Abstract:
In a method and an arrangement for increasing the throughput of mail when franking with a security imprint, the editing of the print image data is undertaken by a postage meter machine processor, and the calculation of the security code is undertaken by a separate security module while the print image data are being edited. A high system clock performance is achieved by interleaving of the two calculation tasks.
Abstract:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
Abstract:
Apparatus and method for the maintenance of redundant postage accounting datafiles. Redundant postage accounting report data is maintained by the present invention by first creating a datafile on a postage metering device (e.g., an SMD) to store postage accounting data. A second datafile is created on a computer capable of communicating with the SMD (which may be either remote or local to the computer). For every transaction which updates the postage accounting data stored in the SMD, the datafile residing on the computer is updated to reflect the change.
Abstract:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
Abstract:
The invention relates to a method and a device for the generation of checkable forgery-proof documents with an externally supplied cryptographic module, whereby the checking of authenticity of the document is carried out without using key information belonging to the cryptographic module. According to the invention, the method and the device are characterised in that the cryptographic module is supplied with two types of data, even on supply from a communication partner which is cryptographically not trustworthy, which either remain in the cryptographic module or are attached to the document. The information remaining in the cryptographic module is used to secure the document information by means of a check value and the information transferred into the document serves to verify the securing of the document by the cryptographic module during a check of the authenticity of the document at a checkpoint.
Abstract:
A postal system includes a local computer having a user interface and an associated storage unit for storing a secure data file that contains postal (e.g., accounting) data. A secure processing unit interfaces with the local computer and performs the secure processing normally associated with a secure postal environment. The secure processing unit can be designed to receive power from the computer to which it couples, and generally does not require special interconnect. By using the secure processing unit to perform the secure processing and the local computer to perform other postal functions (e.g., user interface), complexity is reduced which translates to faster speed of operation and a more economical hardware design.
Abstract:
A mail processing system having a postal security device (PSD) that can be dynamically configured to support multiple customers and carriers is provided. Meter records are maintained at a data center. Each meter record includes information necessary to configure the PSD for a particular customer and/or a specified carrier. The data center provides a requested meter record to the PSD, which then is configured according to the meter record. Once loaded with a complete meter record, the PSD will function as a traditional PSD and mail processing can be performed by the mail processing system using the configured PSD. All accounting takes place locally in the PSD, and all records maintained in the meter record are updated locally in the PSD. Upon completion of the mail run, the updated meter record can then be uploaded to the data center until the next mail run that requires the meter record.
Abstract:
A postal system includes a local computer having a user interface and an associated storage unit for storing a secure data file that contains postal (e.g., accounting) data. A secure processing unit interfaces with the local computer and performs the secure processing normally associated with a secure postal environment. The secure processing unit can be designed to receive power from the computer to which it couples, and generally does not require special interconnect. By using the secure processing unit to perform the secure processing and the local computer to perform other postal functions (e.g., user interface), complexity is reduced which translates to faster speed of operation and a more economical hardware design.
Abstract:
System and method for performing cryptographic operations include providing at least one processor for performing cryptographic operations, memory coupled to the processor for use in performing the cryptographic operations; and a storage component coupled to the processor for storing and retrieving information calculated and used in the cryptographic operations. The processor, memory and storage component are securely enclosed whereby direct access to the cryptographic operations is prevented. At least the processor is comprised in an integrated circuit. A first power source, which is external to the secure enclosure, is coupled to and supplies power to the processor, the memory and the storage component. A second power source, which is within the housing of the integrated circuit, is coupled to and supplies power to at least the processor. A switch is included for switching from the first power source to the second power source when the cryptographic operations are being performed and for switching from the second power source to the first power source when non-cryptographic operations are being performed.
Abstract:
System and method for performing cryptographic operations include providing at least one processor for performing cryptographic operations, memory coupled to the processor for use in performing the cryptographic operations; and a storage component coupled to the processor for storing and retrieving information calculated and used in the cryptographic operations. The processor, memory and storage component are securely enclosed whereby direct access to the cryptographic operations is prevented. A first power source, which is external to the secure enclosure, is coupled to and supplies power to the processor, the memory and the storage component. A second power source, which is internal to the secure enclosure, is coupled to and supplies power to at least the processor. A switch is included for switching from the first power source to the second power source when the cryptographic operations are being performed and for switching from the second power source to the first power source when non-cryptographic operations are being performed.