The present subject matter relates to techniques and equipment to sort mailpieces prior to their delivery to the postal authority. Additional services are provided in data reporting and printing of delivery point barcodes. Performing these additional services together with sorting will qualify the mailing for postage discounts.
Many large mail sorting operations use multiple sorters to handle the quantity of mail that must be processed during the daily operations. These sorting operations can be captive shops or letter shops that manufacture the mail and then presort the mail before it is delivered to the postal authority such as the United States Postal Service (USPS®). Presort operations is another example of a large sorting operation with multiple machines. Many of these presorting operations process many different jobs from different clients or departments. In many cases, the client data and department data must be tracked by mailpiece and reported. Sorting operations are designed to sort the mailpieces into predefined groups of geographically related delivery points (addresses). The grouping relate to postal processing centers and mail carrier routes. Since the delivery point is associated with a number (e.g. ZIP Code) the groupings will be individual numbers or groups and ranges of numbers. For the USPS, the finest depth of sorting is based on the high order 5 digits of the ZIP Code. The next depth of sorting is based on the high order 3 digits and the lowest depth of sorting is also based on the high order 3 digits, but the range of 3 digit numbers is expanded to cover Automated Area Distribution Centers (AADC). Increasing postage discounts are based on the mailpiece sorting results with the largest discount for 5 digit and the least discount for AADC, provided at least 150 mailpieces are in the group and the ZIP Code was encoded in an approved barcode and printed on the mailpiece.
The sorting operator must create a sort scheme to control the sorter during first pass operations when the mailpieces are first processed. The data associated with each job and mailpiece is collected during first pass and stored for later use in generation of a report. The sort scheme determines which ZIP Codes will be sorted into which sort bins. The first pass sort scheme gives priority to high volume 5 digit groups and 5 digit schemes (ranges of 5 digit numbers that get the same discount when combined). Second priority for sort bin utilization is 3 digit groups or schemes. In numerous cases, sort bins will be assigned large ranges for 3 digit numbers. The mailpieces in these bins will be processed on a second pass, with a different sort scheme, to sort the mailpieces to additional 5 digit groups. The second pass is required because there are far more qualifying 5 digit groups than there are bins on the sorter.
Sorter operators will allocate sort bins for the first pass sort scheme to the highest volume 5 digit groups or schemes based on historical data. The operator has to leave available a sufficient number of bins for second pass mail collection and for special purposes, such as reject bins and undeliverable mail. Since a large sorter may have 100 to 260 sort bins, only a few of the thousands of 5 digit sort groups will be sorted to during first pass. This means that a significant amount of mail will have to be processed on second pass or even a third pass. These subsequent passes add significant processing time that may result in not sorting the mail to the finest depth of sort before the mail must be delivered to the postal authority. Significant extra hours of operation are required for the subsequent passes and significant postal discounts may be lost.
Since the sort groups are not known in advance of first pass sortation, all of the sorters in a given operation will run the same first pass sort scheme. Second pass can not be started until all of first pass is competed and analysis of the first pass data is made to create a second pass sort scheme(s). Having the same second pass sort bin designations on each machine also facilitates second pass operation where mail from individual second pass sort bins, with the same bin sort scheme, can be run on different machines during second pass.
A few sorter operators will have different first pass sort schemes on different sorters and use a NO-COUNT mode to run out of scheme mail from one machine on the other machine during first pass operation. In order to use NO-COUNT mode, the sorter must be stopped and the mode selected before the mail is run. Data from the first time the mail was run, on a different machine, is used for postal authority reports. NO-COUNT mode stops data collection. This mode represents high risk because if the operator does not cancel the mode as required, a large volume of mail may be processed incorrectly. In addition, individual mailpiece tracking, as required for the USPS Intelligent Mail operations, can not be accomplished in a NO-COUNT mode.
Hence, there exists a need for the ability to run different first pass sort schemes on each sorter in a sorting facility without stopping operations for NO-COUNT, without losing mailpiece tracking, or waiting for all first pass sorting to complete before re-running the mail that was not sorted to the finest depth of sorting.
The teachings herein alleviate one or more of the above noted problems by allowing all sorters in a shop to have different first pass sort schemes. This process increases the number of sort bins that can be assigned to a different 5 digit sort group during first pass operations, reducing the quantity of mailpieces that have to be run during second pass. Mailpieces that can be run a second time can be run concurrently during first pass without the high risk NO-COUNT mode or loss of data integrity.
It is desirable to provide a method for performing continuous sortation of mailpieces using a plurality of sorters. The method includes assigning first and second sortation schemes to first and second sorters, respectively. The first sorter receives a first batch of mailpieces and the second sorter receives a second batch of mailpieces. At least one sortation bin on the first sorter is assigned to receive mailpieces to be further processed on the second sorter with the second sortation scheme. Each mailpiece is read and a unique identifier and first metadata are established for each mailpiece to be sorted on the first sorter. The first batch of mailpieces is sorted on the first sorter in accordance with the first sort scheme. A subset of mailpieces of the first batch is sorted to the at least one designated sortation bin. During sorting of the second batch of mailpieces on the second sorter, the subset of mailpieces, transferred to the second sorter from the at least one designated bin of the first sorter is, is sorted. Second metadata for each mailpiece of the subset is established and the second metadata is associated with the unique identifier. For each mailpiece of the subset, based on an common unique identifier, the first and second metadata are integrated to establish third metadata used to generate a non-duplicative record. A mailing report is generated and contains selected data items of the non-duplicative record for each unique identifier.
It is further desirable to provide a sorting system for sortation of mailpieces. The system includes a first and second sorter. Each sorter includes a feeder for singulating a plurality of mailpieces and feeding the singulated mailpieces into the respective sorter and a plurality of sort bins for receiving the singulated mailpieces. A reader reads mailpieces for establishing a unique identifier for each of a plurality of mailpieces. A control processor is in operable connection with each sorter. During sorting of a first batch of mailpieces on the first sorter, the control processor is configured to receive and store established unique identifiers and first metadata from at least each mailpiece of a subset of mailpieces to be transferred to the second sorter. During sorting of the subset of mailpieces transferred to the second sorter, the control processor is configured to receive and store the established unique identifiers and second metadata from at least the subset of mailpieces. For each mail piece of the subset, based on a common unique identifier, the first and second metadata are integrated to establish third metadata used to generate a non-duplicative record. A mailing report is generated and contains selected data items of the non-duplicative record for each unique identifier.
It is yet further desirable to provide a method for performing continuous sortation of mailpieces using a plurality of sorters. The method includes assigning first and second sortation schemes to first and second sorters, respectively, with the first sorter receiving a first batch of mailpieces and the second sorter receiving a second batch of mailpieces. At least one sortation bin on the first sorter is designated to receive mailpieces to be further processed on the second sorter with the second sortation scheme. Each mailpiece is read and a unique identifier and first metadata are established for each mailpiece to be sorted on the first sorter. The first batch of mailpieces is sorted on the first sorter in accordance with the first sort scheme, wherein a subset of mailpieces of the first batch is sorted to the at least one designated sortation bin. A processing flag is set within the first metadata for each mailpiece of the subset. The subset of mailpieces transferred to the second sorter is identified to ensure that a second processing flag is set within second metadata during sortation on the second sorter. During sorting of the second batch of mailpieces on the second sorter, the subset of mailpieces transferred to the second sorter from the at least one designated bin of the first sorter, is sorted. The second metadata is established for each mailpiece of the subset and the second metadata is associated with the unique identifier. Each mailpiece of the subset has the second processing flag set within the second metadata. For each mailpiece of the subset having a first and second processing flag and a common unique identifier, the first and second metadata are integrated to establish third metadata used to generate a non-duplicative record. A mailing report is generated and contains selected data items of the non-duplicative record for each unique identifier.
The advantages and novel features are set forth in part in the description which follows, and in part will become apparent to those skilled in the art upon examination of the following and the accompanying drawings or may be learned by production or operation of the examples. The advantages of the present teachings may be realized and attained by practice or use of the methodologies, instrumentalities and combinations described herein.
The drawing figures depict one or more implementations in accord with the present teachings, by way of example only, not by way of limitation. In the figures, like reference numerals refer to the same or similar elements.
In the following detailed description, numerous specific details are set forth by way of examples in order to provide a thorough understanding of the relevant teachings. However, it should be apparent to those skilled in the art that the present teachings may be practiced without such details. In other instances, well known methods, procedures, components, and circuitry have been described at a relatively high-level, without detail, in order to avoid unnecessarily obscuring aspects of the present teachings.
Reference now is made in detail to the examples illustrated in the accompanying drawings and discussed below.
The sort bin allocation process is repeated for sort bins 123, 133, 143 on sorters 20, 30 and 40. The bin assignments for sort groups are not repeated in order to have the maximum number of bins available for qualifying sort groups.
During first pass operation, jobs 118, 126, 136, 146 are selected from the job queue 150 and run on their respective sorters until all jobs are completed for first pass. During first pass operation, mailpieces 115 for second sorter 20 are collected in sort bin S-2 on first sorter 10. These mailpieces are transferred to sorter 20 on an as required basis. Individual bundles of mailpieces, trays of mailpieces or containers of trays will be transferred to sorter 20 based on operational considerations. These trays of continuous first pass mail 115 can be run at any time during first pass operation on sorter 20 without operator intervention, even during a job run. Alternately, the operator may identify that a tray(s) of mail to be run is part of a continuous first pass group of mailpieces to aid in the mailpiece tracking process and postal authority generation. Mail collected in bins S-3 and S-4 are transferred (directional arrows 116, 117) and run in a similar manner on sorters 30 and 40, respectively.
A review of the processing steps shown in
The sort schemes are generated in step S205 from the data acquired in step S200. A first pass sort scheme is generated for each sorter using each finest depth of sort delivery point sort group and each second pass sort group only once. One or more sort bins are included in the allocation for each additional sorter. This bin is assigned the entire first pass sort scheme for the corresponding sorter. Any special use sort bin is allocated as required. The completed first pass sort schemes are loaded into the respective sorter from the processor/server P5. A sorting job is selected from the job queue 150 and appropriate metadata is loaded into the sorter control. The metadata will be associated with each mailpiece that is sorted during sortation if client or department data needs to be tracked. If the operation will be treated as a single large mailing, less metadata is utilized. Operation is then commenced for each sorter at the conclusion of step S210. If the mail make up (groups of ZIP Codes) of the available jobs is known for a specific job, the job can be directed to the sorter 10, 20, 30, 40 that has the best match of ZIP Code groups in the sorter's first pass sort scheme. This allocation will minimize the amount of mail that gets sorted to continuous first pass sort bins 119, 125, 135, 145.
During operation of the sorter, step S215, each mailpiece is processed in succession. The address is read with an imaging system to determine the 11 digit delivery point ZIP Code. The reader will read any postal authority barcode such as the Intelligent Mail Barcode (IMB) either in the address block or in the postal authority clear zone. If a barcode is detected in the clear zone, no additional barcode may be printed. This represents either an error, a continuous first pass mailpiece, or a mailpiece from another site. These situations may be corrected in data during report generation (
Metadata associated with the job and mailpiece is collected and correlated with the unique identifier. The unique identifier for the mailpiece is usually made up of the MID, service type and unique number, but the delivery point can be used in addition for extended uniqueness of the IMB (mailpiece license plate). Other formats for a unique identifier may be designed by those skilled in the art in place of the IMB such as, but not limited to, data matrix barcodes and additional coding formats for 4 state barcodes. The metadata saved per mailpiece and associated with the unique identifier may include, but is not limited to, client/department, time stamp when sorted, sorter ID, postage affixed, weight, bin assignment, sort group and associated tray tags. If the mailpiece is sorted to a continuous first pass sort bin, a processing flag may be set to identify the mailpiece as a continuous first pass piece. The processing flag will be used to improve processing time during analysis in the server P5. If there is a IMB in the clear zone, it will be read and decoded to obtain the unique identifier. Metadata associated with this observation will be associated with this unique identifier. The metadata can include, but is not limited to, bin assignment, time stamp, sort group and tray label group.
During operation sort bins S-1, S-2, and S-3 are monitored for any continuous first pass mailpieces that need transfer to another sorter for processing during first pass on that sorter (step S220). If such mailpiece(s) are detected, arrangements are made to transfer the mailpiece(s) to the appropriate sorter (step S250). Continuous first pass processing continues in step S251. If the job is not complete (step S225), processing continues with step S215. If the job is complete, the job queue is checked for additional jobs available (step S230). If jobs are available, processing returns to step S210. The final check, step S235, is made to be sure that all continuous first pass mail has been run. If mail needs to be run, step S215 is repeated and, if not, first pass is exited and analysis is performed (step S240).
Referring to
The process steps of
Sorter 20 is processing first pass mail when a continuous first pass tray of mail (a subset of the total mail that is sorted on first pass) becomes available for sorting (step S265). The operator must enter data into the control processor P2 or scan a special tray label before sorting the tray of mail (step S266). The mail pieces are sorted to the correct bin and the bin designation, continuous first pass processing flag, time stamp and unique identifier are sent to the server P5 individually or in batches as part of the metadata associated with each mailpiece (step S267). Continuous first pass sortation is continued S270 until all the jobs are processed for sorter 20. The server system P5 is constantly monitoring the status for the multi sorter processing. Depending on the operational plan for preparing the mail for delivery to the postal authority, the mailing may be based on the mail from all the sorters as one mailing or the mail may be broken down into other subsets such as, but not limited to, a mailing for each sorter. The server P5 monitors the available jobs 150 to determine if any additional jobs can be run on sorter 20 (step S275). If jobs are available, first pass processing continues (step S270). If all jobs are completed for sorter 20, a determination must be made if any continuous first pass mail is not yet processed that was destined for sortation on sorter 20 (step S280). If continuous first pass mail still needs sortation, the mail trays must be collected (step S285) and processed (step S270).
If all mail processing is complete, data processing and analysis is performed (step S290). The mailpieces whose metadata has the first pass processing flag set are grouped by an identical unique identifier. There should be only two entries for a mailpiece if the continuous first pass sortation has been done correctly. If additional entries are present, the errors are resolved though additional processing such as, but not limited to, saving the first and last observation data and discarding all intermediate data based on the time stamp. This approach would be appropriate if a continuous first pass tray was run on the wrong sorter. Based on the time stamp and unique identifier, data from the first observation and the last observation is catenated to one metadata file for the mailpiece. The may include, but not limited to, client, job, bin data, tray label group association, presort group, time stamp and unique ID. The parameters included are those needed for client and postal authority reports. The processing is completed starting with step S295 (
While the various examples pertain primarily to a sorter or multi-sorter environment primarily, those skilled in the art will recognize that any document processing environment may take advantage of the aforementioned techniques, including mail preparation or inserter-based environments. Furthermore, it will be recognized by skilled artisans that the techniques and concepts described herein relate to functions of document processing environments, including pre-sort bureaus, shared mailing networks, captive shops, inbound or outbound sorting environments and the like.
Although the discussion above has focused largely on the methodologies of sorter or multi-sorters, those skilled in the art will recognize that those methodologies may be controlled or implemented by one or more processors/controllers, such as one or more computers (P1, P2, P3 and P4 in
In operation, the main memory stores at least portions of instructions for execution by the CPU and data for processing in accord with the executed instructions, for example, as uploaded from mass storage. The mass storage may include one or more magnetic disk or tape drives or optical disk drives, for storing data and instructions for use by CPU. For example, at least one mass storage system in the form of a disk drive or tape drive, stores the operating system and various application software as well as data, such as sort scheme instructions. The mass storage within the computer system may also include one or more drives for various portable media, such as a floppy disk, a compact disc read only memory (CD-ROM), or an integrated circuit non-volatile memory adapter (i.e. PC-MCIA adapter) to input and output data and code to and from the computer system.
The system also includes one or more input/output interfaces for communications, shown by way of example as an interface for data communications with one or more other processing systems/devices associated with the sorting environment. Although not shown, one or more such interfaces may enable communications via a network, e.g., to enable sending and receiving instructions electronically. The physical communication links may be optical, wired, or wireless.
The computer system may further include appropriate input/output ports for interconnection with a display and a keyboard serving as the respective user interface for the processor/controller. For example, a printer control computer in a document factory may include a graphics subsystem to drive the output display. The output display, for example, may include a cathode ray tube (CRT) display, or a liquid crystal display (LCD) or other type of display device. The input control devices for such an implementation of the system would include the keyboard for inputting alphanumeric and other key information. The input control devices for the system may further include a cursor control device (not shown), such as a mouse, a touchpad, a trackball, stylus, or cursor direction keys. The links of the peripherals to the system may be wired connections or use wireless communications.
The computer system runs a variety of applications programs and stores data, enabling one or more interactions via the user interface provided, and/or over a network to implement the desired processing, in this case, including those for processing document data as discussed above.
The components contained in the computer system are those typically found in general purpose computer systems. Although summarized in the discussion above mainly as a PC type implementation, those skilled in the art will recognize that the class of applicable computer systems also encompasses systems used as host computers, servers, workstations, network terminals, and the like. In fact, these components are intended to represent a broad category of such computer components that are well known in the art.
Hence aspects of the techniques discussed herein encompass hardware and programmed equipment for controlling the relevant document processing as well as software programming, for controlling the relevant functions. A software or program product, which may be referred to as an “article of manufacture” may take the form of code or executable instructions for causing a computer or other programmable equipment to perform the relevant data processing steps, where the code or instructions are carried by or otherwise embodied in a medium readable by a computer or other machine. Instructions or code for implementing such operations may be in the form of computer instruction in any form (e.g., source code, object code, interpreted code, etc.) stored in or carried by any readable medium.
Such a program article or product therefore takes the form of executable code and/or associated data that is carried on or embodied in a type of machine readable medium. “Storage” type media include any or all of the memory of the computers, processors or the like, or associated modules thereof, such as various semiconductor memories, tape drives, disk drives and the like, which may provide storage at any time for the software programming. All or portions of the software may at times be communicated through the Internet or various other telecommunication networks. Such communications, for example, may enable loading of the relevant software from one computer or processor into another, for example, from a management server or host computer into the image processor and comparator. Thus, another type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links. The physical elements that carry such waves, such as wired or wireless links, optical links or the like, also may be considered as media bearing the software. As used herein, unless restricted to tangible “storage” media, terms such as computer or machine “readable medium” refer to any medium that participates in providing instructions to a processor for execution.
Hence, a machine readable medium may take many forms, including but not limited to, a tangible storage medium, a carrier wave medium or physical transmission medium. Non-volatile storage media include, for example, optical or magnetic disks, such as any of the storage devices in any computer(s) or the like, such as may be used to implement the sorting control. Volatile storage media include dynamic memory, such as main memory of such a computer platform. Tangible transmission media include coaxial cables; copper wire and fiber optics, including the wires that comprise a bus within a computer system. Carrier-wave transmission media can take the form of electric or electromagnetic signals, or acoustic or light waves such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media therefore include for example: a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD or DVD-ROM, any other optical medium, punch cards paper tape, any other physical storage medium with patterns of holes, a RAM, a PROM and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave transporting data or instructions, cables or links transporting such a carrier wave, or any other medium from which a computer can read programming code and/or data. Many of these forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to a processor for execution.
In the detailed description above, numerous specific details are set forth by way of examples in order to provide a thorough understanding of the relevant teachings. However, it should be apparent to those skilled in the art that the present teachings may be practiced without such details. In other instances, well known methods, procedures, components, and software have been described at a relatively high-level, without detail, in order to avoid unnecessarily obscuring aspects of the present teachings.
This application claims the benefit of U.S. Provisional Application No. 61/157,485 filed Mar. 4, 2009, the disclosure of which is entirely incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61157485 | Mar 2009 | US |