Abstract: Methods and systems for a user to receive location-based services for user selected locations while maintaining the privacy of his/her location unless in the vicinity of a user selected location. A user designates selected locations to the LBS provider. The LBS provider digitally signs grid cell identifiers of approved locations and the signatures are stored in the user's mobile device. The mobile device determines the grid cell identifier of its current location, blinds the grid cell identifier, and sends the blinded grid cell identifier to the LBS provider. The LBS provider digitally signs the blinded grid cell identifier, and returns the signature to the mobile device. The mobile device removes the blinding from the blinded signature to obtain the digital signature for the grid cell identifier. The user's mobile device then compares the signature of the grid cell identifier with those stored in its memory to determine whether the user is near any approved locations.
Abstract: A system and methods to provide updates of an oblivious database that is based on an original database without compromising privacy guarantees, and without requiring a periodic downtime to re-initialize the database. According to embodiments of the present invention, update caches are provided at the random servers that are not emptied or sent to the oblivious database after every update in a predictable fashion. Instead, updates are made incrementally to the oblivious database in an order that is independent of how the original database is updated. Hence there is no way for the server to learn which record of the oblivious database corresponds to an updated block from the original database.
Abstract: A method to secure unique information about a handwritten document and to provide verification of document's authenticity, integrity and non-repudiation. The method includes the following steps: creating a document having an area of interest containing information, segmenting the area of interest on the document into a plurality of elements, obtaining the average gray scale of each element, inserting the average gray scale of each element into an identifier, and attaching the identifier to the document.
Abstract: A system and methods that preserve the privacy of personal information of consumers as they seek to take advantage of offers advertised by sellers is provided. A seller can advertise services or benefits with some criteria prospective consumers must satisfy to qualify for such services or benefits. A consumer can make a statement that shows that he or she satisfies the criteria. The requesting party is able to verify the correctness of the statement without being able to learn any additional information about the value of the attributes contained in the statement, other than the information directly implied by the statement. A consumer can be enrolled for the benefit or service after a statement has been successfully verified.
Abstract: Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a removable signature stub positioned on top of a signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and removes the signature stub. The signature is then covered by a label that conceals the signature under normal lighting conditions. To read the signature, light having a predetermined wavelength is directed onto the label, thereby rendering the label transparent and the signature visible.
Abstract: A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion.
Type:
Application
Filed:
June 17, 2014
Publication date:
October 2, 2014
Applicants:
PITNEY BOWES INC., CERTICOM CORP.
Inventors:
Scott Alexander VANSTONE, Robert Philip GALLANT, Robert John LAMBERT, Leon A. PINTSOV, Frederick W. RYAN, JR., Ari SINGER
Abstract: A powder and gel concentrate for a sealing solution is provided. The concentrate is comprised of a biocide, dye and acid buffer. This concentrate can be hydrated or dissolved using standard tap (mineralized) water to produce a sealing solution. The acid buffer keeps the minerals in the tap water suspended in solution, thereby preventing the solid scale (mineral build-up) that would otherwise clog the filters of a sealing system.
Abstract: A low-cost, network based, secure printer that can provide multiple vendors with independent protected access, as authorized by a secure printer authority, is provided. The secure printer authority issues certificates for each secure printer and authorized vendor. Each certificate includes a public key and identification for the respective secure printer or vendor. The certificates are utilized during generation of a secret session key that preferably can be utilized only once to print the requested document. The secret session key is used by the vendor to encrypt the document, and used by the printer to decrypt the document. Since the secret session key is preferably valid for only a single document, printing of the document can only occur once, thereby preventing any fraudulent printing of the document. Additionally, only vendors authorized by the secure printer authority will have the ability to establish session keys with the printer.
Abstract: A system and method for detecting adhesive used to produce an envelope in a mailpiece creation system. The system includes a source of ElectroMagnetic (EM) energy in at least the short UV range to illuminate a surface of the substrate material anticipated to have an adhesive deposited thereon in select regions, an EM energy detection device operative to detect energy reflected from the surface of the substrate material in the visible light range and produce a response indicative of the optical absorbance of EM energy in the short UV range; and a processor operative to analyze the response of the EM energy detection device to determine whether light energy in the visible range is below a threshold level to indicate the presence of adhesive deposited on the substrate material.
Abstract: The present invention includes methods for operating a mailing machine. A permit mail imprint is generated in the mailing machine on the basis of input signals entered into the mailing machine via a user interface of the mailing machine. At least some of the input signals may represent alphanumeric characters. For example, the permit number may be entered via a keypad or keyboard in the form of numeric characters.
Type:
Grant
Filed:
August 12, 2003
Date of Patent:
August 26, 2014
Assignee:
Pitney Bowes Inc.
Inventors:
Steven M. Kaye, Joan T. Doutney, Rodney Hallgren, Beth A. Kroczaleski, Mark D. Lee, Jacky Y. Igval
Abstract: A method and system for selecting an external user interface using spatial information is described. In one configuration the floor space of a mailroom is mapped using a two dimensional grid. At least one machine is located on the mapped grid and an associated control zone is defined for that particular machine. The machine includes a wireless transceiver for providing user interface access. An external portable processor with a wireless transceiver is provided with user interface logic for the machine. A user then moves the external portable processor into the control zone of the machine. An indoor positioning system is utilized to provide relative or absolute position information relating to the machine and the external processor. The system determines that the external processor is in the machine control zone and allows the external processor to function as a user interface for the machine.
Abstract: An edge justification device for a mail processing machine. The device shifts the mailpiece from bottom edge justified to top edge justified. The amount of shift is determined as a function of the height of the mail piece. One embodiment solves the problem of switching from bottom to top registration by having a series of steerable nips, which are arranged in line, parallel to the mail flow direction. As the mail piece travels though the justifier, the nips will rotate to impart a lateral velocity to the mail piece, shifting it over to properly justify it. In a further embodiment, the nips of the justification device are not steerable. Rather, a whole nip assembly that is transporting the mail piece is moved laterally to switch from bottom to top justification.
Abstract: A method for producing a continuous web of printed material for use in creating mailpieces. The continuous web has a width and a length, the length comprised of a series of attached sheets. The series of attached sheets are comprising envelope sheets and rectangular content pages. The content pages are rectangular in shape and may be oriented relative to the envelope sheets in a number of different configurations. In some configurations, two sets of content pages and/or envelope sheets can be printed across the width of the web. Sheets for forming business return envelopes may be printed in series with the content pages and envelope sheets. BREs may include individualized return addresses. A control code may be printed on one or more of the sheets for a given mailpiece, providing information for controlling assembly of the mailpiece.
Type:
Grant
Filed:
March 11, 2010
Date of Patent:
August 12, 2014
Assignee:
Pitney Bowes Inc.
Inventors:
Denis J. Stemmle, Clare E. Woodman, John W. Sussmeier, Michael J. Cummings
Abstract: Systems and methods for providing geodemographic analyses using a unique weighting, centering and scaling approach for intensive variables is provided in a principal components analysis. The system may use an extensive variable as a size parameter that is appropriate for the particular geodemographic application. Additionally, a sizing function may be applied to the determined principal components before a clustering analysis.
Abstract: An electronic bill presentment and payment system including an extensible, customizable, data source independent data layer for accessing a business data repository. The business data includes different data source formats. A business logic module generates business data requests for processing. The business data requests are independent of the one or more data source formats of the business data repository. A data layer is generated from the customizable descriptors in a data layer descriptor repository. The data layer implements a data source specific method for fulfilling the request by accessing data in the business data repository. The data layer descriptor repository preferably includes top-level listings of data sources in the system and customized data source specifications for the each of the data sources listed in the customized set of data sources.
Abstract: A method includes feeding an envelope along an envelope transport path in a paper-handling machine to a flap-opening station. The method further includes opening the flap of the envelope at the flap-opening station and printing on the envelope with the flap in an open position. After printing, a collation is inserted into the envelope.
Abstract: A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination.
Type:
Grant
Filed:
March 15, 2012
Date of Patent:
July 29, 2014
Assignees:
Certicom Corp., Pitney Bowes Inc.
Inventors:
Scott Alexander Vanstone, Robert Gallant, Robert J. Lambert, Leon A. Pintsov, Frederick W. Ryan, Jr., Ari Singer
Abstract: Systems and methods for optimizing the process of digitizing and delivering physical mail based upon selective scanning are described and in certain illustrative examples, an intelligent agent computer system is employed for making selective scanning decisions in the process of digitizing and delivering physical mail.
Type:
Grant
Filed:
December 29, 2006
Date of Patent:
July 29, 2014
Assignee:
Pitney Bowes Inc.
Inventors:
Arthur J. Parkos, Paul P. Carella, Ronald P. Sansone, Chao Chen
Abstract: Systems and methods for providing a simultaneous voice and data user interface for secure catalog orders and in particular for providing a system and method for providing a distributed voice user interface for a remote device having a limited visual user interface simultaneously with a data stream for facilitating secure automated catalog orders for simultaneous electronic fulfillment applied to that device are described.
Type:
Grant
Filed:
March 19, 2012
Date of Patent:
July 15, 2014
Assignee:
Pitney Bowes Inc.
Inventors:
Jeffrey D. Pierce, G. Jonathan Wolfman, Luu T. Pham, Thomas J. Foth, George M. Macdonald
Abstract: Systems and methods for utilizing a digital mailbox to provide additional services with regard to physical mail are provided. A more efficient process for verification of address uses a corresponding digital mailbox to first identify potentially misdirected mailpieces before incurring the expense of a third party address record search. Additionally the system provides notifications related to physical mailpieces using a digital mailbox.
Type:
Application
Filed:
December 28, 2012
Publication date:
July 3, 2014
Applicant:
PITNEY BOWES INC.
Inventors:
Yassir Nawaz, Frederick W. Ryan, JR., Femi Olumofin