The present invention relates to advanced postage payment systems and, more particularly, to advanced postage payment systems having pre-computed postage payment information.
The USPS is presently considering requirements for two metering device types: closed systems and open systems. In a closed system, the system functionality is solely dedicated to metering activity. Examples of closed system metering devices, also referred to as postage evidencing devices (PEDs), include conventional digital and analog postage meters wherein a dedicated printer is securely coupled to a metering or accounting function. In a closed system, since the printer is securely coupled and dedicated to the meter, printing cannot take place without accounting. Furthermore, printing occurs immediately after accounting is concluded.
In an open system, the printer is not dedicated to the metering activity, freeing system functionality for multiple and diverse uses in addition to the metering activity. Examples of open system metering devices include personal computer (PC) based devices with single/multi-tasking operating systems, multi-user applications and digital printers. An open system metering device is a PED with a non-dedicated printer that is not securely coupled to a secure accounting module.
When a PED prints a postage indicia on a mailpiece, the accounting register within the PED must always reflect that the printing has occurred. Postal authorities generally require the accounting information to be stored within the postage meter in a secure manner with security features that prevent unauthorized and unaccounted for postage printing or changes in the amounts of postal funds stored in the meter. In a closed system, the meter and printer are integral units, i.e., interlocked in such a manner as to ensure that the printing of a postage indicia cannot occur without accounting.
Since an open system PED utilizes a printer that is not used exclusively for printing proof of postage payment, additional security measures are required to prevent unauthorized printing evidence of postage payment. Such security measures include cryptographic evidencing of postage payment by PEDs in the open and closed metering systems. The postage value for a mail piece may be encrypted together with other data to generate a digital token. A digital token is encrypted information that authenticates the information imprinted on a mail piece including postage values.
Examples of systems for generating and using digital tokens are described in U.S. Pat. Nos. 4,757,537, 4,831,555, 4,775,246, 4,873,645,and 4,725,718,the entire disclosures of which are hereby incorporated by reference. These systems employ an encryption algorithm to encrypt selected information to generate at least one digital token for each mailpiece. The encryption of the information provides security to prevent altering of the printed information in a manner such that any misuse of the tokens is detectable by appropriate verification procedures.
Typical information which may be encrypted as part of a digital token includes origination postal code, vendor identification, data identifying the PED, piece count, postage amount, date, and, for an open system, destination postal code. These items of information, collectively referred to as Postal Data, when encrypted with a secret key and printed on a mail piece provide a very high level of security which enables the detection of any attempted modification of a postal revenue block or a destination postal code. A postal revenue block is an image printed on a mail piece that includes the digital token used to provide evidence of postage payment. The Postal Data may be printed both in encrypted and unencrypted form in the postal revenue block. Postal Data serves as an input to a Digital Token Transformation which is a cryptographic transformation computation that utilizes a secret key to produce digital tokens. Results of the Digital Token Transformation, i.e., digital tokens, are available only after completion of the Accounting Process.
Digital tokens are utilized in both open and closed metering systems. However, for open metering systems, the non-dedicated printer may be used to print other information in addition to the postal revenue block and may be used in activity other than postage evidencing. In an open system PED, addressee information is included in the Postal Data which is used in the generation of the digital tokens. Such use of the addressee information creates a secure link between the mailpiece and the postal revenue block and allows unambiguous authentication of the mail piece.
A typical problem for postage meters in general is when the meter accounting function debits the available postage funds of the meter but the indicia has not been successfully printed. Usually, the only way to recover such postage funds is to take mailpieces with misprinted indicia to the Post for a refund. For open and closed metering systems, whenever a digital token is issued by the metering function, the metering function debits the available postage funds before an indicia is printed. Therefore, even with new meters employing digital printing of indicia, the same problem exists.
It has been discovered that in an open metering system a digital token can be reissued from the metering system if the digital token is never printed or if a problem occurs preventing a printing of an indicia with the token. It has further been discovered that the security of the open system indicia is not compromised by such reissue of a token.
The present invention provides a method for reissuing a digital token for an open metering system, such as a PC-based metering system that comprises a PC, special Windows-based software, a printer and a plug-in peripheral as a vault to store postage funds. The PC meter uses a personal computer and its non-secure and non-dedicated printer to generate digital tokens and later print evidence of postage on envelopes and labels at the same time it prints a recipient address.
The present invention provides a token generation process for an open metering system that includes security that prevents tampering and false evidence of postage payment. The present invention further provides a token generation process that includes the ability to do batch processing of digital tokens.
In accordance with the present invention a method of reissuing digital tokens in a open system meter includes the steps of calculating a digital token using the predetermined postal information including addressee information, postage amount and piece count; debiting postal funds by the postage amount; issuing the digital token for generation of an indicia; storing the digital token and the predetermined postal information as part of a transaction record in a transaction record file indexed according to piece count; determining that an indicia generated from the digital token has not been successfully printed on a mailpiece for a particular addressee; and reissuing the digital token from the transaction record in the transaction file to generate the indicia for another attempt to print the indicia on the mailpiece.
The above and other objects and advantages of the present invention will be apparent upon consideration of the following detailed description, taken in conjunction with accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
In describing the present invention, reference is made to the drawings, wherein there is seen in
As used herein, the term personal computer is used generically and refers to present and future microprocessing systems with at least one processor operatively coupled to user interface means, such as a display and keyboard, and storage media. The personal computer may be a workstation that is accessible by more than one user.
The PC-based postage meter 10 includes a personal computer (PC) 12, a display 14, a keyboard 16, and an non-secured digital printer 18, preferably a laser or ink-jet printer. PC 12 includes a conventional processor 22, such as the 80486 and Pentium processors manufactured by Intel, and conventional hard drive 24, floppy drive(s) 26, and memory 28. Electronic vault 20, which is housed in a removable card, such as PCMCIA card 30, is a secure encryption device for postage funds management, digital token generation and traditional accounting functions. PC meter system 10 may also include an optional modem 29 which is located preferably in PC 12. Modem 29 may be used for communicating with a Postal Service or a postal authenticating vendor for recharging funds (debit or credit). In an alternate embodiment the modem may be located in PCMCIA card 30.
PC meter system 10 further includes a Windows-based PC software module 34 (
Thus, PC-based meter system 10 operates as a conventional personal computer with attached printer that becomes a postage meter upon user request. Printer 18 prints all documents normally printed by a personal computer, including printing letters and addressing envelopes, and in accordance with the present invention, prints postage indicia.
The vault is housed in a PCMCIA I/O device, or card, 30 which is accessed through a PCMCIA controller 32 in PC 12. A PCMCIA card is a credit card size peripheral or adapter that conforms to the standard specification of the Personal Computer Memory Card International Association. Referring now to
The hardware design of the vault includes an interface 56 that communicates with the host processor 22 through PCMCIA controller 32. Preferably, for added physical security, the components of vault 20 that perform the encryption and store the encryption keys (microprocessor 44, ROM 47 and NVM 46) are packaged in the same integrated circuit device/chip that is manufactured to be tamper proof. Such packaging ensures that the contents of NVM 46 may be read only by the encryption processor and are not accessible outside of the integrated circuit device. Alternatively, the entire card 30 could be manufactured to be tamper proof.
The memory of each NVM 46 is organized into sections. Each section contains historical data of previous transactions by vault 20. Examples of the types of transactions include: postage dispensed, tokens issued, refills, configuration parameters, and postal and vendor inspections. The size of each section depends on the number of transactions recorded and the data length of the type of transaction. Each section in turn is divided into transaction records. Within a section, the length of a transaction record is identical. The structure of a transaction record is such that the vault can check the integrity of data.
The functionality of DLL 40 is a key component of PC-base meter 10. DLL 40 includes both executable code and data storage area 41 that is resident in hard drive 24 of PC 12. In a Windows environment, a vast majority of applications programs 36, such as word processing and spreadsheet programs, communicate with one another using one or more dynamic link libraries. PC-base meter 10 encapsulates all the processes involved in metering, and provides an open interface to vault 20 from all Windows-based applications capable of using a dynamic link library. Any application program 36 can communicate with vault microprocessor 44 in PCMCIA card 30 through DLL 40.
DLL 40 includes the following software sub-modules. Secure communications sub-module 80 controls communications between PC 12 and vault 20. Transaction captures sub-module 82 stores transaction records in PC 12. Secure indicia image creation and storage sub-module 84 generates an indicia bitmap image and stores the image for subsequent printing. Application interface sub-module 86 interfaces with non-metering application programs and issues requests for digital tokens in response to requests for indicia by the non-metering application programs. A more detailed description of PC meter system 10 is provided in related U.S. patent application Ser. No. 08/575,112 filed concurrently herewith.
Since printer 18 is not dedicated to the metering function, issued digital tokens may be requested, calculated and stored in PC 12 for use at a later time when, at a user's discretion, corresponding indicia are generated and printed. Such delayed printing and batch processing is described in more detail in co-pending U.S. patent application Ser. No. 08/575,104, which is incorporated herein in its entirety by reference.
In accordance with the present invention, when a request for digital token is received from PC 12, vault 20 calculates and issues at least one digital token to PC 12 in response to the request. The issued digital token is stored as part of a transaction record in PC 12 for printing at a later time. In the preferred embodiment of the present invention, the transaction record is stored in a hidden file in DLL storage area 41 on hard drive 24. Each transaction record is indexed in the hidden file according to addressee information. It has been discovered that this method of issuing and storing digital tokens provides an additional benefit that one or more digital tokens can be reissued whenever a token has not been printed or if a problem has occurred preventing a printing of an indicia with the token.
By storing digital tokens as part of transaction records in PC 12 the digital tokens can be accessed at a later time for the generation and printing of indicia which is done in PC 12. Furthermore, if a digital token is lost, i.e., not properly printed on a mailpiece, the digital token can be reissued from DLL 40 rather than from vault 20. The storage of transaction records that include vault status at the end of each transaction provides a backup to the vault with regard to accounting information as well as a record of issued tokens. The number of transaction records stored on hard drive 24 may be limited to a predetermined number, preferably including all transactions since the last refill of vault 20.
Referring now to
When a status command is received, at step 210, vault 20 replies to PC 12 with its current status, at step 212. If a password is required to access vault 20 functions, at step 216 an entered password is checked for correctness.
When a command to set the date is received, at step 218, for the first time in a particular month, the vault, at step 220, sets the date and derives token generation keys for the month from master keys stored in NVM 46 of the vault. The vault then enables itself and is ready to receive a token request command. Once the date is set, when another date set command is received in the same month, the vault simply acknowledges the command and sets the date without re-calculating the token generation keys. At step 224, a postage command is received and a postage value, for example, $0.32, is set at step 226.
When a token request command comprising a destination postal code is received by vault 20, at step 228, it checks the format of and the range of values in the request at steps 234–240. If the request is improper, vault 20 rejects the request and sends a status message to user application program 36 via DLL 40 at step 212. Vault 20 checks the date in the request, at step 234, and then compares, at step 236, the requested postage amount with the two warning values: high value warning and the postage limit amount. If the request exceeds the warning values, the request is rejected. Vault 20 then compares, at step 238, the requested postage amount with available postal funds in the descending register. If the amount of available postal funds is smaller than the requested amount, the vault rejects the token request command and sends an appropriate message to user application program 36 via DLL 40. If the amount of available postal funds is greater than or equal to the requested amount, vault 20 checks the destination information at step 240.
Finally, at step 242 vault 20 begins the accounting process to issue a digital token. Vault 20 deducts the requested postage amount from the available postal funds, i.e., adds the amount to the ascending register and subtracts the amount from the descending register, in RAM. At step 244 a digital token is calculated using an open system algorithm which includes addressee information. At step 246, vault 20 constructs in RAM 45 a transaction record that includes the piece count and the calculated token and stores the transaction record in an indexed file in the redundant NVM 46. In the preferred embodiment, the NVM transaction file is indexed by piece count. After storing to NVM, vault 20 checks, at step 248, the integrity of NVM 46 to confirm that the data is stored correctly. If an error occurs during this process, tokens are not issued and an error message is reported to the host processor in PC 12. If no error occurs, a transmission buffer that consists of the transaction record is assembled and vault 20 transmits, at step 250, the transaction record to DLL 40 in PC 12. If vault 20 does not receive a positive acknowledgment from PC 12, vault 20 retransmits the message.
Conventional postage meters store transactions in the meter. In accordance with the present invention, Transaction Capture sub-module 82 captures each transaction record received from vault 20 and records the transaction record in DLL 40 and in DLL storage area 41 on hard drive 24 for a historical record. If there is ample room on hard drive 24, such transaction captures can be stored for a plurality of different vaults. Referring now to
Referring now to
In accordance with the present invention, the entire fixed graphics image 90 of the indicia 92, shown in
Referring now to
Thus, the bit-mapped indicia image 96 is stored in DLL 40 which can only be accessed by executable code in DLL 40. Furthermore, only the executable code of DLL 40 can access the fixed graphics image 90 of the indicia to generated bit-mapped indicia image 96. This prevents accidental modification of the indicia because it would be very difficult for a normal user to access, intentionally or otherwise, the fixed graphics image 90 of the indicia and the bit-mapped indicia image 96.
The present invention is suitable for generating a batch of tokens for addresses in a mailing list rather than entering such list of addressees one at a time. The batch of tokens are part of a batch of transaction records, that are indexed in the transaction file in the DLL storage area 41, which are later used to generate indicia images when printing envelopes for the mailing list. Such batch processing would be useful, for example, to production mailers which often have databases of addresses from which to generate mail. These databases are usually pre-processed and sorted to take advantage of postal discounts and recipient profiles for direct marketing opportunities.
In an alternate embodiment, a PC-based open metering system is part of a network with the vault connected to a server PC and the user requesting postage from a user PC. The token generation process would proceed as previously described except that the vault functions, including token generation, would occur in the server PC or the vault card connected thereto. The user PC would store the transaction records, including issued tokens, on its hard drive and would generate indicia corresponding thereto. The server PC also stores a record of all transactions for backup and disaster recovery purposes. This configuration would allow multiple users to send a letter to the same addressee without the token generation being inhibited.
While the present invention has been disclosed and described with reference to a single embodiment thereof, it will be apparent, as noted above that variations and modifications may be made therein. It is, thus, intended in the following claims to cover each variation and modification that falls within the true spirit and scope of the present invention.
This application is a continuation of U.S. Ser. No. 08/575,110 filed on Dec. 19, 1995, entitled “A Method For Reissuing Digital Tokens in An Open Metering System”, now U.S. Pat. No. 6,285,990. The present application is related to the following U.S. patent application Ser. Nos. 08/575,106, 08/575,107, 08/574,746, 08/574,745, 08/574,743, 08/575,112, 08/575,109, 08/575,104, 08/574,749 and 08/575,111, each filed concurrently herewith, and assigned to the assignee of the present invention.
Number | Name | Date | Kind |
---|---|---|---|
4699531 | Ulinski et al. | Oct 1987 | A |
4725718 | Sansone et al. | Feb 1988 | A |
4757537 | Edelmann et al. | Jul 1988 | A |
4775246 | Edelmann et al. | Oct 1988 | A |
4802027 | Talmadge | Jan 1989 | A |
4809185 | Talmadge | Feb 1989 | A |
4813912 | Chickness et al. | Mar 1989 | A |
4831555 | Sansone | May 1989 | A |
4858138 | Talmadge | Aug 1989 | A |
4873645 | Hunter | Oct 1989 | A |
5173862 | Fedirchuk et al. | Dec 1992 | A |
5177790 | Hazard | Jan 1993 | A |
5319562 | Whitehouse | Jun 1994 | A |
5325430 | Smyth | Jun 1994 | A |
5363447 | Rager | Nov 1994 | A |
5365466 | Hazard | Nov 1994 | A |
5390251 | Pastor et al. | Feb 1995 | A |
5448641 | Pintsov et al. | Sep 1995 | A |
5454038 | Cordery et al. | Sep 1995 | A |
5655023 | Cordery et al. | Aug 1997 | A |
5675650 | Cordery et al. | Oct 1997 | A |
5787406 | Arsenault et al. | Jul 1998 | A |
5819240 | Kara | Oct 1998 | A |
6005945 | Whitehouse | Dec 1999 | A |
6285990 | Lee et al. | Sep 2001 | B1 |
Number | Date | Country |
---|---|---|
0782109 | Jul 1997 | EP |
09-311962 | Dec 1997 | JP |
2005018737 | Jan 2005 | JP |
Number | Date | Country | |
---|---|---|---|
20010037735 A1 | Nov 2001 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 08575110 | Dec 1995 | US |
Child | 09906196 | US |