摘要:
Various methods for detecting the removal of a processing unit, such as a microprocessor or a microcontroller, form a printed circuit board in a secure printing system, such as a postage metering system are provided. The methods utilize one or more of a real time clock provided internal to the processing unit, a CMOS device provided on the printed circuit board external to the processing unit, and CMOS memory internal to the processing unit to detect the removal of the processing unit and therefore an attack.
摘要:
A system and method for efficient uncorrectable error detection in flash memory is described. A microcontroller including a non-volatile flash memory utilizes an Error Correction Code (ECC) having a certain error detection and correction bit strength. The user data is first processed by a hash function and hash data is stored with the user data. Then, the user data and hash data are processed by the ECC system. In detection, the hash ensures that a relatively low bit-strength ECC system did not incorrectly manipulate the user data. Such a hash integrity check provides an efficient, robust detection of incorrectly corrected user data resulting from errors beyond the correction but strength of the ECC system utilized.
摘要:
A system and method for efficient uncorrectable error detection in flash memory is described. A microcontroller including a non-volatile flash memory utilizes an Error Correction Code (ECC) having a certain error detection and correction bit strength. The user data is first processed by a hash function and hash data is stored with the user data. Then, the user data and hash data are processed by the ECC system. In detection, the hash ensures that a relatively low bit-strength ECC system did not incorrectly manipulate the user data. Such a hash integrity check provides an efficient, robust detection of incorrectly corrected user data resulting from errors beyond the correction but strength of the ECC system utilized.
摘要:
Various methods for detecting the removal of a processing unit, such as a microprocessor or a microcontroller, form a printed circuit board in a secure printing system, such as a postage metering system are provided. The methods utilize one or more of a real time clock provided internal to the processing unit, a CMOS device provided on the printed circuit board external to the processing unit, and CMOS memory internal to the processing unit to detect the removal of the processing unit and therefore an attack.
摘要:
A system and method for efficient uncorrectable error detection in flash memory is described. A microcontroller including a non-volatile flash memory utilizes an Error Correction Code (ECC) having a certain error detection and correction bit strength. The user data is first processed by a hash function and hash data is stored with the user data. Then, the user data and hash data are processed by the ECC system. In detection, the hash ensures that a relatively low bit-strength ECC system did not incorrectly manipulate the user data. Such a hash integrity check provides an efficient, robust detection of incorrectly corrected user data resulting from errors beyond the correction but strength of the ECC system utilized.
摘要:
A system and method for efficient uncorrectable error detection in flash memory is described. A microcontroller including a non-volatile flash memory utilizes an Error Correction Code (ECC) having a certain error detection and correction bit strength. The user data is first processed by a hash function and hash data is stored with the user data. Then, the user data and hash data are processed by the ECC system. In detection, the hash ensures that a relatively low bit-strength ECC system did not incorrectly manipulate the user data. Such a hash integrity check provides an efficient, robust detection of incorrectly corrected user data resulting from errors beyond the correction but strength of the ECC system utilized.
摘要:
A system and method is provided for refilling a postage metering system that includes a host coupled to a postal security device (PSD). A user enters a first request for postage refill which is transmitted to a meter server. The meter server transmits a request for a PSD audit to the postage metering system. PSD audit data is signed with a first secret key stored in the PSD to produce an audit message that includes a first signature and the PSD audit data. The audit message is transmitted to the meter server which transmits the first signature to a key management system which then verifies the first signature using a second secret key stored in the key management system. The PSD audit data is verified at the meter server which then constructs a second request for meter refill and transmits it to a meter recharging data center. The meter recharging data center generates a refill combination and transmits it to the meter server. The refill combination is transmitted from the meter server to the key management system for signature using the second secret key to produce a refill message that is transmitted to the meter server. The refill message includes a second signature and the refill combination. The refill message is transmitted to the PSD which verifies the signature and the refill combination using the first secret key and credits the PSD for the amount.
摘要:
Apparatus and method of determining the authenticity of a signal indicative of the mass of an article being weighted. The article is placed upon the platform, and the platform is caused to oscillate and the period of harmonic motion is measured. One of or both the frequency of oscillation and amplitude of the transducer signal is monitored for purposes of determining authentication.
摘要:
A secure system for Authentication information. The system includes a scanner for reading the information contained in a document, a timing mechanism for entering the time the document was read, an encryptor for encrypting the read and timed information and a counter for counting the number of documents processed.
摘要:
A method is provided for improving print quality for a 2-D bar code. The method includes determining printer type, including print resolution, for printer that will print 2-D bar code and entering paper type for the envelope. A suggested 2-D bar code module size is calculated based on the paper and the printer type. A test sample 2-D bar code is printed at the suggested 2-D bar code module size. The printed test sample is scanned and then evaluated for print quality and readability. The method can also suggest a 2-D bar code module size to the user.