Abstract:
A system for controlling the validity of printing of indicias on mailpieces from a potentially large number of users of postage meters includes apparatus disposed in each said postage meter for generating a code and for printing the code on each mailpiece. The code is an encrypted code representative of the postage meter apparatus printing the indicia and other information uniquely determinative of the legitimacy of postage on the mailpieces. The keys for the code generating apparatus are changed to change its code generation at predetermined time intervals in each of the meters. A security center includes apparatus for maintaining a security code database and for keeping track of the keys for generating security codes in correspondence with the changes in each generating apparatus and the information printed on the mailpiece by the postage meter apparatus for comparison with the code printed on the mailpiece. There may be two codes printed, one used by the Postal Service for its security checks and one by the manufacturer. The encryption key may be changed at predetermined intervals or on a daily basis or for printing each mailpiece.
Abstract:
An item bearing an indicia which verifies a status of the item and a method and apparatus for applying such indicia. The indicia represents an encrypted message and has the form of a number n base N number system represented by characters selected from an unambiguous machine-readable character set having n characters. The characters consist of connected graphs drawn on a predetermined grid and meeting certain selected requirements. A set of descripters is selected, including a number of type 1 and type 3 points in a character and a subset of characters is selected from the set of all possible characters meeting the requirements so that each character is unambiguously described in terms of the selected descripters. In one embodiment disclosed the item is a mail piece and the status is the payment of postage.
Abstract:
An item bearing an indicia which verifies a status of the item and a method and apparatus for applying such indicia. The indicia represents an encrypted message and has the form of a number n base N number system represented by characters selected from an unambiguous machine-readable character set having n characters. The characters consist of connected graphs drawn on a predetermined grid and meeting certain selected requirements. A set of descripters is selected, including a number of type 1 and type 3 points in a character and a subset of characters is selected from the set of all possible characters meeting the requirements so that each character is unambiguously described in terms of the selected descripters. In one embodiment disclosed the item is a mail piece and the status is the payment of postage.
Abstract:
A radiant energy collector is described having a generally scroll-shaped configuration and exhibiting a hemispheric energy acceptance angle. Substantially all diffuse and direct radiant energy which is incident on a reflective surface of the collector is reflected toward an elongated energy conversion means. In one arrangement, the energy conversion means comprises a fluid container in which a transfer fluid is heated. In another arrangement, the energy conversion means comprises means for converting incident radiant energy into electrical energy.
Abstract:
A system for controlling the validity of printing of indicias on mailpieces from a potentially large number of users of postage meters includes apparatus disposed in each said postage meter for generating a code and for printing the code on each mailpiece. The code is an encrypted code representative of the postage meter apparatus printing the indicia and other information uniquely determinative of the legitimacy of postage on the mailpieces. The keys for the code generating apparatus are changed to change its code generation at predetermined time intervals in each of the meters. A security center includes apparatus for maintaining a security code database and for keeping track of the keys for generating security codes in correspondence with the changes in each generating apparatus and the information printed on the mailpiece by the postage meter apparatus for comparison with the code printed on the mailpiece. There may be two codes printed, one used by the Postal Service for its security checks and one by the manufacturer. The encryption key may be changed at predetermined intervals or on a daily basis or for printing each mailpiece.
Abstract:
An item bearing bit-mapped indicia with information encrypted by a public key which verifies a status of the item and a method and apparatus for applying such indicia. The indicia represents an encrypted message and has the form of an array of pixels, each pixel having a value selected from a predetermined set of values in accordance with a mapping of an encrypted message on to the array. Thus, a person having knowledge of the appropriate decryption key may scan the indicia to obtain the message and verify the status by decrypting the message. In one embodiment disclosed, the item is a mail piece and the status is the payment of postage. The indicia may have the form of a binary matrix transformed by matrix multiplication by a corresponding Hadamard matrix and the encrypted message may be encrypted using a public key encryption system.
Abstract:
A process for thinning an image, comprising the steps of defining an image in terms of a plurality of discrete picture elements (pixels), convolving each horizontal string of pixels of the image with itself shifted a predetermined number of pixels, weighting each shifted position of each horizontal string, selecting certain of the pixels of the weighted horizontally convolved pixel strings which correspond to predetermined descriptors, convolving each vertical string of pixels of the image with itself shifted a predetermined number of pixels, weighting each shifted position of each vertical string, selecting certain of the pexels of the weighted vertically convolved pixel strings which correspond to predetermined descriptors, adding thee selected pixels from the weighted vertical and horizontal convolutions and the pixels of the original image, retaining those pixels which are common to the original image and the selected pixels of both the horizontal and vertical weighted convolutions, discarding those pixels which are absent from the original image, filtering those pixels which are common to the original image and the original image and only one of the selected pixels of the horizontal and vertical weighted convolutions, further retaining certain of the filtered pixels and discarding others in accordance with a predetermined filter matrix, and providing an output signal of the retained pixels which represents a thinned image.
Abstract:
A method and apparatus for the representation of binary data. Each bit of binary data corresponds to one of two representations, where each representation is a 3.times.3 array of cells. In a first representation five cells of the array are asserted and four cells are not asserted, and the second representation is complementary to the first representation. In the first representation the asserted cells are the four corner cells and the central cell of the 3.times.3 array. These representations are preferred since they minimize the possibility of long runs of contiguous cells having the same value in an indicia representing a plurality of data bits; which is useful to synchronize scanning of the indicia. An error in the transcription of a data bit is detected by comparison of a nominal representation with the received 3.times.3 array in determining the number of cells which differ between the nominal and the received representations. If the number of cells which differ between the nominal and the received representations is less than five, the received 3.times.3 array is assumed to correspond to the selected nominal representation, otherwise the received array is assumed to correspond to the complementary representation. In one embodiment disclosed, binary data is represented by printing indicia composed of pluralities of such 3.times.3 arrays. In another embodiment disclosed the printed binary data comprises encrypted information printed on an envelope to verify proper payment of postage for that mail piece.
Abstract:
An alphanumeric character is recognized by optically scanning that character, detecting the occurrence of predetermined geographical features in the scanned image, comparing the detected geographical features to a store of particular geographical features which identify respective alphanumeric characters, and identifying the scanned image as the alphanumeric character having those geographical features to which the detected geographical features favorably compare. The aforementioned geographical features comprise lagoons (formed as enclosed areas) and bays (formed as open areas). The types of bays and lagoons, as well as the relative positioning of such bays and lagoons with respect to each other, characterize the respective alphanumeric characters. By detecting the bays and lagoons and relative positions thereof in the scanned image, the identity of that image is ascertained.
Abstract:
A method and apparatus for generating cryptographic keys for a postal manifest and for synchronizing cryptographic keys for transmitting postal data securely on a communication link is presented. The techniques for generating a key and for synchronizing keys use the same apparatus but use slightly different data to create a cryptographic key.The postal data center maintains a unique set of data for each server station. Using this set of data along with a manifest sequence number (or communication transaction number) and the date, a cryptographic key is created. Each server station stores a fixed master key, KO, a permutation table, Pt, and ID, and GMT date. Using the manifest sequence number (or the communication transaction number) a row of the permutation table is altered and the master key KO is scrambled with the permutation table top get a new key K2. With K2, the date, server ID, and manifest sequence number (our communication transaction number) are encrypted. The result of this encryption yields another key K3. K3 is then used for encrypting the postal manifest or for communicating with a postal data center.