摘要:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
摘要:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
摘要:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
摘要:
Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a flap with a window that aligns with a signature area on the envelope. The window appears opaque under normal lighting conditions, but appears transparent when illuminated with light having a predetermined wavelength. A movable signature stub is positioned on top of the signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and moves the signature stub. The flap of the envelope is then sealed, thereby covering the voter's signature in the signature area with the window of the envelope flap. To read the signature, light having the predetermined wavelength can be directed onto the window, thereby rendering the window transparent and the signature visible.
摘要:
Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a flap with a window that aligns with a signature area on the envelope. The window appears opaque under normal lighting conditions, but appears transparent when illuminated with light having a predetermined wavelength. A movable signature stub is positioned on top of the signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and moves the signature stub. The flap of the envelope is then sealed, thereby covering the voter's signature in the signature area with the window of the envelope flap. To read the signature, light having the predetermined wavelength can be directed onto the window, thereby rendering the window transparent and the signature visible.
摘要:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
摘要:
Methods and systems that prevent completion of postdated financial transactions until the specified future date is provided. A portion of the information necessary to complete a financial transaction is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the information is associated with the date on which the transaction is authorized to be completed. The encrypted information is provided to the payee. The issuing bank provides a daily decryption key that allows decryption of information encrypted using the key associated with the corresponding date. Thus, only when the maturity date of the transaction has arrived will the payee or depositing bank be able to obtain the decryption key that will decrypt the encrypted information necessary to complete the transaction. Since the encrypted information can not be decrypted until the date associated with the encryption key, the financial transaction can not be completed until such date.
摘要:
A system, method, and medium, the method including receiving parameter information associated with a mailer, associating the parameter information with a mailing, receiving statistical information, the statistical information including historical performance data of at least one carrier, determining a delivery sequence for the mailing based on the received mailer parameter information and the statistical information, and outputting the determined delivery sequence for the mailing.
摘要:
A system, method, and medium, the method including receiving parameter information associated with a mailer, associating the parameter information with a mailing, receiving statistical information, the statistical information including historical performance data of at least one carrier, determining a delivery sequence for the mailing based on the received mailer parameter information and the statistical information, and outputting the determined delivery sequence for the mailing.
摘要:
A method includes scanning a check to generate image data representative of an image of the check. The method further includes detecting at least one security feature of the check. The method also includes transforming the image data to include at least one encoded indication of the detected at least one security feature of the check.