摘要:
A method for verifying that the expected components of a postage metering system includes alternate embodiments for verifying a PSD coupled to a host system is the expected PSD. The method further includes verifying the host system as the expected host system. A first message is encrypted in the PSD using a first cryptographic key to obtain a first encrypted message. The first encrypted message is sent to the host system which decrypts the first encrypted message using a second cryptographic key. The host system then encrypts a second message derived from the decrypted first encrypted message using the second cryptographic key. The host system then sends the encrypted second message to the PSD which decrypts the second encrypted message in the PSD using the first cryptographic key. The PSD compares the decrypted second encrypted message with the first message, and activates the PSD for processing transactions requested by the host system when the decrypted second encrypted message corresponds to the first message.
摘要:
A production mail system for producing a mailpiece including an inserter system for feeding a document in a path of travel and into an envelope. The document includes a control code printed thereon. The inserter includes a scanner located adjacent the path of travel for reading the control code on the document and a printer for printing a selected message on the envelope corresponding to the control code.
摘要:
A postage metering system includes a plurality of computers operatively connected as part of a computer network and operating as client computers on the computer network. At least one postal security device (PSD) is coupled to at least one of the client computers (local client computer). The PSD includes unique identification the ability to store postal value and generate digital signatures. The client computers function as a postage metering network wherein a client computer other than the local client computer (remote client computer) requests evidence of postage payment from the PSD for concluding a postage metering transaction. The local client computer functions as a meter server and the remote client computer functions as a meter client on the postage metering network. The remote client computer initiates a postage metering transaction in the PSD by sending a request for evidence of postage payment to the local client computer. The local client computer sends the request for the evidence of postage payment to the PSD, receives transaction information from the PSD and sends the evidence of payment to the remote client computer for subsequent printing.
摘要:
A method of issuing digital tokens in a open system meter includes the steps of sending a request for digital tokens and predetermined postal information, including addressee information, from a host processor to a vault that is operatively coupled to the host processor; calculating in the vault in response to the request for tokens at least one digital token using the predetermined postal information; debiting postal funds in the vault; issuing the digital token to the host processor; and storing the digital token and the predetermined postal information as a transaction record in the host processor for subsequent generation and printing of an indicia. The method further includes the steps of generating in the host processor an indicia comprising a graphical image of the digital token and the predetermined postal information and storing the indicia in the host processor; and printing the indicia on a mailpiece when requested.
摘要:
A method is provided for improving print quality for a 2-D bar code. The method includes determining printer type, including print resolution, for printer that will print 2-D bar code and entering paper type for the envelope. A suggested 2-D bar code module size is calculated based on the paper and the printer type. A test sample 2-D bar code is printed at the suggested 2-D bar code module size. The printed test sample is scanned and then evaluated for print quality and readability. The method can also suggest a 2-D bar code module size to the user.
摘要:
A control node for controlling a predetermined function in response to messages transmitted over a communications bus and for responding to a second class of such messages to exercise boundary-scan logic to test the control node. The boundary-scan logic is implemented in accordance with ANSI/IEEE Standard 1149.1. The second class of messages include Scan Command messages which contain data for controlling the state of the Test Access Port of the boundary-scan logic, Scan Test Data messages which transmit data to be loaded into the instruction registers or the test data registers of the boundary-scan logic, and Scan Results Request messages which control the node to return the test results over the communications bus.
摘要:
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination.
摘要:
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.
摘要:
A method and system for a virtual stamp dispensing metering system is provided wherein indicia of varying values are calculated at a data center and downloaded to a mailing machine on a periodic basis. The mailing machine securely stores the indicia and dispenses the indicia as needed. At the end of the period, any unused indicia are returned to the data center, the user's account is credited, and a new set of indicia are downloaded to the mailing machine. Accordingly, the processing requirements of the meter are reduced, as there is no longer any need to generate digital signatures, an attacker is prevented from generating indicia indefinitely if the security of the meter is compromised, as the cryptographic key is not resident at the meter, and tracking requirements of the meter are reduced, as the meter alone can not be used to generate postage funds.
摘要:
A signature scheme is provided in which a message is divided into a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion.