The present invention relates generally to value printing systems and, more particularly, to value printing systems wherein a printer is not dedicated to a metering module.
The present application is related to the following U.S. patent applications Ser. Nos. 08/575,106, 08/575,107, 08/574,746, 08/574,745, 08/575,110, 08/574,743, 08/575,112, 08/575,104, 08,574,749 and 08/575,111, each filed concurrently herewith, and assigned to the assignee of the present invention.
Postage metering systems are being developed which employ digital printers to print encrypted information on a mailpiece. Such metering systems are presently categorized by the USPS as either closed systems or open systems. In a closed system, the system functionality is solely dedicated to metering activity. A closed system metering device includes a dedicated printer securely coupled to a metering or accounting function. In a closed system, since the printer is securely coupled and dedicated to the meter, printing cannot take place without accounting. In an open metering system the system functionality is not dedicated solely to metering activity. An open system metering device includes a printer that is not dedicated to the metering activity, thus freeing system functionality for multiple and diverse uses in addition to the metering activity. An open system metering device is a postage evidencing device (PED) with a non-dedicated printer that is not securely coupled to a secure accounting module.
Typically, the postage value for a mailpiece is encrypted together with other data to generate a digital token which is then used to generate a postage indicia that is printed on the mailpiece. A digital token is encrypted information that authenticates the information imprinted on a mailpiece including postal value. Examples of systems for generating and using digital tokens are described in U.S. Pat. Nos. 4,757,537, 4,831,555, 4,775,246, 4,873,645 and 4,725,718, the entire disclosures of which are hereby incorporated by reference. These systems employ an encryption algorithm to encrypt selected information to generate at least one digital token for each mailpiece. The encryption of the information provides security to prevent altering of the printed information in a manner such that any misuse of the tokens is detectable by appropriate verification procedures.
Typical information which may be encrypted as part of a digital token includes origination postal code, vendor identification, data identifying the PED, piece count, postage amount, date, and, for an open system, destination postal code. These items of information, collectively referred to as Postal Data, when encrypted with a secret key and printed on a mail piece provide a very high level of security which enables the detection of any attempted modification of a postal revenue block or a destination postal code. A postal revenue block is an image printed on a mail piece that includes the digital token used to provide evidence of postage payment. The Postal Data may be printed both in encrypted and unencrypted form in the postal revenue block. Postal Data serves as an input to a Digital Token Transformation which is a cryptographic transformation computation that utilizes a secret key to produce digital tokens. Results of the Digital Token Transformation, i.e., digital tokens, are available only after completion of the Accounting Process.
Digital tokens are utilized in both open and closed metering systems. However, for open metering systems, the non-dedicated printer may be used to print other information in addition to the postal revenue block and may be used in activity other than postage evidencing. In an open system PED, addressee information is included in the Postal Data which is used in the generation of the digital tokens. Such use of the addressee information creates a secure link between the mailpiece and the postal revenue block and allows unambiguous authentication of the mail piece.
In accordance with the present invention an network-based open metering system is provided wherein some of the functionality typically performed in the vault of a conventional postage meter has been removed from the vault of the network-based open metering system and is performed in server and client PCs in the network. It has been discovered that this transfer of functionality from the vault to the PCs does not effect the security of the meter because the security of the network-based open metering system is in the information being processed.
Thus, the present invention provides a network-based open metering system that comprises a conventional network of a server PC and a plurality of client PC's, special Windows-based software in the server PC and each of client PC's, and a plug-in peripheral as a vault to store postage funds. The network-based meter uses the client PC's and their non-secure and non-dedicated printers to print postage on envelopes and labels at the same time it prints a recipient address. The present invention provides access to an metering system by multiple users that are geographically separated, for example at different offices within a building.
The present invention provides a network-based open meter system, which consists of a personal computer (PC) network, a digital printer operatively connected to each PC in the network, a removable electronic vault operatively connected to the server PC, an optional modem for funds recharge (debit or credit), PC software modules in the form of a Dynamic Link Library (DLL) and a user interface module in each PC. The vault is a secure encryption device for digital token generation, funds management and traditional accounting functions. The DLL module in the client initiates all communications with the DLL in the server PC which communicates with the vault, and provides an open interface to Windows-based applications. Secure communication between the client PC and the vault is desired but is not necessary for system security. The DLL module in the server PC obtains from the vault transaction records comprising digital tokens issued by the vault and associated postal data and sends the transaction record to the client PC which then generates an electronic indicia image. The usage of postal funds and the transaction record are stored in the vault. Another copy of the usage of postal funds and the transaction record may be stored on the server and client hard drives as backup. The user interface module obtains the electronic indicia image from the DLL module for printing the postal revenue block on a document, such as an envelope. The user interface also communicates with the vault via the DLL in the server PC for remote refills and for performing administrative functions.
The present invention further provides open system network metering that includes security to prevent tampering and false evidence of postage payment as well as the ability to do batch processing of envelopes, review of indicia and addressing on envelope before printing.
The above and other objects and advantages of the present invention will be apparent upon consideration of the following detailed description, taken in conjunction with accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
In describing the present invention, reference is made to the drawings, wherein there is seen in
In the following description and in the drawings, components common to server 10 and clients 11 are distinguished, when necessary, by referring to the client components with a prime designation. When the component functionality is common to both server and client PC's the description does not distinguish between server and client.
The server 10 and clients 11 include the following common components: a personal computer (PC) 12, a display 14, a keyboard 16, and an unsecured digital printer 18, preferably a laser or ink-jet printer. Each PC 12 includes a conventional processor 22, such as the 80486 and Pentium processors manufactured by Intel, and conventional hard drive 24, floppy drive(s) 26, and memory 28. Server 10 includes an electronic vault 20, which is housed in a removable card, such as PCMCIA card 30. Electronic vault 20 is a secure encryption device for postage funds management, digital token generation and traditional accounting functions. Server 10 may also include an optional modem 29 which is located in PC 12, preferably, or in card 30. Modem 29 may be used for communicating with a Postal Service or a postal authenticating vendor for recharging funds (debit or credit). A description of such communication by modem is described in U.S. Pat. No. 4,831,555, incorporated herein by reference. In an alternate embodiment the modem may be located in PCMCIA card 30.
Each of the PC's 12 includes a Windows-based PC software module 34 (
Thus, network-based metering system 1 operates as a conventional network, except that a client or network printer prints postage upon user request. Printers 18 print all documents normally printed by a personal computer, including printing letters and addressing envelopes, and in accordance with the present invention, prints postage indicia. Network-based meter system 1 uses server 10 to issue postage and one of the printers to print the issued postage on envelopes at the same time it prints a recipient's address or to print labels for pre-addressed return envelopes or large mailpieces. It will be understood that although the preferred embodiment of the present invention is described as a postage metering system, the present invention is applicable to any value metering system that includes transaction evidencing. It will also be understood that the present invention could also be used in a network in which a network printer, such as the server printer, is used to print envelopes with indicia, when local printers are not available to some or all of the client PC's.
A description of the key components of network-based metering system 1 are described below followed by a description of the preferred operation of network-based metering system 1.
In the preferred embodiment of the present invention, the vault is housed in a PCMCIA I/O device, or card, 30 which is accessed through a PCMCIA controller 32 in server 10. A PCMCIA card is a credit card size peripheral or adapter that conforms to the standard specification of the personal Computer Memory Card International Association.
Referring now to
The hardware design of the vault includes an interface 56 that communicates with the server host processor 22 through PCMCIA controller 32. Preferably, for added physical security, the components of vault 20 that perform the encryption and store the encryption keys (microprocessor 44, ROM 47 and NVM 46) are packaged in the same integrated circuit device/chip that is manufactured to be tamper proof. Such packaging ensures that the contents of NVM 46 may be read only by the encryption processor and are not accessible outside of the integrated circuit device. Alternatively, the entire card 30 could be manufactured to be tamper proof.
In accordance with the present invention, the open system vault 20 is strictly a slave device in PC 12 of server 10. Server host processor 22 generates a command and vault 20 replies with a response. Vault 20 does not generate unsolicited messages. Thus, server PC 12 requests vault status whenever any transaction is initiated. A further description of vault 20 is disclosed in the related U.S. patent Application Ser. No. 08/575,112, which is incorporated herein in its entirety by reference.
In accordance with the present invention, the functionality of DLL's 40 and 40′ in server and client PC's, respectively, is a key component of network-based metering 1. DLL 40 includes both executable code and data storage area 41 that is resident in hard drive 24 of PC 12. In a Windows environment, a vast majority of applications programs 36, such as word processing and spreadsheet programs, communicate with one another using one or more dynamic link libraries. The present invention encapsulates all the processes involved in metering, and provides an open interface to vault 20 from all Windows-based applications capable of using a dynamic link library. In accordance with the present invention, any client application program 36′ can communicate with vault microprocessor 44 in PCMCIA card 30 through DLL 40′ and server PC 12.
In accordance with the present invention, DLL 40 includes the following software sub-modules: secure communications 80, transaction captures 82, secure indicia image creation and storage 84, and application interface module 86.
Since vault 20 is not physically secured to server PC 12, it may be possible for that one vault 20 attached to server PC 12 is replaced with another vault 20 while a vault transaction is in process. The Secure Communications sub-module 80 prevents this from happening by maintaining secure communication between server DLL 40 and vault 20. Secure Communications sub-module 80 in server 11 identifies a specific vault 20 when it opens a communication session through PCMCIA controller 32, and maintains communication data integrity with the specific vault during the entire communication session. Similarly, when a communication session is initiated between client 11 and a server 10, Secure Communications sub-module 80 maintains communication data integrity between the client 11 and server 10. Referring now to
Conventional postage meters store transactions in the meter. In accordance with the present invention, Transaction Capture sub-module 82 in server 10 captures each transaction record received from vault 20 and records the transaction record in DLL 40 and in DLL storage area 41 on hard drive 24. When server 10 sends the transaction record to client 11, Transaction Capture sub-module 82′ in client 11 captures the transaction record and records the transaction record in DLL 40′ and in DLL storage area 41′ on hard drive 24′. Referring now to
A description of a digital token generation process is disclosed for a PC-meter system in the related U.S. patent applications Ser. Nos. 08/575,106, 08/575,107, and 08/575,110 which are incorporated herein in their entirety by reference. The digital token generation process for network-based metering system 1 is the same as described in the related applications except that a client application program 36′ sends a request for digital token to vault 20 through client DLL 40′ and server DLL 40 as shown in FIG. 3. The generated token is sent to the client DLL 40′ through the server DLL 40 for use in generating an indicia. In the present invention, when a request for token is sent from a client to server 10, all postal information that is needed to calculate the token as well as parameters identifying the client, such as user ID, password and client PC identification, must accompany the request since multiple clients may be requestig tokens simultaneously.
In a closed metering system, such as conventional postage meters, the indicia is secure because the indicia printer is dedicated to the meter activity and is physically secured to the accounting portion of the meter, typically in a tamper-proof manner. In an open metering system, such as the present invention, such physical security is not present.
In accordance with the present invention, the entire fixed graphics image 90 of the indicia 92, shown in
Referring now to
Thus, the bit-mapped indicia image 96 is stored in DLL 40′ which can only be accessed by executable code in DLL 40′. Furthermore, only the executable code of DLL 40′ can access the fixed graphics image 90 of the indicia to generate bit-mapped indicia image 96. This prevents accidental modification of the indicia because it would be very difficult for a normal user to access, intentionally or otherwise, the fixed graphics image 90 of the indicia and the bit-mapped indicia image 96.
Referring now to
The request for indicia most likely will originate from a client 11 but could originate from server 10. When server 10 originates a request for indicia server 10 functions as a PC-based meter as described U.S. patent application Ser. No. 08/575,112, filed concurrently herewith, which is hereby incorporated in its entirety by reference.
The Application Interface sub-module 86, in server 10 or client 11, provides the following services when requested by an application program 36 in PC 12. Application program 36 accepts user data through user interface module 42 and prints an indicia on an envelope or on a label. In the preferred embodiment of the present invention, such application program 36 would be an off-the-shelf software module, such as a word processor or spreadsheet, that can access DLL 40. In an alternate embodiment application program 36 could be a software module dedicated solely to accept user data and print an indicia on an envelope or on a label. Application Interface sub-module 86 provides the destination ZIP data and associated postal data needed to create the indicia. Application Interface sub-module 86 requests available postage from vault 20 and reports the available postage to the requesting application program 36.
When vault 20 is refilled with postage funds from the data center, Application Interface sub-module 86 requests from vault 20 the access code required for refills and reports the access code received to the Secure Communications sub-module 80 which initiates communications with the data center. Application Interface sub-module 86 initiates the refill and provides the amount and combination to vault 20. DLL 40 reports the result to the requesting application program 36 which acknowledges the refill to the user.
Application Interface sub-module 86 processes a request for an indicia received from application program 36 and forwards the request to Indicia Image Creation and Storage sub-module 84. Application Interface sub-module 86 provides postal data, including date, postage, and a destination postal code, such as an 11 digit ZIP code, to Indicia Image Creation and Storage sub-module 84 which then generates a bit-mapped indicia image 96. Application Interface sub-module 86 reports to application program 36 that the bit-mapped indicia image 96 is ready for printing.
Vault 20 must be a secure device because it contains the accounting information of the amount of postage remaining in the vault and the postage printed. However, the very nature of the security makes it hard to recover postal funds in the event a malfunction occurs and the vault cannot be accessed by normal operation. The present invention enhances the reliability of a PC meter system by using the hard disks of server 10 and clients 11 to backup the accounting information of the vault. As previously described, the transaction capture sub-modules 82 and 82′ store transaction files as backup files on hard drives 24 and 24′. This provides a benefit that certain functions, such as account reconciliation, can be performed even when vault 20 malfunctions. Such backup is unavailable in conventional postage meters.
For further security, the backup transaction files can be encrypted before being stored on hard drives 24 and 24′ to prevent tampering. The number of transactions that are maintained on hard drives 24 and 24′ is limited only by the available storage space on the hard drives. Preferably, at least all transactions since the last refill would be maintained on server 10 as backup.
A detailed description of recovery from vault malfunction is disclosed in co-pending U.S. patent Application Ser. No. 08/574,743, which is incorporated herein in its entirety by reference.
Generally, the first action by a user after powering up a conventional meter is setting the time and date of the meter. Setting the date is necessary to generate derived keys which are used to generate the digital tokens. (Some recent meters have a real time clock internal to the meter in which case the time and date need only be set once.) The present invention spares the user from having to set the vault date.
As previously described, vault 20 does not have an independent power source and therefore cannot have a continuous running real-time clock. The date must be set every time the vault is powered-up. Power is applied to vault 20 only when it is plugged into server PC 12. Thus, the date would normally be entered by the user through server PC 12 each time vault 20 is plugged into PCMCIA controller 32. Since server PC 12 has a real-time clock, the date setting process may be automated and made transparent to the user. In accordance with the present invention, the time and date set in server PC 12 is sent to vault 20 each time power is initially applied to vault 20. The vault date is used by DLLs 40 and 40′ to generate the indicia. The vault date may be changed at any time by the user to facilitate post-dating of mail.
Upon application of power to vault 20 by PCMCIA controller 32, the date of server PC 12 is obtained through user interface 42. The date is then translated into the correct format and sent to vault 20 which then sets its date, calculates its date dependent token keys and returns its status and the token keys to server PC 12. Additionally, a default postage amount (e.g. First Class Postage) may be set in a similar manner. This method enables network-based metering system 1 immediately when vault 20 is plugged-into PCMCIA controller 32 without the user having to manually set parameters. The user may change the vault date (in order to post date mail) or the default postage amount at any time.
In an alternate embodiment, PCMCIA card 30 has its own internal clock that is automatically set with the time and date in server PC 12 each time PCMCIA card 30 is inserted into PCMCIA controller 32.
In the preferred operation, a user of an application program 36 (running in either client 11 or server 10), such as a word processor, highlights a recipient address from a letter or mailing list displayed on display 14. The user requests the printing of an envelope with indicia. A dialog box appears on display 14 indicating the default postage amount which the user may accept or modify. When the postage amount accepted, the entire envelope is previewed with all addressing, bar-coding and indicia shown on the envelope. At this point the user can print the envelope as shown or correct any errors that are seen in the preview.
As previously described, in network-based metering system 1 the printers are not dedicated to the metering function and the indicia are stored in PC 12 before printing. Thus, tokens can be generated individually or for a batch of addressees stored in the requesting client 11 which can later generate an indicia from each of the tokens and then print the indicia at the user's discretion. Such delayed printing and batch processing is described in more detail in co-pending U.S. patent Application Ser. No. 08/575,104, which is incorporated herein in its entirety by reference.
As with any document prepared in a Windows-based PC system, a user may observe, through the application program 36 in which an envelope was created, an image of a fully prepared envelope or batch of envelopes to be printed, including addressee information and indicia, before printing any of the envelopes. Network-based metering system 1 also provides a user with the ability to customize return addresses, slogans, logos and greetings that are to be printed with the indicia on the envelope.
In an alternate embodiment of network-based metering system 1, the electronic vault is in an IC token, such as manufactured by CDSM of Phoenix, Ariz., that is inserted into a token receptacle of a PCMCIA card and programmed to operate as the vault in a similar manner as described for PCMCIA card 30. In another alternate embodiment, the electronic vault is in a smart diskette, such as manufactured by SmartDisc Security Corp. of Naples, Fla., that is programmed to operate in a similar manner as described for PCMCIA card 30. In another alternate embodiment of network-based metering system 1, the electronic vault is a tamper proof, hardware peripheral, such as a dongle, that is attached to a serial, parallel or SCSI port of the PC.
As used herein, the term personal computer is used generically and refers to present and future microprocessing systems with at least one processor operatively coupled to user interface means, such as a display and keyboard, and storage media. The personal computer may be a workstation that is accessible by more than one user.
While the present invention has been disclosed and described with reference to a single embodiment thereof, it will be apparent, as noted above that variations and modifications may be made therein. It is, thus, intended in the following claims to cover each variation and modification that falls within the true spirit and scope of the present invention.
This is a continuation of application Ser. No. 08/575,109 filed Dec. 19, 1995, now U.S. Pat. No. 6,151,590.
Number | Name | Date | Kind |
---|---|---|---|
4253158 | McFiggans | Feb 1981 | A |
4376299 | Rivest et al. | Mar 1983 | A |
4641347 | Clark et al. | Feb 1987 | A |
4725718 | Sansone et al. | Feb 1988 | A |
4743747 | Fougere et al. | May 1988 | A |
4757537 | Edelmann et al. | Jul 1988 | A |
4763271 | Field | Aug 1988 | A |
4775246 | Edelmann et al. | Oct 1988 | A |
4800506 | Axelrod et al. | Jan 1989 | A |
4802027 | Talmadge | Jan 1989 | A |
4802117 | Chrosny et al. | Jan 1989 | A |
4802218 | Wright | Jan 1989 | A |
4807059 | Talmadge | Feb 1989 | A |
4809185 | Talmadge | Feb 1989 | A |
4812994 | Taylor et al. | Mar 1989 | A |
4831554 | Storace et al. | May 1989 | A |
4831555 | Sansone et al. | May 1989 | A |
4837701 | Sansone et al. | Jun 1989 | A |
4853523 | Talmadge | Aug 1989 | A |
4858138 | Talmadge | Aug 1989 | A |
4862375 | Talmadge | Aug 1989 | A |
4864618 | Wright et al. | Sep 1989 | A |
4868757 | Gil | Sep 1989 | A |
4873645 | Hunter et al. | Oct 1989 | A |
4900903 | Wright et al. | Feb 1990 | A |
4900904 | Wright et al. | Feb 1990 | A |
4901241 | Schneck | Feb 1990 | A |
4908502 | Jackson | Mar 1990 | A |
4908770 | Breault et al. | Mar 1990 | A |
4941091 | Breault et al. | Jul 1990 | A |
4978839 | Chen et al. | Dec 1990 | A |
5065000 | Pusic | Nov 1991 | A |
5111030 | Brasington et al. | May 1992 | A |
5202834 | Gilham | Apr 1993 | A |
5224046 | Kim et al. | Jun 1993 | A |
5239168 | Durst, Jr. et al. | Aug 1993 | A |
5309558 | Rourke et al. | May 1994 | A |
5319562 | Whitehouse | Jun 1994 | A |
5377268 | Hunter | Dec 1994 | A |
5384886 | Rourke | Jan 1995 | A |
5390251 | Pastor et al. | Feb 1995 | A |
5423573 | De Passille | Jun 1995 | A |
5437441 | Tuhro et al. | Aug 1995 | A |
5448641 | Pintsov et al. | Sep 1995 | A |
5454038 | Cordery et al. | Sep 1995 | A |
5510992 | Kara | Apr 1996 | A |
5583779 | Naclerio et al. | Dec 1996 | A |
5606613 | Lee et al. | Feb 1997 | A |
5655023 | Cordery et al. | Aug 1997 | A |
5696829 | Cordery et al. | Dec 1997 | A |
5812991 | Kara | Sep 1998 | A |
5822739 | Kara | Oct 1998 | A |
6151590 | Cordery et al. | Nov 2000 | A |
Number | Date | Country |
---|---|---|
0775987 | May 1997 | EP |
0540022 | May 1993 | GB |
WO 9519016 | Jul 1995 | WO |
Number | Date | Country | |
---|---|---|---|
Parent | 08575109 | Dec 1995 | US |
Child | 09452404 | US |