摘要:
A method and apparatus for embedding information in an image during relative movement between a print medium and an ink jet print head is provided. A plurality of first lines are printed and a plurality of second lines are printed. Each of the first lines includes a plurality of first dots and a plurality of second dots offset from the first dots by a first amount, and each of the second lines includes a plurality of third dots and a plurality of fourth dots offset from the third dots by a second amount different than the first amount. The information is encoded in the image using an encoding scheme in which the first lines represent a first value in the encoding scheme and the second lines represent a second value in the encoding scheme.
摘要:
Methods and systems that prevent completion of postdated financial transactions until the specified future date is provided. A portion of the information necessary to complete a financial transaction is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the information is associated with the date on which the transaction is authorized to be completed. The encrypted information is provided to the payee. The issuing bank provides a daily decryption key that allows decryption of information encrypted using the key associated with the corresponding date. Thus, only when the maturity date of the transaction has arrived will the payee or depositing bank be able to obtain the decryption key that will decrypt the encrypted information necessary to complete the transaction. Since the encrypted information can not be decrypted until the date associated with the encryption key, the financial transaction can not be completed until such date.
摘要:
In accordance with an embodiment of the invention, a method for creating a self-authenticating document is disclosed. The method comprises: providing a base substrate forming the document; printing an authentication seal on the document, the authentication seal comprising a printed portion comprising an ink creating a bleed area on the document where the ink and the substrate interact; and obtaining unique bleed properties of the bleed area. The bleed properties are obtained by scanning the bleed area upon termination of bleeding or drying to provide a description of the ink and substrate interaction to generate an identifier code representing the unique bleed properties. The method further comprises generating a signature of the identifier code, encoding the identifier code in an information carrier, and associating the information carrier with the document or storing the signed identifier code in a remote verification seal code that is not printed on the document. The authentication seal is capable of being scanned and compared to the information carrier or to the remote verification seal code, wherein the verification seal code is not located on the document and comprises the same code information as the identifier code.
摘要:
A method for producing a metered tape and an indicium on a meter tape comprising determining a location on the meter tape where the indicium is to be printed, generating the indicium with information related to the location incorporated therein, and printing the indicium on the meter tape at the location. A method of authenticating an indicium printed on a meter tape comprising retrieving information stored within the indicium, the information identifying a first location where the indicium is supposed to be positioned relative to the meter tape, detecting a spatial indicator identifying a second location where the indicium is actually positioned relative to the meter tape, and comparing the first location to the second location. Mail metering and authenticating systems for implementing the methods are also disclosed.
摘要:
Methods and systems for keeping information related to the sender of a mail piece private, while still allowing authorized parties to easily obtain the sender information if desired, is provided. Sender information for a mail piece is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the sender information can be computed using recipient information. The corresponding decryption key can only be obtained from a trusted third party acting as a Private Key Generator (PKG). Only those parties authorized to have access to the sender information will be provided with the corresponding decryption key. The corresponding decryption key can then be used to decrypt the sender information into human readable form.
摘要:
A method for detecting whether perforations are present on the edge of an image of a form, such as a check, includes obtaining a bitmap of the image, identifying a selected portion of the bitmap that corresponds to at least the edge and that includes a matrix of a plurality of rows and columns of brightness values, and selecting a particular one of the rows of brightness values. The method further includes performing a Fourier transform of the brightness values included in the particular selected row to generate a Fourier transform output, and determining whether a series of perforations is present based on the Fourier transform output. The method may also include steps wherein the brightness values are low pass filtered and wherein the values in the selected row are high pass filtered prior to the step of performing a Fourier transform
摘要:
A system for facilitating a transaction between a first party and a second party is controlled by a trusted third party system and is programmed to carry out the method by receiving the first party's instructions for fulfilling at least a part of the first party's obligations in said transaction. The system communicates with the second party and provides the second party with perceptible assurance that the second party is in communication with a trusted third party system through the system. The system transmits information to the second party to provide assurance that the first party's instructions have been or will be fulfilled. Thus trust in the third party is transferred to the first party and the second party can trust that the first party's obligations have been or will be fulfilled.
摘要:
A method for incorporating fraud detection features in a printed image. The method includes the steps of providing an impact printer having a plurality of impact pins for producing pixels on a substrate, developing an encoding scheme within the printed image, and controlling the impact printer to produce the pixels in accordance with the encoding scheme. More specifically, the encoding scheme is characterized by predefining a group of pixels within the printed image and determining the pixel density characteristics thereof, e.g., light or dark pixels. Furthermore, the impact printer is controlled to vary the magnetic flux density across each solenoid, thereby varying the impact pressure applied by the impact pins on the print ribbon. By selectively controlling the magnetic flux density at least some of the respective print densities of each of the respective printed pixels are different from each other to define an encoding scheme within the printed image. Variation in pixel density may be produced by changing the magnitude, pulse width or frequency of the voltage/pulse applied to the solenoids of the impact printer.
摘要:
A card for testing print heads includes a first layer having a first height and longitudinal length and a second layer located on top of the first layer having a second height and longitudinal length smaller than the first length. Also, a method of determining ink drop velocity including providing such a card, and printing a line including a plurality of dots thereon. A first of the dots is located on the first layer and a second of the dots is located on the second layer. Finally, the method includes determining a first relative distance between the first and second of the dots along the print direction, determining a second relative distance between the top surfaces of the first and second layers, and calculating the ink drop velocity as follows: V*(RD1/RD2), wherein V is the print velocity, D1 is the first relative distance, and D2 is the second relative distance.
摘要:
A mailing machine that optimizes throughput by reducing the amount of time necessary for the PSD to generate the digital signature and indicium for each mail piece is provided. The debit operation performed by the PSD, i.e., adjusting the PSD registers, is separated into three different sections, a pre-debit operation, a perform debit operation, and a complete debit operation. In addition, the calculation of the digital signature can optionally be pre-computed, or, alternatively, computed in stages, i.e., partial signature calculation. Utilizing this granularity, the cryptographic operations associated with generating the digital signature can be shifted between the three debit operations such that the execution time of the time critical portion of the debit operation (perform debit) can be optimized to meet the performance requirements of the mailing machine in which the PSD is deployed.