EP0780809B1 - PC-gestütztes offenes Zählsystem und dazugehöriges Verfahren - Google Patents
PC-gestütztes offenes Zählsystem und dazugehöriges Verfahren Download PDFInfo
- Publication number
- EP0780809B1 EP0780809B1 EP19960120519 EP96120519A EP0780809B1 EP 0780809 B1 EP0780809 B1 EP 0780809B1 EP 19960120519 EP19960120519 EP 19960120519 EP 96120519 A EP96120519 A EP 96120519A EP 0780809 B1 EP0780809 B1 EP 0780809B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- vault
- indicia
- transaction
- module
- application program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00193—Constructional details of apparatus in a franking system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00314—Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
- G07B2017/00153—Communication details outside or between apparatus for sending information
- G07B2017/00177—Communication details outside or between apparatus for sending information from a portable device, e.g. a card or a PCMCIA
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00193—Constructional details of apparatus in a franking system
- G07B2017/00201—Open franking system, i.e. the printer is not dedicated to franking only, e.g. PC (Personal Computer)
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00314—Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
- G07B2017/00322—Communication between components/modules/parts, e.g. printer, printhead, keyboard, conveyor or central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00314—Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
- G07B2017/0033—Communication with software component, e.g. dll or object
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00314—Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
- G07B2017/00338—Error detection or handling
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00314—Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
- G07B2017/00346—Power handling, e.g. power-down routine
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00362—Calculation or computing within apparatus, e.g. calculation of postage value
- G07B2017/00395—Memory organization
- G07B2017/00411—Redundant storage, e.g. back-up of registers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00362—Calculation or computing within apparatus, e.g. calculation of postage value
- G07B2017/00427—Special accounting procedures, e.g. storing special information
Definitions
- the present invention relates generally to value printing systems and, more particularly, to value printing systems wherein a printer is not dedicated to a metering module.
- the present application is related to the following European Patent Publication Nos. 0780804 , 0790806 , 0780807 , 0782110 , 0780808 . 0782109 . 0782112 , 0780805 and 0782108 , each filed concurrently herewith, and assigned to the assignee of the present invention.
- closed systems The USPS is presently considering requirements for two metering device types: closed systems and open systems.
- closed system the system functionality is solely dedicated to metering activity.
- closed system metering devices also referred to as postage evidencing devices (PEDs)
- PEDs postage evidencing devices
- PEDs postage evidencing devices
- a dedicated printer is securely coupled to a metering or accounting function.
- the printer is securely coupled and dedicated to the meter, printing cannot take place without accounting.
- Post PerfectTM meter which is a new closed system metering device that includes a dedicated digital printer securely coupled to a secure accounting module.
- the printer In an open system, the printer is not dedicated to the metering activity, freeing system functionality for multiple and diverse uses in addition to the metering activity.
- Examples of open system metering devices include personal computer (PC) based devices with single/multi-tasking operating systems, multi-user applications and digital printers.
- An open system metering device is a PED with a non-dedicated printer that is not securely coupled to a secure accounting module.
- the accounting register within the PED must always reflect that the printing has occurred.
- Postal authorities generally require the accounting information to be stored within the postage meter in a secure manner with security features that prevent unauthorized and unaccounted for postage printing or changes in the amounts of postal funds stored in the meter.
- the meter and printer are integral units, i.e., interlocked in such a manner as to ensure that the printing of a postage indicia cannot occur without accounting.
- the postage value for a mail piece may be encrypted together with other data to generate a digital token.
- a digital token is encrypted information that authenticates the information imprinted on a mail piece including postage values.
- These systems employ an encryption algorithm to encrypt selected information to generate at least one digital token for each mailpiece.
- the encryption of the information provides security to prevent altering of the printed information in a manner such that any misuse of the tokens is detectable by appropriate verification procedures.
- Typical information which may be encrypted as part of a digital token includes origination postal code, vendor identification, data identifying the PED, piece count, postage amount, date, and, for an open system, destination postal code.
- origination postal code e.g., a postal code
- vendor identification e.g., a postal code
- data identifying the PED e.g., a secret key
- piece count e.g., a secret key
- postage amount e.g., postage amount, date
- destination postal code e.g., postal data which may be encrypted as part of a digital token.
- postal data when encrypted with a secret key and printed on a mail piece provide a very high level of security which enables the detection of any attempted modification of a postal revenue block or a destination postal code.
- a postal revenue block is an image printed on a mail piece that includes the digital token used to provide evidence of postage payment.
- the Postal data may be printed both in encrypted and unencrypted form in the postal revenue block
- Postal data serves as an input to a Digital Token Transformation which is a cryptographic transformation computation that utilizes a secret key to produce digital tokens.
- Digital Token Transformation i.e., digital tokens
- Digital token may be an encryption of all postal data or a subset thereof.
- Digital tokens are utilized in both open and closed metering systems.
- the non-dedicated printer may be used to print other information in addition to the postal revenue block and may be used in activity other than postage evidencing.
- addressee information is included in the postal data which is used in the generation of the digital tokens. Such use of the addressee information creates a secure link between the mailpiece and the postal revenue block and allows unambiguous authentication of the mail piece.
- two digital tokens are used to authenticate postal data and postage payment.
- the first is produced by a Digital Token Transformation using a secret key held by the Postal Service and the mailer's PED.
- the second is produced by a Digital Token Transformation using a secret key held by the PED vendor and the mailer's PED.
- the fact that two independent entities hold separate verification secrets greatly enhances the security of the system because it provides the Postal Service and the vendor with independent means to authenticate the postal revenue block, and thus, verify postage payment.
- the use of the second Digital Token Transformation using the vendor's secret key is an optional part of the security which authenticates postage payment by a particular vendor's device.
- the use of two digital tokens (postal and vendor) is described in US Patent No.
- a transaction evidencing system comprising: a personal computer (PCs), an unsecured printer and portable vault means removably coupled to said PC, and user interface means, said PC including a processor, memory and storage means, said storage means including at least one non-metering application program that is selectively run on said PC, said unsecured printer connected to said PC for printing in accordance with said non-metering application program, said portable vault means including digital token generation means and transaction accounting means, the system comprising: vault interface means in said PC for effecting communications between said portable vault means and said non-metering application program and for performing metering functions other than metering functions performed in said portable vault means, said vault interface means comprising: an application interface module for interfacing with said non-metering application program; a communications module for communicating with said portable vault means; a storage area in the storage means;' an indicia image creation and storage module for generating indicia bitmaps and storing said indicia bitmaps in said storage area;
- a method of implementing a transaction evidencing system on a personal computer (PC) having a display and an unsecured printer operatively coupled thereto comprising the steps of: providing a portable vault that is removably coupled to the personal computer via a vault interface means, said portable vault operating as a secure accounting module of the transaction evidencing system; requesting indicia for a particular document being processed in an application program running in the PC; securely sending via the vault interface means from an application interfacing module in the PC, in response to said request for indicia, a request for at least one digital token to said vault with a predetermined set of information relating to the particular document; issuing in said vault at least one digital token and securely sending via the vault interface means the digital token to an indicia generating module in the PC; storing the digital token and the predetermined set of information in a transaction record; the vault interface means storing the transaction record in a storage area of the personal computer; generating an indici
- a transaction evidencing system including a plurality of computer systems operatively configured to form a network with one of the computer systems functioning as a server and the remaining computer systems functioning as clients, each of the computer systems including processor, memory, storage and user interface means, at least some of said storage means including a plurality of non-metering application programs that are selectively run on said client computer systems, at least one of said computer systems including an unsecured printer operatively coupled thereto for printing in accordance with said non-metering application programs, the system comprising: a portable vault card that is removable coupled to said server computer system, said vault card including digital token generation means and transaction accounting means, said server computer system including means for removable coupling said vault card to said server computer system; vault interface means for effecting communications between said portable vault means and said non-metering application program and for performing metering functions other than metering functions performed in said portable vault means, said vault interface means comprising: an application interface module in said client computer system for interfacing with said non-metering application
- a method of implementing a transaction evidencing system on a computer network comprising a plurality of computer systems operatively configured to form the computer network with one of the computer systems functioning as a server and the remaining computer systems functioning as clients, the method comprising the steps of: providing a portable vault that is operatively coupled to the server via a vault interface means, said vault operating as a secure accounting module of the transaction evidencing system; requesting indicia in one of the clients for a particular document being processed in a non-metering application program running in the requesting client; sending the request for indicia from the requesting client to the server with a predetermined set of information relating to the particular document; sending, in response to said request for indicia, a request for at least one digital token from the server via the vault interface means to the portable vault with the predetermined set of information; issuing in said portable vault at least one digital token and sending the digital token as part of a transaction record via the vault interface means to
- the present system provides a PC-based open metering system that comprises a PC, special Windows-based software, a printer and a plug-in peripheral as a vault to store postage funds.
- the PC meter uses a personal computer and its non-secure and non-dedicated printer to print postage on envelopes and labels at the same time it prints a recipient address.
- a PC based open meter system which consists of a personal computer (PC), a digital printer, a removable electronic vault, an optional modem for funds recharge (debit or credit), a PC software module in the form of a Dynamic Link Library (DLL) and a user interface module.
- the vault is a secure encryption device for digital token generation, funds management and traditional accounting functions.
- the DLL module performs all communications with the vault, and provides an open interface to Windows-based applications. Secure communication between the DLL and the vault is desired but is not necessary for system security.
- the DLL module obtains from the vaults transaction records comprising digital tokens issued by the vault and associated postal data and generates an electronic indicia image. The usage of postal fund and the transaction record are stored in the vault.
- the user interface module obtains the electronic indicia image from the DLL module for printing the postal revenue block on a document, such as an envelope.
- the user interface also communicates with the vault via the DLL for remote refills and for performing administrative functions.
- the present system provides open system metering that includes security to prevent tampering and false evidence of postage payment as well as the ability to do batch processing of envelopes, review of indicia and addressing on envelope before printing.
- the transaction evidencing system includes a personal computer (PC) comprising a conventional processor, memory and hard drive, with a plurality of non-metering application programs that selectively run on the PC.
- An unsecured printer is operatively coupled to the PC for printing in accordance with the non-metering application programs.
- a portable vault card that is removably coupled to the PC is programmed to generate tokens and perform transaction accounting.
- An application interface module in the PC which interfaces with the non-metering application programs, issues a request for digital tokens in response to requests for indicia from a non-metering application program.
- a secure communications module in the PC which securely communicates with the vault card when the vault card is coupled to the PC, sends the request for digital token to the vault card and receives a digital token generated by the vault card.
- An indicia bitmap generation module generates an indicia bitmap in the PC from the digital token and stores it in memory . The indicia bitmap is accessed by the non-metering application program when a print indicia operation is selected.
- a transaction capture module in the PC stores on the hard drive a transaction record corresponding to each issued digital token and associated postal data.
- the application interface module, the secure communications module, the indicia bitmap generation module and the transaction capture module are part of a dynamic link library module in the PC.
- PC-based postage meter also referred to herein as a PC meter system, generally referred to as 10, comprising a conventional personal computer configured to operate as a host to a removable metering device or electronic vault, generally referred to as 20, in which postage funds are stored.
- PC meter system 10 uses the personal computer and its printer to print postage on envelopes at the same time it prints a recipient's address or to print labels for pre-addressed return envelopes or large mailpieces. It will be understood that although the preferred embodiment of the present invention is described as a postage metering system, the present invention is applicable to any value metering system that includes transaction evidencing.
- the term personal computer is used generically and refers to present and future microprocessing systems with at least one processor operatively coupled to user interface means, such as a display and keyboard, and storage media.
- the personal computer may be a workstation that is accessible by more than one user.
- the PC-based postage meter 10 includes a personal computer (PC) 12, a display 14, a keyboard 16, and an unsecured digital printer 18, preferably a laser or ink-jet printer.
- PC 12 includes a conventional processor 22, such as the 80486 and Pentium processors manufactured by Intel, and conventional hard drive 24, floppy drive(s) 26, and memory 28.
- Electronic vault 20, which is housed in a removable card, such as PCMCIA card, is a secure encryption device for postage funds management, digital token generation and traditional accounting functions.
- PC meter system 10 may also include an optional modem 29 which is located preferably in PC 12. Modem 29 may be used for communicating with a Postal Service or a postal authenticating vendor for recharging funds (debit or credit). A description of such communication by modem is described in U.S. Patent No. 4,831,555 , incorporated herein by reference. In an alternate embodiment the modem may be located in PCMCIA card.
- PC meter system 10 further includes a Windows-based PC software module 34 ( Figs. 3 and 4 ) that is accessible from conventional Windows-based word processing, database and spreadsheet application programs 36.
- PC software module 34 includes a vault dynamic link library (DLL) 40, a user interface module 42, ( Fig. 2 ) and a plurality of sub-modules that control the metering functions.
- the DLL is an application programming interface (API) that is used by in Windows-based programs. It will be understood that the present invention is suitable for use with an API corresponding to other than Windows-based programs.
- API application programming interface
- DLL module 40 securely communicates with vault 20 and provides an open interface to Microsoft Windows-based application programs 36 through user interface module 42.
- DLL module 40 also securely stores an indicia image and a copy of the usage of postal funds of the vault.
- User interface module 42 provides application programs 36 access to an electronic indicia image from DLL module 40 for printing the postal revenue block on a document, such as an envelope or label.
- User interface module 42 also provides application programs the capability to initiate remote refills and to perform administrative functions.
- PC-based meter system 10 operates as a conventional personal computer with attached printer that becomes a postage meter upon user request.
- Printer 18 prints all documents normally printed by a personal computer, including printing letters and addressing envelopes, and in accordance with the present invention, prints postage indicia.
- the vault is housed in a PCMCIA I/O device, or card, which is accessed through a PCMCIA controller 32 in PC 12.
- a PCMCIA card is a credit card size peripheral or adapter that conforms to the standard specification of the Personal Computer Memory Card International Association.
- the PCMCIA card includes a microprocessor 44, non-volatile memory (NVM) 46, clock 48, an encryption module 50 and an accounting module 52.
- the encryption module 50 may implement the NBS Data Encryption Standard (DES) or another suitable encryption scheme.
- DES NBS Data Encryption Standard
- encryption module 50 is a software module. It will be understood that encryption module 50 could also be a separate device, such as a separate chip connected to microprocessor 44.
- Accounting module 52 may be EEPROM that incorporates ascending and descending registers as well as postal data, such as origination ZIP Code, vendor identification, data identifying the PC-based postage meter 10, sequential piece count of the postal revenue block generated by the PC-based postage meter 10, postage amount and the date of submission to the Postal Service.
- an ascending register in a metering unit records the amount of postage that has been dispensed, i.e., issued by the vault, in all transactions and the descending register records the value, i.e., amount of postage, remaining in the metering unit, which value decreases as postage is issued.
- the hardware design of the vault includes an interface 56 that communicates with the host processor 22 through PCMCIA controller 32.
- the components of vault 20 that perform the encryption and store the encryption keys are packaged in the same integrated circuit device/chip that is manufactured to be tamper proof. Such packaging ensures that the contents of NVM 46 may be read only by the encryption processor and are not accessible outside of the integrated circuit device. Alternatively, the entire card could be manufactured to be tamper proof.
- the open system vault 20 is strictly a slave device to PC 12.
- Host processor 22 generates a command and vault 20 replies with a response.
- the vault 20 does not generate unsolicited messages.
- PC 12 requests vault status whenever any transaction is initiated.
- vault 20 has four security access levels: normal mode 60, service mode 62, privileged mode 64 and manufacturing mode 66.
- normal mode 60 commands available to users are processed.
- service mode 62 normal mode commands and service related commands are processed.
- privilege mode 64 all commands except direct access to NVM are processed.
- manufacturing mode 66 all commands are processed.
- An access level is assigned to every command that is processed by the vault.
- Passwords are assigned to the various access levels. For example, to enter service mode 62 from the normal mode 60, a service password is required. Another password is required to enter privileged mode 64. Thus, two passwords, service and privileged, must be entered to access privileged mode 64. Privileged mode 64 cannot be accessed from normal mode 60 or manufacturing mode 66.
- a manufacturing vendor puts vault 20 in manufacturing mode 66 to program the NVM 46 of PCMCIA card.
- NVM 46 is programmed with encryption, accounting, funds management and other vault software modules. Then the vendor locks a serial number in NVM 46, prohibiting any unauthorized access to NVM 46, before delivering PCMCIA card to a user.
- the vendor programs vault 20 to default to normal mode 60 whenever power is applied.
- a manufacturing mode password is required, i.e. vault 20 must be in manufacturing mode, to unlock the serial number in vault 20.
- PCMCIA card does not include a self contained power source. Power to PCMCIA card is controlled by PC 12 in a conventional manner. When a user inserts vault 20 into PCMCIA controller 32 of PC 12, PC 12 software is in full control of electric power to vault 20.
- Microprocessor 44 in PCMCIA card is always in one of the four states: power removed 70, execution 72, idle 74, or power-down 76. Microprocessor 44 enters the execution state 72 each time it performs a task specified in a command from PC 12. Microprocessor 44 enters the idle state 74 after performing such task. Microprocessor 44 enters the power-down 76 if the system remains idle longer than the user specified idle time. To exit power-down state 76, an external signal from PC 12 wakes up microprocessor 44. Microprocessor 44 is in the power removed state 70 whenever PCMCIA card is removed from PCMCIA controller 32 or whenever PCMCIA controller 32 disables power to PCMCIA card. Figure 6 shows the state transitions for power controls.
- Status messages communicate the status of vault 20 to PC 12.
- the status messages also serve as acknowledgment or failure to acknowledge a given command by PC 12.
- DLL 40 is a key component of PC-base meter 10.
- DLL 40 includes both executable code and data storage area 41 that is resident in hard drive 24 of PC 12.
- applications programs 36 such as word processing and spreadsheet programs, communicate with one another using one or more dynamic link libraries.
- the present invention encapsulates all the processes involved in metering, and provides an open interface to vault 20 from all Windows-based applications capable of using a dynamic link library.
- any application program 36 can communicate with vault microprocessor 44 in PCMCIA card through DLL 40.
- DLL 40 includes the following software sub-modules: secure communications 80, transaction capture 82, secure indicia image creation and storage 84, and application interface module 86.
- the Secure Communications sub-module 80 prevents this from happening by maintaining secure communication between DLL 40 and vault 20.
- the Secure Communications sub-module 80 identifies a specific vault 20 when it opens a communication session through PCMCIA controller 32, and maintains communication data integrity with the specific vault during the entire communication session.
- DLL 40 and vault 20 negotiate a session key at step 100. All the messages thereafter are encoded/decoded using the session key which is used for only the one particular communication session.
- the communication session terminates and an error message is sent to the user at step 106.
- session keys is described in Applied Cryptography by Bruce Schneier, published by John Wiley and Sons, Inc., 1994 .
- the session key not only provides secure encrypted communication between DLL 40 and vault 20, but also prevents another vault (PCMCIA card) from replacing the vault 20 that began a communication session, because the other vault does not have the session key negotiated at the beginning of the communication session.
- Secure Communications sub-module 80 also controls secure communications with the postal data center, for example, during refills of the accounting registers in vault 20.
- Transaction Capture sub-module 82 captures each transaction record received from vault 20 and records the transaction record in DLL 40 and in DLL storage area 41 on hard drive 24. If there is ample room on hard drive 24, such transaction captures can be stored for a plurality of different vaults. Referring now to Fig. 8 , from the moment that a communication session is established, Transaction Capture sub-module 82 monitors message traffic at step 120, selectively captures each transaction record for token generations and refills, and stores such transaction records in DLL 40 at step 124 and in an invisible and write-protected file 83 in DLL storage area 41 at step 126.
- the information stored for each transaction record includes, for example, vault serial number, date, piece count, postage, postal funds available (descending register), tokens, destination postal code and the block check character.
- a predetermined number of the most recent records initiated by PC 12 are stored in file 83 which is an indexed historical file. In the preferred embodiment, file 83 is indexed according to piece count but may be searched according to addressee information. File 83 represents the mirror image of vault 20 at the time of the transaction except for the encryption keys and configuration parameters. Storing transaction records on hard drive 24 provides backup capability which is described below.
- the indicia is secure because the indicia printer is dedicated to the meter activity and is physically secured to the accounting portion of the meter, typically in a tamper-proof manner.
- an open metering system such as the present invention, such physical security is not present.
- the entire fixed graphics image 90 of the indicia 92, shown in Fig. 9 is stored as compressed data 94 in DLL storage area 41.
- Postal data information including piece count 93a, vendor ID 93b, postage amount 93c, serial number 93d, date 93e and origination ZIP 93f and tokens 93g are combined with the fixed graphics image 90 by Indicia Image Creation Module 84.
- Indicia Image Creation Module 84 checks for a digital token from vault 20 at step 144, and at step 146 generates a bit-mapped indicia image 96 by expanding the compressed fixed graphics image data 94 at step 148 and combining at step 150 the indicia's fixed graphics image 90 with some or all of the postal data information and tokens received from vault 20.
- the indicia image is stored in DLL 40 for printing.
- Sub-module 84 sends to the requesting application program 36 in PC 12 the created bit-mapped indicia image 96 that is ready for printing, and then stores a transaction record comprising the digital tokens and associated postal data in DLL storage area 41.
- bit-mapped indicia image 96 is stored in DLL 40 which can only be accessed by executable code in DLL 40. Furthermore, only the executable code of DLL 40 can access the fixed graphics image 90 of the indicia to generate bit-mapped indicia image 96. This prevents accidental modification of the indicia because it would be very difficult for a normal user to access, intentionally or otherwise, the fixed graphics image 90 of the indicia and the bit-mapped indicia image 96.
- the Application Interface sub-module 86 provides the following services when requested by an application program 36 in PC 12.
- Application program 36 accepts user data through user interface module 42 and prints indicia on an envelope or on a label.
- such application program 36 would be an off-the-shelf software module, such as a word processor or spreadsheet, that can access DLL 40.
- application program 36 could be a software module dedicated solely to accept user data and print indicia on an envelope or on a label.
- Application Interface sub-module 86 provides the destination ZIP data and associated postal data needed to create the indicia.
- Application Interface sub-module 86 requests available postage from vault 20 and reports the available postage to the requesting application program 36.
- Application Interface sub-module 86 When vault 20 is refilled with postage funds from the data center, Application Interface sub-module 86 requests from vault 20 the access code required for refills and reports the access code received to the Secure Communications sub-module 80 which initiates communications with the data center. Application Interface sub-module 86 initiates the refill and provides the amount and combination to vault 20. DLL 40 reports the result to the requesting application program 36 which acknowledges the refill to the user.
- Application Interface sub-module 86 processes a request for indicia received from application program 36 and forwards the request to Indicia Image Creation and Storage sub-module 84.
- Application Interface sub-module 86 provides postal data, including date, postage, and a destination postal code, such as an 11 digit ZIP code, to Indicia Image Creation and Storage sub-module 84 which then generates a bit-mapped indicia image 96.
- Application Interface sub-module 86 reports to application program 36 that the bit-mapped indicia image 96 is ready for printing.
- Vault 20 must be a secure device because it contains the accounting information of the amount of postage remaining in the vault and the postage printed.
- the present invention enhances the reliability of a PC meter system by using the hard disk of the user PC to backup the accounting information of the vault.
- the transaction capture sub-module 82 stores transaction files as backup files on hard drive 24. This provides a benefit that certain functions, such as account reconciliation, can be performed even when vault 20 malfunctions. Such backup is unavailable in conventional postage meters.
- the backup transaction files can be encrypted before being stored on hard drive 24 to prevent tampering.
- the number of transactions that are maintained on hard drive 24 is limited only by the available storage space on hard drive 24. Preferably, at least all transactions since the last refill would be maintained as backup.
- the first action by a user after powering up a conventional meter is setting the time and date of the meter. Setting the date is necessary to generate derived keys which are used to generate the digital tokens. (Some recent meters have a real time clock internal to the meter in which case the time and date need only be set once.) The present system spares the user from having to set the vault date.
- vault 20 does not have an independent power source and therefore cannot have a continuous running real-time clock.
- the date must be set every time the vault is powered-up. Power is applied to vault 20 only when it is plugged into PC 12. Thus, the date would normally be entered by the user through PC 12 each time vault 20 is plugged into PCMCIA controller 32. Since the PC to which the vault is connected has a real-time clock, the date setting process may be automated and made transparent to the user.
- the time and date set in PC 12 is sent to vault 20 each time power is initially applied to vault 20.
- the vault date is used by DLL 40 to generate the indicia.
- the vault date may be changed at any time by the user to facilitate post-dating of mail.
- a default postage amount (e.g. First Class Postage) may be set in a similar manner. This method enables PC meter system 10 immediately when vault 20 is plugged into PC 12 without the user having to manually set parameters. The user may change the vault date (in order to post date mail) or the default postage amount at any time.
- PCMCIA card has its own internal clock that is automatically set with the time and date in PC 12 each time PCMCIA card is inserted into PCMCIA controller 32.
- a user of an application program 36 such as a word processor, highlights a recipient address from a letter or mailing list displayed on display 14.
- the user requests the printing of an envelope with indicia.
- a dialog box appears on display 14 indicating the default postage amount which the user may accept or modify.
- the postage amount is accepted, the entire envelope is previewed with all addressing, bar-coding and indicia shown on the envelope. At this point the user can print the envelope as shown or correct any errors that are seen in the preview.
- PC meter system 10 From the display 14 and keyboard 16, the user can change postage amount, date and address information. The user can also select and customize a return address, slogan, logo and greeting that may be printed with the indicia.
- the present invention also provides from the application program 36 the ability for a user to check funds available in vault 20 and to initiate 36 the automatic refilling of the PC meter through modem 29.
- PC meter system 10 also includes the capability of interfacing with optional software, such as postal rate calculation and address hygiene, that improves the performance of PC meter system 10.
- PC meter system 10 provides capabilities that are not available with conventional postage meters. For example, a user can scan in addressee information; generate indicia for a batch of envelopes before printing any of the envelopes; observe an image of the envelope to be printed, including addressee information and indicia, before printing the envelope; and customize slogans, logos and greetings to be printed with the indicia on the envelope.
- PC meter system 10 Most personal bills received in the home today come with self-addressed, reply envelopes.
- a user may desire to use PC meter system 10 to apply open system indicia to the self-addressed, reply envelopes. Since the open system indicia includes addressee information, the user can type such addressee information into PC 12 before requesting indicia. This task can be simplified by using a conventional optical scanner connected to PC 12 for scanning in the unique addressee information printed on the reply envelope. PC meter system 10 uses such unique addressee information to generate tokens for the indicia. PC meter system 10 then prints the indicia to a label printer or label printed on a conventional printer, or prints a completely new envelope with the scanned address.
- the label with indicia printed on it could then be applied to the self-addressed, reply envelope.
- Using a scanner in this manner eliminates the need for a user to manually enter information from the self addressed envelope which is a slower method that has a higher potential for error. Such error in entering addressee information could result in indicia that fails open system verification by the Post Office. It will be understood that the scanner can also be used for scanning in addresses from a printed mailing list. Finally, if the envelope was prepared previously or at another PC, the addressee information can be scanned as described above.
- indicia can be generated individually or for a batch of addressees and then printed at a later time at the user's discretion.
- delayed printing and batch processing is described in more detail in co-pending European Patent Publication No. 0782112 , which is incorporated herein in its entirety by reference.
- a user may observe, through the application program 36 in which an envelope was created, an image of a fully prepared envelope or batch of envelopes to be printed, including addressee information and indicia, before printing any of the envelopes.
- PC meter system 10 provides a user with the ability to customize return addresses, slogans, logos and greetings that are to be printed with the indicia on the envelope.
- the electronic vault is in an IC token, such as manufactured by CDSM of Phoenix, Arizona, that is inserted into a token receptacle of a PCMCIA card and programmed to operate as the vault in a similar manner as described for PCMCIA card.
- the electronic vault is in a smart diskette, such as manufactured by SmartDisc Security Corp. of Naples, Florida, that is programmed to operate in a similar manner as described for PCMCIA card.
- the electronic vault is a tamper proof, hardware peripheral, such as a dongle, that is attached to a serial, parallel or SCSI port of the PC.
- the vault is internal to PC-12, for example a separate chip within PC-12 that functions in a manner similar to vault 20.
- PC meter system 12 can print an open system indicia on a letter itself as shown in Fig. 11 .
- the format of such a letter 170 includes a return address 172 in the upper left corner, an open system indicia 174 in the upper right corner, a destination address 176 below the return address, and the body of the letter 178 below the destination address.
- a windowed envelope 180 with three windows, as shown in Fig. 12 the return address is visible through an upper left corner window 182, the destination address is visible through a lower left window 184, and the indicia is visible through an upper right window 186.
- the present invention can be used to print indicia anywhere on the letter or document being printed to accommodate alternately configured windowed envelopes, such as a single, large windowed envelope.
- the present invention is also suitable for printing indicia on a one piece mailer.
- the foregoing method of mailing a letter with indicia printed directly on the letter and visible through a window of the envelope eliminates a finishing step in production mail relating to matching a separately printed envelope with its corresponding letter. It has been a challenge to insert a letter to the corresponding envelope when the letters and envelopes are printed separately.
- the present invention simplifies and eliminates errors in the mail preparation process.
- PC 12 is a host computer in a network serving a plurality of users in which the vault is active within the host computer and requests for indicia originate from and printing of indicia occur at a local PC.
- an open system network-based postage meter also referred to herein as a network-based metering system, generally referred to as 1, comprising a server 10 and a plurality of clients 11.
- Server 10 is configured to operate as a host to a removable metering device or electronic vault, generally referred to as 20, in which postage funds are stored.
- components common to server 10 and clients 11 are distinguished, when necessary, by referring to the client components with a prime designation.
- component functionality is common to both server and client PC's the description does not distinguish between server and client.
- the server 10 and clients 11 include the following common components: a personal computer (PC) 12, a display 14, a keyboard 16, and an unsecured digital printer 18, preferably a laser or ink-jet printer.
- PC 12 includes a conventional processor 22, such as the 80486 and Pentium processors manufactured by Intel, and conventional hard drive 24, floppy drive(s) 26, and memory 28.
- Server 10 includes an electronic vault 20, which is housed in a removable card, such as PCMCIA card.
- Electronic vault 20 is a secure encryption device for postage funds management, digital token generation and traditional accounting functions.
- Server 10 may also include an optional modem 29 which is located in PC 12, preferably, or in card. Modem 29 may be used for communicating with a Postal Service or a postal authenticating vendor for recharging funds (debit or credit). A description of such communication by modem is described in U.S. Patent No. 4,831,555 , incorporated herein by reference. In an alternate embodiment the modem may be located in PCMCIA card.
- Each of the PC's 12 includes a Windows-based PC software module 34 ( Fig. 4 ) that is accessible from conventional Windows-based word processing, database and spreadsheet application programs 36.
- PC software module 34 includes a dynamic link library (DLL) 40, a user interface module 42, and a plurality of sub-modules that control the metering functions.
- DLL module 40 securely communicates with vault 20 and clients 11.
- DLL module 40' securely communicates with server 10.
- DLL 40 in server 10 and client 11, provides an open interface to Microsoft Windows-based application programs 36 through user interface module 42.
- DLL module 40 also securely stores transaction records reflecting the usage of postal funds of vault 20.
- User interface module 42 provides application programs 36 access to an electronic indicia image from DLL module 40 for printing the postal revenue block on a document, such as an envelope or label.
- User interface module 42 also provides application programs the capability to initiate remote refills and to perform administrative functions.
- network-based metering system 1 operates as a conventional network, except that a client or network printer prints postage upon user request.
- Printers 18 print all documents normally printed by a personal computer, including printing letters and addressing envelopes, and in accordance with the present invention, prints postage indicia.
- Network-based meter system 1 uses server 10 to issue postage and one of the printers to print the issued postage on envelopes at the same time it prints a recipient's address or to print labels for pre-addressed return envelopes or large mailpieces.
- server 10 to issue postage and one of the printers to print the issued postage on envelopes at the same time it prints a recipient's address or to print labels for pre-addressed return envelopes or large mailpieces.
- the present invention could also be used in a network in which a network printer, such as the server printer, is used to print envelopes with indicia, when local printers are not available to some or all of the client PC's.
- the PCMCIA card includes a microprocessor 44, non-volatile memory (NVM) 46, clock 48, an encryption module 50 and an accounting module 52.
- the encryption module 50 may implement the NBS Data Encryption Standard (DES) or another suitable encryption scheme.
- encryption module 50 is a software module. It will be understood that encryption module 50 could also be a separate device, such as a separate chip connected to microprocessor 44.
- Accounting module 52 may be EEPROM that incorporates ascending and descending registers as well as postal data, such as origination ZIP Code, vendor identification, data identifying server PC 12, sequential piece count of the postal revenue block generated by the network-based metering system 1, postage amount and the date of submission to the Postal Service.
- an ascending register in a metering unit records the amount of postage that has been dispensed, i.e., issued by the vault, in all transactions and the descending register records the value, i.e., amount of postage remaining in the vault, which value decreases as postage is issued.
- the hardware design of the vault includes an interface 56 that, communicates with the server host processor 22 through PCMCIA controller 32.
- the components of vault 20 that perform the encryption and store the encryption keys are packaged in the same integrated circuit device/chip that is manufactured to be tamper proof. Such packaging ensures that the contents of NVM 46 may be read only by the encryption processor and are not accessible outside of the integrated circuit device. Alternatively, the entire card could be manufactured to be tamper proof.
- network-based metering system 1 A description of the key components of network-based metering system 1 are described below followed by a description of the preferred operation of network-based metering system 1.
- DLL 40 includes both executable code and data storage area 41 that is resident in hard drive 24 of PC 12.
- applications programs 36 such as word processing and spreadsheet programs, communicate with one another using one or more dynamic link libraries.
- the present invention encapsulates all the processes involved in metering, and provides an open interface to vault 20 from all Windows-based applications capable of using a dynamic link library.
- any client application program 36' can communicate with vault microprocessor 44 in PCMCIA card through DLL 40' and server PC 12.
- DLL 40 includes the following software sub-modules: secure communications 80, transaction captures 82, secure indicia image creation and storage 84, and application interface module 86.
- the Secure Communications sub-module 80 prevents this from happening by maintaining secure communication between server DLL 40 and vault 20.
- Secure Communications sub-module 80 in server 11 identifies a specific vault 20 when it opens a communication session through PCMCIA controller 32, and maintains communication data integrity with the specific vault during the entire communication session.
- Secure Communications sub-module 80 maintains communication data integrity between the client 11 and server 10.
- a session key is negotiated at step 100. All the messages thereafter are encoded/decoded using the session key which is used for only the one particular communication session. Whenever the session key changes during the communication session, the communication session terminates and an error message is sent to the user at step 106.
- session keys is described in Applied Cryptography by Bruce Schneider, published by John Wiley and Sons, Inc., 1994 .
- the session key not only provides secure encrypted communication during a token request and issue, but also prevents another vault (PCMCIA card) from replacing the vault 20 that began a communication session, because the other vault does not have the session key negotiated at the beginning of the communication session.
- the secure communications between server 10 and client 11 ensures that only the client requesting a token can receive the token.
- Secure Communications sub-module 80 in server 11 also controls secure communications with the postal data center, for example, during refills of the accounting registers in vault 20.
- Transaction Capture sub-module 82 in server 10 captures each transaction record received from vault 20 and records the transaction record in DLL 40 and in DLL storage area 41 on hard drive 24.
- Transaction Capture sub-module 82' in client 11 captures the transaction record and records the transaction record in DLL 40' and in DLL storage area 41' on hard drive 24'.
- respective Transaction Capture sub-modules 82 and 82' monitor message traffic at step 120, selectively capture each transaction record for token generations and refills, and store such transaction records in respective DLLs 40 and 40' at step 124 and in an invisible and write-protected files 83 and 83' in DLL storage areas 41 and 41' at step 126.
- the information stored for each transaction record includes, for example, vault serial number, date, piece count, postage, postal funds available (descending register), tokens, destination postal code and the block check character. A predetermined number of the most recent records initiated can be stored in this manner by indexing files 83 and 83' accordingly.
- files 83 and 83' are indexed according to piece count but may searched according to addressee information.
- Server file 83 represents the mirror image of vault 20 at the time of the transaction except for the encryption keys and configuration parameters.
- Client file 83' may represent a subset of the image of vault 20 at the time of the transaction because each client 11 stores transaction records of transactions initiated by such client. Storing transaction records on hard drive 24 provides backup capability which is described below.
- a description of a digital token generation process is disclosed for a PC-meter system in the related European Patent Publication Nos. 0780804 , 0780806 and 0782109 , which are incorporated herein in their entirety by reference.
- the digital token generation process for network-based metering system 1 is the same as described in the related applications except that a client application program 36' sends a request for digital token to vault 20 through client DLL 40' and server DLL 40 as shown in Fig. 3 .
- the generated token is sent to the client DLL 40' through the server DLL 40 for use in generating an indicia.
- a request for indicia is made, at step 142, from application program 36' in client 11 to server 10.
- Secure Communications sub-module 80' in client 11 checks for a response from server 10.
- Indicia Image Creation and Storage sub-module 84' checks, at step 146, the response for postal data, including at least one digital token. If the postal data has not been sent with the response, at step 148, an error condition is processed that results in a message to the user.
- Indicia Image Creation and Storage sub-module 84' If the response from server 10 included the expected postal data, at step 150, Indicia Image Creation and Storage sub-module 84' generates a bit-mapped indicia image 96 by expanding the compressed fixed graphics image data 94, at step 152, and combining, at step 154, the indicia's fixed graphics image 90 with some or all of the postal data information and tokens received from vault 20. At step 156, the indicia image is stored in DLL 40' for printing. Sub-module 84' sends to the requesting application program 36' in client PC 12' the created bit-mapped indicia image 96 that is ready for printing, and then stores a transaction record comprising the digital tokens and associated postal data in DLL storage area 41'.
- bit-mapped indicia image 96 is stored in DLL 40' which can only be accessed by executable code in DLL 40'. Furthermore, only the executable code of DLL 40' can access the fixed graphics image 90 of the indicia to generate bit-mapped indicia image 96. This prevents accidental modification of the indicia because it would be very difficult for a normal user to access, intentionally or otherwise, the fixed graphics image 90 of the indicia and the bit-mapped indicia image 96.
- Secure Communications sub-module 80 in server 10 checks for the request from client 11, at step 160.
- Secure Communications sub-module 80 requests tokens from vault 20, at step 162.
- Secure Communications sub-module 80 checks for a transaction record, including digital token, from vault 20. If a transaction record is not received in response to the request from server 10, an error is processed, at step 166, resulting in an error message to client 11. If a transaction record is received, then, at step 168, the transaction record is stored in DLL 40 and DLL storage area 41.
- Secure Communications sub-module 80 sends the postal data received as in the transaction record, including token and piece count, to client 11.
- server 10 When server 10 originates a request for indicia server 10 functions as a PC-based meter.
- This Application Interface sub-module operates as previously described for the basic PC meter.
- the transaction capture sub-modules 82 and 82' store transaction files as backup files on hard drives 24 and 24'. This provides a benefit that certain functions, such as account reconciliation, can be performed even when vault 20 malfunctions. Such backup is unavailable in conventional postage meters.
- the backup transaction files can be encrypted before being stored on hard drives 24 and 24' to prevent tampering.
- the number of transactions that are maintained on hard drives 24 and 24' is limited only by the available storage space on the hard drives. Preferably, at least all transactions since the last refill would be maintained on server 10 as backup.
- a user of an application program 36 (running in either client 11 or server 10), such as a word processor, highlights a recipient address from a letter or mailing list displayed on display 14.
- the user requests the printing of an envelope with indicia.
- a dialog box appears on display 14 indicating the default postage amount which the user may accept or modify.
- the postage amount accepted the entire envelope is previewed with all addressing, bar-coding and indicia shown on the envelope. At this point the user can print the envelope as shown or correct any errors that are seen in the preview.
- the printers are not dedicated to the metering function and the indicia are stored in PC 12 before printing.
- tokens can be generated individually or for a batch of addressees stored in the requesting client 11 which can later generate an indicia from each of the tokens and then print the indicia at the user's discretion.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Claims (39)
- Transaktions-beweisendes System (10), mit:einem Personal-Computer (PC) (12), einem ungesicherten Drucker (18) und einer tragbaren Tresorvorrichtung (20), die entfernbar mit dem PC gekoppelt ist und einer Benutzerschnittstellenvorrichtung (14, 16), wobei der PC einen Prozessor (22), einen Speicher und eine Speichervorrichtung (28) umfasst, wobei die Speichervorrichtung zumindest ein nicht-messendes Anwendungsprogramm (36) umfasst, das selektiv auf dem PC laufengelassen wird, der ungesicherte Drucker (18), mit dem PC (12) zum Drucken gemäß dem nicht-messenden Anwendungsprogramm verbunden ist, die tragbare Tresorvorrichtung (20) eine Digitalzeichenerzeugungsvorrichtung (50) und eine Transaktions-abrechnende Vorrichtung umfasst, wobei das System umfasst:eine Tresorschnittstellenvorrichtung (34) in dem PC (12) zum Bewirken von Kommunikationen zwischen der tragbaren Tresorvorrichtung (20) und dem nicht-messenden Anwendungsprogramm und zum Durchführen von anderen messenden Funktionen als den messenden Funktionen, die in der tragbaren Tresorvorrichtung (20) durchgeführt werden, wobei die Tresorschnittstellenvorrichtung (34) umfasst:ein Anwendungsschnittstellenmodul (86) zum Bilden einer Schnittstelle mit dem nicht-messenden Anwendungsprogramm;ein Kommunikationsmodul (80) zum Kommunizieren mit der tragbaren Tresorvorrichtung (20);einen Speicherbereich (41) in der Speichervorrichtung (28);ein Freimachungsvermerkbilderzeugungs- und Speichermodul (84) zum Erzeugen von FreimachungsvermerkBitmaps und Speichern der Freimachungsvermerkbitmaps in dem Speicherbereich (41); undein Transaktionserfassungsmodul (82) zum Speichern in dem Speicherbereich (41) von Transaktionssätzen, die in der tragbaren Tresorvorrichtung (20) erzeugt werden.
- Transaktions-beweisendes System nach Anspruch 1, wobei die tragbare Tresorvorrichtung (20) eine Tresorkarte umfasst, die entfernbar mit dem PC (12) gekoppelt ist, wobei der PC eine Vorrichtung zum entfernbaren Koppeln der Tresorkarte mit dem PC umfasst.
- Transaktions-beweisendes System nach Anspruch 2, wobei die Tresorkarte eine PCMCIA-Karte (20) ist.
- Transaktions-beweisendes System nach Anspruch 1, weiter mit:einer Vorrichtung (82) in dem PC zum Erfassen in dem Speicherbereich eines Transaktionssatzes entsprechend dem Digitalzeichen, wobei der Transaktionssatz das Digitalzeichen und die vorbestimmte Information umfasst.
- Transaktions-beweisendes System nach Anspruch 4, wobei die Tresorschnittstellenvorrichtung ein Dynamikverbindungsbibliotheksmodul (40) in dem PC umfasst.
- Transaktions-beweisendes System nach Anspruch 4, wobei eine Menge von Digitalzeichen erzeugt werden kann, bevor irgendwelche Freimachungsvermerkbitmaps entsprechend der Menge von Digitalzeichen erzeugt werden.
- Transaktions-beweisendes System nach Anspruch 4, weiter mit einer Vorrichtung zum Verschlüsseln des Transaktionssatzes, bevor dieser in dem Speicherbereich (41) erfasst wird.
- Transaktions-beweisendes System nach Anspruch 4, weiter mit einer Vorrichtung zum Speichern einer Vielzahl von aufeinander folgenden der Transaktionssätze in dem Speicherbereich (41) als Sicherung für Information, die in der tragbaren Tresorvorrichtung (20) gespeichert ist.
- Transaktions-beweisendes System nach Anspruch 1, wobei die Speichervorrichtung eine Festplatte (24) des PCs ist.
- Transaktions-beweisendes System nach Anspruch 1, wobei die tragbare Tresorvorrichtung (20) mit einer Vielzahl von Sicherheitszugangsleveln einschließlich zumindest eines Standardmodus für normalen Benutzerzugang und zumindest eines beschränkten Modus programmiert ist, auf den über ein Passwort zugegriffen wird.
- Transaktions-beweisendes System nach Anspruch 1, weiter mit einer Vorrichtung, die mit dem PC (12) gekoppelt ist, zum Scannen von Adressateninformation zur Auswahl durch die nicht-messenden Anwendungsprogramme, wenn Freimachungsvermerke angefordert werden.
- Transaktions-beweisendes System nach Anspruch 1, wobei die Tresorschnittstellenvorrichtung (34) angeordnet ist, die Freimachungsvermerkbitmap an das nicht-messende Anwendungsprogramm zum Betrachten eines Bildes der Freimachungsvermerkbitmap auf einer Anzeige bereitzustellen, die mit dem PC gekoppelt ist, vor einem Drucken der Freimachungsvermerkbitmap.
- Transaktions-beweisendes System nach Anspruch 1, wobei das Freimachungsvermerkbilderzeugungs- und Speichermodul (84) angeordnet ist, eine Portofreimachungsvermerkbitmap zu erzeugen.
- Transaktions-beweisendes System nach Anspruch 1, wobei die Freimachungsvermerkbitmap-erzeugende Vorrichtung betriebsbereit ist, die Freimachungsvermerkbitmap durch Kombinieren von Freimachungsvermerkgrafiken, die in der Speichervorrichtung (24, 28) gespeichert sind, mit dem Digitalzeichen und der vorbestimmten Information zu erzeugen.
- Transaktions-beweisendes System nach Anspruch 1, wobei das Anwendungsschnittstellenmodul (86) betriebsbereit ist, eine Anfrage nach zumindest einem Digitalzeichen in Reaktion auf eine Anfrage nach Freimachungsvermerken von dem nicht-messenden Anwendungsprogramm auszugeben, wobei die Anfrage nach Digitalzeichen eine vorbestimmte Information umfasst, die von der Zeichenerzeugungsvorrichtung (50) benötigt wird, wobei das Kommunikationsmodul (80) betriebsbereit ist, die Anfrage nach Digitalzeichen und die vorbestimmte Information an die tragbare Tresorvorrichtung (20) zu senden und von der tragbaren Tresorvorrichtung (20) einen Transaktionssatz zu empfangen, der ein Digitalzeichen umfasst, das von der Zeichenerzeugungsvorrichtung (50) erzeugt ist, wobei das Freimachungsvermerkbilderzeugungs- und Speichermodul (84) betriebsbereit ist, eine Freimachungsvermerkbitmap aus dem Digitalzeichen zu erzeugen und die Freimachungsvermerkbitmap zu speichern, wobei das Transaktionserfassungsmodul (82) betriebsbereit ist, den Transaktionssatz zu speichern und das Anwendungsschnittstellenmodul (86) betriebsfähig ist, die Freimachungsvermerkbitmap an das nicht-messende Anwendungsprogramm (36) bereitzustellen.
- Transaktions-beweisendes System nach Anspruch 15, wobei das Kommunikationsmodul (80) betriebsbereit ist, eine Kommunikationsdatenintegrität mit der tragbaren Tresorvorrichtung (20) durch die Verwendung eines Sitzungsschlüssels für jede Transaktions-beweisende Kommunikationssitzung bezüglich einer Anfrage nach und eines Empfangs eines Digitalzeichens aufrechtzuerhalten.
- Transaktions-beweisendes System nach Anspruch 16, wobei das Kommunikationsmodul (80) ebenso betriebsbereit ist, sichere Kommunikationen mit einem Postdatenzentrum während einem Neuauffüllen von Abrechnungsregistern in der Transanktions-abrechnenden Vorrichtung der tragbaren Tresorvorrichtung (20) zu steuern.
- Transaktions-beweisendes System nach Anspruch 17, wobei die tragbare Tresorvorrichtung (20) eine Vielzahl von tragbaren Tresorgeräten umfasst, von denen jedes mit dem PC (12) für jede Transaktions-beweisende Kommunikationssitzung gekoppelt sein kann und wobei das Transaktionserfassungsmodul (82) angeordnet ist, Kommunikationen zwischen jedem der Tresorgeräte (20) und dem Kommunikationsmodul (80) zu überwachen und in der Speichervorrichtung (28) alle Transaktionssätze zu speichern und Abrechnungsinformation neu aufzufüllen, die von dem Kommunikationsmodul für jedes der Tresorgeräte (20) empfangen wird, wobei die Speichervorrichtung (28) eine Sicherung von Information speichert, die in den Tresorgeräten (20) gespeichert ist.
- Verfahren eines Implementierens eines Transaktions-beweisenden Systems (10) auf einem Personal Computer (PC) (12) mit einer Anzeige (14) und einem ungesicherten Drucker (18), der mit diesem wirksam gekoppelt ist, mit den Schritten:Bereitstellen eines tragbaren Tresors (20), der entfernbar mit dem Personal-Computer (12) über eine Tresorschnittstellenvorrichtung (34) gekoppelt ist,
wobei der tragbare Tresor (20) als ein sicheres Abrechnungsmodul des Transaktions-beweisenden Systems (10) arbeitet;Anfordern von Freimachungsvermerken für ein bestimmtes Dokument, das in einem Anwendungsprogramm (36) verarbeitet wird, das in dem PC (12) läuft;sicheres Senden über die Tresorschnittstellenvorrichtung (34) von einem Anwendungsschnittstellenmodul (86) in dem PC in Reaktion auf die Anforderung nach Freimachungsvermerken, einer Anforderung nach zumindest einem Digitalzeichen an den Tresor (20) mit einem vorbestimmten Informationssatz, der sich auf das bestimmte Dokument bezieht;Ausgeben in dem Tresor (20) zumindest eines Digitalzeichens und sicherem Senden über die Tresorschnittstellenvorrichtung (34) des Digitalzeichens an ein Freimachungsvermerk-erzeugendes Modul in dem PC;Speichern des Digitalzeichens und des vorbestimmten Informationssatzes in einem Transaktionssatz;
wobei die Tresorschnittstellenvorrichtung (34) den Transaktionssatz in einem Speicherbereich (41) des Personal-Computers (12) speichert;Erzeugen einer Freimachungsvermerkbitmap in dem PC (12) unter Verwendung des Transaktionssatzes; Speichern der Freimachungsvermerkbitmap in dem Speicherbereich (41); undBereitstellen der Freimachungsvermerkbitmap an das Anwendungsprogramm (36), wenn das Anwendungsprogramm bereit ist, die Freimachungsvermerke zu drucken. - Verfahren nach Anspruch 19, mit dem weiteren Schritt:Betrachten auf einer PC-Anzeige (14) eines Bildes von zumindest einem Teil des bestimmten Dokumentes mit den darauf gezeigten Freimachungsvermerken vor einem Drucken des bestimmten Dokumentes.
- Verfahren nach Anspruch 19, mit dem weiteren Schritt:Speichern einer Vielzahl von Transaktionssätzen auf einer Festplatte des PCs, wobei jeder der Transaktionssätze Transaktionen entspricht, die in dem tragbaren Tresor (20) auftreten.
- Verfahren nach Anspruch 19, mit den weiteren Schritten:Bereitstellen einer Dynamikverbindungsbibliothek (DLL) (41) mit Routinen zum Steuern von Kommunikationen mit dem tragbaren Tresor (20), Speichern von Transaktionen, Speichern von Freimachungsvermerkbitmaps und Bilden von Schnittstellen mit einer Anwendung;Laden der DLL in einen Speicher (28) des PCs (12), wenn eine Freimachungsvermerkanforderung von dem Anwendungsprogramm (36) durchgeführt wird; undZugreifen auf die DLL von dem Anwendungsprogramm (36) aus.
- Verfahren nach Anspruch 19, mit den weiteren Schritten:Auswählen in dem Anwendungsprogramm (36) einer Empfängeradresseninformation für in dem Anwendungsprogramm;Auswählen in dem Anwendungsprogramm (36) eines zu druckenden Portobetrages;Einschließen der Empfängeradresseninformation und des Portobetrages als ein Teil des vorbestimmten Informationssatzes; undDrucken der Empfängeradresse und des Freimachungsvermerkes auf einem Umschlag.
- Verfahren nach Anspruch 19, mit den weiteren Schritten:Drucken des Freimachungsvermerkes direkt auf dem Dokument; undEinsetzen des Dokumentes in einen Umschlag derart, dass der Freimachungsvermerk durch einen Fensterteil des Umschlages sichtbar ist.
- Transaktions-beweisendes System einschließlich einer Vielzahl von Computersystemen (12, 12'), die wirksam konfiguriert sind, ein Netzwerk (1) mit einem (12) der Computersysteme, das als ein Server funktioniert und den verbleibenden Computersystemen (12') zu bilden, die als Clients funktionieren, wobei jedes der Computersysteme einen Prozessor, einen Speicher, eine Speicher- und Benutzerschnittstellenvorrichtung umfasst, wobei zumindest einige der Speichervorrichtungen eine Vielzahl von nicht-messenden Anwendungsprogrammen (36') umfassen, die selektiv auf den Clientcomputersystemen (12') laufengelassen werden, zumindest eines der Computersysteme (12') einen ungesicherten Drucker (18') umfasst, der wirksam mit diesem zum Drucken gemäß den nicht-messenden Anwendungsprogrammen gekoppelt ist,
wobei das System umfasst:eine tragbare Tresorkarte (20), die entfernbar mit dem Servercomputersystem (12) gekoppelt ist, wobei die Tresorkarte (20) eine Digitalzeichenerzeugungsvorrichtung (50) und eine Transaktionsabrechnungsvorrichtung (52) umfasst, wobei das Servercomputersystem (12) eine Vorrichtung (32) zum entfernbaren Koppeln der Tresorkarte (20) mit dem Servercomputersystem (12) umfasst;eine Tresorschnittstellenvorrichtung (34) zum Bewirken von Kommunikationen zwischen der tragbaren Tresorvorrichtung (20) und dem nicht-messenden Anwendungsprogramm (36) und zum Durchführen von anderen messenden Funktionen als den messenden Funktionen, die in der tragbaren Tresorvorrichtung (20) durchgeführt werden, wobei die Tresorschnittstellenvorrichtung umfasst:ein Anwendungsschnittstellenmodul (86) in dem Clientcomputersystem zum Bilden einer Schnittstelle mit dem nicht-messenden Anwendungsprogramm;ein Kommunikationsmodul (80) in dem Servercomputersystem (12) zum Kommunizieren mit der tragbaren Tresorvorrichtung (20);einen Speicherbereich (41) in der Speichervorrichtung;ein Freimachungsvermerkbilderzeugungs- und Speichermodul (84) in dem Clientcomputersystem zum Erzeugen von Freimachungsvermerkbitmaps und Speichern der Freimachungsvermerkbitmaps in dem Speicherbereich (41); undein Transaktionserfassungsmodul (82) zum Speichern in dem Speicherbereich (41) von Transaktionssätzen, die in der tragbaren Tresorvorrichtung (20) erzeugt werden. - Transaktions-beweisendes System nach Anspruch 25, wobei die Tresorschnittstellenvorrichtung Teil von Dynamikverbindungsbibliotheksmodulen in den Computersystemen (12, 12') ist.
- Transaktions-beweisendes System nach Anspruch 25, wobei die Tresorkarte eine PCMCIA-Karte (20) ist.
- Transaktions-beweisendes System nach Anspruch 25, wobei eine Menge von Digitalzeichen in der Tresorkarte (20) erzeugt und in einem anfordernden der Clientcomputersysteme (12') gespeichert werden kann, bevor irgendwelche Freimachungsvermerkbitmaps entsprechend der Menge von Digitalzeichen erzeugt werden.
- Transaktions-beweisendes System nach Anspruch 25, weiter mit einer Vorrichtung zum Verschlüsseln des Transaktionssatzes, bevor dieser in der Speichervorrichtung (28) des Servercomputersystems (12) gespeichert wird.
- Transaktions-beweisendes System nach Anspruch 25, weiter mit einer Vorrichtung zum Speichern einer Vielzahl von aufeinander folgenden der Transaktionssätze in der Speichervorrichtung (28) des Servercomputersystems als Sicherung für Information, die in der Tresorkarte (20) gespeichert ist.
- Transaktions-beweisendes System nach Anspruch 25, wobei die Transaktionsschnittstellenvorrichtung betriebsbereit ist, die Freimachungsvermerkbitmap an eines der nicht-messenden Anwendungsprogramme zum Betrachten eines Bildes der Freimachungsvermerkbitmap auf einer Anzeige bereitzustellen, die mit dem anfordernden Clientcomputersystem (12') gekoppelt ist, vor einem Drucken der Freimachungsvermerkbitmap.
- Transaktions-beweisendes System nach Anspruch 25, wobei die Freimachungsvermerkbitmap-erzeugende Vorrichtung betriebsbereit ist, eine Portofreimachungsvermerkbitmap durch Kombinieren von Freimachungsvermerkgrafiken, die in der Speichervorrichtung des anfordernden Clientcomputersystems gespeichert sind, mit dem Digitalzeichen und der vorbestimmten Information zu erzeugen.
- Transaktions-beweisendes System nach Anspruch 25, wobei das Anwendungsschnittstellenmodul (86) betriebsbereit ist, eine Anforderung nach zumindest einem Digitalzeichen in Reaktion auf eine Anforderung nach Freimachungsvermerken von dem nicht-messenden Anwendungsprogramm (36) auszugeben, wobei die Anfrage nach Digitalzeichen eine vorbestimmte Information umfasst, die von der Zeichenerzeugungsvorrichtung benötigt wird, wobei das Kommunikationsmodul (80) betriebsbereit ist, die Anforderung nach Digitalzeichen und die vorbestimmte Information an die tragbare Tresorvorrichtung (20) zu senden und von der tragbaren Tresorvorrichtung (20) einen Transaktionssatz einschließlich eines Digitalzeichens zu empfangen, das von der Zeichenerzeugungsvorrichtung (50) erzeugt wird,
wobei das Freimachungsvermerkbilderzeugungs- und Speichermodul (84) betriebsbereit ist, eine Freimachungsvermerkbitmap aus dem Digitalzeichen zu erzeugen und die Freimachungsvermerkbitmap zu speichern,
wobei das Transaktionserfassungsmodul (82) betriebsbereit ist, den Transaktionssatz zu speichern und das Anwendungsschnittstellenmodul (86) betriebsbereit ist, die Freimachungsvermerkbitmap an das nicht-messende Anwendungsprogramm (36) bereitzustellen. - Transaktions-beweisendes System nach Anspruch 25 oder 33,
wobei das Transaktionserfassungsmodul (82, 82') in jedem von Server- (12) und Clientcomputersystemen (12') ist. - Transaktions-beweisendes System nach Anspruch 25 oder 33,
wobei das Transaktionserfassungsmodul in dem Servercomputersystem (12) ist. - Verfahren eines Implementierens eines Transaktions-beweisenden Systems auf einem Computernetzwerk (1) mit einer Vielzahl von Computersystemen (12, 12'), die wirksam konfiguriert sind, das Computernetzwerk mit einem der Computersysteme (12), das als ein Server funktioniert und den verbleibenden Computersystemen zu bilden, die als Clients (12') funktionieren, wobei das Verfahren die Schritte umfasst:Bereitstellen eines tragbaren Tresors (20), der wirksam mit dem Server (12) über eine Tresorschnittstellenvorrichtung (34) gekoppelt ist,
wobei der Tresor als ein sicheres Abrechnungsmodul (20) des Transaktions-beweisenden Systems arbeitet;Anfordern von Freimachungsvermerken in einem der Clients (12') für ein bestimmtes Dokument, das in einem nicht-messenden Anwendungsprogramm verarbeitet wird, das in dem anfordernden Client läuft;Senden der Anforderung nach Freimachungsvermerken von dem anfragenden Client (12') zu dem Server (12) mit einem vorbestimmten Informationssatz bezüglich des bestimmten Dokumentes;Senden in Reaktion auf die Anforderung nach Freimachungsvermerken einer Anforderung nach zumindest einem Digitalzeichen von dem Server (12) über die Tresorschnittstellenvorrichtung (34) zu dem tragbaren Tresor (20) mit dem vorbestimmten Informationssatz;Ausgeben in dem tragbaren Tresor (20) zumindest eines Digitalzeichens und Senden des Digitalzeichens als Teil eines Transaktionssatzes über die Tresorschnittstellenvorrichtung (34) zu dem Server (12);Speichern des Transaktionssatzes in dem Server (12);Senden von dem Server (12) zu dem anfordernden Client (12') des Digitalzeichens und eines vorbestimmten Informationssatzes des Transaktionssatzes;
wobei die Tresorschnittstellenvorrichtung (34) den Transaktionssatz in einen Speicherbereich des Client (12') speichert;Erzeugen einer Freimachungsvermerkbitmap unter Verwendung des Digitalzeichens und des vorbestimmten Informationssatzes in dem Client; undBereitstellen der Freimachungsvermerkbitmap an das nicht-messende Anwendungsprogramm, wenn das nicht-messende Anwendungsprogramm bereit ist, den Freimachungsvermerk zu drucken. - Verfahren nach Anspruch 36, mit dem weiteren Schritt:Betrachten auf einer Anzeige (14'), die mit dem anfordernden Clientcomputersystem (12') gekoppelt ist, eines Bildes zumindest eines Teils des bestimmten Dokumentes mit den darauf gezeigten Freimachungsvermerken vor einem Drucken des bestimmten Dokumentes.
- Verfahren nach Anspruch 36, mit dem weiteren Schritt:Speichern einer Vielzahl von Transaktionssätzen in einer Datei auf einer Festplatte des Servers (12) undIndizieren der Transaktionssätze gemäß der Stückzahl.
- Verfahren nach Anspruch 36, mit den weiteren Schritten:Auswählen in dem nicht-messenden Anwendungsprogramm (36) einer Empfängeradressinformation zur Verwendung in dem Anwendungsprogramm;Auswählen in dem nicht-messenden Anwendungsprogramm eines Portobetrages, der in dem Anwendungsprogramm aufgedruckt werden soll;Einschließen der Empfängeradressinformation und des Portobetrages als Teil des vorbestimmten Informationssatzes; undDrucken der Empfängeradresse und des Freimachungsvermerkes auf einem Umschlag.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/575,112 US6157919A (en) | 1995-12-19 | 1995-12-19 | PC-based open metering system and method |
US575109 | 1995-12-19 | ||
US08/575,109 US6151590A (en) | 1995-12-19 | 1995-12-19 | Network open metering system |
US575112 | 1995-12-19 |
Publications (3)
Publication Number | Publication Date |
---|---|
EP0780809A2 EP0780809A2 (de) | 1997-06-25 |
EP0780809A3 EP0780809A3 (de) | 2000-03-01 |
EP0780809B1 true EP0780809B1 (de) | 2010-03-24 |
Family
ID=27076585
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19960120519 Expired - Lifetime EP0780809B1 (de) | 1995-12-19 | 1996-12-19 | PC-gestütztes offenes Zählsystem und dazugehöriges Verfahren |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0780809B1 (de) |
JP (1) | JPH1027272A (de) |
CA (1) | CA2193434C (de) |
DE (1) | DE69638152D1 (de) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5963928A (en) * | 1997-07-17 | 1999-10-05 | Pitney Bowes Inc. | Secure metering vault having LED output for recovery of postal funds |
US6151591A (en) * | 1997-12-18 | 2000-11-21 | Pitney Bowes Inc. | Postage metering network system with virtual meter mode |
US6175826B1 (en) * | 1997-12-18 | 2001-01-16 | Pitney Bowes Inc. | Postage metering system and method for a stand-alone meter having virtual meter functionality |
US6081795A (en) | 1997-12-18 | 2000-06-27 | Pitney Bowes Inc. | Postage metering system and method for a closed system network |
US6098058A (en) * | 1997-12-18 | 2000-08-01 | Pitney Bowes Inc. | Postage metering system and method for automatic detection of remote postage security devices on a network |
US6085181A (en) | 1997-12-18 | 2000-07-04 | Pitney Bowes Inc. | Postage metering system and method for a stand-alone meter operating as a meter server on a network |
US6058384A (en) | 1997-12-23 | 2000-05-02 | Pitney Bowes Inc. | Method for removing funds from a postal security device |
US6125162A (en) * | 1998-08-20 | 2000-09-26 | Pitney Bowes Inc. | Postage meter having non-Gregorian calendar capability |
US6741972B1 (en) | 1998-11-06 | 2004-05-25 | Pitney Bowes Inc. | Method and apparatus for dynamically determining a printing location in a document for a postage indicia |
AU5174700A (en) * | 1999-06-01 | 2000-12-18 | Stamps.Com | Online value bearing item printing |
EP1224630A1 (de) | 1999-10-18 | 2002-07-24 | Stamps.Com | Verfahren und vorrichtung für online wertträgersysteme |
WO2001029775A1 (en) | 1999-10-18 | 2001-04-26 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
EP1230623B1 (de) * | 1999-11-10 | 2005-01-26 | Neopost Inc. | Bereitstellung von briefmarken auf sicherheitspapier unter benutzung eines kommunikationnetzes |
AU2001247986A1 (en) | 2000-02-16 | 2001-08-27 | Stamps.Com | Secure on-line ticketing |
DE20221810U1 (de) * | 2001-03-21 | 2007-12-20 | Deutsche Post Ag | Graphische Benutzeroberfläche zum Freimachen von Postsendungen |
US9779556B1 (en) | 2006-12-27 | 2017-10-03 | Stamps.Com Inc. | System and method for identifying and preventing on-line fraud |
CN112087300B (zh) * | 2020-07-30 | 2023-04-28 | 宁波三星医疗电气股份有限公司 | 一种针对电力现场设备的密钥分发方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4775246A (en) * | 1985-04-17 | 1988-10-04 | Pitney Bowes Inc. | System for detecting unaccounted for printing in a value printing system |
US4812994A (en) * | 1985-08-06 | 1989-03-14 | Pitney Bowes Inc. | Postage meter locking system |
US4837701A (en) * | 1985-12-26 | 1989-06-06 | Pitney Bowes Inc. | Mail processing system with multiple work stations |
US4941091A (en) * | 1987-06-30 | 1990-07-10 | Pitney Bowes Inc. | Mail management system transaction data customizing and screening |
US5778066A (en) * | 1995-11-22 | 1998-07-07 | F.M.E. Corporation | Method and apparatus for authentication of postage accounting reports |
-
1996
- 1996-12-19 JP JP35964796A patent/JPH1027272A/ja active Pending
- 1996-12-19 EP EP19960120519 patent/EP0780809B1/de not_active Expired - Lifetime
- 1996-12-19 DE DE69638152T patent/DE69638152D1/de not_active Expired - Lifetime
- 1996-12-19 CA CA 2193434 patent/CA2193434C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CA2193434A1 (en) | 1997-06-20 |
EP0780809A3 (de) | 2000-03-01 |
DE69638152D1 (de) | 2010-05-06 |
EP0780809A2 (de) | 1997-06-25 |
CA2193434C (en) | 2002-02-19 |
JPH1027272A (ja) | 1998-01-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6157919A (en) | PC-based open metering system and method | |
US6151590A (en) | Network open metering system | |
US5987441A (en) | Token generation process in an open metering system | |
US5625694A (en) | Method of inhibiting token generation in an open metering system | |
US7136839B2 (en) | Method for reissuing digital tokens in an open metering system | |
US5835689A (en) | Transaction evidencing system and method including post printing and batch processing | |
US5742683A (en) | System and method for managing multiple users with different privileges in an open metering system | |
EP0780808B1 (de) | System und Verfahren zur Wiederherstellung im Falle einer Katastrophe in einem offenen Zählsystem | |
US5590198A (en) | Open metering system with super password vault access | |
US5778076A (en) | System and method for controlling the dispensing of an authenticating indicia | |
US5796834A (en) | System and method for controlling the dispensing of an authenticating indicia | |
EP0780809B1 (de) | PC-gestütztes offenes Zählsystem und dazugehöriges Verfahren | |
AU4744697A (en) | System and method for retrieving postage credit over a network | |
EP0780807B1 (de) | Verfahren zum Bilden von Zieladressen zur Berechnung digitaler Wertmarken | |
EP0782108A2 (de) | Verfahren zum Erzeugen digitaler Wertmarken aus einer Empfängerinformationsuntergruppe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): DE FR GB |
|
17P | Request for examination filed |
Effective date: 20000829 |
|
17Q | First examination report despatched |
Effective date: 20050330 |
|
17Q | First examination report despatched |
Effective date: 20050330 |
|
17Q | First examination report despatched |
Effective date: 20050330 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 69638152 Country of ref document: DE Date of ref document: 20100506 Kind code of ref document: P |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20110107 Year of fee payment: 15 |
|
26N | No opposition filed |
Effective date: 20101228 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 69638152 Country of ref document: DE Effective date: 20110701 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110701 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20120831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20120102 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20131227 Year of fee payment: 18 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20141219 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20141219 |