摘要:
Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a flap with a window that aligns with a signature area on the envelope. The window appears opaque under normal lighting conditions, but appears transparent when illuminated with light having a predetermined wavelength. A movable signature stub is positioned on top of the signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and moves the signature stub. The flap of the envelope is then sealed, thereby covering the voter's signature in the signature area with the window of the envelope flap. To read the signature, light having the predetermined wavelength can be directed onto the window, thereby rendering the window transparent and the signature visible.
摘要:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
摘要:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
摘要:
Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a flap with a window that aligns with a signature area on the envelope. The window appears opaque under normal lighting conditions, but appears transparent when illuminated with light having a predetermined wavelength. A movable signature stub is positioned on top of the signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and moves the signature stub. The flap of the envelope is then sealed, thereby covering the voter's signature in the signature area with the window of the envelope flap. To read the signature, light having the predetermined wavelength can be directed onto the window, thereby rendering the window transparent and the signature visible.
摘要:
A system, method, and medium, the method including receiving parameter information associated with a mailer, associating the parameter information with a mailing, receiving statistical information, the statistical information including historical performance data of at least one carrier, determining a delivery sequence for the mailing based on the received mailer parameter information and the statistical information, and outputting the determined delivery sequence for the mailing.
摘要:
A system, method, and medium, the method including receiving parameter information associated with a mailer, associating the parameter information with a mailing, receiving statistical information, the statistical information including historical performance data of at least one carrier, determining a delivery sequence for the mailing based on the received mailer parameter information and the statistical information, and outputting the determined delivery sequence for the mailing.
摘要:
Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.
摘要:
Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.
摘要:
Methods and systems that prevent completion of postdated financial transactions until the specified future date is provided. A portion of the information necessary to complete a financial transaction is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the information is associated with the date on which the transaction is authorized to be completed. The encrypted information is provided to the payee. The issuing bank provides a daily decryption key that allows decryption of information encrypted using the key associated with the corresponding date. Thus, only when the maturity date of the transaction has arrived will the payee or depositing bank be able to obtain the decryption key that will decrypt the encrypted information necessary to complete the transaction. Since the encrypted information can not be decrypted until the date associated with the encryption key, the financial transaction can not be completed until such date.
摘要:
A method includes receiving a plurality of mail messages. The plurality of mail messages are all appointed for delivery by mail to the same recipient. Each of the mail messages includes a respective account number for the mail recipient. The method further includes combining the received mail messages into a single combined mailpiece addressed to the mail recipient. All of the account numbers included in the mail messages are mutually different from each other.