Abstract:
A method and apparatus for generating a Value Bearing Indicium (VBI) for on-line ticketing applications. A VBI may be generated by hashing user information to create a message digest that is used to create a digital signature. The digital signature is combined with the user information to create a VBI that can be validated by a variety of stand-alone or on-line methods. An on-line ticketing application using the VBI is described.
Abstract:
A method and apparatus for generating a Value Bearing Indicium (VBI) for on-line ticketing applications. A VBI may be generated by hashing user information to create a message digest that is used to create a digital signature. The digital signature is combined with the user information to create a VBI that can be validated by a variety of stand-alone or on-line methods. An on-line ticketing application using the VBI is described.
Abstract:
The invention relates to a method for providing postal items with postal prepayment impressions, characterized in that data are generated in the customer system that are encrypted in such a manner that the value transfer center is able to decrypt them. To this end, the data are transmitted from the customer system to the value transfer center. The value transfer center then decrypts the data and re-encrypts them with a code not known to the customer system and transmits the encrypted data to the customer system.
Abstract:
A postage metering system (100) includes a postage meter (130) and a user interface (120) in communication with the postage meter (130). The user interface (120) includes a micro controller (122) and a memory (126). The memory (126) has stored therein a plurality of image data files (140) corresponding to different currencies. The postage meter (130) includes a micro controller (132) and a memory (134) having stored therein an indicator of meter currency type. The user interface uses the indicator of meter currency type from the postage meter (130) to select a particular one of the plurality of image data files (140) for use in printing a postal indicia (20).
Abstract:
An automated mailing/shipping system (1, 2, 3) and method communicates an activation key (90) to a customer terminal (2) for modifying one or more features of a mailing/shipping program (100) installed at the customer terminal (2). The modification performed may be the activation, de-activation, or addition of those features (100). Communication of the activation key (90) may take place over a computer network such as the Internet (4), and if so, encryption information may be sent with the key (70) to protect information exchanges between the customer terminal (2) and a service provider terminal (1) which sent the key. In accordance with other aspects of the method, a data base of customer information maintained at the service provider terminal is searched (200) for customers (210) who might be interested in receiving a new feature of the mailing/shipping system (220) or who have pre-purchased a rate table update service (250). An electronic mail message containing the new feature or rate table is communicated (240) to the customer terminal (2) for installation and access by the customer.
Abstract:
Systems and methods maintain a database of recipient names and addresses where the delivery point addresses contain secondary address. Data that is stored in the database may be arrayed in secure data tables. The structure of the secure data tables ensures that the data is secure and prevents an unauthorized user from learning address information improperly. A delivery service provider may create secure data tables using 20-byte Secure Hash Algorithm. A software searches secure data tables for the matching recipient name and address. If the match is found, a business sender may receive valid secondary address information for that recipient. If, however, a database does not contain a matching recipient name and address, a business sender may not receive any further information about that recipient's address.
Abstract:
The invention relates to a method for providing letters and parcels with postal remarks. A client system loads a fee amount from a value transmission centre through a data line, said client system controlling the printing of postal remarks on letters and parcels and said value transmission centre transmitting a data packet to the client system. According to the invention, the method is characterised in that the value transmission centre generates a code and transmits the code to the client system, in that data that are generated in the client system can be encoded with said code in such a way that the value transmission centre can decode them, in that the data are sent from the client system to the value transmission centre and in that the value transmission centre decodes these data, in that the value transmission system forms a random number and then replaces the data, together with the random number, encodes them with a code that is unknown to the client system and with a code that is known to the security module of the client system and then transmits these encoded data to the client system. The invention also relate to a client system for franking letters and parcels and to a value transmission system for using in a franking method.
Abstract:
A method and system for efficiently retrieving secured data by securely pre-processing provided access information, provides data store security based on only a single piece of access information, which is generally public, such as the proper name of a business or individual that is used to retrieve mailing address information. The access information is hashed (43) for access to a secured data store and efficient access and low data storage for permutations of input access information are provided by verifying the presence of an entry for the hashed access information in a look-up table (44). if an entry is found, the data store is accessed using the hashed access information (48), but if an entry is not found, another look-up table corresponding to another information type may be tried (49) or the input access information permuted (52) and retried.
Abstract:
A system for authenticating software is disclosed. In one embodiment, the invention is utilized in conjunction with a gaming machine to authenticate the software utilized by the gaming machine or loaded onto the gaming machine. To achieve authentication, one exemplary mode of operation is used to authenticate the contents of a removable media (224), the removable media being used to per form any desired operation on the gaming machine. Use of a removable media (224) provides means to store large amounts of software on a single media to thereby access and perform numerous tasks including software install, software update, diagnosis, authentication, or configure.
Abstract:
A system for authenticating software is disclosed. In one embodiment, the invention is utilized in conjunction with a gaming machine to authenticate the software utilized by the gaming machine or loaded onto the gaming machine. To achieve authentication, one exemplary mode of operation is used to authenticate the contents of a removable media, the removable media being used to perform any desired operation on the gaming machine. Use of a removable media provides means to store large amounts of software on a single media to thereby access and perform numerous tasks including software install, software update, diagnosis, authentication, or configure. Prior to use of the removable media in the gaming machine, an authentication file is created. The authentication file contains a listing of each file on the removable media and an associated hash value calculated with a known hash function. These hash values are calculated and stored in an authentication file when the files on the removable media are known to be trusted. Encryption of the one or more hash values may occur. At a later date when the removable media is used in the gaming machine, a hash value re-calculation is performed on each file to determine the hash value at the time of use. The re-calculated hash values are compared to the decrypted hash values stored in the authentication file on the removable media on a file-by-file basis. If the values match, the removable media authenticates. If the values do not match, the removable media does not authenticate.