WO1998057460A1 - Method for access control in a virtual postage metering system - Google Patents
Method for access control in a virtual postage metering system Download PDFInfo
- Publication number
- WO1998057460A1 WO1998057460A1 PCT/US1998/012206 US9812206W WO9857460A1 WO 1998057460 A1 WO1998057460 A1 WO 1998057460A1 US 9812206 W US9812206 W US 9812206W WO 9857460 A1 WO9857460 A1 WO 9857460A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data center
- password
- postage
- meter
- user
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000004891 communication Methods 0.000 claims description 27
- 230000006870 function Effects 0.000 description 17
- 238000007639 printing Methods 0.000 description 13
- 238000007726 management method Methods 0.000 description 10
- 230000008901 benefit Effects 0.000 description 7
- 238000009826 distribution Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012795 verification Methods 0.000 description 6
- 229910000831 Steel Inorganic materials 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 239000010959 steel Substances 0.000 description 5
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 230000001174 ascending effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012011 method of payment Methods 0.000 description 1
- 238000010899 nucleation Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000035899 viability Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/342—Cards defining paid or billed services or quantities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/351—Virtual cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/00024—Physical or organizational aspects of franking systems
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00435—Details specific to central, non-customer apparatus, e.g. servers at post office or vendor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/02—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
- G07F7/025—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/00024—Physical or organizational aspects of franking systems
- G07B2017/00048—Software architecture
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/00024—Physical or organizational aspects of franking systems
- G07B2017/00048—Software architecture
- G07B2017/00056—Client-server
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/00024—Physical or organizational aspects of franking systems
- G07B2017/00048—Software architecture
- G07B2017/00056—Client-server
- G07B2017/00064—Virtual meter, online stamp; PSD functions or indicia creation not at user's location
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
- G07B2017/00088—Communication details outside or between apparatus via landlines
- G07B2017/00096—Communication details outside or between apparatus via landlines via phone lines
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
- G07B2017/00137—In a LAN
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
- G07B2017/00145—Communication details outside or between apparatus via the Internet
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
- G07B2017/00153—Communication details outside or between apparatus for sending information
- G07B2017/00161—Communication details outside or between apparatus for sending information from a central, non-user location, e.g. for updating rates or software, or for refilling funds
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
- G07B2017/00153—Communication details outside or between apparatus for sending information
- G07B2017/00169—Communication details outside or between apparatus for sending information from a franking apparatus, e.g. for verifying accounting
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00016—Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
- G07B17/0008—Communication details outside or between apparatus
- G07B2017/00153—Communication details outside or between apparatus for sending information
- G07B2017/00177—Communication details outside or between apparatus for sending information from a portable device, e.g. a card or a PCMCIA
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00193—Constructional details of apparatus in a franking system
- G07B2017/00201—Open franking system, i.e. the printer is not dedicated to franking only, e.g. PC (Personal Computer)
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00362—Calculation or computing within apparatus, e.g. calculation of postage value
- G07B2017/00427—Special accounting procedures, e.g. storing special information
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00435—Details specific to central, non-customer apparatus, e.g. servers at post office or vendor
- G07B2017/00443—Verification of mailpieces, e.g. by checking databases
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00459—Details relating to mailpieces in a franking system
- G07B17/00508—Printing or attaching on mailpieces
- G07B2017/00572—Details of printed item
- G07B2017/0058—Printing of code
- G07B2017/00588—Barcode
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00741—Cryptography or similar special procedures in a franking system using specific cryptographic algorithms or functions
- G07B2017/0075—Symmetric, secret-key algorithms, e.g. DES, RC2, RC4, IDEA, Skipjack, CAST, AES
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00741—Cryptography or similar special procedures in a franking system using specific cryptographic algorithms or functions
- G07B2017/00758—Asymmetric, public-key algorithms, e.g. RSA, Elgamal
- G07B2017/00766—Digital signature, e.g. DSA, DSS, ECDSA, ESIGN
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00822—Cryptography or similar special procedures in a franking system including unique details
- G07B2017/0083—Postal data, e.g. postage, address, sender, machine ID, vendor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00846—Key management
- G07B2017/00862—Key storage, e.g. escrowing by trusted third party
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00846—Key management
- G07B2017/0087—Key distribution
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00935—Passwords
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00959—Cryptographic modules, e.g. a PC encryption board
- G07B2017/00967—PSD [Postal Security Device] as defined by the USPS [US Postal Service]
Definitions
- the present invention relates generally to a postage metering system and method for evidencing postage payment in an open system and, more particularly, to a postage metering system and method for evidencing postage payment in a virtual meter configuration.
- Postage metering systems have been developed which employ encrypted information that is printed on a mailpiece as part of an indicium evidencing postage payment.
- the encrypted information includes a postage value for the mailpiece combined with other postal data that relate to the mailpiece and the postage meter printing the indicium.
- the encrypted information typically referred to as a digital token or a digital signature, authenticates and protects the integrity of information, including the postage value, imprinted on the mailpiece for later verification of postage payment. Since the digital token incorporates encrypted information relating to the evidencing of postage payment, altering the printed information in an indicium is detectable by standard verification procedures. Examples of systems that generate and print such indicium are described in U.S. Patent Numbers 4,725,718, 4,757,537, 4,775,246 and 4,873,645, each assigned to the assignee of the present invention.
- closed system the system functionality is solely dedicated to metering activity.
- closed system metering devices also referred to as postage evidencing devices
- postage evidencing devices include conventional digital and analog (mechanical and electronic) postage meters wherein a dedicated printer is securely coupled to a metering or accounting function.
- a dedicated printer In a closed system, typically the printer is securely coupled and dedicated to the meter, and printing evidence of postage cannot take place without accounting for the evidence of postage.
- open system the printer is not dedicated to the metering activity, freeing system functionality for multiple and diverse uses in addition to the metering activity.
- open system metering devices examples include personal computer (PC) based devices with single and/or multi-tasking operating systems, multi-user applications and digital printers.
- An open system metering device is a postage evidencing device with a non-dedicated printer that is not securely coupled to a secure accounting module.
- An open system indicium printed by the non-dedicated printer is made secure by including addressee information in the encrypted evidence of postage printed on the mailpiece for subsequent verification. See U.S. Patent Numbers 4,725,718 and 4,831 ,555, each assigned to the assignee of the present invention.
- the United States Postal Service (“USPS”) has proposed an Information- Based Indicia Program (“IBIP”), which is a distributed trusted system to retrofit and augment existing postage meters using new evidence of postage payment known as information-based indicia.
- the program relies on digital signature techniques to produce for each envelope an indicium whose origin can be authenticated and content cannot be modified.
- IBIP is expected to support new methods of applying postage in addition to the current approach, which typically relies on a postage meter to print indicia on mailpieces.
- IBIP requires printing a large, high density, two-dimensional (“2-D”) bar code on a mailpiece.
- the 2-D bar code encodes information and is signed with a digital signature.
- IBIP INFORMATION BASED INDICIA PROGRAM
- IBIP Indicium Specification defines the proposed requirements for a new indicium that will be applied to mail being created using IBIP.
- the INFORMATION BASED INDICIA PROGRAM POSTAL SECURITY DEVICE SPECIFICATION dated June 13, 1996, and revised July 23, 1997
- PSD Postal Security Device
- the INFORMATION BASED INDICIA PROGRAM HOST SYSTEM SPECIFICATION dated October 9, 1996, defines the proposed requirements for a host system element of IBIP ("IBIP Host Specification").
- IBIP includes interfacing user, postal and vendor infrastructures, which are the system elements of the program.
- the INFORMATION BASED INDICIA PROGRAM KEY MANAGEMENT PLAN defines the generation, distribution, use and replacement of the cryptographic keys used by the USPS product/service provider and PSDs ("IBIP KMS Specification").
- the specifications are collectively referred to herein as the "IBIP Specifications”.
- the IBIP Specifications define a stand-alone open metering system, referred to herein as a PC Meter comprising a PSD coupled to a computer system, such as a personal computer, ("PC") which operates as a host system with a printer coupled thereto ("Host PC").
- PC personal computer
- the Host PC runs the metering application software and associated libraries (collectively referred to herein as "Host Applications") and communicates with one or more attached PSDs.
- the PC Meter can only access PSDs coupled to the Host PC. There is no remote PSD access for the PC Meter.
- the PC Meter processes transactions for dispensing postage, registration and refill on the Host PC. Processing is performed locally between the Host PC and the PSD coupled thereto. Connections to a Data Center, for example for registration and refill transactions, are made locally from the Host PC through a local or network modem/internet connection. Accounting for debits and credits to the PSD is also performed locally, logging the transactions on the Host PC.
- Host PC may accommodate more than one PSD, for example supporting one PSD per serial port.
- Several application programs running on the Host PC such as a word processor or an envelope designer, may access the Host Applications.
- the IBIP Specifications do not address an IBIP open metering system on a network environment. However, the specifications do not prohibit such a network-based system.
- a network Server controls remote printing requested by a Client PC on the network. Of course, the Client PC controls any local printing.
- One version of a network metering system referred to herein as a "virtual meter", has many Host PCs without any PSDs coupled thereto.
- the Host PCs run Host Applications, but all PSD functions are performed on Server(s) located at a Data Center.
- the PSD functions at the Data Center may be performed in a secure device attached to a computer at the Data Center, or may be performed in the computer itself.
- the Host PCs must connect with the Data Center to process transactions such as postage dispensing, meter registration, or meter refills. Transactions are requested by the Host PC and sent to the Data Center for remote processing. The transactions are processed centrally at the Data Center and the results are returned to the Host PC. Accounting for funds and transaction processing are centralized at the Data Center. See, for example, U.S. Patent Numbers 5,454,038 and 4,873,645, which are assigned to the assignee of the present invention.
- the virtual meter does not conform to all the current requirements of the IBIP Specifications.
- the IBIP Specifications do not permit PSD functions to be performed at the Data Center.
- a virtual meter configuration with each mailer's PSD located at the Data Center may provide an equivalent level of security as required by the IBIP Specifications.
- An example of a digital printing postage meter with secure print head communication is the Personal Post Office TM manufactured by Pitney Bowes Inc. of Stamford, Connecticut.
- U.S. Patent Numbers 4,873,645 and 5,454,3,0308 a virtual metering system and method are disclosed wherein the postal accounting and token generation occur at a data center remote from the postage evidencing printer.
- the Data Center may be a secure facility, there remain certain inherent security issues since the accounting and token generation functions do not occur in a secure device local to the postage printer.
- the virtual postage metering system includes a computer coupled to an unsecured printer and to a remote data metering system. The postal accounting and the token generation occur at the Data Center.
- the Data Center is a centralized facility under the control of a meter vendor, such as Pitney Bowes, or the Postal Service.
- a meter vendor such as Pitney Bowes, or the Postal Service.
- remote access to mailer account information i.e. metering information, is a concern.
- an identification password or PIN is used in conjunction with a secure box into which the ATM card is inserted to initiate a transaction.
- the secure box and a data center in combination with the card and PIN authenticate the user initiating the transaction.
- no secure device is available to the user initiating a request for postage.
- One solution may be to distribute a secret key to each mailer. However, when distributing such keys, once the key is compromised, the mailer's account is in jeopardy.
- a virtual postage metering system provides benefits that are not available under conventional postage payment systems.
- a virtual postage metering system provides central management of all postage without the need to manage physical meters or PSDs.
- a further benefit is the opportunity to directly associate a mailer to each mailpiece as opposed to each reset.
- no metering hardware i.e. postage meter or PSD, is needed.
- mailers need to maintain current lists of valid addresses, such as with purchased CD-ROMs.
- Mailers can acquire postage on an as-needed basis.
- meter vendors do not have to keep track of physical meters.
- a virtual postage metering system eliminates stolen or relocated meter problems and simplifies meter management in general.
- the present invention provides a method for securely controlling access to a mailer's account, which resides at a virtual meter data center.
- the present invention comprises means to authenticate a mailer, the secure distribution of mailer (user) authentication keys and the use of a secure box to execute the authentication algorithms.
- the database in the virtual meter data center holds the mailer authentication keys in cipher text to prevent exposure of the keys in plain text. The keys are only decrypted when used within the secure authentication box.
- the present invention provides a method of remotely accessing a postage security account at a data center from a remote user device begins with a remote user assigning, or being assigned, a password to the user's postage security account at a data center.
- a cryptographic key corresponding to the user's postage security account is provided to the remote user device and is stored at the data center.
- the password and the cryptographic key are combined at the remote user device and the data center respectively to obtain a user authentication key.
- An authentication algorithm is performed using the user authentication key to obtain a remote access message.
- the remote access message is sent to the data center to initiate request for access to the postage security account by the remote user device.
- the remote user device is authenticated for accessing the postage security account when the data center verifies the remote access message.
- FIG. 1 is a block diagram of a virtual postage metering system for dispensing postage embodying the principles of the present invention
- Fig. 2 is a block diagram of the Data Center database server and secure box for the virtual postage metering system of Fig. 1 ;
- Fig. 3 is a flow chart of an alternate authentication protocol for the virtual postage metering system of Fig.1;
- Fig 4 is a flow chart of the preferred authentication protocol for the virtual postage metering system of Fig.1;
- Fig. 5 is a flow chart of a preferred distribution of keys used in the present invention.
- Fig 6 is a block diagram of a virtual postage metering system providing multiple-password access for each account.
- a virtual postage metering system generally designated 10.
- the virtual postage metering system 10 includes a plurality (only one is shown) of personal computer (PC) systems, generally designated 20, each having access to a printer 22 for printing evidence of postage on an envelope.
- PC 20 is connected with a transaction processing Data Center 30 that performs postal accounting and evidencing of postage.
- the virtual postage metering system 10 allows each mailer to use a conventional PC to remotely obtain evidence of postage payment on an as needed basis.
- virtual postage metering system 10 does not include any meter hardware located at the mailer's site. Nor are any postal funds stored at the mailer's site. All metering and accounting of funds occur at Data Center 30 using functional software and database records representing each mailer's "postage meter", referred to herein as a "meter account”.
- the accounting method for virtual postage metering system 10 may be a conventional prepayment or post-payment system.
- the preferred method is a prepayment method wherein each mailer is required to put a minimum amount of money into the mailer's virtual meter account. As account funds drop below a specific level a refill is charged against the mailer's account.
- An alternate accounting method that is suitable for a virtual postage metering system is a real-time payment method in which the amount of a transaction is charged to a mailer's credit card account when the transaction occurs. This method is referred to herein as a "trickle charge" postage payment, because the mailer does not pay for postage for a mailpiece until the mailer is ready to print the mailpiece.
- a "meter" vendor such as Pitney Bowes Inc.
- client software that runs on PC 20
- the client software may be downloaded from the vendor's Internet server.
- the client software may be Internet browser-based pages that provide mailer interactions with the Data Center 30.
- the meter vendor also manages Data Center 30.
- the client software initiates communications with Data Center 30 which performs metering transactions to evidence postage for single mailpieces or batches of mailpieces.
- the client software establishes a connection to the Data Center, and requests postage by providing postal information relating to the requested transactions, such as postage amount, addressee information and (optionally) the origin of deposit for each mailpiece.
- Data Center 30 receives the postal information, determines the origin zip for the mailpiece(s), performs accounting functions and generates an encrypted evidence of postage payment, such as a token or digital signature, and sends indicium information including the token, to PC 20.
- PC 20 receives the indicium information, creates an indicium bitmap, which can be displayed on a PC monitor (not shown) and printed on the mailpiece by printer 22.
- PC 20 then disconnects from Data Center 30 or requests another transaction.
- the connection between PC 20 and Data Center 30 may be through a Network Service Provider, such as on the Internet, or by direct dial using the PC's modem.
- Virtual postage metering system 10 eliminates the need to maintain and account for traditional metering devices at each mailer's site and provides flexibility for handling requests from multiple origins of deposit by each mailer.
- Virtual postage metering system 10 also provides value added services that are not available with conventional meter devices, such as, real-time address hygiene, direct marketing services and trickle charge postage payment.
- Virtual postage metering system 10 provides mailer authentication by Data Center 30 to identify mailers with valid accounts. When a mailer has been authenticated for each request, for example, by a username, password or other conventional methods, Data Center 30 services the request, and returns indicium information to the PC 20 where the indicium is created and printed on the mailpiece.
- the mailer initiates a postage evidencing transaction by running client software in PC 20, which contacts Data Center 30.
- a Communication Server 32 supports connectivity from various communication technologies and protocols.
- the Communication Server merges all incoming traffic and routes it to a Function Server 34, which includes application software that supports mailer sign-on, postage dispensing and postal reporting. All mailer and meter information is accessed from a Database Server 36 where the information is securely stored using secure cryptographic processes and protocols as described below.
- Data Center 30 maintains cryptographic keys for each meter account in Database Server 36. The cryptographic keys are used for postage evidencing and verification as well as for security of the records stored in Database Server 36.
- a Key Management System 38 administers all cryptographic keys used in virtual postage metering system 10.
- the cryptographic keys may be distributed to verifiers in remote locations.
- a mailer may establish a meter account through an on-line sign-up process with Data Center 30.
- the mailer enters, at PC 20, account information, such as user name, password and method of payment. Any registration fees can be charged at this time.
- Data Center 30, preferably administered by a meter vendor, such as Pitney Bowes Inc., arranges all meter licenses and agreements between its mailers and the Post.
- the PSD does not exist, i.e., there is no metering device coupled to the PC from which postage payment is requested.
- Virtual postage metering system 10 replaces the accounting and metering functions of the PSD with metering software and mailer account information performed and updated at Data Center 30.
- the virtual postage metering system 10 provides each mailer with a metering system that has the capability of originating transactions from multiple origins of deposit. See, for example, previously noted International Patent Application Serial Number [Attorney Docket E-735].
- Various methods can be used to determine the origin of deposit for a requested transaction. For example, a method for determining origin zip code using a caller ID from a telephone call is disclosed in U.S. Patent Application Serial Number 08/775,818, filed December 31 , 1996, and assigned to the assignee of the present invention, which is hereby incorporated in its entirety by reference.
- one or more cryptographic modules are located within Data Center 30 and are used to perform cryptographic processes.
- Each secure box is a secure, tamper-evident, tamper-resistant and tamper-responding device, including a processor and memory, that stores encryption keys and performs cryptographic operations using the keys within the secure boundary of the device.
- Data Center 30 includes several types of secure boxes, which are described below.
- Data Center 30 includes multiple boxes of each type for redundancy and performance.
- Key Management System 38 includes a manufacturing box (not shown) that provides top-level keys used to generate random numbers for seeding each of the other secure boxes. By sharing cryptographic keys (secret and/or public), the secure boxes communicate securely within Data Center 30. Key
- Management System 38 also includes a "steel" box (not shown) that shares a common key with meter box 44 to encrypt/decrypt master token keys for postage evidencing transactions for each meter account.
- the steel box merges a vendor key and a postal key into one record in cipher text. For each meter account,
- Data Center 30 creates a logical meter, i.e. a meter record, in Database Server
- Data Center 30 also includes a meter box 44 that shares a secret key with the steel box for decrypting the token key encrypted in the meter record.
- Meter box 44 also holds the key used for digital signature of transaction records. The only other information stored in meter box 44 is freshness data for each meter record processed by meter box 44. For each postage transaction, meter box 44 generates at least one digital token or signs the postage transaction, and updates the meter record corresponding to the transaction.
- Each meter record in Database Server 36 includes postal funds as well as the token keys in cipher text.
- Meter box 44 uses the token keys to generate tokens, updates the postal funds in the meter record, and signs the updated meter record. In this manner, meter box 44 performs and controls the secure accounting for each transaction. Meter box 44 can also be used to verify the token or the transaction signature for verification of the postage evidencing for the transaction.
- Data Center 30 also includes an authentication box 40 that shares a different secret key with the steel box to decrypt a mailer authentication key stored in cipher text in Database Server 36.
- Authentication box 40 also executes the authentication algorithms using the decrypted authentication key to authenticate a mailer.
- Data Center 30 includes an transaction box 42 that shares another secret key with the steel box to sign mailer transaction records other than the meter records signed by meter box 44, such as logins and login history records. Transaction box 42 later verifies the transaction record signature when the next transaction is requested.
- meter box 44 the functions described for meter box 44, authentication box 40 and transaction box 42 can be logically separated and combined in one box. In the preferred embodiment of the present invention, at least the functions of authentication box 40 and meter box 44 are performed in separate secure boxes.
- Meter database 60 comprises meter information associated for each meter account, such as, meter serial number, piece count of last mailpiece, ascending register, descending register and other postal values.
- Mailer database 62 comprises mailer information and information that associates a mailer with a meter account.
- Communication Server 32 receives a request for a meter transaction from mailer PC 20.
- the application software in the Function Server 34 controls the processing of the transaction request.
- Function Server 34 accesses mailer database 62 and meter database 60 to obtain records, including the appropriate meter record 64, corresponding to the meter account of the mailer initiating the request.
- Function Server 34 communicates mailer records from mailer database 62 to authentication box 40, which then authenticates the mailer requesting the transaction. Once the mailer has been authenticated, Function Server 34 communicates the appropriate meter record 64 to meter box 44, which verifies a signature and freshness data for the record.
- Meter box 44 decrypts the encrypted key(s) that are stored within meter record 64, performs accounting functions on the ascending and descending registers in meter record 64, and uses the key(s) to generate a token for the requested transaction. Meter box 44 then generates data for an indicium, and once again signs meter record 64. The updated and signed record is then sent back to Database Server 36 where it is stored as part of meter database 60.
- the authentication keys are not available in plain text, but must be distributed to the mailer. Conventional methods of distributing and updating the authentication key for each mailer can be used. See, for example, previously noted U.S. Patent Number Application Serial Number 08/553812, which describes a key management system for distributing and updating cryptographic keys to the secure boxes and the mailer's PC.
- one common key is used to sign all transactions and records that require a digital signature, such as, meter records, postage transactions, funds transfer records, master account records, etc. Multiple boxes of each box are used for redundancy and to share the workload as the number of transactions grow.
- the signing box such as meter box 44 or authentication box 40, will also verify the signature of a record.
- a message authentication code is employed to provide message integrity for the sensitive virtual meter records.
- This MAC involves multiple applications of the Data Encryption Standard (DES).
- DES Data Encryption Standard
- the main requirement for generation of the signature keys is that the resulting keys are unpredictable. (The signature keys will be updated using the current month and year.)
- NVM non-volatile memory
- the signature keys are generated or updated from the master signature keys and the current month and year in a conventional manner.
- the virtual meter record signature verification algorithm simply recalculates the signature of the meter record 64 using the signature algorithm and data within meter record 64 and compares calculated signature to the signature in meter record 64.
- an authentication protocol for the virtual postage metering system uses a shared secret between the Data Center 30 and a remote PC 20.
- a mailer also referred to herein as a user
- the mailer must possess a secret key and a password.
- the secret key is preferably stored on removable media, such as a floppy diskette or dongle, so that only the mailer in possession of the removable media may access the account. Only the mailer knows the password.
- the secret key and the password are combined to form the authentication key that is used in the authentication protocol.
- Data Center 30 stores the mailer's secret key in Database Server 36.
- the mailer's password is combined with the secret key to form the authentication key which is stored in encrypted form in mailer database 62 at Data Center 30.
- Data Center uses the stored authentication key, whereas PC 20 generates the authentication key using two pieces of information, i.e., the stored secret key and the user password.
- a simple but effective method of combining the two pieces is to exclusive- or the secret key and the ASCII representation of the password to form the authentication key used. Although this method is suitable, it has the drawback of restricting the number of characters in the password to the length of the secret key in bytes.
- An alternate method of combining the secret key and password first compresses the ASCII representations of the characters in the password.
- One example restricts the password to alphanumeric characters only and encodes each character with 6 bits or using a cryptographic hash to compress the password to the desired size. Again, the password would be exclusive-ored with the secret key to produce the authentication key. The latter method allows longer passwords to be used, although both methods are sufficient for a desired level of security.
- KA is the secret key stored on the user's removable media and Ku is an authentication key derived from the user's password.
- IDu is the user's ID
- IDDC is the Data Center ID
- Cu is the user's challenge
- C D c is the Data Center's challenge
- [Cu, CDC]K A denotes a digital signature of the user's challenge and the Data Center's challenge signed with the secret key
- ⁇ CDC ⁇ KA denotes an encryption of the Data Center's challenge using the secret key
- ⁇ C D c ⁇ Ku denotes an encryption of the Data Center's challenge using the authentication key.
- PC 20 initiates communication with Data Center 30, sending the user's ID and the user's challenge in plain text to Data Center 30.
- Data Center 30 responds with plain text of the Data Center ID, the user's ID, the user's challenge and the Data Center's challenge, and a digital signature of the user's challenge and the Data Center's challenge signed with the secret key.
- PC 20 creates the user's authentication key Ku by combining the user's password and secret key K A stored on a diskette, the distribution of which is described below.
- PC 20 verifies the digital signature of the user's challenge and the Data Center's challenge using secret key K A . If not verified, the Data Center is alerted and the communication terminated.
- PC 20 encrypts the Data Center's challenge using the user's authentication key Ku and encrypts it again using secret key K A .
- PC 20 then sends to Data Center 30 the user's ID, the Data Center ID, and the two encryptions of the Data Center's challenge.
- Data Center 30 verifies the user's ID, the Data Center ID, and the two encryptions of the Data Center's challenge to complete authentication protocol. If not verified, PC 20 is alerted and the communication terminated.
- Data Center 30 creates user's authentication key Ku by combining secret key K A and the user's password, which is stored at Data Center 30 prior to this communication, as described below in Figs. 5 and 6.
- the preferred embodiment of the present invention uses the user's authentication key K U ⁇ which is a combination of KA and the user's password.
- User's authentication key Ku is created in PC 20 for each communication session with Data Center 30.
- PC 20 initiates communication with Data Center 30, sending the user's ID and the user's challenge in plain text to Data Center 30.
- Data Center 30 and then responds with plain text of the Data Center ID, the user's ID, the user's challenge and the Data Center's challenge, and a digital signature of the user's challenge and the Data Center's challenge signed with a user's authentication key Ku, which has been established prior to this communication, as described in Figs. 5 and 6 below.
- PC 20 generates Ku by combining K A and the user's password.
- PC 20 verifies the digital signature of the user's challenge and the Data Center's challenge using the user's authentication key Ku. If not verified, the Data Center is alerted and the communication terminated.
- PC 20 encrypts the Data Center's challenge using the user's authentication key Ku.
- PC 20 then sends to Data Center 30 the user's ID, the Data Center ID, and the encrypted Data Center's challenge.
- Data Center 30 verifies the user's ID, the Data Center ID, and the encrypted Data Center's challenge to complete authentication protocol. If not verified, PC 20 is alerted and the communication terminated.
- the computations involved in the authentication protocol are carried out in the secure authentication box 40.
- the purpose of this box is simply to decrypt the authentication key for the protocol and to use the authentication key in a secure, tamper-proof environment.
- the user and the virtual meter data center must share the key KA used in the authentication protocol.
- a variety of methods are available to distribute authentication keys to enable other security services for a new client. Each method uses a different means to distribute software and keying material to the mailer.
- software packages are manufactured with individualized keys on each diskette.
- the mailer purchases a software package and installs the software on PC 20.
- the disk serial number is sent to the Data Center 30 so that Data Center 30 can associate the secret key with the new mailer.
- the mailer also chooses a password at this time, which is also sent to Data Center 30. At this time, there is no mechanism to securely communicate the mailer's sensitive information, such as the password and credit card number.
- the secret key initially on the diskette could be used as a communication key for uploading such sensitive data to Data Center 30 and for downloading a secret key for future logins.
- a diskette or dongle is manufactured with key material and sent to the mailer.
- the mailer must now wait to receive its key before postage can be requested and dispensed.
- there is no mechanism to securely communicate the mailer's sensitive information such as the password and credit card number.
- the secret key initially on the diskette could be used as a communication key for uploading such sensitive data to Data Center 30 and for downloading a secret key for future logins.
- the first and second methods both place a burden on manufacturing.
- the following alternate methods are preferred for distributing the virtual meter software.
- a virtual meter public key is used to enable signup, downloads the software package.
- the software package includes the virtual meter public key.
- the mailer installs software into PC 20.
- the virtual postage metering system setup uses pseudorandom data (obtained from the mailer's machine or from the mailer's keystrokes) to seed a process which generates the authentication key.
- the mailer also chooses a password at this time.
- the mailer memorizes the password and the secret key is stored onto the hard drive or removable media (diskette or dongle).
- the mailer's sensitive data such as credit card information and the authentication key for the authentication protocol is encrypted with the virtual meter public key and uploaded to the virtual meter data center.
- Data Center 30 decrypts the sensitive data with the virtual meter private key and securely stores this data.
- a public key toolkit can provide the tools to enable this.
- a client public key is used to enable signup.
- the mailer downloads or purchases the software package and installs the software in PC 20.
- Setup uses pseudorandom data (obtained from the mailer's machine or from the mailer's keystrokes) to seed a process which generates a public/private key pair.
- the mailer also chooses and memorizes a password at this time.
- the mailer uploads the client public key to the virtual meter data center.
- Data Center 30 generates the key for the authentication protocol, encrypts it with the client public key and returns it to the mailer.
- the mailer decrypts the authentication key for the authentication protocol with the client private key and splits it into the secret key and the password.
- the secret key is stored onto the hard drive or, preferably, onto removable media
- diskette or dongle diskette or dongle. Note that this method does not allow a natural mechanism for uploading credit card information to the virtual meter data center.
- a public key toolkit can provide the tools to enable this.
- Method 3 has the advantage of being able to upload all sensitive data at sign-up whereas method 4 has the advantage of being able to control the generation of keys for the authentication protocol at Data Center 30.
- Method 4 has the advantage of being able to control the generation of keys for the authentication protocol at Data Center 30.
- the benefits of methods 3 and 4 can simultaneously be realized by using a public/private key pair for both the Data Center 30 and the mailer.
- the key management system 38 distributes the secret key K A to PC 20 (using one of the above-described methods) and to Data Center 30 for user's account.
- PC 20 holds/stores the secret key K A depending on the method of distribution.
- Data Center 30 stores the secret key KA in a file record for the user's account.
- PC 20 sends the user password to Data Center 30.
- Data Center 30 optionally stores the password in the file record for the user's account.
- Data Center 30 combines the secret key and the password to create the user's authentication key Ku and stores the authentication key in the file record for the user's account.
- the PC 20 sends the user's authentication key Ku Data Center 30 in lieu of sending the password.
- Data Center 30 does not have to create the user's authentication key Ku and, therefore, does not access to the password.
- the present invention provides an additional advantage for a mailer desiring multiple sub-accounts, such as departmental accounts, within the mailer's main metering account at Data Center 30.
- a single mailer account may be set up for use with multiple passwords PW ⁇ , PW 2 , ... PW N using a single secret key K A .
- the key management system 38 distributes the secret key K A to PC 20 (using one of the above-described methods) and to Data Center 30 for the user's account.
- PC 20 holds/stores the secret key K A depending on the method of distribution.
- Data Center 30 stores the secret key KA in a file record for the user's account.
- PC 20 sends multiple passwords PWi, PW 2 , ... PW N to Data Center 30.
- Data Center 30 optionally stores the multiple passwords in corresponding sub-accounts in the file record for the user's account.
- Data Center 30 combines the secret key K A with each of the multiple passwords to obtain respective authentication keys (Ku-i, Ku 2 , • ⁇ KUN) for each of the sub-accounts and stores the authentication keys in the corresponding sub-accounts in the file record for the user's account.
- Steps 320 and 420 are optional because once the user's authentication key Ku is created, Data Center 30 no longer needs access to the secret key K A and the user's password(s).
- Personal Post OfficeTM is a trademark of Pitney Bowes Inc., the assignee of the present invention.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP98932744A EP0925663A4 (en) | 1997-06-13 | 1998-06-12 | Method for access control in a virtual postage metering system |
AU82558/98A AU8255898A (en) | 1997-06-13 | 1998-06-12 | Method for access control in a virtual postage metering system |
CA002263434A CA2263434C (en) | 1997-06-13 | 1998-06-12 | Method for access control in a virtual postage metering system |
US09/242,205 US6567794B1 (en) | 1997-06-13 | 1999-09-02 | Method for access control in a virtual postage metering system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US4951897P | 1997-06-13 | 1997-06-13 | |
US60/049,518 | 1997-06-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998057460A1 true WO1998057460A1 (en) | 1998-12-17 |
Family
ID=21960252
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/012276 WO1998057304A1 (en) | 1997-06-12 | 1998-06-12 | Virtual postage meter with secure digital signature device |
PCT/US1998/012081 WO1998057302A1 (en) | 1997-06-13 | 1998-06-12 | Virtual postage metering system |
PCT/US1998/012204 WO1998057303A1 (en) | 1997-06-13 | 1998-06-12 | Virtual postage meter with multiple origins of deposit |
PCT/US1998/012385 WO1998057305A1 (en) | 1997-06-12 | 1998-06-12 | System and method for dynamic selection of appropriate postal rates based on metering data |
PCT/US1998/012206 WO1998057460A1 (en) | 1997-06-13 | 1998-06-12 | Method for access control in a virtual postage metering system |
PCT/US1998/012438 WO1998057306A1 (en) | 1997-06-13 | 1998-06-12 | System and method for controlling a postage metering using data required for printing |
Family Applications Before (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/012276 WO1998057304A1 (en) | 1997-06-12 | 1998-06-12 | Virtual postage meter with secure digital signature device |
PCT/US1998/012081 WO1998057302A1 (en) | 1997-06-13 | 1998-06-12 | Virtual postage metering system |
PCT/US1998/012204 WO1998057303A1 (en) | 1997-06-13 | 1998-06-12 | Virtual postage meter with multiple origins of deposit |
PCT/US1998/012385 WO1998057305A1 (en) | 1997-06-12 | 1998-06-12 | System and method for dynamic selection of appropriate postal rates based on metering data |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/012438 WO1998057306A1 (en) | 1997-06-13 | 1998-06-12 | System and method for controlling a postage metering using data required for printing |
Country Status (9)
Country | Link |
---|---|
US (2) | US6526391B1 (en) |
EP (6) | EP0960394B1 (en) |
JP (2) | JP4117912B2 (en) |
CN (2) | CN1155917C (en) |
AU (6) | AU7961998A (en) |
BR (2) | BR9805995B1 (en) |
CA (6) | CA2263415C (en) |
DE (3) | DE69836123T2 (en) |
WO (6) | WO1998057304A1 (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6249777B1 (en) * | 1996-10-02 | 2001-06-19 | E-Stamp Corporation | System and method for remote postage metering |
US6466921B1 (en) * | 1997-06-13 | 2002-10-15 | Pitney Bowes Inc. | Virtual postage meter with secure digital signature device |
US6567794B1 (en) * | 1997-06-13 | 2003-05-20 | Pitney Bowes Inc. | Method for access control in a virtual postage metering system |
US6619544B2 (en) | 2000-05-05 | 2003-09-16 | Pitney Bowes Inc. | System and method for instant online postage metering |
US6839691B2 (en) | 2000-05-05 | 2005-01-04 | Pitney Bowes Inc. | Method for acquiring a customer for online postage metering |
US6889214B1 (en) | 1996-10-02 | 2005-05-03 | Stamps.Com Inc. | Virtual security device |
US7251632B1 (en) | 1999-10-18 | 2007-07-31 | Stamps. Com | Machine dependent login for on-line value-bearing item system |
US7752141B1 (en) | 1999-10-18 | 2010-07-06 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
US8027926B2 (en) | 1999-10-18 | 2011-09-27 | Stamps.Com | Secure and recoverable database for on-line value-bearing item system |
US9721225B1 (en) | 2013-10-16 | 2017-08-01 | Stamps.Com Inc. | Systems and methods facilitating shipping services rate resale |
US9779556B1 (en) | 2006-12-27 | 2017-10-03 | Stamps.Com Inc. | System and method for identifying and preventing on-line fraud |
US9864990B2 (en) | 1999-06-18 | 2018-01-09 | Cria Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US9965903B2 (en) | 2006-12-27 | 2018-05-08 | Stamps.Com Inc. | Postage metering with accumulated postage |
US9978185B1 (en) | 2008-04-15 | 2018-05-22 | Stamps.Com Inc. | Systems and methods for activation of postage indicia at point of sale |
US10089797B1 (en) | 2010-02-25 | 2018-10-02 | Stamps.Com Inc. | Systems and methods for providing localized functionality in browser based postage transactions |
US10373398B1 (en) | 2008-02-13 | 2019-08-06 | Stamps.Com Inc. | Systems and methods for distributed activation of postage |
US10417728B1 (en) | 2014-04-17 | 2019-09-17 | Stamps.Com Inc. | Single secure environment session generating multiple indicia |
US10521754B2 (en) | 2016-03-08 | 2019-12-31 | Auctane, LLC | Concatenated shipping documentation processing spawning intelligent generation subprocesses |
US10580222B2 (en) | 2000-02-16 | 2020-03-03 | Stamps.Com Inc. | Secure on-line ticketing |
US10713634B1 (en) | 2011-05-18 | 2020-07-14 | Stamps.Com Inc. | Systems and methods using mobile communication handsets for providing postage |
US10755224B2 (en) | 2010-02-25 | 2020-08-25 | Stamps.Com Inc. | Systems and methods for rules based shipping |
US10846650B1 (en) | 2011-11-01 | 2020-11-24 | Stamps.Com Inc. | Perpetual value bearing shipping labels |
US10891807B1 (en) | 2008-12-24 | 2021-01-12 | Stamps.Com Inc. | Systems and methods utilizing gravity feed for postage metering |
US10922641B1 (en) | 2012-01-24 | 2021-02-16 | Stamps.Com Inc. | Systems and methods providing known shipper information for shipping indicia |
US10984369B2 (en) | 2006-12-27 | 2021-04-20 | Stamps.Com Inc. | System and method for handling payment errors with respect to delivery services |
US11037151B1 (en) | 2003-08-19 | 2021-06-15 | Stamps.Com Inc. | System and method for dynamically partitioning a postage evidencing system |
US11093623B2 (en) | 2011-12-09 | 2021-08-17 | Sertainty Corporation | System and methods for using cipher objects to protect data |
US11140278B2 (en) | 2006-12-27 | 2021-10-05 | Stamps.Com Inc. | Postage printer |
US11386409B2 (en) | 2016-03-04 | 2022-07-12 | Sertintyone Corporation | Systems and methods for media codecs and containers |
US11423400B1 (en) | 1999-06-18 | 2022-08-23 | Stripe, Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US12072989B2 (en) | 2011-12-09 | 2024-08-27 | Sertainty Corporation | System and methods for using cipher objects to protect data |
Families Citing this family (106)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2173428A1 (en) | 1995-04-06 | 1996-10-07 | Donald W. Church | Electronic parking meter |
US6671813B2 (en) | 1995-06-07 | 2003-12-30 | Stamps.Com, Inc. | Secure on-line PC postage metering system |
US7343357B1 (en) * | 1995-10-11 | 2008-03-11 | Stamps.Com Inc. | System and method for printing multiple postage indicia |
WO1998057304A1 (en) * | 1997-06-12 | 1998-12-17 | Pitney Bowes Inc. | Virtual postage meter with secure digital signature device |
US6546377B1 (en) | 1997-06-13 | 2003-04-08 | Pitney Bowes Inc. | Virtual postage meter with multiple origins of deposit |
US20030004900A1 (en) | 1999-05-19 | 2003-01-02 | Robert G. Schwartz | Technique for effectively generating multi-dimensional symbols representing postal information |
US6064993A (en) * | 1997-12-18 | 2000-05-16 | Pitney Bowes Inc. | Closed system virtual postage meter |
DE19812903A1 (en) | 1998-03-18 | 1999-09-23 | Francotyp Postalia Gmbh | Franking device and a method for generating valid data for franking imprints |
US6820065B1 (en) * | 1998-03-18 | 2004-11-16 | Ascom Hasler Mailing Systems Inc. | System and method for management of postage meter licenses |
DE19843252A1 (en) * | 1998-09-11 | 2000-03-16 | Francotyp Postalia Gmbh | Data entry in postage computer, e.g. in postage machine, postage scales, involves loading of new postage table data at user-defined time, and updating data at time defined by post carrier |
EP1118064A1 (en) * | 1998-09-29 | 2001-07-25 | Stamps.Com, inc. | On-line postage system |
GB9823288D0 (en) * | 1998-10-23 | 1998-12-23 | Neopost Ltd | Mail preparation system |
US6044350A (en) * | 1998-12-24 | 2000-03-28 | Pitney Bowes Inc. | Certificate meter with selectable indemnification provisions |
CA2361514A1 (en) | 1999-02-08 | 2000-08-10 | United Parcel Service Of America, Inc. | Internet package shipping systems and methods |
US6381589B1 (en) * | 1999-02-16 | 2002-04-30 | Neopost Inc. | Method and apparatus for performing secure processing of postal data |
US7120610B1 (en) | 1999-03-04 | 2006-10-10 | Ascom Hasler Mailing Systems, Inc. | Technique for effective management of resource consumption |
US6847951B1 (en) * | 1999-03-30 | 2005-01-25 | Pitney Bowes Inc. | Method for certifying public keys used to sign postal indicia and indicia so signed |
EP1183656A2 (en) * | 1999-06-01 | 2002-03-06 | Stamps.Com | Online value bearing item printing |
GB9916242D0 (en) * | 1999-07-09 | 1999-09-15 | Neopost Ltd | Method and system for providing information to mailing machine users |
EP1153367A4 (en) | 1999-10-15 | 2002-05-29 | Ascom Hasler Mailing Sys Inc | Technique for effectively generating postage indicia using a postal security device |
US6868406B1 (en) | 1999-10-18 | 2005-03-15 | Stamps.Com | Auditing method and system for an on-line value-bearing item printing system |
WO2001045051A1 (en) * | 1999-10-18 | 2001-06-21 | Stamps.Com | Postal system intranet and commerce processing for on-line value bearing system |
WO2001029741A2 (en) * | 1999-10-18 | 2001-04-26 | Stamps.Com | Machine dependent login for on-line value-bearing item system |
WO2001029780A1 (en) * | 1999-10-19 | 2001-04-26 | Stamps.Com | Address matching system and method |
US7236970B1 (en) | 1999-10-19 | 2007-06-26 | Stamps.Com | Address matching system and method |
EP1230623B1 (en) * | 1999-11-10 | 2005-01-26 | Neopost Inc. | Providing stamps on secure paper using a communications network |
US20020046195A1 (en) * | 1999-11-10 | 2002-04-18 | Neopost Inc. | Method and system for providing stamps by kiosk |
US6244763B1 (en) * | 1999-11-12 | 2001-06-12 | Stamps.Com | PC postage label containing three primary labels for indicia, sender and recipient and method for printing same |
ATE280418T1 (en) * | 1999-11-16 | 2004-11-15 | Neopost Inc | SYSTEM AND METHOD FOR MANAGING MULTIPLE POSTAL FUNCTIONS IN A SINGLE ACCOUNT |
AU2001236435A1 (en) * | 2000-01-24 | 2001-07-31 | Ascom Hasler Mailing Systems, Inc. | Proof of postage digital franking |
AU2001247983A1 (en) * | 2000-02-16 | 2001-08-27 | Ascom Hasler Mailing Systems, Inc. | Adaptable secure funds source |
AU2001255271A1 (en) * | 2000-04-07 | 2001-10-23 | Ascom Hasler Mailing Systems, Inc. | Dynamic reassignment of postal metering device licensing location |
DE10019085A1 (en) | 2000-04-10 | 2001-12-06 | Francotyp Postalia Gmbh | Arrangement and method for providing a message when loading service data for a terminal |
DE10020402C2 (en) * | 2000-04-27 | 2002-03-14 | Deutsche Post Ag | Method for providing postage with postage indicia |
DE10020566C2 (en) | 2000-04-27 | 2002-11-14 | Deutsche Post Ag | Method for providing postage with postage indicia |
DE10020904B4 (en) * | 2000-04-28 | 2004-12-09 | Francotyp-Postalia Ag & Co. Kg | Procedure for the secure distribution of security modules |
GB2363868B (en) * | 2000-06-19 | 2004-12-01 | Pitney Bowes Ltd | Secure data storage on open systems |
GB2363887B (en) | 2000-06-19 | 2004-02-11 | Pitney Bowes Ltd | Mailer-postal service interfaces |
GB2363759B (en) * | 2000-06-19 | 2004-06-16 | Pitney Bowes Ltd | Mail production systems |
GB2363888B (en) * | 2000-06-19 | 2004-02-18 | Pitney Bowes Ltd | Verification of batch items |
EP1299862A1 (en) * | 2000-07-13 | 2003-04-09 | Stamps.Com | Web-enabled value bearing item printing |
US7756795B2 (en) * | 2000-12-27 | 2010-07-13 | Pitney Bowes Inc. | Mail piece verification system |
US7707124B2 (en) * | 2000-08-28 | 2010-04-27 | Pitney Bowes Inc. | Mail piece verification system having forensic accounting capability |
US6868407B1 (en) * | 2000-11-02 | 2005-03-15 | Pitney Bowes Inc. | Postage security device having cryptographic keys with a variable key length |
EP1379968A2 (en) * | 2001-02-23 | 2004-01-14 | United States Postal Service | Systems and methods for dispensing postage stamps |
DE10116703A1 (en) * | 2001-03-29 | 2002-10-10 | Francotyp Postalia Ag | Method for recording a consumption value and consumption counter with a sensor |
US6839695B2 (en) * | 2001-05-03 | 2005-01-04 | Pitney Bowes Inc. | Postage meter location system |
US20030187666A1 (en) * | 2002-03-26 | 2003-10-02 | Neopost Inc. | Techniques for dispensing postage using a communications network |
US6823321B2 (en) * | 2001-09-14 | 2004-11-23 | Pitney Bowes Inc. | Method and system for optimizing refill amount for automatic refill of a shared virtual postage meter |
GB0202269D0 (en) * | 2002-01-31 | 2002-03-20 | Neopost Ltd | Postage meter security |
US20040064422A1 (en) * | 2002-09-26 | 2004-04-01 | Neopost Inc. | Method for tracking and accounting for reply mailpieces and mailpiece supporting the method |
US7069253B2 (en) * | 2002-09-26 | 2006-06-27 | Neopost Inc. | Techniques for tracking mailpieces and accounting for postage payment |
US20040249765A1 (en) * | 2003-06-06 | 2004-12-09 | Neopost Inc. | Use of a kiosk to provide verifiable identification using cryptographic identifiers |
US8078548B1 (en) * | 2003-10-06 | 2011-12-13 | Stamps.Com Inc. | System and method for controlling postage usage independent of meter balance |
DE102004017309A1 (en) * | 2004-04-06 | 2005-11-10 | Francotyp-Postalia Ag & Co. Kg | Method and arrangement for carrying out transactions |
US7243842B1 (en) * | 2004-07-27 | 2007-07-17 | Stamps.Com Inc. | Computer-based value-bearing item customization security |
US8805745B1 (en) | 2004-07-27 | 2014-08-12 | Stamps.Com Inc. | Printing of computer-based value-bearing items |
US7979358B1 (en) | 2004-07-27 | 2011-07-12 | Stamps.Com Inc. | Quality assurance of image-customization of computer-based value-bearing items |
US8065239B1 (en) | 2004-07-27 | 2011-11-22 | Stamps.Com Inc. | Customized computer-based value-bearing item quality assurance |
US11893089B1 (en) | 2004-07-27 | 2024-02-06 | Auctane, Inc. | Systems and methods for protecting content when using a general purpose user interface application |
US9728107B1 (en) | 2008-04-15 | 2017-08-08 | Stamps.Com Inc. | Systems and methods for protecting content when using a general purpose user interface application |
US7933845B1 (en) | 2004-07-27 | 2011-04-26 | Stamps.Com Inc. | Image-customization of computer-based value-bearing items |
DE102004037695A1 (en) * | 2004-08-02 | 2006-02-23 | Deutsche Post Ag | Method and device arrangement for the digital franking of mailpieces |
GB0424243D0 (en) * | 2004-11-02 | 2004-12-01 | Rand Ricky C | A method and system for regulating electronic mail |
CA2631699C (en) | 2005-12-02 | 2016-02-23 | Ips Group Inc. | A parking meter and a device therefor |
US20090192950A1 (en) * | 2005-12-02 | 2009-07-30 | Ips Group, Inc. | Method and apparatus for operating a removable meter unit |
US8285651B1 (en) | 2005-12-30 | 2012-10-09 | Stamps.Com Inc. | High speed printing |
US7874593B1 (en) | 2006-05-16 | 2011-01-25 | Stamps.Com Inc. | Rolls of image-customized value-bearing items and systems and methods for providing rolls of image-customized value-bearing items |
US10839332B1 (en) | 2006-06-26 | 2020-11-17 | Stamps.Com | Image-customized labels adapted for bearing computer-based, generic, value-bearing items, and systems and methods for providing image-customized labels |
DE102006060700A1 (en) | 2006-12-18 | 2008-06-19 | Francotyp-Postalia Gmbh | A method of data processing with the provision of postage fee tables and their selection from a database of a data center as well as an arrangement for carrying out the method |
US8505978B1 (en) | 2006-12-20 | 2013-08-13 | Stamps.Com Inc. | Systems and methods for creating and providing shape-customized, computer-based, value-bearing items |
CA2622164C (en) * | 2007-02-27 | 2015-11-03 | Ips Group Inc. | A parking meter |
US8479909B2 (en) | 2007-03-30 | 2013-07-09 | Ips Group Inc. | Coin validation unit with clip feature |
US8513832B2 (en) | 2007-03-30 | 2013-08-20 | Ips Group Inc. | Power supply unit |
US20090171848A1 (en) * | 2007-12-28 | 2009-07-02 | Pitney Bowes Inc. | Mailing machine having dynamically configurable postal security device to support multiple customers and carriers |
MX2009000719A (en) * | 2008-01-18 | 2009-08-12 | Ips Group Inc | Method and apparatus for automatic location-specific configuration management of a removable meter unit. |
CA2664291C (en) | 2008-04-25 | 2013-09-17 | J.J. Mackay Canada Limited | Improved data collection system for electronic parking meters |
US7925595B2 (en) * | 2008-05-13 | 2011-04-12 | Neopost Technologies | Method for postage payment |
US20110316716A1 (en) | 2008-12-23 | 2011-12-29 | George Allan Mackay | Low power wireless parking meter and parking meter network |
US8965809B1 (en) * | 2009-05-21 | 2015-02-24 | Stamps.Com Inc. | Restricted printing of postage with layout constraints in a browser |
WO2011029061A2 (en) * | 2009-09-04 | 2011-03-10 | Ips Group, Inc. | Location-aware advertising to parking location users |
WO2011029062A2 (en) | 2009-09-04 | 2011-03-10 | Ips Group, Inc. | Parking meter communications for remote payment with updated display |
US8250887B2 (en) | 2010-05-26 | 2012-08-28 | J.J. Mackay Canada Limited | Tamper resistant lock |
US9183590B2 (en) * | 2010-07-20 | 2015-11-10 | Neopost Technologies | System and method for managing postal accounting data using transient data collectors |
CA3178279A1 (en) | 2011-03-03 | 2012-09-03 | J.J. Mackay Canada Limited | Parking meter with contactless payment |
US9914320B1 (en) | 2011-04-21 | 2018-03-13 | Stamps.Com Inc. | Secure value bearing indicia using clear media |
WO2013016453A2 (en) | 2011-07-25 | 2013-01-31 | Ips Group Inc. | Low-power vehicle detection |
US8751409B2 (en) * | 2011-09-09 | 2014-06-10 | Psi Systems, Inc. | System and method for securely disseminating and managing postal rates |
US10373216B1 (en) | 2011-10-12 | 2019-08-06 | Stamps.Com Inc. | Parasitic postage indicia |
CA145137S (en) | 2012-04-02 | 2013-07-22 | Jj Mackay Canada Ltd | Single space parking meter |
CN103716762B (en) * | 2012-09-29 | 2017-04-05 | 卓望数码技术(深圳)有限公司 | A kind of Internet Accounting Ststem and its method for realizing Secure Billing |
EP2759984A1 (en) * | 2013-01-29 | 2014-07-30 | Neopost Technologies | Date management system |
CA2843253C (en) * | 2013-02-19 | 2018-06-05 | Francotyp-Postalia Gmbh | Method and arrangement for generating franking imprint data for a mail item |
US9508198B1 (en) | 2014-12-23 | 2016-11-29 | Ips Group Inc. | Meters and upgraded meter cover with sensor |
CA2894350C (en) | 2015-06-16 | 2023-03-28 | J.J. Mackay Canada Limited | Coin chute with anti-fishing assembly |
USRE48566E1 (en) | 2015-07-15 | 2021-05-25 | J.J. Mackay Canada Limited | Parking meter |
CA3176773A1 (en) | 2015-08-11 | 2017-02-11 | J.J. Mackay Canada Limited | Single space parking meter retrofit |
USD813059S1 (en) | 2016-02-24 | 2018-03-20 | J.J. Mackay Canada Limited | Parking meter |
CA3031936A1 (en) | 2019-01-30 | 2020-07-30 | J.J. Mackay Canada Limited | Spi keyboard module for a parking meter and a parking meter having an spi keyboard module |
US11922756B2 (en) | 2019-01-30 | 2024-03-05 | J.J. Mackay Canada Limited | Parking meter having touchscreen display |
USD911857S1 (en) | 2019-02-20 | 2021-03-02 | Ips Group Inc. | Sensor enhanced parking meter |
USD959298S1 (en) | 2020-11-19 | 2022-08-02 | Ips Group Inc. | Meter cover |
USD986082S1 (en) | 2020-11-19 | 2023-05-16 | Ips Group Inc. | Sensor enhanced meter |
USD996237S1 (en) | 2020-11-19 | 2023-08-22 | Ips Group Inc. | Sensor enhanced meter |
USD959299S1 (en) | 2020-11-19 | 2022-08-02 | Ips Group Inc. | Meter cover |
USD959997S1 (en) | 2020-11-19 | 2022-08-09 | Ips Group Inc. | Meter cover |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4423287A (en) * | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4578530A (en) * | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US5163098A (en) * | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5526428A (en) * | 1993-12-29 | 1996-06-11 | International Business Machines Corporation | Access control apparatus and method |
US5590198A (en) * | 1995-12-19 | 1996-12-31 | Pitney Bowes Inc. | Open metering system with super password vault access |
Family Cites Families (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4122532A (en) * | 1977-01-31 | 1978-10-24 | Pitney-Bowes, Inc. | System for updating postal rate information utilized by remote mail processing apparatus |
US4138735A (en) * | 1977-01-31 | 1979-02-06 | Pitney-Bowes, Inc. | System for remotely resetting postage rate memories |
US4180856A (en) | 1977-07-29 | 1979-12-25 | Pitney Bowes Inc. | Electronic postage metering system |
US4376981A (en) | 1978-06-26 | 1983-03-15 | Pitney Bowes Inc. | Electronic postage metering system |
US4376299A (en) | 1980-07-14 | 1983-03-08 | Pitney Bowes, Inc. | Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encrypted seed number signals |
US4556944A (en) | 1983-02-09 | 1985-12-03 | Pitney Bowes Inc. | Voice responsive automated mailing system |
US4567359A (en) | 1984-05-24 | 1986-01-28 | Lockwood Lawrence B | Automatic information, goods and services dispensing system |
US4775246A (en) | 1985-04-17 | 1988-10-04 | Pitney Bowes Inc. | System for detecting unaccounted for printing in a value printing system |
US4831555A (en) | 1985-08-06 | 1989-05-16 | Pitney Bowes Inc. | Unsecured postage applying system |
GB2173741B (en) * | 1985-04-17 | 1989-07-05 | Pitney Bowes Inc | Unsecured postage applying system and method |
US4757537A (en) * | 1985-04-17 | 1988-07-12 | Pitney Bowes Inc. | System for detecting unaccounted for printing in a value printing system |
US4725718A (en) | 1985-08-06 | 1988-02-16 | Pitney Bowes Inc. | Postage and mailing information applying system |
US4873646A (en) | 1985-07-15 | 1989-10-10 | Tektronix, Inc. | Digital Correction of linear system distortion |
US4812994A (en) * | 1985-08-06 | 1989-03-14 | Pitney Bowes Inc. | Postage meter locking system |
US4855920A (en) | 1985-12-26 | 1989-08-08 | Pitney Bowes, Inc. | Postage accounting device |
US4802218A (en) * | 1986-11-26 | 1989-01-31 | Wright Technologies, L.P. | Automated transaction system |
US4873645A (en) | 1987-12-18 | 1989-10-10 | Pitney Bowes, Inc. | Secure postage dispensing system |
US5146403A (en) | 1988-12-13 | 1992-09-08 | Postal Buddy Corporation | Change of address system and method of using same |
US5257196A (en) | 1988-12-13 | 1993-10-26 | Pitney Bowes Inc. | Apparatus and method for the processing of mail |
US4936209A (en) | 1988-12-29 | 1990-06-26 | Pitney Bowes Inc. | Electronic postage meter with zip code location designation |
CH678366A5 (en) | 1989-03-08 | 1991-08-30 | Frama Ag | |
US5128988A (en) | 1990-03-19 | 1992-07-07 | Ameritech Services, Inc. | Telephone-switched network, automatic meter-reading system based upon service address |
JP2915108B2 (en) * | 1990-08-10 | 1999-07-05 | 住友ゴム工業株式会社 | Golf ball |
DE4034292A1 (en) * | 1990-10-25 | 1992-04-30 | Francotyp Postalia Gmbh | METHOD FOR MAILING POSTAGE AND ARRANGEMENT FOR CARRYING IT OUT |
US5239168A (en) | 1991-07-29 | 1993-08-24 | Pitney Bowes Inc. | Postage meter with barcode printing capability |
US5319562A (en) * | 1991-08-22 | 1994-06-07 | Whitehouse Harry T | System and method for purchase and application of postage using personal computer |
DE4213278C2 (en) * | 1992-04-16 | 1998-02-19 | Francotyp Postalia Gmbh | Arrangement for franking mail |
US5699258A (en) | 1992-04-16 | 1997-12-16 | Francotyp-Postalia Ag & Co | Assembly for franking postal matter, and multi-carrier shipping system |
US5491796A (en) | 1992-10-23 | 1996-02-13 | Net Labs, Inc. | Apparatus for remotely managing diverse information network resources |
JPH06284124A (en) | 1993-03-24 | 1994-10-07 | Rooreru Intelligent Syst:Kk | Information transmission system |
US5454038A (en) | 1993-12-06 | 1995-09-26 | Pitney Bowes Inc. | Electronic data interchange postage evidencing system |
DE4344471A1 (en) * | 1993-12-21 | 1995-08-17 | Francotyp Postalia Gmbh | Method and device for generating and checking a security impression |
US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
US5812991A (en) * | 1994-01-03 | 1998-09-22 | E-Stamp Corporation | System and method for retrieving postage credit contained within a portable memory over a computer network |
US5510992A (en) | 1994-01-03 | 1996-04-23 | Post N Mail, L.C. | System and method for automatically printing postage on mail |
US5517567A (en) * | 1994-08-23 | 1996-05-14 | Daq Electronics Inc. | Key distribution system |
DE4447404C2 (en) * | 1994-12-23 | 1998-08-20 | Francotyp Postalia Gmbh | Method for entering data into a balance and arrangement for carrying out the method |
US5602742A (en) * | 1995-01-10 | 1997-02-11 | Solondz; Leonard I. | Postage metering system |
US5812666A (en) | 1995-03-31 | 1998-09-22 | Pitney Bowes Inc. | Cryptographic key management and validation system |
US5826247A (en) | 1996-04-09 | 1998-10-20 | Pitney Bowes Inc. | Closed loop transaction based mail accounting and payment system with carrier payment through a third party initiated by mailing information release |
US5675650A (en) * | 1995-05-02 | 1997-10-07 | Pitney Bowes Inc. | Controlled acceptance mail payment and evidencing system |
US5623546A (en) * | 1995-06-23 | 1997-04-22 | Motorola, Inc. | Encryption method and system for portable data |
US5796841A (en) * | 1995-08-21 | 1998-08-18 | Pitney Bowes Inc. | Secure user certification for electronic commerce employing value metering system |
US5781438A (en) | 1995-12-19 | 1998-07-14 | Pitney Bowes Inc. | Token generation process in an open metering system |
US5742683A (en) * | 1995-12-19 | 1998-04-21 | Pitney Bowes Inc. | System and method for managing multiple users with different privileges in an open metering system |
US5625694A (en) * | 1995-12-19 | 1997-04-29 | Pitney Bowes Inc. | Method of inhibiting token generation in an open metering system |
US6072876A (en) * | 1996-07-26 | 2000-06-06 | Nippon Telegraph And Telephone Corporation | Method and system for depositing private key used in RSA cryptosystem |
US5839119A (en) * | 1996-09-27 | 1998-11-17 | Xerox Corporation | Method of electronic payments that prevents double-spending |
US5822739A (en) | 1996-10-02 | 1998-10-13 | E-Stamp Corporation | System and method for remote postage metering |
US5812401A (en) | 1996-10-02 | 1998-09-22 | Pitney Bowes Inc. | Address verification on a postage meter vault |
US5982896A (en) * | 1996-12-23 | 1999-11-09 | Pitney Bowes Inc. | System and method of verifying cryptographic postage evidencing using a fixed key set |
US5943658A (en) | 1996-12-31 | 1999-08-24 | Pitney Bowes Inc. | Method for automatic determination of origination ZIP code using caller I.D. |
US6005945A (en) | 1997-03-20 | 1999-12-21 | Psi Systems, Inc. | System and method for dispensing postage based on telephonic or web milli-transactions |
WO1998057304A1 (en) * | 1997-06-12 | 1998-12-17 | Pitney Bowes Inc. | Virtual postage meter with secure digital signature device |
US6466921B1 (en) * | 1997-06-13 | 2002-10-15 | Pitney Bowes Inc. | Virtual postage meter with secure digital signature device |
US6085181A (en) | 1997-12-18 | 2000-07-04 | Pitney Bowes Inc. | Postage metering system and method for a stand-alone meter operating as a meter server on a network |
US6061670A (en) | 1997-12-18 | 2000-05-09 | Pitney Bowes Inc. | Multiple registered postage meters |
US6295359B1 (en) | 1998-05-21 | 2001-09-25 | Pitney Bowes Inc. | Method and apparatus for distributing keys to secure devices such as a postage meter |
-
1998
- 1998-06-12 WO PCT/US1998/012276 patent/WO1998057304A1/en active IP Right Grant
- 1998-06-12 AU AU79619/98A patent/AU7961998A/en not_active Abandoned
- 1998-06-12 JP JP50326699A patent/JP4117912B2/en not_active Expired - Fee Related
- 1998-06-12 WO PCT/US1998/012081 patent/WO1998057302A1/en active IP Right Grant
- 1998-06-12 AU AU82566/98A patent/AU8256698A/en not_active Abandoned
- 1998-06-12 WO PCT/US1998/012204 patent/WO1998057303A1/en active IP Right Grant
- 1998-06-12 CN CNB988009935A patent/CN1155917C/en not_active Expired - Fee Related
- 1998-06-12 DE DE69836123T patent/DE69836123T2/en not_active Expired - Lifetime
- 1998-06-12 CN CN98800992.7A patent/CN1131621C/en not_active Expired - Fee Related
- 1998-06-12 EP EP98936805A patent/EP0960394B1/en not_active Expired - Lifetime
- 1998-06-12 CA CA002263415A patent/CA2263415C/en not_active Expired - Fee Related
- 1998-06-12 EP EP98932756A patent/EP0920679A4/en not_active Withdrawn
- 1998-06-12 BR BRPI9805995-5A patent/BR9805995B1/en not_active IP Right Cessation
- 1998-06-12 AU AU79638/98A patent/AU736669B2/en not_active Ceased
- 1998-06-12 CA CA002263437A patent/CA2263437C/en not_active Expired - Fee Related
- 1998-06-12 CA CA002263436A patent/CA2263436C/en not_active Expired - Fee Related
- 1998-06-12 EP EP98936803A patent/EP0966728A4/en not_active Withdrawn
- 1998-06-12 US US09/242,208 patent/US6526391B1/en not_active Expired - Lifetime
- 1998-06-12 AU AU85670/98A patent/AU753214B2/en not_active Ceased
- 1998-06-12 WO PCT/US1998/012385 patent/WO1998057305A1/en not_active Application Discontinuation
- 1998-06-12 CA CA002263131A patent/CA2263131C/en not_active Expired - Fee Related
- 1998-06-12 AU AU82558/98A patent/AU8255898A/en not_active Abandoned
- 1998-06-12 EP EP98930159A patent/EP0925558B1/en not_active Expired - Lifetime
- 1998-06-12 EP EP98932744A patent/EP0925663A4/en not_active Withdrawn
- 1998-06-12 EP EP98930183A patent/EP0931299B1/en not_active Expired - Lifetime
- 1998-06-12 AU AU85672/98A patent/AU8567298A/en not_active Abandoned
- 1998-06-12 BR BR9806225A patent/BR9806225A/en not_active Application Discontinuation
- 1998-06-12 WO PCT/US1998/012206 patent/WO1998057460A1/en active Application Filing
- 1998-06-12 CA CA002264622A patent/CA2264622C/en not_active Expired - Fee Related
- 1998-06-12 DE DE69832685T patent/DE69832685T2/en not_active Expired - Lifetime
- 1998-06-12 DE DE69836375T patent/DE69836375T2/en not_active Expired - Lifetime
- 1998-06-12 JP JP50318399A patent/JP2002501647A/en active Pending
- 1998-06-12 CA CA002263434A patent/CA2263434C/en not_active Expired - Fee Related
- 1998-06-12 WO PCT/US1998/012438 patent/WO1998057306A1/en active IP Right Grant
-
2003
- 2003-01-13 US US10/341,124 patent/US7433849B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4423287A (en) * | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4578530A (en) * | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5163098A (en) * | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
US5526428A (en) * | 1993-12-29 | 1996-06-11 | International Business Machines Corporation | Access control apparatus and method |
US5590198A (en) * | 1995-12-19 | 1996-12-31 | Pitney Bowes Inc. | Open metering system with super password vault access |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6249777B1 (en) * | 1996-10-02 | 2001-06-19 | E-Stamp Corporation | System and method for remote postage metering |
US6889214B1 (en) | 1996-10-02 | 2005-05-03 | Stamps.Com Inc. | Virtual security device |
US6466921B1 (en) * | 1997-06-13 | 2002-10-15 | Pitney Bowes Inc. | Virtual postage meter with secure digital signature device |
US6567794B1 (en) * | 1997-06-13 | 2003-05-20 | Pitney Bowes Inc. | Method for access control in a virtual postage metering system |
US11551211B1 (en) | 1999-06-18 | 2023-01-10 | Stripe, Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US11423400B1 (en) | 1999-06-18 | 2022-08-23 | Stripe, Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US9928509B2 (en) | 1999-06-18 | 2018-03-27 | Cria Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US9864989B2 (en) | 1999-06-18 | 2018-01-09 | Cria Inc. | Method and apparatus for ordering goods, services, and content over an internetwork using a virtual payment account |
US9864990B2 (en) | 1999-06-18 | 2018-01-09 | Cria Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US7251632B1 (en) | 1999-10-18 | 2007-07-31 | Stamps. Com | Machine dependent login for on-line value-bearing item system |
US7752141B1 (en) | 1999-10-18 | 2010-07-06 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
US8027927B2 (en) | 1999-10-18 | 2011-09-27 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
US8041644B2 (en) | 1999-10-18 | 2011-10-18 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
US8301572B2 (en) | 1999-10-18 | 2012-10-30 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
US8498943B2 (en) | 1999-10-18 | 2013-07-30 | Stamps.Com | Secure and recoverable database for on-line value-bearing item system |
US8027926B2 (en) | 1999-10-18 | 2011-09-27 | Stamps.Com | Secure and recoverable database for on-line value-bearing item system |
US10580222B2 (en) | 2000-02-16 | 2020-03-03 | Stamps.Com Inc. | Secure on-line ticketing |
US7689518B2 (en) | 2000-05-05 | 2010-03-30 | Pitney Bowes Inc. | System and method for instant online postage metering |
US7917454B2 (en) | 2000-05-05 | 2011-03-29 | Pitney Bowes Inc. | System and method for instant online postage metering |
US6839691B2 (en) | 2000-05-05 | 2005-01-04 | Pitney Bowes Inc. | Method for acquiring a customer for online postage metering |
US6619544B2 (en) | 2000-05-05 | 2003-09-16 | Pitney Bowes Inc. | System and method for instant online postage metering |
US11037151B1 (en) | 2003-08-19 | 2021-06-15 | Stamps.Com Inc. | System and method for dynamically partitioning a postage evidencing system |
US9779556B1 (en) | 2006-12-27 | 2017-10-03 | Stamps.Com Inc. | System and method for identifying and preventing on-line fraud |
US9965903B2 (en) | 2006-12-27 | 2018-05-08 | Stamps.Com Inc. | Postage metering with accumulated postage |
US11140278B2 (en) | 2006-12-27 | 2021-10-05 | Stamps.Com Inc. | Postage printer |
US10984369B2 (en) | 2006-12-27 | 2021-04-20 | Stamps.Com Inc. | System and method for handling payment errors with respect to delivery services |
US10373398B1 (en) | 2008-02-13 | 2019-08-06 | Stamps.Com Inc. | Systems and methods for distributed activation of postage |
US10424126B2 (en) | 2008-04-15 | 2019-09-24 | Stamps.Com Inc. | Systems and methods for activation of postage indicia at point of sale |
US9978185B1 (en) | 2008-04-15 | 2018-05-22 | Stamps.Com Inc. | Systems and methods for activation of postage indicia at point of sale |
US11074765B1 (en) | 2008-04-15 | 2021-07-27 | Stamps.Com Inc. | Systems and methods for activation of postage indicia at point of sale |
US11893833B1 (en) | 2008-12-24 | 2024-02-06 | Auctane, Inc. | Systems and methods utilizing gravity feed for postage metering |
US10891807B1 (en) | 2008-12-24 | 2021-01-12 | Stamps.Com Inc. | Systems and methods utilizing gravity feed for postage metering |
US11881058B1 (en) | 2010-02-25 | 2024-01-23 | Auctane, Inc. | Systems and methods for providing localized functionality in browser based postage transactions |
US10930088B1 (en) | 2010-02-25 | 2021-02-23 | Stamps.Com Inc. | Systems and methods for providing localized functionality in browser based postage transactions |
US10755224B2 (en) | 2010-02-25 | 2020-08-25 | Stamps.Com Inc. | Systems and methods for rules based shipping |
US10089797B1 (en) | 2010-02-25 | 2018-10-02 | Stamps.Com Inc. | Systems and methods for providing localized functionality in browser based postage transactions |
US10713634B1 (en) | 2011-05-18 | 2020-07-14 | Stamps.Com Inc. | Systems and methods using mobile communication handsets for providing postage |
US11544692B1 (en) | 2011-05-18 | 2023-01-03 | Auctane, Inc. | Systems and methods using mobile communication handsets for providing postage |
US10846650B1 (en) | 2011-11-01 | 2020-11-24 | Stamps.Com Inc. | Perpetual value bearing shipping labels |
US11676097B1 (en) | 2011-11-01 | 2023-06-13 | Auctane, Inc. | Perpetual value bearing shipping labels |
US12072989B2 (en) | 2011-12-09 | 2024-08-27 | Sertainty Corporation | System and methods for using cipher objects to protect data |
US11093623B2 (en) | 2011-12-09 | 2021-08-17 | Sertainty Corporation | System and methods for using cipher objects to protect data |
US10922641B1 (en) | 2012-01-24 | 2021-02-16 | Stamps.Com Inc. | Systems and methods providing known shipper information for shipping indicia |
US11574278B1 (en) | 2012-01-24 | 2023-02-07 | Auctane, Inc. | Systems and methods providing known shipper information for shipping indicia |
US9721225B1 (en) | 2013-10-16 | 2017-08-01 | Stamps.Com Inc. | Systems and methods facilitating shipping services rate resale |
US10628778B1 (en) | 2013-10-16 | 2020-04-21 | Stamps.Com Inc. | Systems and methods facilitating shipping services rate resale |
US11334840B1 (en) | 2013-10-16 | 2022-05-17 | Stamps.Com Inc. | Systems and methods facilitating shipping services rate resale |
US11842419B1 (en) | 2014-04-17 | 2023-12-12 | Auctane, Inc. | Single secure environment session generating multiple indicia |
US11263717B2 (en) | 2014-04-17 | 2022-03-01 | Stamps.Com Inc. | Single secure environment session generating multiple indicia |
US10417728B1 (en) | 2014-04-17 | 2019-09-17 | Stamps.Com Inc. | Single secure environment session generating multiple indicia |
US11386409B2 (en) | 2016-03-04 | 2022-07-12 | Sertintyone Corporation | Systems and methods for media codecs and containers |
US11574280B1 (en) | 2016-03-08 | 2023-02-07 | Auctane, LLC | Concatenated shipping documentation processing spawning intelligent generation subprocesses |
US11282025B1 (en) | 2016-03-08 | 2022-03-22 | Auctane, LLC | Concatenated shipping documentation processing spawning intelligent generation subprocesses |
US10521754B2 (en) | 2016-03-08 | 2019-12-31 | Auctane, LLC | Concatenated shipping documentation processing spawning intelligent generation subprocesses |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2263434C (en) | Method for access control in a virtual postage metering system | |
US6567794B1 (en) | Method for access control in a virtual postage metering system | |
US6466921B1 (en) | Virtual postage meter with secure digital signature device | |
CA2221553C (en) | Method for verifying the expected postage security device and an authorized host system | |
US5812990A (en) | System and method for providing an additional cryptography layer for postage meter refills | |
JP2000030102A (en) | Method for taking out fund from mail security device | |
US7203666B1 (en) | Virtual postage metering system | |
US6260144B1 (en) | Method for verifying the expected postal security device in a postage metering system | |
US6169804B1 (en) | Method for verifying the expected postage security device and its status | |
EP0845760A2 (en) | Method for verifying the expected postage security device in a host system | |
MXPA99001576A (en) | Virtual postage meter with secure digital signature device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AU AZ BA BB BG BR BY CA CN CU CZ EE GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL RO RU SD SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
ENP | Entry into the national phase |
Ref document number: 2263434 Country of ref document: CA Ref country code: CA Ref document number: 2263434 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998932744 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1998932744 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1999503233 Format of ref document f/p: F |