摘要:
A system for the preparation of items to be mailed, preparation of each item varying in accordance with selected values of pre-determined parameters. The system includes apparatus for marking each item with selected identification code values; apparatus for preparing each item to be mailed in accordance with stored parameters, the preparing apparatus having a detector for detecting and outputting identification values from the items; a data base system for storing selected values of the parameters in associated with the identification codes, a control system responsive to the output identification codes to access the associated selected values for output to the preparation apparatus. The preparation apparatus of the subject system includes an inserted system and the pre-determined parameters include parameters defining the inserts to be assembled with an item. The preparation apparatus also includes a printer which is controlled to print information on the items in accordance with other pre-determined parameters. The identification codes are printed on control documents for each item by a data processing system which includes a post-processing subsystem for removing conventional dash codes and substituting identification codes, and transmitting records of the values of the pre-determined parameters to the data base system together with associated identification codes.
摘要:
A Key Management System for generating, distributing and managing cryptographic keys used by an information transaction system that employs cryptographic means to produce evidence of information integrity. The system comprises a plurality of functionally distinct secure boxes operatively coupled to each other. Each of the secure boxes performs functions for key generation, key installation, key verification or validation of tokens. Computers, operatively coupled to the secure boxes, provide system control and facilitate communication among the secure boxes. A plurality of separate logical security domains provide domain processes for key generation, key installation, key verification and validation of tokens produced by the transaction evidencing device within the domain using the key management functions. A plurality of domain archives, corresponding respectively to each of the security domains, securely and reliably record key status records and master keys for each domain. The Key Management System installs the master keys in the transaction evidencing device and validates the tokens. The secure boxes include a key generation box for generating, encrypting and signing a master key; a key installation box for receiving, verifying and decrypting the signed master key and for installing the master key into the transaction evidencing device; a key verification box for verifying the installation of the master key in the transaction evidencing device, a token verification box for verifying the tokens, and at least one manufacturing box for generating domain keys and distributing the domain keys among the secure boxes for each of the domains.
摘要:
A method of manufacturing transaction evidencing devices, such as digital postage meters, includes the steps of generating a master key in a logical security domain of a Key Management System; installing the master key into a digital postage meter; verifying the installation of the master key; and registering the master key to a logical security sub-domain in the Key Management System. The step of generating the master key further includes the steps of generating a domain; generating at least one sub-domain; installing the domain in secure boxes of the Key Management System; generating a master key and test token within the domain; and recording the master key in the domain archive. The step of installing the master key further includes the steps of installing the master key into a digital meter; and associating the master key with a unique device identifier. The step of registering the master key to a logical security sub-domain in the Key Management System further includes the steps of assigning a sub-domain to the digital meter; installing a postal identifier into the digital meter; associating the postal identifier to the unique device identifier; generating a registration token in the digital meter based on the postal identifier and the unique device identifier; generating registration tokens using the master key recorded in the archives; verifying that the registration tokens are identical; and recording the master key in the sub-domain. The steps are repeated for each domain assigned to the digital postage meter.
摘要:
A method and system for secure package delivery utilizing digital signatures is described. In one configuration, data regarding the weight, dimensions and origination are cryptographically processed to create an authentication digital signature with message retrieval capability. The data is read and independently verified at the package destination.
摘要:
A closed loop postage metering system includes networked meters that provide mailers and/or recipients the capability to request additional or modified services during processing of a mail piece by a carrier. The networked meter allows the Post to charge the mailer, or even the recipient for these services or to provide them with a refund or credit. The services can include changing the processing of the mail piece. Further, the closed loop postage metering system enables more precise methods of paying for services when multiple carriers handle a mail piece. A special case of such multiple carriers handling is the handling of international mail.
摘要:
A method in which the creation of identifier information is done by the recipient in a convenient fashion and communicated to the mailer. A recipient, such as a business or consumer who orders mail items of value, i.e., merchandise, documents, etc., from a mailer would give the mailer the recipient's electronic address and the recipient's delivery and handling preferences for the ordered merchandise. The electronic address and delivery and handling preferences of the recipient may be given to the mailer in plain language or in codified or encrypted form. This invention takes into account recipient's desires and preferences by entering information about the recipient's desires and preferences into a computerized actionable form.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier.
摘要:
Methods and systems for authenticating senders and recipients in a carrier system and providing receipt of specified content by a recipient are provided. A one-time recipient identification code is generated that can be entered into the delivery agent's portable terminal. Data is protected against eavesdropping by encryption and by splitting cipher text and an encryption key into two parts that are not accessible to any single party except at the moment of the mail unit delivery.
摘要:
System and methods for determining time-for-delivery for a mail piece based on the origin and destination of the mail piece are provided. A mail processing system is utilized by recipients of mail pieces to scan each incoming mail piece. The mail processing system extracts information from the mail piece that indicates the origin location of the mail piece as well as the date the mail piece was sent. The mail processing system establishes a record of the time-for-delivery between the origin location for each mail piece and the destination location. A data center aggregates the records from a plurality of different mail processing systems to establish a database that includes an actual value of time-for-delivery based on specific origin and destination locations. Mailers can then obtain information from the data center concerning actual time-for-delivery statistics based on the specific origin and destination of a mail piece.
摘要:
Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.