摘要:
A method of printing modules for a two dimensional barcode that includes printing a pixel at a plurality of the pixel locations included in the inner portion of the darkened module, and printing a pixel at less than all of the pixel locations of the outer boundary of the darkened module. Various embodiments are contemplated, such as, without limitation, methods that print darkened modules having four light corners, three light corners, two light corners, one light corner, and/or one light edge. Also, a method of printing a two dimensional barcode having a finder pattern wherein the inner edge of the finder pattern is light, meaning that is does not include any printed pixels at the pixel locations along the inner edge.
摘要:
The number of dots per inch or resolution may be specified within a image on a document or within a postal indicia and later checked to determine if the image or document or the postal indicia has the correct resolution. The foregoing is accomplished by specifying that the image on the substrate will be printed with n plus m dots per inch; rotating a ink jet head having n nozzles per inch about a axis parallel to a substrate by an angle &thgr; so that the ink jet head will produce an image on the substrate having (n/cos &thgr;) dots per inch; storing in a data center that the specified image will be printed with (n/cos &thgr;) dots per inch; analyzing the image to determine if the image has (n/cos &thgr;) dots per inch; and comparing the number of dots per inch in the analyzed image with the number of dots per inch stored for the specified image to determine if they have the same number of dots per inch.
摘要:
A ferromagnetic marker for an electronic surveillance system is magnetically biased so that the magnetic fields of two different regions thereof extend in different direction, e.g. in opposite directions.
摘要:
A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via the link utilizing a Nonlinear Feedback Shift Register (NLFSR) based system is provided. A NLFSR is provided in each of the accounting unit and printing unit of a metering system. The NLFSR in the accounting unit is utilized to generate a message authentication code (MAC) for the image data being sent from the accounting unit to the printing unit. The printing unit generates a corresponding MAC for the received image data using the NLFSR in the printing unit. The MAC generated by the printing unit is compared with the MAC generated by the accounting unit. If the MACs are similar, the image data is accepted as authentic and the printing unit will print the image corresponding to the image data.
摘要:
A method of printing an image having a graphic security element included therein includes receiving main image data representing a main image, receiving graphic security element data representing a graphic security element to be included in the main image, receiving a request to print the main image, responsive to receiving the request to print the main image, determining particular pixels of the main image data that are to be shifted based on the graphic security element data, and causing a plurality of ink deposits to be deposited on the print medium based on the main image data including causing the position of each of the ink deposits on the print medium that is determined to correspond to shifted pixels to be shifted relative to a normal position that would normally result from the main image data. Also, system that implements the method is provided.
摘要:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
摘要:
A printing system for printing both secure value documents and non-secure documents while ensuring that fraudulent copies of secure value documents printed by the printing system can be detected is provided. The printing system determines if the source is a secure or non-secure source. If the source of the image is a secure source, it will print the image, including any graphic security features. If the source is a non-secure source, before printing the image a filter is applied to the image data to remove any graphic security features included in the received image and/or the printing system will not add any graphic security features to the received image to ensure that the printed image will not contain any copy detection graphic security features.
摘要:
A system for controlling the validity of printing of indicias on mailpieces from a potentially large number of users of postage meters includes apparatus disposed in each said postage meter for generating a code and for printing the code on each mailpiece. The code is an encrypted code representative of the postage meter apparatus printing the indicia and other information uniquely determinative of the legitimacy of postage on the mailpieces. The keys for the code generating apparatus are changed to change its code generation at predetermined time intervals in each of the meters. A security center includes apparatus for maintaining a security code database and for keeping track of the keys for generating security codes in correspondence with the changes in each generating apparatus and the information printed on the mailpiece by the postage meter apparatus for comparison with the code printed on the mailpiece. There may be two codes printed, one used by the Postal Service for its security checks and one by the manufacturer. The encryption key may be changed at predetermined intervals or on a daily basis or for printing each mailpiece.
摘要:
An apparatus for canceling mailpieces includes structure for transporting the mailpieces through the apparatus; a printing device; a device for detecting the presence and location of a postage indicium on a first one of the mailpieces, the postage indicium having a machine readable portion; and a controller, operatively in communication with the printing device and the detecting device, for receiving detection data from the detecting device and for causing the printing device to print a postage indicium cancellation mark on the first mailpiece relative to the postage indicium such that the postage indicium cancellation mark does not degrade the readability of the machine readable portion. A method corresponds to operation of the apparatus.
摘要:
A method of manufacturing a secure box in a Key Management System that includes a plurality of functionally distinct secure boxes initializes a first manufacturing box if one does not exist. The method creates in a manufacturing box at least one logical security domain including encryption keys needed to perform Key Management System processes within the domain, and provides a target secure box with the capability to perform at least one Key Management System function from a plurality of functions required by the Key Management System. The method authenticates the target secure box to the manufacturing box, installs a unique secure box identification in the target secure box, and creates at least one logical security domain in the target secure box corresponding to a logical security domain in the manufacturing box. The method sends a command from a Key Management System computer to initialize the target secure box to perform a domain process for at least one of Key Management System functions provided within the target secure box, and initializes the target secure box in each domain process indicated in the command from the Key Management System computer. The method installs in the target secure box the encryption keys required to perform a key generation process within the domain. For example, target secure box may be provided with at least one of a key verification function, a key installation function, a token verification function, a key registration function, or a secure box manufacturing function.