摘要:
Methods and systems that prevent completion of postdated financial transactions until the specified future date is provided. A portion of the information necessary to complete a financial transaction is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the information is associated with the date on which the transaction is authorized to be completed. The encrypted information is provided to the payee. The issuing bank provides a daily decryption key that allows decryption of information encrypted using the key associated with the corresponding date. Thus, only when the maturity date of the transaction has arrived will the payee or depositing bank be able to obtain the decryption key that will decrypt the encrypted information necessary to complete the transaction. Since the encrypted information can not be decrypted until the date associated with the encryption key, the financial transaction can not be completed until such date.
摘要:
Methods and systems for keeping information related to the sender of a mail piece private, while still allowing authorized parties to easily obtain the sender information if desired, is provided. Sender information for a mail piece is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the sender information can be computed using recipient information. The corresponding decryption key can only be obtained from a trusted third party acting as a Private Key Generator (PKG). Only those parties authorized to have access to the sender information will be provided with the corresponding decryption key. The corresponding decryption key can then be used to decrypt the sender information into human readable form.
摘要:
A method for detecting whether perforations are present on the edge of an image of a form, such as a check, includes obtaining a bitmap of the image, identifying a selected portion of the bitmap that corresponds to at least the edge and that includes a matrix of a plurality of rows and columns of brightness values, and selecting a particular one of the rows of brightness values. The method further includes performing a Fourier transform of the brightness values included in the particular selected row to generate a Fourier transform output, and determining whether a series of perforations is present based on the Fourier transform output. The method may also include steps wherein the brightness values are low pass filtered and wherein the values in the selected row are high pass filtered prior to the step of performing a Fourier transform
摘要:
A method and system for providing services to a mail delivery point are presented. According to the method, a delivery point identifier is acquired from a device located at the delivery point. Then, delivery point data is accessed corresponding to the delivery point identifier, and mail delivery services are provided in response to the delivery point data. The delivery point data are modifiable by a recipient who receives physical mail at the delivery point, and the delivery point data includes recipient preferences.
摘要:
Methods for generating and reading a two-dimensional barcode comprised of a number of data modules for storing a first encoded set of binary data and a second encoded set of binary data. The first set of binary data is encoded using a first data module size and the second set of binary data is encoded using a second data module size, wherein the first data module size is larger than the second data module size. Mail metering and verification systems for implementing the methods are also disclosed.
摘要:
An improved check sorting system capable of ordering cancelled checks for a plurality of accounts in a predetermined manner other than by account number is provided. Checks are ordered according to a priority value associated with the account number, and optionally check number, identified by each check. A database is utilized to store information indexed by institution and/or account number and optionally check number. The information includes a priority value. The check sorting system scans each check and reads the MICR code from each check. The institution and/or account number, and possibly check number, from each check are used as pointers to obtain the priority value for that check. The check is then sorted based on the priority value obtained from the database.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier. The carrier service as part of issuing the unique identification may: charge the mailer's account of other fund depository for the carrier service charges associated with the mailpiece; and/or, assign a destination delivery code; and/or, provide address hygiene for the mailpiece; and/or change of address processing. When the unique identifier is obtained from the mailpiece, a delivery point destination code may be printed on the mailpiece, based on the corrected address. As an alternative, the destination delivery code may be provided to the mailer with the unique mailpiece identifier to be printed on the mailpiece by the mailer. Various cryptographic techniques may be employed to authenticate the mailer and the carrier service and to protect the transmitted information between the parties. The payment for the carrier services can be implemented prior in time to the entry of the mailpieces to the carrier service mailstream. Unauthorized mailpieces may be out sorted early in the carrier service processing procedure.
摘要:
A document printed marking including a first information marking including first luminescent taggants having a first luminescence wavelength band; and a second information marking printed at least partially on the first information marking at an overlap location. The second information marking includes second different luminescent taggant having a second different luminescence wavelength band. The second luminescence wavelength band is spaced from the first luminescence wavelength band such that the first information marking and the second information marking are substantially luminescently non-intrusive with each other at the overlap location.
摘要:
A closed loop postage metering system includes networked meters that provide mailers and/or recipients the capability to request additional or modified services during processing of a mail piece by a carrier. The networked meter allows the Post to charge the mailer, or even the recipient for these services or to provide them with a refund or credit. The services can include changing the processing of the mail piece. Further, the closed loop postage metering system enables more precise methods of paying for services when multiple carriers handle a mail piece. A special case of such multiple carriers handling is the handling of international mail.
摘要:
A method that enables the mailer (sender) to automatically receive updated and computerized address information that can be used for automatic, real-time correction of address data in mailer's mailing lists.