Abstract:
A method and system for printing an original image which is protected against copying or alteration, such as a postal indicium, and for determining if that image has been altered. The image includes a copy detection feature and coded information linked to the copy detection feature. Altered images are detected by testing to determine if the link between the copy detection feature and the coded information if fact exists. The copy detection feature and the coded information can be linked by: 1) generating said copy detection feature as a pseudorandom function of said coded information; identifying a type of printer corresponding to said printer; and incorporating information identifying said type of printer into said image; or 2) creating a robust descriptor of said copy detection feature; and incorporating said descriptor into said coded information; or 3) creating a robust descriptor of said copy detection feature; and incorporating said descriptor into said coded information, and modifying said copy detection feature as a pseudorandom function of said coded information; or 4) generating said copy detection feature as a pseudorandom function of said coded information; creating a robust descriptor of said copy detection feature; and incorporating said descriptor into said coded information.
Abstract:
A system and method to provide identification codes to track outbound mail and corresponding replies. Tracking is enabled where an intended recipient is not determined until after physical components of the mailpiece are assembled. A first ID code is associated with a second ID code on a return envelope. The first ID code is positioned on a front of the return envelope proximal to a return address on the return envelope. The second ID code is positioned on a back of the return envelope proximal to a recipient address region on the return envelope. The return envelope is inserted into a carrier envelope with the front of the return envelope facing the back of the carrier envelope, and the second ID code and the recipient address region being visible through a front window in the front of the carrier envelope. A recipient address is printed in the recipient address region of the reply envelope, through the front window on the carrier envelope. To allow mail piece tracking, the first and second ID codes are associated with the intended recipient of the outbound mail.
Abstract:
A system and method to provide identification codes to track outbound mail and corresponding replies. Tracking is enabled where an intended recipient is not determined until after physical components of the mailpiece are assembled. A first ID code is associated with a second ID code on a return envelope. The first ID code is positioned on a front of the return envelope proximal to a return address on the return envelope. The second ID code is positioned on a back of the return envelope proximal to a recipient address region on the return envelope. The return envelope is inserted into a carrier envelope with the front of the return envelope facing the back of the carrier envelope, and the second ID code and the recipient address region being visible through a front window in the front of the carrier envelope. A recipient address is printed in the recipient address region of the reply envelope, through the front window on the carrier envelope. To allow mail piece tracking, the first and second ID codes are associated with the intended recipient of the outbound mail.
Abstract:
A method for printing an original image which is protected against copying or alteration, such as a postal indicium, and for determining if that image has been altered. The image includes a copy detection feature and coded information linked to the copy detection feature. Altered images are detected by testing to determine if the link between the copy detection feature and the coded information in fact exists. The copy detection feature and the coded information can be linked by: 1) scanning the image to recover the coded information and the copy detection feature; 2) test the coded information and copy detection feature, and 3) accept the printed image as unaltered if the test indicates that the nominal link exists in fact.
Abstract:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
Abstract:
A method by which a services vendor, such as, without limitation, a health insurance company or a pharmaceutical company, among others, can provide targeted advertising to recipients based on the recipients' private personal information while still maintaining the confidentiality of such information.
Abstract:
A method of printing an image having a graphic security element included therein includes receiving main image data representing a main image, receiving graphic security element data representing a graphic security element to be included in the main image, receiving a request to print the main image, responsive to receiving the request to print the main image, determining particular pixels of the main image data that are to be shifted based on the graphic security element data, and causing a plurality of ink deposits to be deposited on the print medium based on the main image data including causing the position of each of the ink deposits on the print medium that is determined to correspond to shifted pixels to be shifted relative to a normal position that would normally result from the main image data. Also, system that implements the method is provided.
Abstract:
An image encryption method that includes receiving image data based on an image, wherein the image data comprises a plurality of pixel values, and permuting a plurality of, and preferably all of, the pixel values using at least a secret key to create permuted image data. Also, an image decryption method that includes scanning a printed image to create scanned image data. The printed image is generated from permuted image data that is generated by permuting a plurality of first pixel values of first image data using at least a secret key, obtaining a plurality of second pixel values from the scanned image data, and reverse-permuting a plurality of the second pixel values using at least the secret key to create reverse-permuted scanned image data.
Abstract:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
Abstract:
A method of enabling a voter to verify that a ballot has been received and counted as intended in a vote by mail election that includes receiving the ballot from the voter in the mail, generating a vote verification mechanism for the voter, obtaining the voter's votes from the ballot and counting the votes in the election. The method further includes storing voter vote information including the voter's votes that were counted in the election, providing to the voter the vote verification mechanism and an acknowledgment that the ballot has been received and counted, and, after the election has been closed, receiving the vote verification mechanism from the voter, obtaining the voter vote information from storage using the vote verification mechanism, and displaying the voter vote information for the voter so that the voter can verify that his or her votes have in fact been counted as intended.