This invention relates to systems and methods for rendering scalable, fraud resistant graphical payment indicia.
A bar code symbol is a pattern of parallel bars and spaces of various widths that represent data elements or characters. The bars represent strings of binary ones and the spaces represent strings of binary zeros. A conventional “one-dimensional” bar code symbol contains a series of bars and spaces that vary only in a single dimension. One-dimensional bar code symbols have relatively small information storage capacities. “Two-dimensional” bar codes have been developed to meet the increasing need for machine-readable symbols that contain more information than one-dimensional bar code symbols. The information storage capacity of two-dimensional bar code symbols is increased relative to one-dimensional bar codes by varying a series of bars and spaces in two dimensions. Common two-dimensional bar code standards include PDF417, Code 1, and Maxicode. One-dimensional and two-dimensional bar code symbols typically are read by optical scanning techniques (e.g., by mechanically scanned laser beams or by self-scanning charge-coupled devices (CCD's)) that convert a printed bar code symbol into electrical signals. The electrical signals are digitized and decoded to recover the data encoded in the printed bar code symbol.
Bar code symbols may be used in a variety of applications, including low information content applications (e.g., automatic price tagging and inventory management), and relatively high information content applications (e.g., encoding mail addresses and postage for automated mail reading and mail distribution systems, and encoding compressed content of a printed page).
The United States Postal Service (USPS) has proposed an Information Based Indicia Program (IBIP) that allows users to purchase and print postage with their computers. In accordance with the IBIP, the printed postage indicium includes a large, two-dimensional bar code that contains certain required postal data, including information that conveys evidence that postage has been paid and information used for mail processing. The required postal data is cryptographically transformed into a digital token using a cryptographic key that is held within a secure postage accounting device that is assigned to each user. The digital token is validated by a verifier with access to a public key corresponding to the secret key of the accounting device. By validating the information embedded within the postage indicia, the USPS may verify the integrity and authenticity of the data contained within the postage indicia and, therefore, may be reasonably certain that the required postage has been paid.
The invention features novel schemes for generating payment indicia that enable users to customize the appearance of the payment indicia and to accommodate a wide variety of validation processing environments, while providing a substantial defense against fraudulent photocopy attack.
In one aspect, the invention features a payment indicium generating method in accordance with which a corroborative digital token is generated from payment information, and a base image is modulated with a graphical encoding of the corroborative digital token to produce a payment indicium.
As used herein, the term “corroborative digital token” refers broadly to a digital token from which the sender of information or the information itself, or both, may be authenticated.
Embodiments in accordance with this aspect of the invention may include one or more of the following features.
The corroborative digital token preferably is generated from a cryptographic transformation of the payment information. The payment information may include an indication of payment amount and postal data. The postal data may include destination address information and a geographical deposit area postal code.
The base image may include a user-selected image. The base image preferably is rendered based upon a half-tone encoding process.
In another aspect of the invention, a payment indicium containing embedded payment information is rendered on a printing surface with a printing characteristic that degrades with photographic reproductions such that the embedded payment information is extractable from an original rendering of the payment indicium but is un-extractable from a photographic reproduction of an original rendering of the payment indicium.
Embodiments in accordance with this aspect of the invention may include one or more of the following features.
The payment indicium may be rendered as a bit map image with a resolution selected to be irreproducible by photographic reproduction techniques having a maximum resolution of 600×600 dots per inch, or less. In some embodiments, the payment indicium is rendered as a bit map image with a resolution of 100 dots per inch, or greater. In other embodiments, the payment indicium is rendered as a bit map image with a resolution of 125 dots per inch, or greater. The payment indicium preferably is rendered with a resolution selected based at least in part upon how the payment indicium is rendered on the printing surface.
In another aspect, the invention features a payment indicium generating method in accordance with which payment information is encoded into a corroborative digital token based at least in part upon one or more variable encoding parameters, and a payment indicium containing the encoded payment information is rendered.
Embodiments in accordance with this aspect of the invention may include one or more of the following features.
One or more of the encoding parameters may vary with payment value. For example, an encoding security level parameter (e.g., an encoding private key bit length parameter) may vary with payment value. An encoding robustness parameter (e.g., an error correction code redundancy parameter) also may vary with payment value.
Other features and advantages of the invention will become apparent from the following description, including the drawings and the claims.
In the following description, like reference numbers are used to identify like elements. Furthermore, the drawings are intended to illustrate major features of exemplary embodiments in a diagrammatic manner. The drawings are not intended to depict every feature of actual embodiments nor relative dimensions of the depicted elements, and are not drawn to scale.
Referring to
In cases where payment indicium 14 is intended to evidence payment of postage, information 12 may include the date and time, the current balance of the postage metering device, the strike counter of total transactions, the serial number of meter, a transaction identifier, the debit amount, the addressee ZIP code, the addressee name, the class of postage, the user's registration identifier, and the user's name, company and address.
Referring to
As shown in
Referring to
If a public key certificate is appended to the extracted digital token, the public key certificate may provide a level of assurance as to the identity of the holder of the private key corresponding to a particular public key. The authenticity of the public key certificate may be tested by verifying the certification authority's digital signature using the certification authority's public key.
Referring to
In general, the graphical encoding process of
As mentioned above, payment indicium 14 may be rendered such a way that the embedded information cannot be extracted from a photographic reproduction of the postage indicium (at least with respect to commonly available photographic reproduction techniques). In some embodiments, payment indicium is rendered on a printing surface with a printing resolution selected to be irreproducible by photographic reproduction techniques that have a maximum copying resolution of 600×600 dots per inch (DPI), or less. As shown in Table 1 below, the selected printing resolution depends, at least in part, upon the printing technique used to render payment indicium 14 on the printing surface.
Thus, in some embodiments, payment indicium 14 is rendered with a printing resolution selected based at least in part upon the process used to render payment indicium 14. In particular, in an effort to foil simple fraudulent photocopy attacks, in one embodiment, payment indicium 14 is printed with a printing resolution of 125 DPI, or greater, for laser printer renderings and with a printing resolution of 100 DPI, or greater, for ink-jet printer renderings.
As shown in
In some embodiments, the security level or the robustness level, or both, of payment indicium 14 may be scaled to enable users to fully customize the graphical appearance of the payment indicia while accommodating the particular processing environment available for extracting and authenticating the information embedded in the payment indicia. In one embodiment, one or more of the encoding parameters of the process that encodes payment information into the corroborative digital token may be varied to reduce the amount of processing needed to extract the digital token from payment indicium 14. For example, the bit-length of the private key used to encode the payment information into the digital token may vary with the monetary value represented by payment indicium 14, with longer bit lengths being used for higher-value payment indicia. In addition, the robustness level of the information encoded in payment indicium 14 may vary with monetary value. For example, a 16→31 bit BCH error correction code may be used for payment indicia values that are greater than or equal to $1, and a 8→15 bit BCH error correction code may be used for payment indicia values that are less than $1. In some embodiments, the robustness level of the encoded information preferably is greater than a minimum robustness level that is selected based upon security considerations, such as preventing photocopy attack. By reducing the amount of information that must be encoded in payment indicium 14, the required minimum size of payment indicium 14 may be reduced. In this way, a user may have greater freedom in customizing the visual appearance of payment indicium 14.
In sum, the above-described embodiments provide novel schemes for producing scalable, fraud resistant graphical payment indicia. The payment indicia may have the appearance of a selected visually significant graphical image (e.g., a company acronym or a company logo), rather than the visually non-significant images of conventional two-dimensional bar code symbols. The above-described embodiments also provide a way to scale the security level and the robustness level of payment indicia to enable users to fully customize the graphical appearance of the payment indicia while accommodating the particular processing environment available for extracting and authenticate the information embedded therein.
The systems and methods described herein are not limited to any particular hardware or software configuration, but rather they may be implemented in any computing or processing environment. The encoding and decoding processes described above may be implemented in a high level procedural or object oriented programming language, or in assembly or machine language; in any case, the programming language may be a compiled or interpreted language.
Other embodiments are within the scope of the claims.
For example, although the above embodiments are described with respect to an asymmetric (public key) cryptographic embodiment, other embodiments may be implemented using a symmetric (secret key) cryptographic scheme in which the cryptographic hash is encrypted with the sender's secret key. In addition, although the above embodiments are described with respect to fixed-pattern halftoning methods, other embodiments may utilize different halftoning methods, including cluster dithering (e.g., blue noise) methods and error diffusion methods. Furthermore, payment indicium 14 may represent any form of monetary payment, including USPS postage and parcel shipment payment indicia of other parcel carriers (e.g., United Parcel Service, Federal Express and DHL Worldwide Express).
Still other embodiments are within the scope of the claims.
This application is related to U.S. patent application Ser. No. 09/579,070, filed May 25, 2000, by Doron Shaked et al., and entitled “A Method and Apparatus for Generating and Decoding a Visually Significant Bar Code,” which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4637051 | Clark | Jan 1987 | A |
4777357 | Harada et al. | Oct 1988 | A |
4822986 | Guthmueller et al. | Apr 1989 | A |
4901073 | Kibrick | Feb 1990 | A |
4924078 | Sant'Anselmo et al. | May 1990 | A |
5060980 | Johnson et al. | Oct 1991 | A |
5075862 | Doeberl et al. | Dec 1991 | A |
5091966 | Bloomberg et al. | Feb 1992 | A |
5120940 | Willsie | Jun 1992 | A |
5195123 | Clement, Jr. | Mar 1993 | A |
5315098 | Tow | May 1994 | A |
5337361 | Wang | Aug 1994 | A |
5339170 | Fan | Aug 1994 | A |
5442459 | Gahang | Aug 1995 | A |
5459307 | Klotz, Jr. | Oct 1995 | A |
5486686 | Zdybel, Jr. et al. | Jan 1996 | A |
5513563 | Berson | May 1996 | A |
5523552 | Shellhammer et al. | Jun 1996 | A |
5527407 | Gartland et al. | Jun 1996 | A |
5541396 | Rentsch | Jul 1996 | A |
5550365 | Klancnik et al. | Aug 1996 | A |
5591956 | Longacre, Jr. | Jan 1997 | A |
5644408 | Li et al. | Jul 1997 | A |
5661284 | Freeman et al. | Aug 1997 | A |
5682030 | Kubon | Oct 1997 | A |
5706099 | Curry | Jan 1998 | A |
5710636 | Curry | Jan 1998 | A |
5710814 | Klemba et al. | Jan 1998 | A |
5778076 | Kara et al. | Jul 1998 | A |
5790703 | Wang | Aug 1998 | A |
5799112 | de Queiroz et al. | Aug 1998 | A |
5801944 | Kara | Sep 1998 | A |
5818970 | Ishikawa et al. | Oct 1998 | A |
5819240 | Kara | Oct 1998 | A |
5835615 | Lubow et al. | Nov 1998 | A |
5866895 | Fukuda et al. | Feb 1999 | A |
5871288 | Ryan et al. | Feb 1999 | A |
5880451 | Smith et al. | Mar 1999 | A |
5897669 | Matsui | Apr 1999 | A |
5898166 | Fukuda et al. | Apr 1999 | A |
5912745 | Ulichney | Jun 1999 | A |
5946414 | Cass | Aug 1999 | A |
5946415 | Su et al. | Aug 1999 | A |
5953426 | Windel et al. | Sep 1999 | A |
5974147 | Cordery et al. | Oct 1999 | A |
5974200 | Zhou et al. | Oct 1999 | A |
5982896 | Cordery et al. | Nov 1999 | A |
5996893 | Soscia | Dec 1999 | A |
6032861 | Lemelson et al. | Mar 2000 | A |
6064738 | Fridrich | May 2000 | A |
6064764 | Bhaskaran et al. | May 2000 | A |
6116510 | Nishino | Sep 2000 | A |
6128735 | Goldstein et al. | Oct 2000 | A |
6141441 | Cass et al. | Oct 2000 | A |
6141450 | Chen et al. | Oct 2000 | A |
6151590 | Cordery et al. | Nov 2000 | A |
6172773 | Ulichney | Jan 2001 | B1 |
6175827 | Cordery et al. | Jan 2001 | B1 |
6193158 | Hecht et al. | Feb 2001 | B1 |
6201901 | Zhou et al. | Mar 2001 | B1 |
6212504 | Hayosh | Apr 2001 | B1 |
6240196 | Fischer et al. | May 2001 | B1 |
6240212 | Son et al. | May 2001 | B1 |
6252675 | Jacobs | Jun 2001 | B1 |
6256398 | Chang | Jul 2001 | B1 |
6263086 | Wang | Jul 2001 | B1 |
6311214 | Rhoads | Oct 2001 | B1 |
6345104 | Rhoads | Feb 2002 | B1 |
6364209 | Tatsuta et al. | Apr 2002 | B1 |
6373587 | Sansone | Apr 2002 | B1 |
6398117 | Oakeson et al. | Jun 2002 | B1 |
6427021 | Fischer et al. | Jul 2002 | B1 |
6430302 | Rhoads | Aug 2002 | B2 |
6457651 | Paul et al. | Oct 2002 | B2 |
6459803 | Powell et al. | Oct 2002 | B1 |
6470096 | Davies et al. | Oct 2002 | B2 |
6493110 | Roberts | Dec 2002 | B1 |
6510997 | Wilz et al. | Jan 2003 | B1 |
6526155 | Wang et al. | Feb 2003 | B1 |
6611623 | Konishi et al. | Aug 2003 | B2 |
6751352 | Baharav et al. | Jun 2004 | B1 |
20010047476 | Yen et al. | Nov 2001 | A1 |
Number | Date | Country |
---|---|---|
0647925 | Apr 1995 | EP |
0881601 | Dec 1998 | EP |
0913789 | May 1999 | EP |
0952558 | Oct 1999 | EP |
1001382 | May 2000 | EP |
WO9966456 | Dec 1999 | WO |
WO 0011599 | Mar 2000 | WO |
WO0065541 | Nov 2000 | WO |
Number | Date | Country | |
---|---|---|---|
20020103764 A1 | Aug 2002 | US |