摘要:
In a method for real-time registration having high protection against tampering by means of a security module, an encrypted initial security value for translog file analyzers is made available an unencrypted real-time message is secured by appending an authentication code that the security module generates by inserting a current security value into an algorithm for authentication code for each real-time message that is likewise employed by each translog file analyzer. The first security value is formed according to a first mathematical function known to the translog file analyzer that allows a derivation of following security values. The authentication code is formed according to a second mathematical function known to the translog analyzer that is applied to the real-time message and to the current security value and that serves for the verification of the real-time message. A system for real-time registration has at least one client system and at least one translog analyzer for monitoring the authenticity of a translog file that had been generated by the security module.
摘要:
In a method and apparatus for generating a print image, particularly a franking imprint, on a first image carrier composed of at least one first partial image and a second partial image offset thereto transversely relative to a first direction, whereby a relative motion between a print head and an image carrier is generated along a first direction in a first step for generating the first partial image. A transverse offset between the print head and the image carrier is generated in a second direction proceeding transversely to the first direction in a second step. A relative motion between the print head and the image carrier is generated along the first direction in a third step for generating the second partial image. The waiting time interval between the end of the printing event of the first step and the beginning of the printing event of the third step has a length that is varied according to a prescribed function to prevent tampering.
摘要:
A method and apparatus for data input into a service device allow a loading and updating of service data, particularly postage fee schedule tables, separated from one another in time. The method and apparatus are suitable for postage meter machines as well as for scales containing postage computers or similar devices. The apparatus for implementation of the method contains a processor and a memory with memory areas for service data. After detecting the input and storage of a load requirement, a check for the presence of a load instruction, formation of a status report of the memory occupancy for service data and a transmission of the status report to the data center ensue. The data center forms recommendations for a future status of the memory occupancy in the service device on the basis of an analysis of the status report of the memory occupancy for service data that is implemented in the data center. The data center transmits the recommendations to the service device that, after evaluation thereof, sends corresponding request data before the actual loading.
摘要:
Many physicians, including endocrinologist and internist, have expressed great interest in such a monitoring devise. In a medical office, a doctor could use MyPersonalLab to determine the quantitative value of various blood electrolytes to diagnose and treat a multitude of metabolic diseases much faster, and therefore alleviating a patient's suffering that much faster. At home, the average individual could use MyPersonalLab to monitor his/her own disease state or medical condition. If they detected a value that their doctor previously determined was abnormal, they could then alert their physician of the concern. One might think that the clinical laboratory establishment would be highly opposed to such a devise, citing that it would reduce their traffic and hurt their business.
摘要:
In a security module and a method for protecting a security module, wherein security-relevant data are stored in a memory in the module, proper insertion of the security module on a device motherboard is monitored with a first function unit and a second function in the security module. The first function unit signals the status of the security module. The second function unit detects improper use or improper replacement of the security module, and upon detection of improper use or improper replacement, the second function unit causes the security-relevant data to be erased.
摘要:
A dynamic scale has a conveyor, a weighing pan, a weighing cell, sensors and an electronic control unit that, in addition to controlling the conveyor means (4), implements an evaluation of a number measured weight values that are obtained from the weighing cell and performs a measured value correction on the basis of specific parameters, and supplies a corrected weight value to a postage meter machine via an interface. A method for a control of the conveyor, evaluation of the measured values from the weighing cell, and formulation of a valid output weight value includes an overload check that is made by comparing a measured weight value lying in the middle of the number of measured values to at least one overload limit value, and formation of a decision parameter from the measured values, in a validity check, for comparison to at least one shutoff criterion. If the validity check determines that the measured values from the weighing cell are valid, they are used to form the output weight value.
摘要:
A secure housing for an electronic unit, in particular a franking machine has a first housing part and a second housing part releasably connected to the first housing part via at least one connecting device. In order to prevent the housing from being opened without leaving trace of the opening, there is provided at least one covering device on and/or in the first or second housing part. The covering device blocks the access to the connecting device and can only be removed from the first or second housing part with noticeable damage being caused.
摘要:
In a method and an arrangement for increasing the throughput of mail when franking with a security imprint, the editing of the print image data is undertaken by a postage meter machine processor, and the calculation of the security code is undertaken by a separate security module while the print image data are being edited. A high system clock performance is achieved by interleaving of the two calculation tasks.