Method and arrangement for generating and checking a security imprint
First Claim
1. A method for verifying data formed by a plurality of characters in an indicium comprising characters readable by an optical character reader, comprising the steps of:
- reading characters in an indicium using an optical character reader;
retrieving a DES key from a database using a vendor identifier and a device identifier;
computing a MAC dependent on said characters read by said optical character reader and said DES key;
identifying an MAC from the characters read by said optical character reader;
comparing the computed MAC with the MAC read from said indicium; and
acknowledging validity of said indicium given identity of the computed MAC and the MAC obtained from the indicium.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for checking a security imprint in a postage meter machine having a microprocessor includes the steps of encoding data for a security mark pixel image and inserts the encoded data into the remaining, fixed and variable pixel image data during printing. The method includes steps for forming a mark symbol sequence from an encoded combination number which is composed of at least a first number (sum of all postage values since the last reloading date), an optional second number added to said first number, a third number (postage value) and a fourth number (of the serial number), and for enabling a check of the security imprint by a postal authority. Manipulations can be recognized using further data stored and/or calculated in a remote data center. An arrangement conducting a for check includes a mark reader composed of a CCD line camera, a D/A converter, a comparator and an encoder which are connected via an input/output unit to an input unit. A communication link can be established between the meter and the data center to evaluate mark data in a computerized manner.
-
Citations
1 Claim
-
1. A method for verifying data formed by a plurality of characters in an indicium comprising characters readable by an optical character reader, comprising the steps of:
-
reading characters in an indicium using an optical character reader; retrieving a DES key from a database using a vendor identifier and a device identifier; computing a MAC dependent on said characters read by said optical character reader and said DES key; identifying an MAC from the characters read by said optical character reader; comparing the computed MAC with the MAC read from said indicium; and acknowledging validity of said indicium given identity of the computed MAC and the MAC obtained from the indicium.
-
Specification