摘要:
A method and system for secure package delivery utilizing digital signatures is described. In one configuration, data regarding the weight, dimensions and origination are cryptographically processed to create an authentication digital signature with message retrieval capability. The data is read and independently verified at the package destination.
摘要:
A closed loop postage metering system includes networked meters that provide mailers and/or recipients the capability to request additional or modified services during processing of a mail piece by a carrier. The networked meter allows the Post to charge the mailer, or even the recipient for these services or to provide them with a refund or credit. The services can include changing the processing of the mail piece. Further, the closed loop postage metering system enables more precise methods of paying for services when multiple carriers handle a mail piece. A special case of such multiple carriers handling is the handling of international mail.
摘要:
A method in which the creation of identifier information is done by the recipient in a convenient fashion and communicated to the mailer. A recipient, such as a business or consumer who orders mail items of value, i.e., merchandise, documents, etc., from a mailer would give the mailer the recipient's electronic address and the recipient's delivery and handling preferences for the ordered merchandise. The electronic address and delivery and handling preferences of the recipient may be given to the mailer in plain language or in codified or encrypted form. This invention takes into account recipient's desires and preferences by entering information about the recipient's desires and preferences into a computerized actionable form.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier.
摘要:
Methods and systems for authenticating senders and recipients in a carrier system and providing receipt of specified content by a recipient are provided. A one-time recipient identification code is generated that can be entered into the delivery agent's portable terminal. Data is protected against eavesdropping by encryption and by splitting cipher text and an encryption key into two parts that are not accessible to any single party except at the moment of the mail unit delivery.
摘要:
System and methods for determining time-for-delivery for a mail piece based on the origin and destination of the mail piece are provided. A mail processing system is utilized by recipients of mail pieces to scan each incoming mail piece. The mail processing system extracts information from the mail piece that indicates the origin location of the mail piece as well as the date the mail piece was sent. The mail processing system establishes a record of the time-for-delivery between the origin location for each mail piece and the destination location. A data center aggregates the records from a plurality of different mail processing systems to establish a database that includes an actual value of time-for-delivery based on specific origin and destination locations. Mailers can then obtain information from the data center concerning actual time-for-delivery statistics based on the specific origin and destination of a mail piece.
摘要:
Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.
摘要:
A system for validating service bills includes a first monitoring subsystem associated with and under the control of a service user for determining user generated fee values associated with the amount due a service entity for service usage over a predetermined billing period. A second monitoring subsystem communicating with the first monitoring subsystem is associated with and under the control of the service entity for determining service generated fee values associated with the amount due the service entity for the service usage over the predetermined billing period. One of the monitoring subsystems compares the user and service generated fee values and thereupon validates the amount due determined by one of the user and service generated fee values if such fee values are within a predetermined threshold amount.
摘要:
A formal mechanism for defining a broad variety of postal products using measurable attributes. The mechanism for the products then may be formalized into data structures and procedures executable by computer systems. Once the above is executed an automated production is established for the mail unit and suitable for delivery of the new services to assist postal operators in effective execution of all operations specified by the services selected. In order to fulfill the mailer's requirement as expressed in computer processible format and captured by the mailer's computer the software may make decisions regarding the creation and sending of each mail unit. Based upon the mailer's requirements and available carrier services the mailer's computer may determine the need to modify the content of the mail units and create instructions or controls for the mail units.
摘要:
A mailing list is created including destination addresses for mailpieces to be submitted to a carrier service for delivery. A unique mailpiece identifier associated with mailpieces on the mailing list is generated by the carrier or other trusted third party. The unique mailpiece identifier is printed on the mailpiece with which it is associated. The mailpieces with the printed unique identifier are submitted to the carrier service. The carrier service obtains the printed unique identifier from the mailpiece. The obtained unique identifier from each said mailpiece is utilized to verify that data associated with the mailpiece has been processed by the carrier or trusted third party. When the unique number has been obtained from the mailpieces, the carrier service, if desired, may note this fact in the carrier records to prevent reuse of the unique identifier. The carrier service as part of issuing the unique identification may: charge the mailer's account of other fund depository for the carrier service charges associated with the mailpiece; and/or, assign a destination delivery code; and/or, provide address hygiene for the mailpiece; and/or change of address processing. When the unique identifier is obtained from the mailpiece, a delivery point destination code may be printed on the mailpiece, based on the corrected address. As an alternative, the destination delivery code may be provided to the mailer with the unique mailpiece identifier to be printed on the mailpiece by the mailer. Various cryptographic techniques may be employed to authenticate the mailer and the carrier service and to protect the transmitted information between the parties. The payment for the carrier services can be implemented prior in time to the entry of the mailpieces to the carrier service mailstream. Unauthorized mailpieces may be out sorted early in the carrier service processing procedure.