Cryptographic module for secure processing of value-bearing items
First Claim
1. A security system for secure printing of value-bearing items in a wide area computer network comprising:
- a plurality of user terminals coupled to the computer network;
a database including information about one or more users using the plurality of terminals;
a plurality of cryptographic devices remote from the plurality of user terminals and coupled to the computer network, wherein the cryptographic devices include a computer executable code for authenticating one or more users, wherein each of the plurality of cryptographic devices is programmable to service any of the plurality of user terminals, and wherein each cryptographic device is not dedicated to particular user terminals; and
a plurality of security device transaction data stored in the database for ensuring authenticity of the one or more users, wherein each security device transaction data is related to a user, wherein any cryptographic device authenticates the identity of each user and authenticates the user for a role, the role limiting the user to a subset of operations performed by the system.
8 Assignments
0 Petitions
Accused Products
Abstract
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic modules are capable of implementing the USPS Information Based Indicia Program Postal Security Device Performance Criteria and other required VBI standards. The modules encipher the information stored in the central database for all of the on-line VBI system customers and are capable of preventing access to the database by unauthorized users. Additionally, the cryptographic module is capable of preventing unauthorized and undetected modification, including the unauthorized modification, substitution, insertion, and deletion of VBI related data and cryptographically critical security parameters.
-
Citations
72 Claims
-
1. A security system for secure printing of value-bearing items in a wide area computer network comprising:
-
a plurality of user terminals coupled to the computer network; a database including information about one or more users using the plurality of terminals; a plurality of cryptographic devices remote from the plurality of user terminals and coupled to the computer network, wherein the cryptographic devices include a computer executable code for authenticating one or more users, wherein each of the plurality of cryptographic devices is programmable to service any of the plurality of user terminals, and wherein each cryptographic device is not dedicated to particular user terminals; and a plurality of security device transaction data stored in the database for ensuring authenticity of the one or more users, wherein each security device transaction data is related to a user, wherein any cryptographic device authenticates the identity of each user and authenticates the user for a role, the role limiting the user to a subset of operations performed by the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A system for secure processing of value-bearing items (VBIs) in a computer network comprising:
-
a plurality of user terminals coupled to the computer network; a database coupled to the network and remote from the plurality of user terminals for storing information about one or more users using the plurality of terminals; and a server system coupled to the network including a plurality of cryptographic devices for performing secure VBI functions utilizing the information stored in the database, each of the plurality of cryptographic devices processes data for any of the user terminals, wherein each cryptographic device is not dedicated to particular user terminals; wherein a cryptographic device authenticates the identity of a user and restricts services to the user based on stored information in the database. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
Specification