PERSONAL FUNDS METERING SYSTEM AND METHOD

Abstract
Methods and systems for dispensing value are described. In one configuration, a unique tangible indicia is enabled with a value and then disabled after the value is redeemed. In another configuration, a user enables a unique coded stamp and associates a postage payment with the stamp. The postal service cancels the stamp by deactivating the stamp from a list of active stamps and optionally audits the payment association.
Description


BACKGROUND OF INVENTION

[0001] The illustrative embodiments described in the present application are useful in systems including those for dispensing value and more particularly are useful in systems including those for providing evidence of payment of postage that can be traced to a sender.


[0002] The United States Postal Service (USPS) provides a service of mailpiece reception, sorting and delivery to national addresses and international postal streams. The USPS processes approximately 200 billion domestic letters per year. The USPS also processes parcels. Similarly, other courier services provide services for delivery of letters and parcels.


[0003] In 2001, Anthrax spores were found on mail pieces, mail-handling equipment and in or near areas where certain mail pieces that likely contained anthrax spores were handled. Postal service customers generally pay for postage by either buying a stamp or by using a postage meter to print indicia used to evidence payment of postage. Previously, the identity of a sender using stamps was never truly known and the identity of the sender of a mail piece could not generally be traced. Mailing machines including postage meters are commercially available from Pitney Bowes Inc. of Stamford, Conn.


[0004] Furthermore, postage payment evidencing systems are subject to fraud attacks. Previously, payment authentication by the post office was too costly to implement. As a result, the postage payment process is subject to fraud attacks and mailpieces are not generally traceable to an origin. Unscrupulous attackers may duplicate stamps.



SUMMARY OF INVENTION

[0005] The present application describes several illustrative embodiments of systems and methods for dispensing value, some of which are summarized here for illustrative purposes. In one illustrative embodiment, a unique tangible indicia is enabled with a value and then disabled when the value is used. In another illustrative embodiment, a user enables a unique coded stamp and associates a postage payment with the stamp. The postal service cancels the stamp by deactivating it from a list of active stamps and optionally audits the payment association. In a further embodiment, trace-ability information is associated with the postage payment transaction including routing information.







BRIEF DESCRIPTION OF DRAWINGS

[0006]
FIG. 1 is a schematic representation of a value dispensing system according to an illustrative embodiment of the present application.


[0007] FIGS. 2A-2C are schematic diagrams of representative indicia according to an illustrative embodiment of the present application.


[0008] FIGS. 3A-3B are schematic diagrams of representative indicia according to another illustrative embodiment of the present application.


[0009]
FIG. 4A is a flow chart showing a process for a user for enabling indicia according to an illustrative embodiment of the present application.


[0010]
FIG. 4B is a flow chart showing a process for a carrier for accepting a mailpiece and canceling indicia according to an illustrative embodiment of the present application.







DETAILED DESCRIPTION

[0011] Systems and methods for dispensing value are described according to illustrative embodiments of the present application.


[0012] Certain embodiments of the present application describe a process for enabling and disabling unique stamps that include uniquely identified indicia that are not reused over a period of time. The period of time may be three years. The indicia represent postage and may be used as a replacement for traditional stamps. The stamps may be reused after deactivation or reprinted by using the same number on new media provided that the original stamp media was taken out of circulation.


[0013] The process includes activating and deactivating a unique encoded identifier that would be used as a stamp. The unique ID is placed on an envelope or stamp and is deactivated by default. A user will then utilize a device to activate and pay for the stamp. The postal authority then receives the mailpiece having the stamp and would scan the stamp to determine if the sender had paid for the postage. If the user did pay for the postage, the postal authority would process the letter and deactivate the stamp.


[0014] Digital pen systems such as the Sony-Ericsson CHA-30 Chatpen utilize Anoto paper available from Anoto AB of Sweden. The Anoto paper includes a grid for encoding information such as position information that is detected by the Chatpen. Additionally, other scanners may be used to detect the pattern and decode the pattern to obtain an identifier. A Chatpen or other scanning device such as a scanning enabled PDA available from Symbol Technologies of New York may be used to authenticate a user and process stamps.


[0015] Commonly owned, Co-pending U.S. patent application Ser. No. 10/065,261, entitled Method And System For Creating And Sending A Facsimile Using A Digital Pen, (Attorney Docket No. F-521), filed on Sep. 30, 2002, is incorporated herein by reference in its entirety.


[0016] Commonly owned, co-pending U.S. patent application Ser. No. 10/065,282, entitled Method And System For Creating a Document Having Metadata, (Attorney Docket No. F-522), filed on Sep. 30, 2002, is incorporated herein by reference in its entirety.


[0017] Commonly owned, Co-pending U.S. patent application Ser. No. 10/065,261, entitled Systems and Methods Using a Digital Pen for Funds Accounting Devices and Postage Meters, (Attorney Docket No. F-575), filed on Oct. 4, 2002, is incorporated herein by reference in its entirety.


[0018] Commonly owned, Co-pending U.S. patent application Ser. No. TBD, entitled System and Method For Authenticating a Mailpiece Sender, (Attorney Docket No. F-559), filed on even date herewith, is incorporated herein by reference in its entirety.


[0019] The illustrative embodiments described herein provide for methods and apparatus for activating and deactivating a stamp. However, other value dispensing systems may be configured according to the embodiments herein. The processes and apparatus described may be implemented using hardware, software or a combination of both. The communications channels may be wireless or wired and may utilize security techniques such as encryption and authentication. The data storage and data processors may be locally or remotely located and may utilize techniques such as load balancing and redundancy.


[0020] Referring to FIG. 1, a first illustrative embodiment describing a value dispensing system 1 is shown. An indicia 10 includes an Anoto pattern that encodes an identifier. The identifier is preferably unique in that it is not used on another media within three years unless the current media is retired. However, in an alternative, the pattern is reused in other unrelated fields. The indicia 10 may be reusable such as a tollbooth token in that it may be a reusable stamp.


[0021] System 1 includes an Anoto pattern lookup server 80 that includes storage 86 connected by connection 84 to processor 82. The server 80 is connected to Internet 60 using connection 98.


[0022] The system 1 includes at least one scanning device such as Scanning PDA 50 that is a scanning enabled PDA available from Symbol Technologies. The PDA 50 includes wireless access 170 to the Internet 60 through a wireless service 32. The PDA 50 may be connected to the Laptop 42 using a wired or wireless connection 52. The Laptop 42 is connected to the Internet 60 using a wireless or wired connection and may provide a gateway. The Laptop 42 can scan indicia 10 using scan channel 23. The PDA 50 can scan the indicia 10 using scan channel 24. Alternatively, a cellular telephone 40 may include a wireless connection 27 to the cellular service provider 32. The phone 40 may include scanning capability 22. MAC or other unique identification codes may be used to identify any of the processors described herein. Furthermore, a user may be authenticated using biometric information such as a retinal scan, voiceprint or fingerprint.


[0023] Value receiving server 70 is described for illustrative purposes as a postal service server system. However, any value receiving service may use the embodiments of the present application. Postal Authority Server 70 includes a server processor 72, storage for user accounts 76 connected by channel 74 and stamp data 77 connected by channel 79. The server 70 is connected to the Internet 60 using channel 78.


[0024] Other well-known input devices, servers, processors, networks and communications mechanisms may be used. A back-end application may be utilized to process the user authentication and value dispensing accounting functions. It is contemplated that all of the connections utilize appropriate security measures including encryption and authentication.


[0025] Laptop 42 utilizes a mobile Pentium 4 processor and Windows XP. The server processors are geographically and load balanced application servers using systems available from Sun Microsystems. The storage servers use multiple location redundant backup systems. Additionally, other appropriate wireless and wired networks and other connections may be utilized. It is contemplated that other communications channels such as OC-3 lines or wireless connections could be used. Various communication flows may be utilized, some of which will be chattier than others. Laptop 42 could also provide gateway access to the TCP/IP Internet network.


[0026] The value dispensing system 1 may utilize a local value vault or a distributed vault account. For example, the PDA 50 may contain a postage vault for storing and accounting for postage. Alternatively, an account having postage may be maintained that is accessible to the user and the postal authority 70.


[0027] In one embodiment, a disabled stamp has a set value such as the 1 oz. First class rate that may be $0.37. When the user scans the stamp, the local processor 50 requests authorization. The local processor may debit a local vault or may request authorization and a debit from a remote postal vault. The stamp is then activated and may be used.


[0028] In another embodiment of a postage metering system, a user with access to a metering device 50 would buy an envelope or stamp that represents a unique identifier. The user would then scan the stamp and the initial value of the stamp would be set to 37 cents or any minimal value that the stamp can be worth. The metering device 50 logs on to a central billing server 70 that authenticates the user and enables the stamp on the server side. The user would then place the letter into the mail stream.


[0029] When the letter reaches the post office 70, the mail would be sorted and scanned. During the sort process, if a package were under paid, the postal authority would automatically charge the extra amount to the stamp user by using the current weighing system at the postal service facility. In an alternative, dimensional or regular weighing processes may be used.


[0030] When the letter reaches the scanning process, the stamp 10 is scanned to determine if it is activated. If necessary, the system 70 bills the user. The mail system scanner then disables the stamp and the letter is processed. If the mailpiece has an inactive stamp, it may be returned to the sender or otherwise processed for the exception.


[0031] In one embodiment, a postage meter according to an embodiment of the present application includes a handheld device 50 that is capable of scanning the unique stamp 10. Handheld 50 includes a device that can connect to the billing server 70 through Internet 60 using a cell phone, modem or other connection. In one embodiment, the stamp is encoded using two types of ink. The meter 50 requires a sensor such as a scanner and different light source for each ink used. The reflection from the light source should be discernable so that the correct sensor or camera detects the encoded information.


[0032] When a user registers a Postage Meter 50, the user provides information including billing information. The postage meter 50 is then enabled and works much like an ATM in which the user types in her password and requests the amount to charge from her account. The meter 50 uses an external postage value account, but an internal vault could be used. Other authentication techniques such as a retinal scan may be required instead or in addition the password entry. The meter 50 then sends the registration information or meter identifier with the unique stamp ID to the central billing server 70. The postage meter 50 does not require ink and does not print the indicia.


[0033] Referring to FIGS. 2A-2C, representative indicia are shown according to an illustrative embodiment of the present application. An Anoto pattern is printed on stamp 200. In this alternative, two inks are used in the same space to increase the information density of the Anoto pattern. In another alternative, one ink may be used, or more than two inks may be used. The Anoto pattern is known to have a large area of uniquely defined space in a 2 dimensional pattern space. Here, the stamp 200 is uniquely identified by the unique pattern within a 0.5-inch by 0.5-inch box. The stamp is encoded so that it cannot be easily copied. The stamp 200 enables a sufficient amount of unique combinations in order to satisfy the anticipated need for the stamps for at least three years. In an alternative, in order to increase the amount of unique stamps exponentially, the same encoded ID is printed over each other but slightly offset or our of phase with different types of ink.


[0034] In the multiple ink embodiments, each type of ink should react differently depending on the type of light that it is exposed to. Depending on the type of light that the Metering Scanning Device or Scanning Device shines on the stamp, the camera should detect a different subset of the Anoto pattern. The scanned patterns are used to decode a stamp identifier. The identifier may also be digitally signed by the stamp authority using a digital signature to ensure authenticity. Since the number of potential combinations of the Anoto pattern in a 9 square millimeter box is very large, using two 2 overlapping square boxes each having a different ink drastically increases the number of combinations available. Similarly, additional different inks may be used to increase the information density. In an alternative, having the same two patterns alternate in repeating rows allows the stamp to be more flexible when being scanned. Other known redundancy schemes may be employed to enhance scanning efficiency and accuracy.


[0035] Referring to FIG. 3A and FIG. 3B, indicia are shown according to another illustrative embodiment of the present application. Referring to FIG. 3A, a 2D barcode such as a PDF417 barcode is printed on a reusable stamp. Such a barcode typically stores 1.1 kilobytes of information and with redundancy could be used to store a 256 bit identification number that can provide a very large number of unique identifiers for the stamps.


[0036] Referring to FIG. 3B, a 2D barcode such as a PDF417 barcode is printed on a reusable stamp that has a portion of the stamp used for a digital signature so that the stamp is authenticated. In an alternative, a different bar code may be used. In another alternative, the indicia can be printed on an envelope. In another embodiment, the indicia are printed on reusable envelopes or labels.


[0037] Referring to FIG. 4A, a process for enabling a stamp according to an illustrative embodiment of the present application is shown.


[0038] The process starts in step 410. In step 420, the user registers a meter that has access to an indicia scanner. In step 422, the user obtains a unique stamp. The user could print the unique stamp locally. In step 424, the user scans the stamp and decodes the identifier. In step 425, if the stamp does not already have a value assigned to it, the user assigns a value to the stamp and the user postage is debited from a local vault or a remote vault. In step 426, the user receives an indication that the stamp is activated. If the user does not have sufficient postage, the user may be prompted to add more postage. Otherwise, the stamp will not be activated. In step 428, the user places the mailpiece with the stamp into the mail stream and in step 430, the process ends.


[0039] In one embodiment, the postal service 70 uses scanning mechanisms that are able to detect the different type of inks that are used on the stamp. The postal server 72 provides a billing server to activate and deactivate the unique stamp IDs in its database. The server 72 also receives weighing information in order to determine whether extra postage charges are required.


[0040] In another embodiment, the system 1 includes a post office window meter. A user that does not have a postage meter 50 could go to the post office and prepay for the stamps that they buy. The user would be required to present valid Identification and the stamp 10 would be activated. The stamp then would include tightly coupled information regarding the purchaser. The stamp 10 in this alternative would have a static value unless the user provided a postage-underpayment billing alternative.


[0041] In yet another embodiment in which a user does have a registered Postage Meter 50, the user obtains a mail piece that has the unique stamp preprinted on the envelope. Alternatively, the stamp is an adhesive stamp that the user can stick to the envelope. Furthermore, the user could remove a stamp from her incoming mail in order to reuse the stamp. The user would then use her Postage meter to scan the stamp in order to pay for and activate it. Stamp information would then be sent to the central server 70. The server 70 would authenticate and activate the stamp on the server side.


[0042] In another embodiment, a process for sorting the mail with enabled stamps is shown after the letter is mailed and reaches the post office 70. The letter is weighed, scanned, and authenticated. Once the letter is authenticated and the user has been billed, the stamp is deactivated and the letter processed. In this embodiment, anyone who receives mail obtains deactivated stamps that they could reactivate with their Postage Meter 50.


[0043] In an alternative in which an exception or illegal behavior is detected, the stamp could be used to track the sender of the letter. If a user were to lose their Postage Meter 50, they could deactivate it or track it much like a missing cell phone. Anyone who scans a copy of a stamp with a stolen meter 50 would not be able to use the stamp because they would have to activate it in order for it to be authenticated.


[0044] Referring to FIG. 4B, a process for receiving value is described according to an illustrative embodiment of the present application. A postage receiving system is described for illustrative purposes, but other value receiving systems may be configured according to the embodiments of the present application.


[0045] The process starts in step 450. In step 455, the postal service server 72 receives stamp scan information. In step 460, the server receives package data. In step 465, the server 72 compares the stamp scan information to determine if the stamp is valid. If the stamp is valid in step 470, the letter or package is routed in step 480. The system optionally tracks the item. In step 485, the stamp is canceled. The stamp may be destroyed and the number reused or the stamp can be sent back into circulation for reuse. If the stamp is not valid, in step 475, the letter is rejected and any remedial action taken. The process ends in step 490.


[0046] In an alternative, the USPS system 70 also provides the authentication services to the user and a private symmetric key could be used to ensure that an unscrupulous sender did not forge the authentication information.


[0047] In another alternative applicable to any of the embodiments, Wi-Fi enabled wireless systems are utilized and the external processor comprises a Wi-Fi capable hand-held pocket PC such as the Toshiba e740 Pocket PC. Furthermore, differing types of processors and logic systems may be supported. For example, JAVA based PALM OS devices may be utilized. The message logic, processing logic, security logic, user interface logic, communications logic and other logic could be provided in JAVA format or in a format compatible with individual platforms such as Windows CE and PALM OS platforms. Similarly, other portable computing devices such as laptop computers and tablet computers and wireless capable computers could be utilized. Other platforms such as those using Symbian OS or OS-9 based portable processors could be utilized.


[0048] In another alternative applicable to any of the embodiments, authentication procedures utilize a token controller having a secure token key storage such as an iButtonĀ® available from Dallas Semiconductor in which an attack, for example, a physical attack on the device, results in an erasure of the key information. Passwords may be used, such as a password to access the device. In an alternative, the password may include biometric data read from a user. Alternatively, other secret key or public key systems may be utilized. Many key exchange mechanisms could be utilized included a Key Encryption Key. Additionally, authentication and repudiation systems such as a secure hash including SHA-1 could be utilized and encryption utilizing a private key for decryption by public key for authentication.


[0049] Known systems such as C++ or Word and VBA may be utilized to implement the processes described. The Anoto toolkits may also be utilized. Authentication data may be used to ensure that only authorized users have access to the postage meters 50. Other systems, processes and postage evidencing methods may be utilized, such as those described in the patent applications incorporated by reference above.


[0050] The present application describes illustrative embodiments of a system and method for dispensing value. The embodiments are illustrative and not intended to present an exhaustive list of possible configurations. Where alternative elements are described, they are understood to fully describe alternative embodiments without repeating common elements whether or not expressly stated to so relate. Similarly, alternatives described for elements used in more than one embodiment are understood to describe alternative embodiments for each of the described embodiments having that element.


[0051] The described embodiments are illustrative and the above description may indicate to those skilled in the art additional ways in which the principles of this invention may be used without departing from the spirit of the invention. Accordingly, the scope of each of the claims is not to be limited by the particular embodiments described.


Claims
  • 1. A method for dispensing value comprising: scanning an indicia; obtaining an identifier assigned to the indicia; assigning a value to the indicia; and enabling the indicia.
  • 2. The method of claim 1 wherein: the value dispensed is postage.
  • 3. The method of claim 1 wherein: the indicia is identified using an Anoto pattern.
  • 4. The method of claim 1 wherein: the indicia includes a digital signature.
  • 5. The method of claim 1 further comprising: receiving an indication of authentication.
  • 6. The method of claim 5 further comprising: placing the indicia on a mailpiece; and placing the mailpiece in the mail stream.
  • 7. The method of claim 5 further comprising: receiving an indication that postage was paid.
  • 8. The method of claim 1 wherein: the indicia includes at least two overlapping Anoto patterns printed using at least two inks.
  • 9. The method of claim 1 wherein: the indicia includes a 2D barcode having a redundant identifier and a digital signature.
  • 10. The method of claim 2 wherein: assigning the postage value to the indicia is performed using a local postage vault.