Cryptographic module for secure processing of value-bearing items
First Claim
1. A cryptographic system for securing data on a computer network comprising:
- a plurality of users coupled to the computer network; and
a plurality of cryptographic devices, each of the plurality of cryptographic devices remote from the plurality of users, and each of the plurality of cryptographic devices comprising;
a processor programmed to authenticate the plurality of remote users on the computer network for secure processing of a value bearing item (VBI);
a memory for storing security device transaction data for ensuring authenticity of a user, wherein the security device transaction data is related to the one of the plurality of users;
a cryptographic engine for cryptographically protecting data;
an interface for communicating with the computer network, anda module for processing value for the value bearing item,wherein each of the plurality of cryptographic devices is capable of authenticating any of the plurality of remote users,wherein each of the plurality of cryptographic devices is capable of processing a VBI printing request from any of the plurality of remote users, andwherein each of the plurality of cryptographic devices is capable of generating indicia data for transmitting to any of the plurality of remote users.
7 Assignments
0 Petitions
Accused Products
Abstract
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic modules are capable of implementing the USPS Information Based Indicia Program Postal Security Device Performance Criteria and other required VBI standards. The modules encipher the information stored in the central database for all of the on-line VBI system customers and are capable of preventing access to the database by unauthorized users. Additionally, the cryptographic module is capable of preventing unauthorized and undetected modification, including the unauthorized modification, substitution, insertion, and deletion of VBI related data and cryptographically critical security parameters.
-
Citations
71 Claims
-
1. A cryptographic system for securing data on a computer network comprising:
-
a plurality of users coupled to the computer network; and a plurality of cryptographic devices, each of the plurality of cryptographic devices remote from the plurality of users, and each of the plurality of cryptographic devices comprising; a processor programmed to authenticate the plurality of remote users on the computer network for secure processing of a value bearing item (VBI); a memory for storing security device transaction data for ensuring authenticity of a user, wherein the security device transaction data is related to the one of the plurality of users; a cryptographic engine for cryptographically protecting data; an interface for communicating with the computer network, and a module for processing value for the value bearing item, wherein each of the plurality of cryptographic devices is capable of authenticating any of the plurality of remote users, wherein each of the plurality of cryptographic devices is capable of processing a VBI printing request from any of the plurality of remote users, and wherein each of the plurality of cryptographic devices is capable of generating indicia data for transmitting to any of the plurality of remote users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method for securing data on a computer network including a plurality of users and a plurality of cryptographic devices remote from the plurality of users, the method comprising the steps of:
-
authenticating any one of the plurality of remote users by any one of the plurality of cryptographic devices; authorizing any one of the plurality of remote users for secure processing of a value bearing item by any one of the plurality of cryptographic devices; processing value for the value bearing item by any one of the plurality of cryptographic devices; and storing a security device transaction data in a memory for ensuring authenticity and authority of one of the plurality of users, wherein the security device transaction data is processed by any one of the plurality of cryptographic devices. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
Specification