摘要:
A method of manufacturing transaction evidencing devices, such as digital postage meters, includes the steps of generating a master key in a logical security domain of a Key Management System; installing the master key into a digital postage meter; verifying the installation of the master key; and registering the master key to a logical security sub-domain in the Key Management System. The step of generating the master key further includes the steps of generating a domain; generating at least one sub-domain; installing the domain in secure boxes of the Key Management System; generating a master key and test token within the domain; and recording the master key in the domain archive. The step of installing the master key further includes the steps of installing the master key into a digital meter; and associating the master key with a unique device identifier. The step of registering the master key to a logical security sub-domain in the Key Management System further includes the steps of assigning a sub-domain to the digital meter; installing a postal identifier into the digital meter; associating the postal identifier to the unique device identifier; generating a registration token in the digital meter based on the postal identifier and the unique device identifier; generating registration tokens using the master key recorded in the archives; verifying that the registration tokens are identical; and recording the master key in the sub-domain. The steps are repeated for each domain assigned to the digital postage meter.
摘要:
A method for certification by a plurality of certifying authorities of the public key of a user wishing to communicate using a public key encryption system while asserting only a subset of rights. A plurality of certifying stations and a user station exchange information and the user station derives a plurality of private keys from the exchanged information. The certifying stations also publish related information and their public keys. The user communicates using a private key formed by summing selected ones of said plurality of private keys corresponding to asserted rights. A third party can derive the public key corresponding to the user's summed private key by operating on the published information with a summation of the certifying station public keys.
摘要:
A system for reliably authenticating a document includes a device having a decryption key therein that, upon application to information provided by a user, reveals not only a plain text message indicating the source of the authentication but, in addition, provides the decryption key for use with the information provided by the mailer.
摘要:
Systems and methods herein relate to verifying an authentication of a sender of a mail item. Certain implementations may include various steps, such as: the sender applying a machine-readable postage indicium having an embedded electronic seal onto the mail item, the sender electronically transmitting the seal to a logistics service provider, the logistics service provider reading a received seal out of a received postage indicium of the mail item received by the logistics service provider, the recipient detecting a postage indicium of the mail item delivered to the recipient by means of a mobile reading device and transmitting said postage indicium to the logistics service provider, the logistics service provider reading a delivered seal out of the delivered postage indicium, and/or the logistics service provider comparing the delivered seal with the transmitted seal.
摘要:
A method for certifying the public key of a user wishing to communicate using a public key encryption system by a plurality of certifying authorities. A plurality of certifying stations and a user station exchange information and the user station derives a public key from the exchanged information. The certifying stations also publish related information and their public keys. A third party can derive the public key corresponding to the user's private key by operating on the published information with a summation of the certifying station keys.
摘要:
The invention relates to a method for checking postage stamps on letters and parcels, at a checkpoint. Said checkpoint deciphers the identity and authenticity of a customer system having generated the production of the stamp by decoding cryptographic security elements originating from a trusted certification point. According to the invention, this method is carried out in such a way that means contained in the checking unit determine a key for which the probability of having been used to encode the data at the certification point is particularly high.
摘要:
A method and system for authenication of communications. More particularly the subject application discloses a method and apparatus whereby a third party may validate that a communication is an authentic communication from a second party sent with the authorization of a first party. For example, the third party may be a postal service, the second party may be a mailer, and the communication may be a postal indicia showing that a mail piece has been properly franked. The first party and the second party share an encryption key, or a series of keys. The first party also has a second encryption key which the third party has the ability to decrypted. In the subject invention the first party encrypts a key shared with the second party with the first party's second key and transmits this to the second party. The second party then uses its copy of the key to encrypt information and appends its encrypted information to the message received from the first party and transmits all this to the third party. The third party may then decrypt the copy of the key encrypted by the first party and use this information to decrypt the information encrypted by the second party. The known technique of eliptical logarithms may be used to provide highly secure encryption of short messages. The second party may be a mailer and the apparatus of the subject invention may include a postage meter which prints the information transmitted to the third party, who may be a postal service, on a mail piece as a postal indicia.
摘要:
A PSD has a private key which is associated with a specific public key that is stored in the host PC. The host PC sends the PSD public key private key to the PSD. If the PSD determines that the received PSD public key corresponds to its private key, the system has determined that the expected PSD is connected to the Host system and the PSD is activated to accept postal value requests from the host PC. Additionally, a PSD state identification, such as a checksum of a PSD transaction log file stored in the host may be verified by the PSD, which also has stored therein a PSD transaction log file. In this manner the PSD verifies that the PSD has performed all transactions with the host PC sending the checksum. Methods for verifying in the PSD that the expected host PC is coupled to the PSD mirrors the two embodiments for verifying the expected PSD.
摘要:
A Key Management System for generating, distributing and managing cryptographic keys used by an information transaction system that employs cryptographic means to produce evidence of information integrity. The system comprises a plurality of functionally distinct secure boxes operatively coupled to each other. Each of the secure boxes performs functions for key generation, key installation, key verification or validation of tokens. Computers, operatively coupled to the secure boxes, provide system control and facilitate communication among the secure boxes. A plurality of separate logical security domains provide domain processes for key generation, key installation, key verification and validation of tokens produced by the transaction evidencing device within the domain using the key management functions. A plurality of domain archives, corresponding respectively to each of the security domains, securely and reliably record key status records and master keys for each domain. The Key Management System installs the master keys in the transaction evidencing device and validates the tokens. The secure boxes include a key generation box for generating, encrypting and signing a master key; a key installation box for receiving, verifying and decrypting the signed master key and for installing the master key into the transaction evidencing device; a key verification box for verifying the installation of the master key in the transaction evidencing device, a token verification box for verifying the tokens, and at least one manufacturing box for generating domain keys and distributing the domain keys among the secure boxes for each of the domains.
摘要:
A method of token verification in a Key Management System provides a logical device identifier and a master key created in a logical security domain to a transaction evidencing device, such as a digital postage meter. The method creates a master key record in a key verification box, securely stores the master key record in a Key Management System archive, and produces in the transaction evidencing device evidence in the logical security domain of transaction information integrity. The method inputs the evidence of the transaction information integrity to a token verification box, and inputs in the token verification box the master key record from the Key Management System archive. The method determines in the token verification box that the master key is valid in logical security domain, uses in the token verification box the master key to verify the evidence of transaction information integrity, and outputs from the token verification box an indication of the result of the verification of the evidence of transaction information integrity. The master key record includes the logical device identifier, the master key and a digital signature associating the logical device identifier and the master key. The method checks the digital signature to verify the association of the logical device identifier and the master key within the logical security domain.