摘要:
A method for producing a metered tape and an indicium on a meter tape comprising determining a location on the meter tape where the indicium is to be printed, generating the indicium with information related to the location incorporated therein, and printing the indicium on the meter tape at the location. A method of authenticating an indicium printed on a meter tape comprising retrieving information stored within the indicium, the information identifying a first location where the indicium is supposed to be positioned relative to the meter tape, detecting a spatial indicator identifying a second location where the indicium is actually positioned relative to the meter tape, and comparing the first location to the second location. Mail metering and authenticating systems for implementing the methods are also disclosed.
摘要:
Methods and systems that prevent completion of postdated financial transactions until the specified future date is provided. A portion of the information necessary to complete a financial transaction is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the information is associated with the date on which the transaction is authorized to be completed. The encrypted information is provided to the payee. The issuing bank provides a daily decryption key that allows decryption of information encrypted using the key associated with the corresponding date. Thus, only when the maturity date of the transaction has arrived will the payee or depositing bank be able to obtain the decryption key that will decrypt the encrypted information necessary to complete the transaction. Since the encrypted information can not be decrypted until the date associated with the encryption key, the financial transaction can not be completed until such date.
摘要:
A method for detecting whether perforations are present on the edge of an image of a form, such as a check, includes obtaining a bitmap of the image, identifying a selected portion of the bitmap that corresponds to at least the edge and that includes a matrix of a plurality of rows and columns of brightness values, and selecting a particular one of the rows of brightness values. The method further includes performing a Fourier transform of the brightness values included in the particular selected row to generate a Fourier transform output, and determining whether a series of perforations is present based on the Fourier transform output. The method may also include steps wherein the brightness values are low pass filtered and wherein the values in the selected row are high pass filtered prior to the step of performing a Fourier transform
摘要:
A method and apparatus for embedding information in an image during relative movement between a print medium and an ink jet print head is provided. A plurality of first lines are printed and a plurality of second lines are printed. Each of the first lines includes a plurality of first dots and a plurality of second dots offset from the first dots by a first amount, and each of the second lines includes a plurality of third dots and a plurality of fourth dots offset from the third dots by a second amount different than the first amount. The information is encoded in the image using an encoding scheme in which the first lines represent a first value in the encoding scheme and the second lines represent a second value in the encoding scheme.
摘要:
A system for facilitating a transaction between a first party and a second party is controlled by a trusted third party system and is programmed to carry out the method by receiving the first party's instructions for fulfilling at least a part of the first party's obligations in said transaction. The system communicates with the second party and provides the second party with perceptible assurance that the second party is in communication with a trusted third party system through the system. The system transmits information to the second party to provide assurance that the first party's instructions have been or will be fulfilled. Thus trust in the third party is transferred to the first party and the second party can trust that the first party's obligations have been or will be fulfilled.
摘要:
Methods and systems for keeping information related to the sender of a mail piece private, while still allowing authorized parties to easily obtain the sender information if desired, is provided. Sender information for a mail piece is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the sender information can be computed using recipient information. The corresponding decryption key can only be obtained from a trusted third party acting as a Private Key Generator (PKG). Only those parties authorized to have access to the sender information will be provided with the corresponding decryption key. The corresponding decryption key can then be used to decrypt the sender information into human readable form.
摘要:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.
摘要:
A voting method includes receiving identity-based information, vote data and a passphrase for a voter, encrypting the vote data using a symmetric key, generating second identity-based information for the voter, and generating an identity-based public key using at least the second identity-based information and a voting system parameter. The symmetric key is encrypted using the identity-based public key and an identity-based asymmetric encryption algorithm. The encrypted symmetric key may be decrypted using a private key corresponding to the identity-based public key and an identity-based asymmetric decryption algorithm, wherein the private key is generated from at least the identity-based public key and a secret master key. The voter is provided with information that includes at least the encrypted vote data and the encrypted symmetric key, and the system retains anonymous identity information, encrypted vote data and the encrypted symmetric key as a paper audit trail.
摘要:
A method and system for generating and printing an indicium, such as a postal indicium, on an object such as a mail piece. A digital image of other printed material, such as an address block, on the object is obtained, and the image is processed to abstract characterizing information descriptive aspects of the other printed material. The aspects can be measurements of word lengths, counts of outliers in images of characters, or descriptions of the shape of the other printed material. The characterizing information is combined with other information, such as postal information, and the combined information is then cryptographically authenticated with a digital signature or the like. An indicium representative of the authenticated information is then printed on the object. The object's relationship to the indicium can be verified by regenerating the characterizing information from the other printed material and comparing the regenerated characterizing information with characterizing information recovered from the indicium. Thus, copies of the indicium cannot easily be used, without detection, on other objects which do not include the other printed material.
摘要:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.