Claims
- 1. A method for generating a first message and verifying that a variable used in the generation of said first message is between a predetermined upper limit and predetermined lower limit, said method comprising the steps of:providing a trapdoor function R to a message originator and to a message verifier, said trapdoor function R having a corresponding inverse function R−1 that is maintained in secrecy by a third party; determining an integer K equal to the difference between said upper limit and said lower limit; providing a second message including R−K(T) from said third party to said message originator, wherein T is a value within a range of said trapdoor function R; generating, at said message originator, a third message Sx=Rx(R−K(T)), wherein x is an integer equal to the absolute value of the difference between a current value of said variable and a first one of said upper limit and said lower limit; incorporating at least said third message Sx into said first messages; receiving, at said message verifier, said first message, said message verifier recovering from said first message said third message Sx, said message verifier further determining said current value of said variable and a second one of said upper limit and said lower limit; and confirming that Ry(Sx)=T, wherein y is an integer equal to the absolute value of the difference between said current value of said variable and said second one of said upper limit and said lower limit.
- 2. A method as described in claim 1 wherein said first message is a postal indicium.
- 3. A method as described in claim 2 wherein said postal indicium is encrypted by a postage metering system using an encryption key and said second message is transmitted to said system when said key is changed.
- 4. A method as described in claim 3 wherein said value T includes an identification of said postage metering system.
- 5. A method as described in claim 1 wherein said value T further includes said second one of said upper limit and said lower limit.
- 6. A method as described in claim 1 wherein said function R is a public key encryption algorithm.
- 7. A method as described in claim 6 wherein said public key encryption algorithm is an RSA algorithm.
- 8. A method as described in claim 1 wherein said current value of said variable is provided to said message verifier within by said first message.
- 9. A method as described in claim 1 wherein said current value of said variable is inherent in the meaning of said first message.
- 10. A method as described in claim 1 wherein said current value of said variable is determined directly by said message verifier.
- 11. A method as described in claim 1 wherein said first message includes only said third message Sx.
- 12. A method as described in claim 1 wherein said first one of said upper limit and said lower limit is said lower limit.
- 13. A method as described in claim 12 wherein said first message is a postal indicium.
- 14. A method as described in claim 1 wherein said first one of said upper limit and said lower limit is said upper limit.
- 15. A method as described in claim 14 wherein said first message is a postal indicium.
- 16. A method as described in claim 1, wherein T is coded plain text.
- 17. A method as described in claim 16, wherein T is plain text coded as an integer.
- 18. A system for generating a first message and verifying that a variable used in the generation of said first message is between a predetermined upper limit and predetermined lower limit, said system comprising:a data center having a trapdoor function R and a corresponding inverse function R−1, said corresponding inverse function R−1 being maintained in secret by said data center; a message originating system; and a verification facility; wherein said data center provides said trapdoor function R to said message originating system and to said verification facility, determines an integer K equal to the difference between said upper limit and said lower limit; and provides a second message including R−K(T) to said message originating system, wherein T is a value within a range of said trapdoor function R; said message originating system generates a third message Sx=Rx(R−K(T)), wherein x is an integer equal to the absolute value of the difference between a current value of said variable and a first one of said upper limit and said lower limit; said message originating system further incorporating at least said third message Sx into said first message; and said verification facility receives said first message and recovers, from said first message, said third message Sx said verification facility further determining said current value of said variable and a second one of said upper limit and said lower limit and confirming that Ry(Sx)=T, wherein y is an integer equal to the absolute value of the difference between said current value of said variable and said second one of said upper limit and said lower limit.
- 19. A system as described in claim 18 wherein said first message is a postal indicium.
- 20. A system as described in claim 19 wherein said postal indicium is encrypted by a postage metering system using an encryption key and said second message is transmitted to said postage metering system when said key is changed.
- 21. A system as described in claim 20 wherein said value T includes an identification of said postage metering system.
- 22. A system as described in claim 18 wherein said value T further includes said second one of said upper limit and said lower limit.
- 23. A system as described in claim 18 wherein said function R is a public key encryption algorithm.
- 24. A system as described in claim 23 wherein said public key encryption algorithm is an RSA algorithm.
- 25. A system as described in claim 18 wherein said current value of said variable is provided to said verification facility within said first message.
- 26. A system as described in claim 18 wherein said current value of said variable is inherent in the meaning of said first message.
- 27. A system as described in claim 18 wherein said current value of said variable is determined directly by said verification facility.
- 28. A system as described in claim 18 wherein said first message includes only said third message Sx.
- 29. A system as described in claim 18 wherein said first one of said upper limit and said lower limit is said lower limit.
- 30. A system as described in claim 29 wherein said first message is a postal indicium.
- 31. A system as described in claim 15 wherein said first one of said upper limit and said lower limit is said upper limit.
- 32. A system as described in claim 31 wherein said first message is a postal indicium.
- 33. A system as described in claim 18, wherein T is coded plain text.
- 34. A system as described in claim 33, wherein T is plain text coded as an integer.
RELATED APPLICATIONS
The present application shares common elements of disclosure with commonly assigned, U.S. application Ser. No. 09/220,657, titled: METHOD OF LIMITING KEY USAGE IN A POSTAGE METERING SYSTEM THAT PRODUCES CRYPTOGRAPHICALLY SECURED INDICIUM.
US Referenced Citations (6)
Foreign Referenced Citations (3)
Number |
Date |
Country |
0360225 |
Mar 1990 |
EP |
0735721 |
Oct 1996 |
EP |
0743774 |
Nov 1996 |
EP |