Language selection

Search

Patent 2324100 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2324100
(54) English Title: TAMPER RESISTANT POSTAL SECURITY DEVICE WITH LONG BATTERY LIFE
(54) French Title: DISPOSITIF DE SECURITE ANTI-FRAUDE POUR AFFRANCHISSEUSE
Status: Expired and beyond the Period of Reversal
Bibliographic Data
(51) International Patent Classification (IPC):
  • G7B 17/04 (2006.01)
(72) Inventors :
  • NACLERIO, EDWARD J. (United States of America)
(73) Owners :
  • ASCOM HASLER MAILING SYSTEMS INC.
(71) Applicants :
  • ASCOM HASLER MAILING SYSTEMS INC. (United States of America)
(74) Agent: LAVERY, DE BILLY, LLP
(74) Associate agent:
(45) Issued: 2009-08-04
(86) PCT Filing Date: 1999-03-18
(87) Open to Public Inspection: 1999-09-23
Examination requested: 2003-12-10
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US1999/005891
(87) International Publication Number: US1999005891
(85) National Entry: 2000-09-15

(30) Application Priority Data:
Application No. Country/Territory Date
60/078,489 (United States of America) 1998-03-18

Abstracts

English Abstract


In accordance with the invention, a postal security device (PSD) (10) contains
a non-volatile memory (13) which does not depend on
battery power such as an EEPROM (13), and contains a nonvolatile memory (14,
16) which does depend on battery power, such as a static
RAM. The PSD (10) also contains an encryption engine (12, 14, 22). An
encryption key is developed and is stored in the static RAM (14),
which is sized to be only large enough to contain the encryption key. A large
body of data, too large to fit in the static RAM, is encrypted
by means of the encryption engine (12, 14, 22) and with reference to the
encryption key, and is stored in the EEPROM (13). This body of
data typically includes cryptographic keys and sensitive bit-images. When the
PSD is powered, a large RAM (typically a dynamic RAM)
(16) is available to receive the large body of data, decrypted using the
encryption key. A tamper switch (17) cuts power to both RAMs
(14, 16) in the event of tampering.


French Abstract

L'invention porte sur un dispositif de sécurité (10) pour affranchisseuse qui renferme une mémoire rémanente (13), non alimentée par batterie, telle qu'une mémoire EEPROM (13), et une mémoire rémanente (14, 16), alimentée par batterie, telle qu'une mémoire RAM statique. Le dispositif de sécurité (10) comprend un moteur de chiffrement (12, 14, 22). Une clé de chiffrement est élaborée et stockée dans la mémoire RAM statique (14) conçue de façon à avoir une capacité suffisante pour contenir la clé de chiffrement. Un corps important de données, trop grand pour s'adapter dans la mémoire RAM statique, est chiffré au moyen du moteur de chiffrement (12, 14, 22) et en référence à la clé de chiffrement, et est stocké dans la mémoire EEPROM (13). Ce corps de données comprend généralement des clés cryptographiques et des images binaires sensibles. Lorsque le dispositif de sécurité est alimenté en énergie, une mémoire RAM de grande capacité (généralement une mémoire RAM dynamique) (16) est disponible pour recevoir le corps important de données, déchiffré par la clé de chiffrement. Un commutateur (17) antifraude coupe le courant dans les deux mémoires RAM (14, 16) en cas de fraude.

Claims

Note: Claims are shown in the official language in which they were submitted.


CLAIMS
1. A postal security device comprising a secure housing, and within the
secure housing a body of data having a size, said postal security device also
having
within the secure housing means for generating print data for printing of
postage
indicia, said generating of said print data relying in part on the body of
data, said postal
security device also having within the secure housing a first memory sized to
accommodate the body of data, said first memory of a type not requiring
electrical
power to maintain the contents thereof, said postal security device also
having within
the secure housing a second memory not large enough to accommodate the body of
data, said second memory of a type requiring electrical power to maintain the
contents
thereof, said postal security device also comprising a battery powering the
second
memory and a tamper switch mechanically coupled with the secure housing so
that
upon tampering with the secure housing the second memory is disconnected from
the
battery, said postal security device further comprising an encryption key
stored within
said second memory, said postal security device further comprising a
cryptographic
engine, said body of data encrypted by the cryptographic engine with respect
to the
encryption key.
2. A method for use with a postal security device comprising a secure
housing, and within the secure housing a body of data having a size, said
postal security
device also having within the secure housing means for generating print data
for
printing of postage indicia, said generating of said print data relying in
part on the body
of data, said postal security device also having within the secure housing a
first
memory sized to accommodate the body of data, said first memory of a type not
requiring electrical power to maintain the contents thereof, said postal
security device
also having within the secure housing a second memory not large enough to
accommodate the body of data, said second memory of a type that requires
electric
power to maintain its contents, said postal security device also comprising a
battery
powering the second memory and a tamper switch mechanically coupled with the
secure housing so that upon tampering with the secure housing the second
memory is
disconnected from the battery, said postal security device further comprising
an
8

encryption key stored within said second memory, said postal security device
further
comprising a cryptographic engine; the method comprising the steps of:
storing the encryption key within the second memory;
encrypting the body of data by the cryptographic engine with respect to the
encryption key;
storing the encrypted body of data in the first memory;
determining if tampering has occurred; and
in the event of tampering, removing power from the second memory.
3. A method for use with a postal security device comprising a secure
housing, and within the secure housing a body of data having a size, said
postal security
device also having within the secure housing means for generating print data
for
printing of postage indicia, said generating of said print data relying in
part on the body
of data, said postal security device also having within the secure housing a
first
memory sized to accommodate the body of data, said first memory of a type not
requiring electrical power to maintain the contents thereof, said postal
security device
also having within the secure housing a second memory not large enough to
accommodate the body of data, said second memory of a type that clears its
contents
upon a predetermined voltage, said postal security device also comprising a
tamper
switch mechanically coupled with the secure housing so that upon tampering
with the
secure housing the second memory has said predetermined voltage, said postal
security
device further comprising an encryption key stored within said second memory,
said
postal security device further comprising a cryptographic engine; the method
comprising the steps of:
storing the encryption key within the second memory;
encrypting the body of data by the cryptographic engine with respect to the
encryption key; storing the encrypted body of data in the first memory;
determining if tampering has occurred; and
in the event of tampering, causing said predetermined voltage.
9

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02324100 2008-01-15
TAMPER RESISTANT POSTAL SECURITY DEVICE WITH LONG BATTERY LIFE
f-5
Background
In recent years it has been proposed to print postal indicia by means of
conventional
nonsecure printers such as laser printers, ink-jet printers, and thermal
transfer printers. Such
printers are termed "nonsecure" because the printer itself is not in a secure
housing and
because the communications channel linking the printer to other apparatus is
nonsecure.
Under such a proposal, the question naturally arises what would prevent a user
from printing
the same postal indicium repeatedly, thereby printing postal indicia for which
no money has
been paid to the post office. The proposed anti-fraud measure is to store
information within
the indicia which would permit detecting fraud. The indicium would include not
only
human-readable text such as a date and a postage amount, but would also
include machine-
readable information, for example by means of a two-dimensional bar code. The
machine-
readable information would be cryptographically signed, and would include
within it some
information intended to make fraud more difficult. The information would
typically include
an identification of the postage meter license (granted by the meter
manufacturer or by the
postal authorities, depending on the country), an indication of the number of
mail pieces
franked, the postage amount, a postal security device identifier about which
more will be said
later, the date and time, and a zip code or post code of the mail piece
addressee.
The typical apparatus for printing such "encrypted indicia" postage includes
what is called a
postal security device or PSD. The PSD has a secure housing, and within the
secure housing
are the accounting registers as well as a cryptographic engine. The engine
permits
cryptographic authentication and signing for communication with an external
device such as

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
the computer of the meter manufacturer or of the post office. The engine also
permits
creation of postal indicia which contain specified information and which are
cryptographically signed. The PSD may well be physically small as compared to
traditional
postage meters. The PSD may be the size of a PCMCIA card or the size of a
smart card.
Within the PSD the memory must be protected against inadvertent damage due to
malfunction of the processor of the PSD, for example as set forth in US Pat.
No. 5668973,
Protection system for critical memory information owned by the same assignee
as the
assignee of the present application. The PSD must handle power failure in a
graceful fashion,
for example as set forth in US Pat. No. 5712542, Postage meter with improved
handling of
power failure, also owned by the same assignee as the assignee of the present
application.
To reduce smudging, the printer may preferably be that described in PCT
publication no.
97-46389, Printing apparatus, also owned by the same assignee as the assignee
of the present
application. While it has been proposed that the PSD contain a real-time clock
which is
keeping time continuously, desirably this requirement may be avoided as
described in PCT
publication no. 98-08325, Printing postage with cryptographic clocking
security, also owned
by the same assignee as the assignee of the present application. PSDs can form
part of a
network with multiple printers as described in PCT publication no. 98-13790,
Proof of
postage digital franking, also owned by the same assignee as the assignee of
the present
application.
The postal authorities face the question how the PSD can be protected from
tampering. For
example, the entire system of PSDs depends on the use of cryptographic keys.
The keys are
used for authenticating communications between the PSD and the manufacturer's
system or
the postal authority's system. Such communications are used to set up and
maintain the
PSDs, and are used to refill or "reset" the PSDs to reflect the ability to
print more postage.
The keys are also used to cryptographically "sign" information printed in the
postal indicia. If
the cryptographic keys were compromised, a user might be able to defraud the
post office or
the PSD manufacturer or both.
2

CA 02324100 2000-09-15
WO 99/48055 PCTIUS99/05891
Many approaches have been proposed for protection of such cryptographic keys
from
compromise. The usual approach is to place the cryptographic keys in a RAM
(random
access memory) of a type which keeps its contents only so long as the RAM
receives power
from a battery. The secure housing of the PSD is designed to include a tamper
switch, so that
if the secure housing is tampered with, the switch opens. The switch
interrupts power to the
RAM (and, in particular, interrupts battery power to the RAM) and its contents
are lost. In
this way the information in the RAM (for example, the cryptographic keys) is
protected from
tampering. Another proposed approach is to employ commercial memory chips
(such as the
Dallas Semiconductor DS1283 and Benchmarq bq3283) offer a pin on the package
which
will clear the memory based on a predetermined input voltage level. The tamper
switch is set
up to apply the predetermined voltage upon detection of tampering.
Many approaches have also been proposed for detection of the tampering. In EP
820 041, for
example, it is suggested that the secure housing of an old-style mechanical or
electromechanical postage meter be set up to contain an air pressure that is
distinctively
higher than or lower than normal atmospheric pressure. If the secure housing
is violated, the
pressure within the secure housing changes to match the ambient pressure. A
sensor within
the housing detects the pressure change and thus the violation. The sensor
disables further
function of the postage meter.
The approach of cutting power to a volatile memory such as the RAM discussed
above has a
drawback in that during periods of power-down, the RAM depends on an internal
battery to
avoid loss of the information in the RAM. Depending on the requirements of the
postal
authority, and on design decisions made by the PSD manufacturer, the quantity
of data
requiring protection may be quite large. The data to be protected may include
cryptographic
keys used for PSD configuration, keys used for remote resetting (refilling),
keys used for
signing postal indicia, and keys used for the management of the other keys. In
addition it may
be desired to protect the bit-images used to generate the human-readable
portion of the
printed indicia. A RAM big enough to hold all of these important items of data
will also
draw a non-negligible current from the internal battery. This may lead to a
limited and
commercially unacceptable battery life.
3

CA 02324100 2000-09-15
~i'/iJtS 9 9 / 0 5 8 9 1
P%W 2 9 MAR 2000
It would thus be desirable to have a PSD design which protects the many
important items of data
stored within, and yet which does not draw very much battery power and so
permits a
connnercially acceptable battery life.
Summary of the invention
In accordance with the invention, a postal security device (PSD) contains a
nonvolatile memory
which does not depend on battery power, such as an EEPROM, and contains a
nonvolatile
memory which does depend on battery power, such as a static RAM. The PSD also
contains an
encryption engine. An encryption key is developed and is stored in the static
RAM, which is sized
to be only large enough to contain the encryption key. A large body of data,
too large to fit in the
static RAM, is encrypted by means of the encryption engine and with reference
to the encryption
key, and is stored in the EEPROM. This body of data typically includes
cryptographic keys and
sensitive bit-images. When the PSD is powered, a large RAM (typically a
dynamic RAM) is
available to receive the large body of data, decrypted using the encryption
key. A-tamper sw'rtch
cuts power to both RAMs in the event of tampering. In this way, the battery
power required to
maintain the PSD during power-off periods is minimal, and yet the large body
of data will be
inaccessible in the event of tampering.
Description of the drawing
The uivention will be described with respect to a drawulg, of which:
Fig. 1 is a schematic functional block diagram of a system according to the
invention.
Detailed description
Fig. 1 shows a postal security device (PSD) in accordance with the invention.
The PSD has a
secure liousulg 11, a inicroprocessor 12 wluch conunuiucates on a bus 23 with
an input/output
(I/O) device 18, a memory which does uot require battery backup 13 wluch may
be for example an
EEPROM or
4
4MENDED S-~EEZ

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
flash memory, a relatively small RAM 14, a ROM 22, and a larger RAM 16. The
I/O device
18 communicates with external apparatus by means of communications channel 19
which
may be a serial asynchronous data line. External power 21 and ground 20 are
also defined.
The larger RAM 16, and most of the other active components, receive external
power. The
smaller RAM 14 is additionally able to receive power from a backup battery 15,
preferably a
lithium cell with a very long (e.g. ten year) life. A tamper switch 17 is
provided which, when
triggered, can cut power to both the small RAM 14 and the large RAM 16.
A large body of data is assumed to require protection from a tampering user.
The EEPROM
is selected to be large enough to hold this body of data after it has been
encrypted. When
power is applied and the system is stable, the body of data (or selected
portions thereof) is
decrypted and transferred to RAM 16. This decryption is performed by the
microprocessor
12 executing a decryption routine stored in the ROM 22, and the decryption is
done with
respect to a decryption key in the RAM 14. Alternatively the decryption may be
performed
by an optional engine omitted for clarity in Fig. 1. The decrypted data in RAM
16 are used as
needed for the ordinary functions of the PSD, which include communicating via
the
communications channel 19 with a user computer, with a manufacturer's system,
or with a
postal authority system, and can include generating postal indicia which are
to be printed by
means of a printer.
When external power 21 is cut off, or when the PSD undergoes a normal power-
down
routine, the information in the RAM 16 is lost. In contrast, the information
in the RAM 14 is
preserved even when external power 21 is lost, because of battery 15.
During normal operation the body of data that requires protection from a
tampering user (or
some portion of it) may be located "in the clear", that is, unencrypted, in
the RAM 16. In the
event that this data has changed, it may be necessary to encrypt the data and
to store it again
in the memory 13. This encryption is performed by the processor 12 executing
encryption
software in the ROM 22, or may optionally be performed by an encryption engine
omitted for
clarity in Fig. 1.
5

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
The power-down condition for the PSD 10 assumes that no power is present at
line 21. In
that event, the only powered device is RAM 14. RAM 14 was purposefully
selected to be
large enough to hold the encryption key but not much larger, and in any event
is smaller than
the large body of data that is understood to require protection from a
tampering user. Because
of the limited size of the RAM 14, it does not draw as much current from the
battery 15 as
would be drawn by a larger RAM such as RAM 16. Thus, the battery life is
optimized,
especially as compared with the shorter battery life that would result if the
large body of data
were all in battery-backed-up RAM.
Tampering may happen during a time when external power 21 is present. At a
minimum, the
tamper switch should cut power to the RAM 14. (Or, alternatively, the tamper
switch should
apply to RAM 14 the predetermined voltage that clears the RAM.) Preferably the
tamper
switch will also cut power to the RAM 16 (or clear the RAM 16), for the reason
that some of
the body of sensitive data may be present "in the clear" in the RAM 16, and
should not fall
into the hands of the tampering user. Alternatively the tamper switch might
trigger an
interrupt in the processor 12 which would cause the processor 12 to clear the
sensitive
portions of the RAM 16.
Tampering may also happen during a time when external power 21 is absent. In
such a case,
the RAM 16 is already, by definition, empty, as it is unpowered. The tamper
switch causes
the RAM 14 to be cleared. If the tampering user extracts the contents of the
memory 13, this
is of little significance, because the contents are useless unless decrypted
with the assistance
of the key that is no longer present in the RAM 14. If the PSD 10 is powered
up again after
the tampering, the decryption routine will not work because the key of RAM 14
is gone. In
addition, desirably the processor 12, under program control, will note the
fact that RAM 14 is
empty and will inunediately attempt to send a message via communications
channel 19 to the
manufacturer or to the postal authority.
Those skilled in the art will readily appreciate that design considerations
may prompt the use
of electrical components in addition to or instead of those shown in Fig. 1,
none of which
depart in any way from the invention. For example, dedicated cryptographic
chips may be
6

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
employed which take some of the computational burden from the microprocessor.
As another
example, the particular way in which the tamper switch cuts power to the RAM
may be
varied, and the particular type of tamper switch may be selected among several
types, all
without departing in any way from the invention. Those skilled in the art will
indeed have no
difficulty devising obvious variations and improvements to the invention, all
of which are
intended to be encompassed by the claims that follow.
7

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Time Limit for Reversal Expired 2019-03-18
Revocation of Agent Request 2018-09-14
Appointment of Agent Request 2018-09-14
Inactive: Agents merged 2018-09-01
Appointment of Agent Request 2018-08-30
Inactive: Agents merged 2018-08-30
Revocation of Agent Request 2018-08-30
Letter Sent 2018-03-19
Grant by Issuance 2009-08-04
Inactive: Cover page published 2009-08-03
Pre-grant 2009-05-11
Inactive: Final fee received 2009-05-11
Notice of Allowance is Issued 2009-01-27
Letter Sent 2009-01-27
4 2009-01-27
Notice of Allowance is Issued 2009-01-27
Inactive: IPC removed 2009-01-26
Inactive: Approved for allowance (AFA) 2009-01-02
Amendment Received - Voluntary Amendment 2008-01-15
Inactive: S.30(2) Rules - Examiner requisition 2007-07-16
Inactive: IPC from MCD 2006-03-12
Letter Sent 2004-01-12
All Requirements for Examination Determined Compliant 2003-12-10
Request for Examination Requirements Determined Compliant 2003-12-10
Request for Examination Received 2003-12-10
Letter Sent 2001-02-15
Inactive: Single transfer 2001-01-19
Inactive: Cover page published 2000-12-13
Inactive: First IPC assigned 2000-12-10
Inactive: Courtesy letter - Evidence 2000-12-05
Inactive: Notice - National entry - No RFE 2000-12-01
Application Received - PCT 2000-11-29
Application Published (Open to Public Inspection) 1999-09-23

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2009-03-11

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
ASCOM HASLER MAILING SYSTEMS INC.
Past Owners on Record
EDWARD J. NACLERIO
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column (Temporarily unavailable). To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2000-12-12 1 7
Abstract 2000-09-14 1 51
Description 2000-09-14 7 333
Claims 2000-09-14 2 98
Drawings 2000-09-14 1 17
Cover Page 2000-12-12 2 69
Description 2008-01-14 7 320
Claims 2008-01-14 2 101
Representative drawing 2009-07-06 1 8
Cover Page 2009-07-06 2 49
Reminder of maintenance fee due 2000-11-29 1 112
Notice of National Entry 2000-11-30 1 195
Courtesy - Certificate of registration (related document(s)) 2001-02-14 1 113
Reminder - Request for Examination 2003-11-18 1 112
Acknowledgement of Request for Examination 2004-01-11 1 188
Commissioner's Notice - Application Found Allowable 2009-01-26 1 163
Maintenance Fee Notice 2018-04-29 1 178
Correspondence 2000-11-29 1 25
PCT 2000-09-14 10 414
Fees 2003-02-13 1 40
Fees 2001-02-08 1 40
Fees 2002-02-21 1 41
Fees 2004-02-09 1 37
Fees 2005-02-20 1 36
Fees 2006-02-16 1 44
Fees 2007-02-18 1 46
Fees 2008-02-21 1 47
Correspondence 2009-05-10 1 30
Fees 2009-03-10 1 47