摘要:
A method of renting a rental article is provided including delivering the rental article by a delivery service provider between rentees without returning the rental article to a renter of the rental article; and delivering the rental article to an article service provider, between deliveries of the rental article, to two of the rentees, based upon a predetermined event.
摘要:
A method of paying for postage stamps, that involves offering a postage stamp for sale by a distributor to a consumer, wherein the stamp has a unique identification code and is initially inactive; distributing the postage stamp to the consumer; activating the stamp for use; and accounting with the distributor for postage associated with the stamp after the stamp has been distributed to the consumer.
摘要:
A printing system for printing both secure value documents and non-secure documents while ensuring that fraudulent copies of secure value documents printed by the printing system can be detected is provided. The printing system determines if the source is a secure or non-secure source. If the source of the image is a secure source, it will print the image, including any graphic security features. If the source is a non-secure source, before printing the image a filter is applied to the image data to remove any graphic security features included in the received image and/or the printing system will not add any graphic security features to the received image to ensure that the printed image will not contain any copy detection graphic security features.
摘要:
A printing system is provided that dynamically adjusts the method of printing an image based on the lightness or darkness of the medium upon which the image will be printed. The reflectivity of the medium upon which an image is to be printed is determined, and the way in which the image will be printed is adjusted based on the determined reflectivity of the medium. For lighter colored mediums, on which sufficient contrast will be provided, the image can be printed directly onto the medium. For darker colored mediums, on which the ink used to print the image will not provide enough contrast with respect to the medium to produce a reliably readable image, the method of printing the image is modified to ensure that sufficient contrast is always provided to produce a reliably readable image.
摘要:
Methods and systems for authenticating website users without exposing passwords or other sensitive information to potential theft are provided. When the user's computer connects to a website server all communications are routed through a secure authentication device. When the authentication device identifies the need for user information to be submitted to the website server, the application retrieves the required information from memory and inserts the information into the appropriate location in the website forms. Since the secure connection to the website server is established in the secure boundary of the authentication device, the information is protected from being obtained by any malware that may reside in the user's computer.
摘要:
An authentication method based on the use of an inanimate physical object that includes storing first object data in a storage medium, wherein the first object data is generated based on a first image of at least a portion of the physical object, capturing a second image of the at least a portion of the physical object, and generating second object data based on the second image. The method further includes searching the storage medium and determining that the second object data and the first object data are a match, and authenticating an individual associated with the physical object in response that determination. Also provided are embodiments of an authentication system that may be adapted to implement the method.
摘要:
Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.
摘要:
A system, method, and medium, the method including receiving parameter information associated with a mailer, associating the parameter information with a mailing, receiving statistical information, the statistical information including historical performance data of at least one carrier, determining a delivery sequence for the mailing based on the received mailer parameter information and the statistical information, and outputting the determined delivery sequence for the mailing.
摘要:
Systems and methods for providing secure digital mail document storage, retrieval and use in a cloud computing environment, such as by advantageously configuring a hybrid cloud computing environment are described. In one, a privately hosted data processing system includes a private key and a PKI decryption subsystem, and a publicly hosted data processing system includes a symmetric key decryption subsystem, wherein digital documents are encrypted by a corresponding individual symmetric key and each of the symmetric keys is encrypted by a public key associated with the private key. In another configuration, document decryption is handled differently depending upon the type of client making the request.
摘要:
A method and system for processing and printing shipping labels having postage is described. In one configuration a postage dispensing system allows a shipping label reprint for a relatively short period of time. In another configuration, the system offers a refund after the second unsuccessful print attempt and logs the label identifier as an invalid identifier. If the print is successful, the identifier is logged as a successful identifier. The system occasionally receives identifiers that have been processed in the mail stream and reports fraud if an unexpected identifier is present.