For decades, postage meters have imprinted their postal indicia on envelopes by means of relief printing using printing dies. The indicia are generally formed with fluorescent ink of a distinctive color. Postage meters to serve such purposes are well known and reliable.
It has been proposed in recent years by some postal authorities to discontinue the use of die-printing postal indicia and instead to use off-the-shelf ordinary computer printers such as inkjet printers and laser printers for the printing of postal indicia. The use of off-the-shelf printers presents, of course, the profound problem of counterfeit indicia printed by parties wishing to print postage without having to pay for it. In an effort to reduce this problem, postal authorities have proposed to include within the postal indicia cryptographic information which is intended to permit the postal authorities to distinguish between counterfeit indicia on the one hand and legitimate indicia on the other hand. It is often proposed that the cryptographic information be printed on mail pieces by means of two-dimensional bar codes. Each such bar code contains information, such as CRC checksum, which serves to indicate whether the bar code has been correctly read.
The cryptographic authentication provides meaningful protection against counterfeit indicia only if the postal service treats authentic indicia differently than it treats counterfeit indicia. If mail pieces bearing counterfeit indicia are delivered by the postal service just as legitimate mail pieces are delivered, then this would become widely known and fraud would increase to high levels (given that the required printers are readily available).
A related problem is that cryptographic postal indicia, if printed in the form of two-dimensional bar codes, are not always easy to read. They will get smudged and smeared. They will be printed at skew angles relative to the edges of the mail pieces. They will have less than optimal contrast ratios. This presents the problem of what the postal service should do if it is unable to read a particular indicium on a mail piece.
It is instructive to discuss what counts as a “readable” bar code. Bar codes used in this context will contain a cyclical redundancy check, a checksum, a hash total, or some other test of the internal consistency of the bar code. As is well known to those skilled in the art, when the bar code is being generated, the “body” or text or content of the bar code is passed through a predetermined function. The function is preferably a cyclical redundancy check (CRC) polynomial but could less preferably be a checksum or hash function. The output of the function (for example, a CRC checksum) is noted and is written in the bar code along with the content. A bar code reader will read the body and the CRC checksum, and will pass the body through the same function yielding an output. This output is compared with the CRC checksum that was read from the bar code. If the bar code tests out to be internally inconsistent (for example by failing the CRC check) then we define this to mean that the bar code is “unreadable”. If, on the other hand, the output matches the CRC checksum that was read from the bar code, then we define this to mean that the bar code is “readable”.
In the case of an unreadable bar code, should the postal service deliver the mail piece anyway? Such an approach would encourage fraud. Persons with fraudulent intent would quickly learn to create bar codes which intentionally failed the CRC check so that they would be delivered without the nuisance of passing a cryptographic authentication.
In the case of an unreadable bar code, should the postal service return the mail piece to the sender? Given that many events, such as smudging or smearing, can male a bar code unreadable, such an approach would motivate mailers to use other franking means such as postage stamps or (if they are not outlawed) relief-type postage meters using printing dies. This awkward decision would repeat itself over a billion times a day in the United States where the daily mail volume is well in excess of a billion mail pieces daily, with a non-negligible percentage of mail pieces halving been rendered unreadable clue to smudging or smearing.
It is all too easy simply to say that the postal service would use bar-code readers with extremely high resolution and sophisticated software to deal with skew, poor contrast, and smudged and smeared indicia. Such bar code readers are very expensive. But even if modest-quality bar code readers were used, estimates of the cost to provide bar-code readers and authentication equipment for the United States are in the billions of dollars. Equipping every US Postal Service mail processing facility with high-quality readers instead of moderate-quality readers would put the nationwide installation cost at tens or hundreds of billions of dollars.
It would be extremely desirable to have an approach for the authentication of mail pieces bearing bar-coded indicia which would be reliable, inexpensive, and robust.
An improved system is provided for authentication of mail pieces bearing bar-coded indicia. The system comprises first and second bar-code readers, the first and second bar-code readers differing in that the first bar-code reader has a lower rate of successful reading of bar-coded indicia than the second bar-code reader. The system collates a mail piece bearing an indicium in a second paper path in the event of a successful reading of the bar-coded indicium by said first bar-code reader, and collates mail pieces in a third paper path in the event of an unsuccessful reading of the bar-coded indicium by the first bar-code reader. The third paper path leads to the second bar-code reader, and the system collates mail pieces in a fourth paper path in the event of a successful reading of the bar-coded indicium by the second bar-code reader. The system collates mail pieces in a fifth paper path in the event of an unsuccessful reading of the bar-coded indicium by the second bar-code reader.
The invention will be described with respect to a drawing in several figures, of which:
In a prior-art system, a mail piece has all indicium. The indicium may be authentic and readable, it may be counterfeit, or it may be authentic but unreadable (at least upon the first attempt to be read). The system must distinguish between these three possibilities. In the prior-art system the mail piece would pass by a bar code reader and the content of the bar code would be read. If the contents of the bar code were unreadable the mail piece would be returned to the sender. If the contents of the bar code were readable and passed the authentication test, then the mail piece would be delivered. Otherwise the postal service would conclude that the mail piece has a fraudulent indicium and would proceed with a criminal investigation leading to arrest and conviction of the sender.
Importantly, in the system 20 according to the invention the mail pieces which were incapable of being read proceed in an automatic way along path 25 to a second reader 28.
The first and second bar code readers are selected as will now be described. The second bar code reader 28 has a higher success rate at reading indicia as compared with the first bar code reader.
In a typical embodiment the second bar code reader has a higher resolution than the first bar code reader, that is, it scans the indicium by breaking it up into a larger number of rows and columns. Stated differently, it scans the indicium in a way that yields a much larger number of pixels when compared with the first reader, and each pixel is smaller. Such a reader is more expensive because its imaging array is more expensive, and because it must process more data to determine the bar code information content.
In a related embodiment the second bar code reader differs from the first reader by having deskewing functionality that is lacking in the first bar code reader, functionality that overcomes problems of the indicium being skewed relative to the mail piece edges.
In another related embodiment the second bar code reader is physically and optically identical to the first bar code reader but takes more time to make its reading. For example, the first bar code reader may have a linear array which detects light and dark areas as the mail piece passes perpendicular to the array. The first and second bar code readers may differ simply in the speed of the mail piece; the first reader may pass its mail pieces at a high speed and with limited control over angular skew of the mail piece, while the second reader may move its mail pieces more slowly and with a strict control eliminating any angular skew of the mail piece relative to the paper path.
In another embodiment the first reader uses a linear array which scans the indicium as the mail piece passes by the array. The second reader uses a two-dimensional imaging array to take a snapshot of the indicium. The mail piece may be motionless during the snapshot, or the second reader may use a strobe light to illuminate the indicium instantaneously even though it is in motion. In either case it will be appreciated that the second reader may have a higher success rate relative to the first reader, a success rate that stems from the more expensive imaging array or from the slower throughput of the system (because mail pieces are brought to a halt to have their picture taken) or both.
In the most generalized case, the second bar code reader is simply much more expensive or slower or both, when compared with the first bar code reader.
Returning to
If, on the other hand, the reader 28 is unable to read a bar code, then the mail piece proceeds along path 33 to optional stack 34.
The process may be generalized. For example the twice-unreadable mail pieces 34 can be passed to a third reader omitted for clarity in
It should be appreciated that if there were simply a single first reader 23 operatively connected with a single second reader 28, the everyday result would be that the first reader 23 is busy all of the time and the second reader would be busy only part of the time. The reason for this is that (by assumption) most of the bar codes would be readable by the first reader 23.
In the case where reader 28 is slower than reader 23, then this imbalance is partly returned to balance because although reader 28 gets fewer mail pieces than reader 23, it takes longer to process the mail pieces that it does receive.
In the case where reader 28 is not necessarily slower than reader 23 but is more expensive, then the imbalance presents the question why reader 23 is used in the first place. Thus, in an exemplary embodiment of the invention, there would be two or more readers in the position of reader 23, and a third reader in the position of reader 28. Document paths are defined so that if either of the readers 23 fails to read a bar code correctly, the offending mail piece would be passed on to third reader 28. Reader 28 is selected to have a higher success rate at reading difficult bar codes thin the readers 23, but as mentioned above it may be slower or more expensive than readers 23. It is thus desirable to cascade two or more readers 23 into reader 28. Stated differently, if any of the several readers 23 finds itself unable to read a bar code, then the mail piece is sent to reader 28.
The sending of the unreadable mail piece from first reader 23 to more-successful reader 28 is preferably performed without manual intervention. But it will be appreciated that the benefits of the invention present themselves even if such unreadable mail pieces are hand-carried from the “unreadable” path of reader 23 to an input of reader 28.
In the case where the bar code reader 28 employs a linear sensing array, the array may be identical to that used in bar code reader 23 but with the mail piece stepped through much smaller steps, such as steps half as large as the steps used with reader 23.
In the case where the bar code reader 28 employs a scanning light source such as a laser, the higher success rate of reader 28 may result from a design decision to halt the mail piece long enough to scan the bar code.
This application claims priority from U.S. Provisional Application Ser. No. 60/170,506, filed Dec. 13, 1999.
Number | Name | Date | Kind |
---|---|---|---|
5390251 | Pastor et al. | Feb 1995 | A |
5917925 | Moore | Jun 1999 | A |
5974147 | Cordery et al. | Oct 1999 | A |
6009416 | Pintsov | Dec 1999 | A |
6041704 | Pauschinger | Mar 2000 | A |
6125357 | Pintsov | Sep 2000 | A |
6175827 | Cordery et al. | Jan 2001 | B1 |
6308165 | Gilham | Oct 2001 | B1 |
6385504 | Pintsov et al. | May 2002 | B1 |
6408287 | Sansone et al. | Jun 2002 | B1 |
Number | Date | Country |
---|---|---|
0845759 | Jun 1998 | EP |
Number | Date | Country | |
---|---|---|---|
60170506 | Dec 1999 | US |