摘要:
Systems and methods including mailing machines configured to selecting a route and carrier or carriers for delivery of the mail and for finishing the mail according the selection are described. In one illustrative configuration, the mailing machine tags mail pieces according to the result of a carrier selection process and sorts the outgoing mail by carrier.
摘要:
A closed loop postage metering system includes networked meters that provide mailers and/or recipients the capability to request additional or modified services during processing of a mail piece by a carrier. The networked meter allows the Post to charge the mailer, or even the recipient for these services or to provide them with a refund or credit. The services can include changing the processing of the mail piece. Further, the closed loop postage metering system enables more precise methods of paying for services when multiple carriers handle a mail piece. A special case of such multiple carriers handling is the handling of international mail.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier. The carrier service as part of issuing the unique identification may: charge the mailer's account of other fund depository for the carrier service charges associated with the mailpiece; and/or, assign a destination delivery code; and/or, provide address hygiene for the mailpiece; and/or change of address processing. When the unique identifier is obtained from the mailpiece, a delivery point destination code may be printed on the mailpiece, based on the corrected address. As an alternative, the destination delivery code may be provided to the mailer with the unique mailpiece identifier to be printed on the mailpiece by the mailer. Various cryptographic techniques may be employed to authenticate the mailer and the carrier service and to protect the transmitted information between the parties. The payment for the carrier services can be implemented prior in time to the entry of the mailpieces to the carrier service mailstream. Unauthorized mailpieces may be out sorted early in the carrier service processing procedure.
摘要:
Radio frequency identification tags are placed on mail contained in trays or tubs to locate and reroute mail that is misdirected, i.e., being routed to the incorrect destination. The method involves the carrier reading the identifying information contained in the radio frequency identification tags on each mail piece while each mail piece is in the trays or tubs and removing one or more mail pieces in the tray or tub that are to be routed differently than that routing information contained on the outside of the trays or tubs.
摘要:
A method for controlling a postage metering system (1) defines a first set of postage parameters P1, P2, P3 to Pn associated with the generation of postage evidence in a postage metering system (10) and then initializes the postage metering system (10) with a subset of the first set of postage parameters F1, F2, F3 to Fn. The subset F1, F2, F3 to Fn defines a combination of the postage parameters for which the generation of postage evidence is not authorized. When a request for postage evidence is received, the request includes a second set of postage parameters P1, P2, P3 to Pn that are combined to form a postage parameter vector (PPV). The generation of postage evidence is inhibited when at least one of the postage parameters P1, P2, P3 to Pn in the second set matches one of the postage parameters in the first set F1, F2, F3 to Fn. When none of the postage parameters P1, P2, P3 to Pn in the second set matches one of the postage parameters in the first set F1, F2, F3 to Fn the requested postage evidence is generated. In an alternative method the subset defines a combination of the postage parameters for which the generation of postage evidence is authorized, and the requested postage evidence is generated when each of the postage parameters in the first set matches one of the postage parameters in the second set.
摘要:
A method and system for providing services to a mail delivery point are presented. According to the method, a delivery point identifier is acquired from a device located at the delivery point. Then, delivery point data is accessed corresponding to the delivery point identifier, and mail delivery services are provided in response to the delivery point data. The delivery point data are modifiable by a recipient who receives physical mail at the delivery point, and the delivery point data includes recipient preferences.
摘要:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
摘要:
Methods for generating and reading a two-dimensional barcode comprised of a number of data modules for storing a first encoded set of binary data and a second encoded set of binary data. The first set of binary data is encoded using a first data module size and the second set of binary data is encoded using a second data module size, wherein the first data module size is larger than the second data module size. Mail metering and verification systems for implementing the methods are also disclosed.
摘要:
A system and method include means for processing a cryptographic certificate adapted to provide security functionality. A register means is provided and means for adjusting the register means to account for services when the cryptographic certificate is processed. In accordance with anther aspect, a system and method include a register means for storing funds. Means are provided for processing a digital token providing proof of postage payment and means are also provided for processing a cryptographic certificate adapted to provide security functionality. Means debit funds stored in the register means when the digital token is processed and when the cryptographic certificate is processed. Processing the cryptographic certificate may involve many functions such as providing security services and/or certificate management functions (including generating and verifying cryptographic certificates) and/or key management functions and/or access to any needed private keys to perform security services. Processing the digital token may include generating the digital token or issuing the digital token.