database for the closest matching certificate. The method further comprises merging data obtained from the two processes and attempting to reconstruct bar code data from the merged data. If the merged data is sufficient, an attempt is made to verify the digital signature obtained from the merged data. If the signature is verified, normal processing is resumed. If the merged data is insufficient or if the signature is not verified, a suspect mailpiece record is created.
摘要:
A method for controlled acceptance mail accounting and evidencing, includes creating a mail batch including at least one mail piece having an encrypted indicia printed thereon. The encrypted indicia is generated by the use of a key K.sub.m. A statement of mailing file is created containing data related to the mail batch. The statement of mailing file including the key K.sub.m is encrypted with a public key of an authentication unit of a carrier distribution system. The public key has an associated private key. The mail batch and the statement of mailing file is submitted to the carrier distribution system and the mail batch and the mail documentation file is processed using the private key of the authentication unit of the carrier distribution system to decrypt the encrypted information and recover the K.sub.m. The key K.sub.m is then used in an authentication procedure related to the mail batch. The statement of mailing file may be sent in tangible form or in electronic form to the carrier distribution system. A plurality of public keys of a plurality of authentication units may be available for encryption of the statement of mailing file including the key K.sub.m. The encryption process may be implemented separately with different public keys of different authentication units when it is not yet determined which authentication unit will perform the processing. This provides greater flexibility in the selection of the authentication unit to process the mail and achieve systems efficiency.
摘要:
System and method for securely backing up and reliably retrieving vault data in a metering system that includes a host processor operatively coupled to a vault. Whenever a transaction is completed by the vault, the vault cryptographically signs the vault data, including ascending register, descending register and piece count and sends the cryptographically signed vault data to the host processor where it is stored in a data file assigned to the vault. Each storage of the cryptographically signed vault data is indexed to create a historical log of vault transactions. If the vault is lost or damaged so that vault data cannot be retrieved from the vault, the cryptographically signed vault data is retrieved from the host processor data file and verified.
摘要:
A method for controlling keys used in the verification of encoded information generated by a transaction evidencing device and printed on a document comprises the steps of generating a plurality of random verifier master keys to obtain a set of verifier master keys consisting of a fixed number of keys; generating at least one pointer by applying a psuedorandom algorithm to data unique to the transaction evidencing device; calculating a plurality of verifier token keys to obtain a verifier token key set corresponding to the set of verifier master keys; encrypting the verifier token key set with a privacy key; and distributing the set verifier token keys and the privacy key to verifiers. The token keys are a function of the verifier master keys and a code valid for a limited time. The pointer algorithm is an appropriate symmetric key cryptographic algorithm and the code is function of a date dependent parameter. The master keys are distributed to postal and vendor data centers.
摘要:
A method for mail payment evidencing includes processing a collation of mail where the collation is one of a series of mail collations being created. Payment rating parameters are determined for carrier services to be associated with the mail collation in process. It is determined if a previously generated digital token associated with a previous mail collation which was not completed is suitable for use on said mail collation in process. The previously generated digital token is utilized for the mail collation in process if the previously generated digital token is suitable for use on said mail collation in process. The created mail collations may be submitted to a carrier service with a digitally signed statement of mailing.
摘要:
A method for controlled acceptance mail payment and evidencing in accordance with the present invention includes creating a mail batch with a plurality of mailpieces each having encrypted indicia printed thereon. A mail documentation file is created containing the total weight of the mail batch, the total payment for the mail batch and mailer identification, all of which are digitally signed to facilitate a subsequent verification of the integrity of the data. The digital signature is included as part of the mail documentation file. The mail batch and mail documentation file are submitted to a carrier distribution system. The carrier processes the batch of mail and the mail documentation file as part of the carrier distribution process to determine the total weight of the batch of mail and verify the weight of the actual batch of mail in comparison to the total weight of the batch of mail as set forth in the mail documentation file.
摘要:
The method and apparatus for verifying that the correct postage has been paid includes a mail processing machine which is adapted to receive properly oriented mail via a transport from a facet apparatus. The mail processing machine includes a scale for weighing a mailpiece having postage affixed thereto for the purpose of cancelling it with a mark which includes the actual postage which should be affixed. In a further embodiment other information necessary to calculate the necessary postage is obtained by reading the information from the mailpiece. Any discrepancies between the postage affixed and the amount of postage which should actually be paid may be noted at acceptance or seen by the carrier as the mail is delivered. A batch of mail may be sampled to select representative mailpieces in a random manner and verified to compare the calculated total of postage required based on the sample to the postal amount paid for the batch by the sender.
摘要:
The method and apparatus for verifying that the correct postage has been paid includes a mail processing machine which is adapted to receive properly oriented mail via a transport from a facer apparatus. The mail processing machine includes a scale for weighing a mailpiece having postage affixed thereto for the purpose of cancelling it with a mark which includes the actual postage which should be affixed. In a further embodiment other information necessary to calculate the necessary postage is obtained by reading the information from the mailpiece. Any discrepancies between the postage affixed and the amount of postage which should actually be paid may be noted at acceptance or seen by the carrier as the mail is delivered. A batch of mail may be sampled to select representative mailpieces in a random manner and verified to compare the calculated total of postage required based on the sample to the postal amount paid for the batch by the sender.
摘要:
Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.
摘要:
A method that enables the post to deliver letters, flats, post cards and packages (mail) addressed to a recipient's virtual post office box and then to be delivered directly to the recipient. The process enables individuals or entities to rent a virtual post office (VPO) box i.e., a box that does not physically exist, from the post office (“post”). Mail addressed to the virtual post office box would be captured by the post during the post's sortation process and rerouted to the specified address of the renter of the virtual post office box.