Role assignments in a cryptographic module for secure processing of value-bearing items
First Claim
1. A security system for securing data in a computer network comprising:
- a plurality of user terminals coupled to the computer network;
a plurality of cryptographic devices remote from the plurality of user terminals and coupled to the computer network, wherein each cryptographic device includes a computer executable code for authenticating one or more users and verifying that the authenticated user is authorized to assume a role, and wherein each cryptographic device is capable of performing value management functions for one or more users; and
a plurality of security device transaction data for ensuring authenticity of the one or more users, wherein each security device transaction data is related to a user,wherein each cryptographic device is not dedicated to particular user terminals, andwherein each cryptographic device is programmable to service any of the plurality of user terminals.
5 Assignments
0 Petitions
Accused Products
Abstract
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic modules are capable of implementing the USPS Information Based Indicia Program Postal Security Device Performance Criteria and other required VBI standards. The modules encipher the information stored in the central database for all of the on-line VBI system customers and are capable of preventing access to the database by unauthorized users. Additionally, the cryptographic module is capable of preventing unauthorized and undetected modification, including the unauthorized modification, substitution, insertion, and deletion of VBI related data and cryptographically critical security parameters.
172 Citations
29 Claims
-
1. A security system for securing data in a computer network comprising:
-
a plurality of user terminals coupled to the computer network; a plurality of cryptographic devices remote from the plurality of user terminals and coupled to the computer network, wherein each cryptographic device includes a computer executable code for authenticating one or more users and verifying that the authenticated user is authorized to assume a role, and wherein each cryptographic device is capable of performing value management functions for one or more users; and a plurality of security device transaction data for ensuring authenticity of the one or more users, wherein each security device transaction data is related to a user, wherein each cryptographic device is not dedicated to particular user terminals, and wherein each cryptographic device is programmable to service any of the plurality of user terminals. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification