摘要:
Tamper detecting enclosures are described. In one configuration, an inflated balloon at least partially surrounds a module in an enclosure and biases at least one normally opened switch into a closed position during normal operation. If an attacker attempts to attack the enclosure, the balloon should at least partially deflate and cause the switch to return to its normally opened position thereby detecting the attack. In another configuration, the balloon is adhered to the inside wall of the outer enclosure.
摘要:
Systems and methods for increasing user trust by authenticating an electronic commerce server over an electronic communications channel using information received through an out-of-band communication in a physical communications channel are described. In one configuration, a paper bill is sent to a user by physical mail delivery and it includes challenge and response data used to authenticate the electronic commerce server over the electronic communications channel.
摘要:
Systems and methods including mailing machines having postage meters including multiple postal security devices are described. In one illustrative configuration, a postage meter having multiple postal security devices for use with different postal carriers is described. In another illustrative configuration, a postage meter is configured to apply two postage payment information indicia to a single mail piece using two separate postal security devices.
摘要:
Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for providing a distributed voice user interface for a remote device having a limited visual user interface simultaneously with a data stream for facilitating secure automated catalog orders for simultaneous electronic fulfillment applied to that device are described.
摘要:
A method and system for drying printed ink on the face of a substrate material such as a mailpiece. The method comprising the steps of (i) providing a dryer having at least one variable output element for producing a plurality of dryer configurations, (ii) developing data correlating each of the dryer configurations with at least one print characteristic, (iii) storing the developed data in a memory storage device, (iv) obtaining the print characteristic associated with a particular print job and comparing the print characteristic with the developed data to define a desired dryer configuration, (v) adapting the dryer to assume the desired dryer configuration based upon the print characteristic, and (vi) drying the ink printed on the face of the substrate material. The system may include a taggant introduced into the ink and a means for identifying the taggant to determine the type of ink and the desired dryer configuration.
摘要:
Systems and methods for increasing user trust by authenticating an electronic commerce server over an electronic communications channel using information received through an out-of-band communication in a physical communications channel are described. In one configuration, a paper bill is sent to a user by physical mail delivery and it includes challenge and response data used to authenticate the electronic commerce server over the electronic communications channel.
摘要:
A method and system for selecting an external user interface using spatial information is described. In one configuration the floor space of a mailroom is mapped using a two dimensional grid. At least one machine is located on the mapped grid and an associated control zone is defined for that particular machine. The machine includes a wireless transceiver for providing user interface access. An external portable processor with a wireless transceiver is provided with user interface logic for the machine. A user then moves the external portable processor into the control zone of the machine. An indoor positioning system is utilized to provide relative or absolute position information relating to the machine and the external processor. The system determines that the external processor is in the machine control zone and allows the external processor to function as a user interface for the machine.
摘要:
An illustrative data structure is provided using a structured table that uses a split primary key including a first key (partition key) and a second key (row key) along with a timestamp key, but that does not otherwise utilize uniform columns that could be used as a key. The partition key that is utilized is unusually fine in that it consists of an individual user identifier that is unique to the system and/or across multiple systems used in an enterprise. Additionally, the system may limit access to one session per individual partition key.
摘要:
Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for providing a distributed voice user interface for a remote device having a limited visual user interface simultaneously with a data stream for facilitating secure automated catalog orders for simultaneous electronic fulfillment applied to that device are described.
摘要:
A system for detecting failures in a sensitive region of an inkjet printhead is described. The system includes an inkjet printer that uses a printhead for printing an image on a substrate. The image has a sensitive portion that is more sensitive to printing failures than the rest of the image. The printhead includes a first portion that prints an area of the substrate corresponding to the sensitive portion of the image. A radiant energy source is used with a photodetector located downstream from the printhead to detect background florescence from the substrate in the area of the substrate corresponding to the sensitive portion of the image that should be quenched by printing of the image. If background fluorescence is detected, a failure is indicated.