WO2003065314A1 - Postage metering system - Google Patents

Postage metering system Download PDF

Info

Publication number
WO2003065314A1
WO2003065314A1 PCT/GB2003/000395 GB0300395W WO03065314A1 WO 2003065314 A1 WO2003065314 A1 WO 2003065314A1 GB 0300395 W GB0300395 W GB 0300395W WO 03065314 A1 WO03065314 A1 WO 03065314A1
Authority
WO
WIPO (PCT)
Prior art keywords
operating code
input
security module
accounting
postage
Prior art date
Application number
PCT/GB2003/000395
Other languages
French (fr)
Inventor
William James Herring
Original Assignee
Neopost Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neopost Limited filed Critical Neopost Limited
Priority to US10/503,178 priority Critical patent/US7273164B2/en
Priority to EP03706677A priority patent/EP1472655A1/en
Publication of WO2003065314A1 publication Critical patent/WO2003065314A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00016Relations between apparatus, e.g. franking machine at customer or apparatus at post office, in a franking system
    • G07B17/0008Communication details outside or between apparatus
    • G07B2017/00153Communication details outside or between apparatus for sending information
    • G07B2017/00169Communication details outside or between apparatus for sending information from a franking apparatus, e.g. for verifying accounting
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00314Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
    • G07B2017/00338Error detection or handling
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • G07B2017/00935Passwords
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • G07B2017/00959Cryptographic modules, e.g. a PC encryption board
    • G07B2017/00967PSD [Postal Security Device] as defined by the USPS [US Postal Service]

Definitions

  • the present invention relates to the security of a postage metering system, and in particular a postage metering system which requires the input of an operating code prior to printing indicia, and more particularly the input of a valid operating code prior to printing indicia.
  • the present invention provides a postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match, deny use of the system and one or both of log data relating to such attempted use and report such attempted use to a security center.
  • the security module includes a memory for storing the at least one valid operating code.
  • the at least one valid operating code comprises a personal identification number.
  • the security module includes a memory for storing a data record of such attempted use.
  • the reporting occurs automatically in response to such attempted use.
  • the present invention provides a postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match and printing of an indicium is requested, cause the printer in a printing operation to print an indicium having a zero postage value and one or both of log data relating to such printing operations and report such operation to a security center.
  • the security module includes a memory for storing the at least one valid operating code.
  • the at least one valid operating code comprises a personal identification number.
  • the accounting module is operative to account for postage value even when an invalid operating code has been input and the postage value applied to a mail item is at zero value.
  • the security module includes a memory for storing a data record of such printing operations.
  • reporting occurs automatically in response to any such printing operation.
  • the reporting occurs at intervals.
  • the present invention provides a postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match, one or both of log data relating to such use and report such use to a security center.
  • the security module is configured one or both of to log data relating to such use and report such use to a security center when printing of an indicium is requested.
  • the security module includes a memory for storing the at least one valid operating code.
  • the at least one valid operating code comprises a personal identification number.
  • the security module includes a memory for storing a data record of such use.
  • reporting occurs automatically in response to any such use.
  • the reporting occurs at intervals.
  • Figure 1 diagrammatically illustrates a postage metering system in accordance with a preferred embodiment of the present invention.
  • the postage metering system comprises a microprocessor 3, a read-only memory (ROM) 5 storing program routines for operation of the microprocessor 3, and a random- access memory (RAM) 7 for use as a working store for the temporary storage of data during operation of the system.
  • the system further comprises an accounting module 9 for accounting for postage value applied to mail items.
  • the accounting module 9 comprises duplicated non-volatile memories (NVMs) 11, 13 for storing accounting data relating to the dispensing of postage value, as applied to mail items, which is required to be retained even when the system is not powered.
  • the NVMs 11, 13 each include inter alia an ascending tote register which represents the accumulated total of the postage value applied by the system in its lifetime, an item count register which represents the total number of mail items to which postage value has been applied by the system in its lifetime, a large items register which represents the total number of mail items to which a postage value in excess of a predetermined value has been applied by the system in its lifetime, a zero-value items register which represents the total number of mail items to which a zero-value postage value has been applied by the system in its lifetime, and a descending credit register which represents the value of credit which is available by the system.
  • the NVMs 11, 13 could include an ascending credit register instead of a descending credit register.
  • the system further comprises a security module 15 for requiring the input of an operating code, in this embodiment a security code, prior to the printing of indicia.
  • an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code
  • use of the system is denied and such attempted use is logged for subsequent analysis.
  • such attempted use is, additionally or alternatively, reported to a security center 21, as will be described in more detail hereinbelow. This reporting can occur automatically, at intervals, such as daily, or on request. Such reporting enables attempted use to be analysed, and, if desired, allow for intervention, particularly where attempted use is frequent in a short period, such as when a person may be attempting to determine the valid operating code through repeated attempted use.
  • This reporting can occur automatically, at intervals, such as daily, or on request. Such reporting enables such use to be analysed, and, if desired, allows for intervention.
  • information is obtained as regards each operation, for example, information as to class, weight, destination, etc which can be utilised in analysing the fraudulent use.
  • the security module 15 comprises a non- volatile memory (NVM) 17 for storing valid operating codes against which operating codes input by users are to be compared.
  • NVM non- volatile memory
  • the system is configured such that valid operating codes can be programmed in the NVM 17 when operated in a supervisor mode.
  • the valid operating codes in the NVM 17 can be factory set.
  • the security module 15 further comprises a first random-access memory (RAM) 19 for storing the operating code which is input by a user and is subsequently compared to the valid operating codes stored in the NVM 17.
  • RAM random-access memory
  • the security module 15 further comprises a second random-access memory (RAM) 20 for storing data, in one mode relating to entry of an invalid operating code, and in other modes relating to any use performed when an invalid operating code has been entered by a user.
  • RAM random-access memory
  • the security module 15 is connected, here by a communications link, to a remote security center 21, such as to allow for downloading of records for analysis, and in addition, or alternatively, provide a report of any use or attempted use to the security center 21.
  • a report can be communicated at each instance.
  • communication can be at intervals, for example, hourly, daily or weekly.
  • the operating codes are machine-related codes.
  • the operating codes could comprise personal identification numbers (PINs), such that each user has a unique operating code.
  • microprocessor 3 the ROM 5, the RAM 7, the accounting module 9 and the security module 15 are all housed in a secure housing 22.
  • the system further comprises a display 23 for displaying information, a keyboard 24 for inputting information, and a printer 25 for printing indicia on mail items.
  • a user In operation, a user is first required to enter an operating code via the keyboard 24. Where a valid operating code is entered by a user, the system operates normally and indicia of any postage value can be applied to mail items.
  • an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code
  • the system remains inoperable and logs such attempted use for subsequent analysis.
  • such attempted use is, additionally or alternatively, reported to a security center 21.
  • Such reporting enables attempted access to be analysed, and, if desired, allows for intervention, particularly where attempted access is frequent, such as when a person may be attempting to determine the valid operating code through repeated attempted use.
  • an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code
  • the system operates normally, in the sense that indicia can be printed and the accounting module 9 performs the usual accounting functions, but the postage value applied to mail items is at zero value and such use is logged for subsequent analysis.
  • such use is, additionally or alternatively, reported to a security center 21.
  • Such reporting enables such use to be analysed, and, if desired, allows for intervention.
  • information is obtained as regards each operation, for example, information as to class, weight, destination, etc which can be utilised in analysing the fraudulent use.
  • an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code
  • the system operates normally, in the sense that indicia can be printed normally and the accounting module 9 performs the usual accounting functions, but such use is logged for subsequent analysis.
  • such use is, additionally or alternatively, reported to a security center 21.
  • Such reporting enables such use to be analysed, and, if desired, allows for intervention, in one embodiment immediately.
  • information is obtained as regards each operation, for example, information as to class, weight, destination, etc which can be utilised in analysing the fraudulent use.
  • This mode of operation in particular allows habitual fraudulent use to be detected, as a user, who perceives that he/she has unfettered access, will likely habitually use the postage metering system.

Abstract

A postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match, one or both of log data relating to such use and report such use to a security center.

Description

POSTAGE METERING SYSTEM
The present invention relates to the security of a postage metering system, and in particular a postage metering system which requires the input of an operating code prior to printing indicia, and more particularly the input of a valid operating code prior to printing indicia.
It is an aim of the present invention to provide a postage metering system which provides for improved or at least alternative security.
In one aspect the present invention provides a postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match, deny use of the system and one or both of log data relating to such attempted use and report such attempted use to a security center.
Preferably, the security module includes a memory for storing the at least one valid operating code.
Preferably, the at least one valid operating code comprises a personal identification number.
Preferably, the security module includes a memory for storing a data record of such attempted use.
In one embodiment the reporting occurs automatically in response to such attempted use.
In another embodiment the reporting occurs at intervals. In another aspect the present invention provides a postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match and printing of an indicium is requested, cause the printer in a printing operation to print an indicium having a zero postage value and one or both of log data relating to such printing operations and report such operation to a security center.
Preferably, the security module includes a memory for storing the at least one valid operating code.
Preferably, the at least one valid operating code comprises a personal identification number.
Preferably, the accounting module is operative to account for postage value even when an invalid operating code has been input and the postage value applied to a mail item is at zero value.
Preferably, the security module includes a memory for storing a data record of such printing operations.
In one embodiment the reporting occurs automatically in response to any such printing operation.
In another embodiment the reporting occurs at intervals.
In a further aspect the present invention provides a postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match, one or both of log data relating to such use and report such use to a security center.
Preferably, the security module is configured one or both of to log data relating to such use and report such use to a security center when printing of an indicium is requested.
Preferably, the security module includes a memory for storing the at least one valid operating code.
Preferably, the at least one valid operating code comprises a personal identification number.
Preferably, the security module includes a memory for storing a data record of such use.
In one embodiment the reporting occurs automatically in response to any such use.
In another embodiment the reporting occurs at intervals.
Preferred embodiments of the present invention will now be described hereinbelow by way of example only with reference to the accompanying drawing, in which:
Figure 1 diagrammatically illustrates a postage metering system in accordance with a preferred embodiment of the present invention.
The postage metering system comprises a microprocessor 3, a read-only memory (ROM) 5 storing program routines for operation of the microprocessor 3, and a random- access memory (RAM) 7 for use as a working store for the temporary storage of data during operation of the system. The system further comprises an accounting module 9 for accounting for postage value applied to mail items. The accounting module 9 comprises duplicated non-volatile memories (NVMs) 11, 13 for storing accounting data relating to the dispensing of postage value, as applied to mail items, which is required to be retained even when the system is not powered. In this embodiment the NVMs 11, 13 each include inter alia an ascending tote register which represents the accumulated total of the postage value applied by the system in its lifetime, an item count register which represents the total number of mail items to which postage value has been applied by the system in its lifetime, a large items register which represents the total number of mail items to which a postage value in excess of a predetermined value has been applied by the system in its lifetime, a zero-value items register which represents the total number of mail items to which a zero-value postage value has been applied by the system in its lifetime, and a descending credit register which represents the value of credit which is available by the system. In an alternative embodiment the NVMs 11, 13 could include an ascending credit register instead of a descending credit register. By including a zero- value register which registers the number of zero-value imprints, the system can be interrogated to determine the frequency of attempted fraud.
The system further comprises a security module 15 for requiring the input of an operating code, in this embodiment a security code, prior to the printing of indicia.
Where a valid operating code is entered by a user, that is, where the input operating code matches a stored operating code, the system operates normally and indicia of any postage value can be applied to mail items.
In one mode, where an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code, use of the system is denied and such attempted use is logged for subsequent analysis. In another embodiment such attempted use is, additionally or alternatively, reported to a security center 21, as will be described in more detail hereinbelow. This reporting can occur automatically, at intervals, such as daily, or on request. Such reporting enables attempted use to be analysed, and, if desired, allow for intervention, particularly where attempted use is frequent in a short period, such as when a person may be attempting to determine the valid operating code through repeated attempted use.
In another mode, where an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code, the system operates normally, in the sense that indicia can be printed and the accounting module 9 performs the usual accounting functions, but the postage value applied to mail items is at zero value and such use is logged for subsequent analysis. In this way, where an invalid operating code is input by a user, the postage indicia obtainable from the system are ineffective as the postage value is a zero postage value, and there is no loss of credit as the postage value is a zero value. In one embodiment such use is, additionally or alternatively, reported to a security center 21, as will be described in more detail hereinbelow. This reporting can occur automatically, at intervals, such as daily, or on request. Such reporting enables such use to be analysed, and, if desired, allows for intervention. In allowing for the operation of the system, albeit with postage indicia at zero value, information is obtained as regards each operation, for example, information as to class, weight, destination, etc which can be utilised in analysing the fraudulent use.
In a further mode, where an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code, the system operates normally, in the sense that indicia can be printed and the accounting module 9 performs the usual accounting functions, but such use is logged for subsequent analysis. In this way, the user perceives that his/her fraudulent use is going undetected, when, in fact, the use is being logged for subsequent forensic analysis. In one embodiment such use is, additionally or alternatively, reported to a security center 21, as will be described in more detail hereinbelow. This reporting can occur automatically, at intervals, such as daily, or on request. Such reporting enables such use to be analysed, and, if desired, allows for intervention, in one embodiment immediately. In allowing for the operation of the system, information is obtained as regards each operation, for example, information as to class, weight, destination, etc which can be utilised in analysing the fraudulent use. The security module 15 comprises a non- volatile memory (NVM) 17 for storing valid operating codes against which operating codes input by users are to be compared. In this embodiment the system is configured such that valid operating codes can be programmed in the NVM 17 when operated in a supervisor mode. In an alternative embodiment the valid operating codes in the NVM 17 can be factory set.
The security module 15 further comprises a first random-access memory (RAM) 19 for storing the operating code which is input by a user and is subsequently compared to the valid operating codes stored in the NVM 17.
The security module 15 further comprises a second random-access memory (RAM) 20 for storing data, in one mode relating to entry of an invalid operating code, and in other modes relating to any use performed when an invalid operating code has been entered by a user.
In this embodiment the security module 15 is connected, here by a communications link, to a remote security center 21, such as to allow for downloading of records for analysis, and in addition, or alternatively, provide a report of any use or attempted use to the security center 21. In one embodiment a report can be communicated at each instance. In another embodiment communication can be at intervals, for example, hourly, daily or weekly.
In this embodiment the operating codes are machine-related codes. In an alternative embodiment the operating codes could comprise personal identification numbers (PINs), such that each user has a unique operating code.
In this embodiment the microprocessor 3, the ROM 5, the RAM 7, the accounting module 9 and the security module 15 are all housed in a secure housing 22.
The system further comprises a display 23 for displaying information, a keyboard 24 for inputting information, and a printer 25 for printing indicia on mail items.
In operation, a user is first required to enter an operating code via the keyboard 24. Where a valid operating code is entered by a user, the system operates normally and indicia of any postage value can be applied to mail items.
In one mode, where an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code, the system remains inoperable and logs such attempted use for subsequent analysis. In one embodiment such attempted use is, additionally or alternatively, reported to a security center 21. Such reporting enables attempted access to be analysed, and, if desired, allows for intervention, particularly where attempted access is frequent, such as when a person may be attempting to determine the valid operating code through repeated attempted use.
In another mode, where an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code, the system operates normally, in the sense that indicia can be printed and the accounting module 9 performs the usual accounting functions, but the postage value applied to mail items is at zero value and such use is logged for subsequent analysis. In one embodiment such use is, additionally or alternatively, reported to a security center 21. Such reporting enables such use to be analysed, and, if desired, allows for intervention. In allowing for the operation of the system, albeit with postage indicia at zero value, information is obtained as regards each operation, for example, information as to class, weight, destination, etc which can be utilised in analysing the fraudulent use.
In a further mode, where an invalid operating code is input by a user, that is, where the input operating code does not match a stored operating code, the system operates normally, in the sense that indicia can be printed normally and the accounting module 9 performs the usual accounting functions, but such use is logged for subsequent analysis. In one embodiment such use is, additionally or alternatively, reported to a security center 21. Such reporting enables such use to be analysed, and, if desired, allows for intervention, in one embodiment immediately. In allowing for the operation of the system, information is obtained as regards each operation, for example, information as to class, weight, destination, etc which can be utilised in analysing the fraudulent use. This mode of operation in particular allows habitual fraudulent use to be detected, as a user, who perceives that he/she has unfettered access, will likely habitually use the postage metering system.
Finally, it will be understood that the present invention has been described in its preferred embodiments and can be modified in many different ways without departing from the scope of the invention as defined by the appended claims.

Claims

1. A postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match, deny use of the system and one or both of log data relating to such attempted use and report such attempted use to a security center.
2. The system of claim 1, wherein the security module includes a memory for storing the at least one valid operating code.
3. The system of claim 1 or 2, wherein the at least one valid operating code comprises a personal identification number.
4. The system of any of claims 1 to 3, wherein the security module includes a memory for storing a data record of such attempted use.
5. The system of any of claims 1 to 4, wherein the reporting occurs automatically in response to such attempted use.
6. The system of any of claims 1 to 4, wherein the reporting occurs at intervals.
7. A postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match and printing of an indicium is requested, cause the printer in a printing operation to print an indicium having a zero postage value and one or both of log data relating to such printing operations and report such operation to a security center.
I. The system of claim 7, wherein the security module includes a memory for storing the at least one valid operating code.
9. The system of claim 7 or 8, wherein the at least one valid operating code comprises a personal identification number.
10. The system of any of claims 7 to 9, wherein the accounting module is operative to account for postage value even when an invalid operating code has been input and the postage value applied to a mail item is at zero value.
11. The system of any of claims 7 to 10, wherein the security module includes a memory for storing a data record of such printing operations.
12. The system of any of claims 7 to 11, wherein the reporting occurs automatically in response to any such printing operation.
13. The system of any of claims 7 to 11, wherein the reporting occurs at intervals.
14. A postage metering system for applying indicia including postage value on mail items, the system including: a keyboard for inputting information; a printer for printing indicia; an accounting module for accounting for postage value applied to mail items; and a security module for requiring a user to input an operating code prior to further operation of the system, the security module being configured to compare the input operating code with at least one stored valid operating code, and, where the input operating code and any stored operating code do not match, one or both of log data relating to such use and report such use to a security center.
15. The system of claim 14, wherein the security module is configured one or both of to log data relating to such use and report such use to a security center when printing of an indicium is requested.
16. The system of claim 14 or 15, wherein the security module includes a memory for storing the at least one valid operating code.
17. The system of any of claims 14 to 16, wherein the at least one valid operating code comprises a personal identification number.
18. The system of any of claims 14 to 17, wherein the security module includes a memory for storing a data record of such use.
19. The system of any of claims 14 to 18, wherein the reporting occurs automatically in response to any such use.
20. The system of any of claims 14 to 18, wherein the reporting occurs at intervals.
PCT/GB2003/000395 2002-01-31 2003-01-31 Postage metering system WO2003065314A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/503,178 US7273164B2 (en) 2002-01-31 2003-01-31 Postage metering system
EP03706677A EP1472655A1 (en) 2002-01-31 2003-01-31 Postage metering system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0202269.7 2002-01-31
GBGB0202269.7A GB0202269D0 (en) 2002-01-31 2002-01-31 Postage meter security

Publications (1)

Publication Number Publication Date
WO2003065314A1 true WO2003065314A1 (en) 2003-08-07

Family

ID=9930144

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/GB2003/000389 WO2003065313A2 (en) 2002-01-31 2003-01-31 Postage metering system
PCT/GB2003/000395 WO2003065314A1 (en) 2002-01-31 2003-01-31 Postage metering system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/GB2003/000389 WO2003065313A2 (en) 2002-01-31 2003-01-31 Postage metering system

Country Status (4)

Country Link
US (2) US7216804B2 (en)
EP (2) EP1472655A1 (en)
GB (1) GB0202269D0 (en)
WO (2) WO2003065313A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9745799B2 (en) 2001-08-19 2017-08-29 Smart Drilling And Completion, Inc. Mud motor assembly
US9051781B2 (en) 2009-08-13 2015-06-09 Smart Drilling And Completion, Inc. Mud motor assembly
GB0202269D0 (en) * 2002-01-31 2002-03-20 Neopost Ltd Postage meter security
KR101243299B1 (en) * 2009-08-10 2013-03-13 한국전자통신연구원 Apparatus for accepting unmanned mail and method thereof and apparatus for managing data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812965A (en) * 1985-08-06 1989-03-14 Pitney Bowes Inc. Remote postage meter insepction system
US5613007A (en) * 1994-11-30 1997-03-18 Pitney Bowes Inc. Portable thermal printing apparatus including a security device for detecting attempted unauthorized access
EP0782110A2 (en) * 1995-12-19 1997-07-02 Pitney Bowes Inc. System and method for managing multiple users with different privileges in an open metering system
US20020010688A1 (en) * 1998-07-24 2002-01-24 Chandrakant J. Shah Method and apparatus for performing automated fraud reporting

Family Cites Families (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4484307A (en) * 1979-05-09 1984-11-20 F.M.E. Corporation Electronic postage meter having improved security and fault tolerance features
US4629871A (en) * 1979-12-28 1986-12-16 Pitney Bowes, Inc. Electronic postage meter system settable by means of a remotely generated input device
US4506344A (en) * 1982-06-04 1985-03-19 Pitney Bowes Inc. Hand held electronic postage meter having secure postage meter doors
CA1263752A (en) 1985-08-06 1989-12-05 Michael P. Taylor Postage meter locking system
US4812994A (en) * 1985-08-06 1989-03-14 Pitney Bowes Inc. Postage meter locking system
US4962459A (en) * 1985-12-26 1990-10-09 Mallozzi Joseph D System for accounting for postage expended by a postage meter having data security during printing
US4780835A (en) * 1985-12-26 1988-10-25 Pitney Bowes Inc. System for detecting tampering with a postage value accounting unit
US5369401A (en) * 1989-03-23 1994-11-29 F.M.E. Corporation Remote meter operation
US20010027448A1 (en) * 1992-09-29 2001-10-04 Ascom Hasler Mailing System Ag Tamper-resistant postage meter
US5452654A (en) * 1993-07-13 1995-09-26 Pitney Bowes Inc. Postage metering system with short paid mail deterrence
DE4344476A1 (en) * 1993-12-21 1995-06-22 Francotyp Postalia Gmbh Process for improving the security of franking machines
DE4344471A1 (en) * 1993-12-21 1995-08-17 Francotyp Postalia Gmbh Method and device for generating and checking a security impression
US5796834A (en) 1994-01-03 1998-08-18 E-Stamp Corporation System and method for controlling the dispensing of an authenticating indicia
US5812991A (en) * 1994-01-03 1998-09-22 E-Stamp Corporation System and method for retrieving postage credit contained within a portable memory over a computer network
US5602742A (en) * 1995-01-10 1997-02-11 Solondz; Leonard I. Postage metering system
US6671813B2 (en) * 1995-06-07 2003-12-30 Stamps.Com, Inc. Secure on-line PC postage metering system
US5812536A (en) * 1995-07-05 1998-09-22 Pitney Bowes Inc. Secure accounting system employing RF communications for enhanced security and functionality
US5984174A (en) * 1995-10-20 1999-11-16 Kabushiki Kaisha Toshiba Method of printing bar codes on pieces to deliver, and method and system for encoding and decoding bar codes
US5822738A (en) * 1995-11-22 1998-10-13 F.M.E. Corporation Method and apparatus for a modular postage accounting system
US5585613A (en) * 1995-11-24 1996-12-17 Pitney Bowes Inc. Postage metering apparatus including means for guarding against printing a postage value without accouting therefor
US6587843B1 (en) * 1995-12-15 2003-07-01 Francotyp-Postalia Ag & Co. Method for improving the security of postage meter machines in the transfer of credit
US5923762A (en) * 1995-12-27 1999-07-13 Pitney Bowes Inc. Method and apparatus for ensuring debiting in a postage meter prior to its printing a postal indicia
GB9601946D0 (en) * 1996-01-31 1996-04-03 Neopost Ltd Postage metering system
US6002095A (en) * 1996-05-07 1999-12-14 Pitney Bowes Inc. Selective printing of postnet barcode for inserting system
GB9609614D0 (en) * 1996-05-08 1996-07-10 Neopost Ltd Postage meter
US5745887A (en) * 1996-08-23 1998-04-28 Pitney Bowes Inc. Method and apparatus for remotely changing security features of a postage meter
DE19711998A1 (en) * 1997-03-13 1998-09-17 Francotyp Postalia Gmbh Mail processing system with a printing machine base station controlled by a personal computer
US6039257A (en) * 1997-04-28 2000-03-21 Pitney Bowes Inc. Postage metering system that utilizes secure invisible bar codes for postal verification
US6466921B1 (en) * 1997-06-13 2002-10-15 Pitney Bowes Inc. Virtual postage meter with secure digital signature device
US6546377B1 (en) * 1997-06-13 2003-04-08 Pitney Bowes Inc. Virtual postage meter with multiple origins of deposit
JP4117912B2 (en) * 1997-06-13 2008-07-16 ピットニイ ボウズ インコーポレイテッド Virtual postage meter with secure digital signature device
US6424954B1 (en) * 1998-02-17 2002-07-23 Neopost Inc. Postage metering system
EP1226554A1 (en) 1999-10-18 2002-07-31 Stamps.Com Postal system intranet and commerce processing for on-line value bearing system
US6865560B1 (en) * 1999-12-28 2005-03-08 Pitney Bowes Inc. Method and system for reporting carrier delivery status to a mailer
US6438530B1 (en) * 1999-12-29 2002-08-20 Pitney Bowes Inc. Software based stamp dispenser
DE10003310A1 (en) * 2000-01-27 2001-08-02 Francotyp Postalia Gmbh Mail franking machine has security code for calculating postage charge data de-activated upon transfer of false security code for preventing further operation of franking machine
US7257542B2 (en) * 2000-02-16 2007-08-14 Stamps.Com Secure on-line ticketing
DE10011192A1 (en) * 2000-03-08 2001-09-13 Francotyp Postalia Gmbh Franking machine with secured print head
AU2001259478A1 (en) * 2000-05-05 2001-11-20 Pitney-Bowes Inc. System and method for instant online postage metering
US6839691B2 (en) * 2000-05-05 2005-01-04 Pitney Bowes Inc. Method for acquiring a customer for online postage metering
DE10023145A1 (en) * 2000-05-12 2001-11-15 Francotyp Postalia Gmbh Postage meter and method for releasing a postage meter
US8527284B2 (en) * 2000-09-29 2013-09-03 Escher Group Limited System for personal mail piece tracking and tracing from multiple sources by user identifier
US6865558B1 (en) * 2000-10-05 2005-03-08 Pitney Bowes Inc. Postage metering system having third party payment capability
US7143068B2 (en) * 2000-12-04 2006-11-28 Pitney Bowes Inc. Remote postage meter resetting system having rebate generating capabilities
GB0202269D0 (en) * 2002-01-31 2002-03-20 Neopost Ltd Postage meter security
AU2003275993A1 (en) * 2002-09-26 2004-04-19 Neopost Industrie Sa Item handling system and method
US7840492B2 (en) * 2002-12-30 2010-11-23 Pitney Bowes Inc. Personal funds metering system and method
FR2865830B1 (en) * 2004-01-30 2006-05-19 Neopost Ind SECURED EXTERNAL PRINT MODE MAIL POSTAGE SYSTEM
US7433492B2 (en) * 2004-07-23 2008-10-07 Pitney Bowes Inc. Method and system for reducing ink consumption required for printing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812965A (en) * 1985-08-06 1989-03-14 Pitney Bowes Inc. Remote postage meter insepction system
US5613007A (en) * 1994-11-30 1997-03-18 Pitney Bowes Inc. Portable thermal printing apparatus including a security device for detecting attempted unauthorized access
EP0782110A2 (en) * 1995-12-19 1997-07-02 Pitney Bowes Inc. System and method for managing multiple users with different privileges in an open metering system
US20020010688A1 (en) * 1998-07-24 2002-01-24 Chandrakant J. Shah Method and apparatus for performing automated fraud reporting

Also Published As

Publication number Publication date
WO2003065313A2 (en) 2003-08-07
GB0202269D0 (en) 2002-03-20
US20060000883A1 (en) 2006-01-05
EP1479047A2 (en) 2004-11-24
WO2003065313A3 (en) 2003-11-27
EP1472655A1 (en) 2004-11-03
US7216804B2 (en) 2007-05-15
US20060032910A1 (en) 2006-02-16
US7273164B2 (en) 2007-09-25

Similar Documents

Publication Publication Date Title
US5107455A (en) Remote meter i/o configuration
US4980542A (en) Postal charge accounting system
US7962423B2 (en) Method and system for dispensing virtual stamps
CA2193024C (en) System and method for managing multiple users with different privileges in an open metering system
US5111030A (en) Postal charge accounting system
US4812994A (en) Postage meter locking system
US5774554A (en) Postage meter system and verification of postage charges
US6308165B1 (en) Method of and apparatus for generating and authenticating postal indicia
EP0788078A2 (en) Postage metering system
US6649849B2 (en) Handheld mailing system
ES2343926T3 (en) SYSTEM AND METHOD OF POSTAGE MEASUREMENT FOR A CLOSED SYSTEM NETWORK.
JP2705963B2 (en) Postage accounting system
US6148292A (en) Method for statistics mode reloading and for statistical acquisition according to statistics classes in the storing of a dataset
AU2002330240A1 (en) Method and system for dispensing virtual stamps
US5365044A (en) Postage meter strip printing machine
CA1263752A (en) Postage meter locking system
EP1417609B1 (en) Method for reissuing indicium in a postage metering system
WO2003065314A1 (en) Postage metering system
US20040243523A1 (en) Mail item printing station, and mail item handling system and method
US5613007A (en) Portable thermal printing apparatus including a security device for detecting attempted unauthorized access

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2003706677

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003706677

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2006000883

Country of ref document: US

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 10503178

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 10503178

Country of ref document: US