Abstract:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
Abstract:
A method by which a services vendor, such as, without limitation, a health insurance company or a pharmaceutical company, among others, can provide targeted advertising to recipients based on the recipients' private personal information while still maintaining the confidentiality of such information.
Abstract:
A method of printing an image having a graphic security element included therein includes receiving main image data representing a main image, receiving graphic security element data representing a graphic security element to be included in the main image, receiving a request to print the main image, responsive to receiving the request to print the main image, determining particular pixels of the main image data that are to be shifted based on the graphic security element data, and causing a plurality of ink deposits to be deposited on the print medium based on the main image data including causing the position of each of the ink deposits on the print medium that is determined to correspond to shifted pixels to be shifted relative to a normal position that would normally result from the main image data. Also, system that implements the method is provided.
Abstract:
An image encryption method that includes receiving image data based on an image, wherein the image data comprises a plurality of pixel values, and permuting a plurality of, and preferably all of, the pixel values using at least a secret key to create permuted image data. Also, an image decryption method that includes scanning a printed image to create scanned image data. The printed image is generated from permuted image data that is generated by permuting a plurality of first pixel values of first image data using at least a secret key, obtaining a plurality of second pixel values from the scanned image data, and reverse-permuting a plurality of the second pixel values using at least the secret key to create reverse-permuted scanned image data.
Abstract:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
Abstract:
A method of enabling a voter to verify that a ballot has been received and counted as intended in a vote by mail election that includes receiving the ballot from the voter in the mail, generating a vote verification mechanism for the voter, obtaining the voter's votes from the ballot and counting the votes in the election. The method further includes storing voter vote information including the voter's votes that were counted in the election, providing to the voter the vote verification mechanism and an acknowledgment that the ballot has been received and counted, and, after the election has been closed, receiving the vote verification mechanism from the voter, obtaining the voter vote information from storage using the vote verification mechanism, and displaying the voter vote information for the voter so that the voter can verify that his or her votes have in fact been counted as intended.
Abstract:
Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a removable signature stub positioned on top of a signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and removes the signature stub. The signature is then covered by a label that conceals the signature under normal lighting conditions. To read the signature, light having a predetermined wavelength is directed onto the label, thereby rendering the label transparent and the signature visible.
Abstract:
A mail piece having a sterilization indicator includes an irradiation status area applied to a part of said mail piece. The irradiation status area is adapted to be activated by radiation. The irradiation status area has a first color prior to activation by radiation. The irradiation status area has a second color subsequent to activation by radiation. A method for the processing a mail piece having a sterilization indicator embodying the present invention includes the steps of introducing the mail piece into a postal processing system. The mail piece has an irradiation status area which is adapted to be activated by radiation. The mail piece is radiated and processed to determine whether the radiation has activated the irradiation status area.
Abstract:
Various election methods are provided wherein voters are able to verify their votes through public means. In one embodiment, each of the ballots includes a ballot identifier and each of the choices thereon is associated with a selection identifier. After the completed ballots are received by the voting authority, the authority publishes the ballot identifiers obtained from the ballots in association with the selection identifiers of the selected choices to enable each voter to verify his or her vote. In another embodiment, the voter provides the ballot identifier and the selection identifiers of the selected choices on a delivery mechanism (e.g., envelope). The relevant identifiers are then obtained by the authority from the delivery mechanisms and published. In another embodiment, the voters generate their own selection identifiers on the ballot which are then published by the authority to enable each voter to verify his or her vote.
Abstract:
Methods and systems for validating signatures on ballots sent through the mail that do not require significant amounts of hardware and/or software to perform are provided. The envelope for returning a ballot by mail includes a signature area in which the voter will sign and a reserved area in which no markings are provided. When the envelope is received at the registrar's office, the voter's identification is scanned and the voter's registration signature is retrieved from a registration database. The signature retrieved from the registration database is then provided in the reserved area. The signatures can then be compared directly on the envelope, without the need to image the voter's signature from the envelope and without the use of monitors to display the imaged and retrieved signatures.