摘要:
A method for controlling keys used in the verification of encoded information generated by a transaction evidencing device and printed on a document comprises the steps of generating a plurality of random verifier master keys to obtain a set of verifier master keys consisting of a fixed number of keys; generating at least one pointer by applying a psuedorandom algorithm to data unique to the transaction evidencing device; calculating a plurality of verifier token keys to obtain a verifier token key set corresponding to the set of verifier master keys; encrypting the verifier token key set with a privacy key; and distributing the set verifier token keys and the privacy key to verifiers. The token keys are a function of the verifier master keys and a code valid for a limited time. The pointer algorithm is an appropriate symmetric key cryptographic algorithm and the code is function of a date dependent parameter. The master keys are distributed to postal and vendor data centers.
摘要:
A method of manufacturing transaction evidencing devices, such as digital postage meters, includes the steps of generating a master key in a logical security domain of a Key Management System; installing the master key into a digital postage meter; verifying the installation of the master key; and registering the master key to a logical security sub-domain in the Key Management System. The step of generating the master key further includes the steps of generating a domain; generating at least one sub-domain; installing the domain in secure boxes of the Key Management System; generating a master key and test token within the domain; and recording the master key in the domain archive. The step of installing the master key further includes the steps of installing the master key into a digital meter; and associating the master key with a unique device identifier. The step of registering the master key to a logical security sub-domain in the Key Management System further includes the steps of assigning a sub-domain to the digital meter; installing a postal identifier into the digital meter; associating the postal identifier to the unique device identifier; generating a registration token in the digital meter based on the postal identifier and the unique device identifier; generating registration tokens using the master key recorded in the archives; verifying that the registration tokens are identical; and recording the master key in the sub-domain. The steps are repeated for each domain assigned to the digital postage meter.
摘要:
A method for controlling keys used in the verification of encoded information generated by a transaction evidencing device and printed on a document comprises the steps of generating a plurality of random verifier master keys to obtain a set of verifier master keys consisting of a fixed number of keys; generating at least one pointer by applying a psuedorandom algorithm to data unique to the transaction evidencing device; calculating a plurality of verifier token keys to obtain a verifier token key set corresponding to the set of verifier master keys; encrypting the verifier token key set with a privacy key; and distributing the set verifier token keys and the privacy key to verifiers. The token keys are a function of the verifier master keys and a code valid for a limited time. The pointer algorithm is an appropriate symmetric key cryptographic algorithm and the code is function of a date dependent parameter. The master keys are distributed to postal and vendor data centers.
摘要:
Methods and systems for preparing mailpieces involve the creation of mailing lists which includes correct and incorrect recipient address information. The list is transmitted to a data center. Received from the data center is a mailing list including addressed hygiened recipient address information and a digital token for each mailpiece with encrypted data. The encrypted data is based on the corrected address information for mailpieces with correct address information on the transmitted mailing list and on hygiened recipient address information the mailpieces with incorrect recipient address information on the transmitted mailing list. The digital tokens for each mailpiece may also be based on the rating parameter information.Selection is provided for utilizing a given one of the incorrect recipient address information and the correct recipient address information is applied to an encrypter generating the digital tokens. The encrypting means for generating digital tokens may be located remote from the mailer facility or on a mailer facility or other local area network. Various arrangements are employed in generating and printing digital tokens recipient address information and corrected recipient address information.
摘要:
Methods and systems for preparing mailpieces involve the creation of mailing lists which includes correct and incorrect recipient address information. The list is transmitted to a data center. Received from the data center is a mailing list including addressed hygiened recipient address information and a digital token for each mailpiece with encrypted data. The encrypted data is based on the corrected address information for mailpieces with correct address information on the transmitted mailing list and on hygiened recipient address information the mailpieces with incorrect recipient address information on the transmitted mailing list. The digital tokens for each mailpiece may also be based on the rating parameter information. Selection is provided for utilizing a given one of the incorrect recipient address information and the correct recipient address information is applied to an encrypter generating the digital tokens. The encrypting means for generating digital tokens may be located remote from the mailer facility or on a mailer facility or other local area network. Various arrangements are employed in generating and printing digital tokens recipient address information and corrected recipient address information.
摘要:
A Key Management System for generating, distributing and managing cryptographic keys used by an information transaction system that employs cryptographic means to produce evidence of information integrity. The system comprises a plurality of functionally distinct secure boxes operatively coupled to each other. Each of the secure boxes performs functions for key generation, key installation, key verification or validation of tokens. Computers, operatively coupled to the secure boxes, provide system control and facilitate communication among the secure boxes. A plurality of separate logical security domains provide domain processes for key generation, key installation, key verification and validation of tokens produced by the transaction evidencing device within the domain using the key management functions. A plurality of domain archives, corresponding respectively to each of the security domains, securely and reliably record key status records and master keys for each domain. The Key Management System installs the master keys in the transaction evidencing device and validates the tokens. The secure boxes include a key generation box for generating, encrypting and signing a master key; a key installation box for receiving, verifying and decrypting the signed master key and for installing the master key into the transaction evidencing device; a key verification box for verifying the installation of the master key in the transaction evidencing device, a token verification box for verifying the tokens, and at least one manufacturing box for generating domain keys and distributing the domain keys among the secure boxes for each of the domains.
摘要:
Methods and systems for preparing mailpieces involve the creation of mailing lists which includes correct and incorrect recipient address information. The list is transmitted to a data center. Received from the data center is a mailing list including addressed hygiened recipient address information and a digital token for each mailpiece with encrypted data. The encrypted data is based on the corrected address information for mailpieces with correct address information on the transmitted mailing list and on hygiened recipient address information the mailpieces with incorrect recipient address information on the transmitted mailing list. The digital tokens for each mailpiece may also be based on the rating parameter information. Selection is provided for utilizing a given one of the incorrect recipient address information and the correct recipient address information is applied to an encrypter generating the digital tokens. The encrypting means for generating digital tokens may be located remote from the mailer facility or on a mailer facility or other local area network. Various arrangements are employed in generating and printing digital tokens recipient address information and corrected recipient address information.
摘要:
A method of token verification in a Key Management System provides a logical device identifier and a master key created in a logical security domain to a transaction evidencing device, such as a digital postage meter. The method creates a master key record in a key verification box, securely stores the master key record in a Key Management System archive, and produces in the transaction evidencing device evidence in the logical security domain of transaction information integrity. The method inputs the evidence of the transaction information integrity to a token verification box, and inputs in the token verification box the master key record from the Key Management System archive. The method determines in the token verification box that the master key is valid in logical security domain, uses in the token verification box the master key to verify the evidence of transaction information integrity, and outputs from the token verification box an indication of the result of the verification of the evidence of transaction information integrity. The master key record includes the logical device identifier, the master key and a digital signature associating the logical device identifier and the master key. The method checks the digital signature to verify the association of the logical device identifier and the master key within the logical security domain.
摘要:
Methods and systems for preparing mailpieces involve the creation of mailing lists which includes correct and incorrect recipient address information. The list is transmitted to a data center. Received from the data center is a mailing list including addressed hygiened recipient address information and a digital token for each mailpiece with encrypted data. The encrypted data is based on the corrected address information for mailpieces with correct address information on the transmitted mailing list and on hygiened recipient address information the mailpieces with incorrect recipient address information on the transmitted mailing list. The digital tokens for each mailpiece may also be based on the rating parameter information.Selection is provided for utilizing a given one of the incorrect recipient address information and the correct recipient address information is applied to an encrypter generating the digital tokens. The encrypting means for generating digital tokens may be located remote from the mailer facility or on a mailer facility or other local area network. Various arrangements are employed in generating and printing digital tokens recipient address information and corrected recipient address information.
摘要:
A mail piece verification system for processing a mail piece having associated therewith mail piece data includes an incoming mail processing center, an outgoing mail processing center located downstream from the incoming mail processing center and a data center in operative communication with the incoming mail processing center and the outgoing mail processing center. The incoming mail processing center receives the mail piece, obtains the mail piece and uploads the mail piece data to the data center. The data center performs a verification check on the mail piece data and downloads instructions based upon the verification check to the outgoing mail processing center. The outgoing mail processing center uses the instructions to process the mail piece.