Sélection de la langue

Search

Sommaire du brevet 2324100 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Brevet: (11) CA 2324100
(54) Titre français: DISPOSITIF DE SECURITE ANTI-FRAUDE POUR AFFRANCHISSEUSE
(54) Titre anglais: TAMPER RESISTANT POSTAL SECURITY DEVICE WITH LONG BATTERY LIFE
Statut: Périmé et au-delà du délai pour l’annulation
Données bibliographiques
(51) Classification internationale des brevets (CIB):
  • G7B 17/04 (2006.01)
(72) Inventeurs :
  • NACLERIO, EDWARD J. (Etats-Unis d'Amérique)
(73) Titulaires :
  • ASCOM HASLER MAILING SYSTEMS INC.
(71) Demandeurs :
  • ASCOM HASLER MAILING SYSTEMS INC. (Etats-Unis d'Amérique)
(74) Agent: LAVERY, DE BILLY, LLP
(74) Co-agent:
(45) Délivré: 2009-08-04
(86) Date de dépôt PCT: 1999-03-18
(87) Mise à la disponibilité du public: 1999-09-23
Requête d'examen: 2003-12-10
Licence disponible: S.O.
Cédé au domaine public: S.O.
(25) Langue des documents déposés: Anglais

Traité de coopération en matière de brevets (PCT): Oui
(86) Numéro de la demande PCT: PCT/US1999/005891
(87) Numéro de publication internationale PCT: US1999005891
(85) Entrée nationale: 2000-09-15

(30) Données de priorité de la demande:
Numéro de la demande Pays / territoire Date
60/078,489 (Etats-Unis d'Amérique) 1998-03-18

Abrégés

Abrégé français

L'invention porte sur un dispositif de sécurité (10) pour affranchisseuse qui renferme une mémoire rémanente (13), non alimentée par batterie, telle qu'une mémoire EEPROM (13), et une mémoire rémanente (14, 16), alimentée par batterie, telle qu'une mémoire RAM statique. Le dispositif de sécurité (10) comprend un moteur de chiffrement (12, 14, 22). Une clé de chiffrement est élaborée et stockée dans la mémoire RAM statique (14) conçue de façon à avoir une capacité suffisante pour contenir la clé de chiffrement. Un corps important de données, trop grand pour s'adapter dans la mémoire RAM statique, est chiffré au moyen du moteur de chiffrement (12, 14, 22) et en référence à la clé de chiffrement, et est stocké dans la mémoire EEPROM (13). Ce corps de données comprend généralement des clés cryptographiques et des images binaires sensibles. Lorsque le dispositif de sécurité est alimenté en énergie, une mémoire RAM de grande capacité (généralement une mémoire RAM dynamique) (16) est disponible pour recevoir le corps important de données, déchiffré par la clé de chiffrement. Un commutateur (17) antifraude coupe le courant dans les deux mémoires RAM (14, 16) en cas de fraude.


Abrégé anglais


In accordance with the invention, a postal security device (PSD) (10) contains
a non-volatile memory (13) which does not depend on
battery power such as an EEPROM (13), and contains a nonvolatile memory (14,
16) which does depend on battery power, such as a static
RAM. The PSD (10) also contains an encryption engine (12, 14, 22). An
encryption key is developed and is stored in the static RAM (14),
which is sized to be only large enough to contain the encryption key. A large
body of data, too large to fit in the static RAM, is encrypted
by means of the encryption engine (12, 14, 22) and with reference to the
encryption key, and is stored in the EEPROM (13). This body of
data typically includes cryptographic keys and sensitive bit-images. When the
PSD is powered, a large RAM (typically a dynamic RAM)
(16) is available to receive the large body of data, decrypted using the
encryption key. A tamper switch (17) cuts power to both RAMs
(14, 16) in the event of tampering.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CLAIMS
1. A postal security device comprising a secure housing, and within the
secure housing a body of data having a size, said postal security device also
having
within the secure housing means for generating print data for printing of
postage
indicia, said generating of said print data relying in part on the body of
data, said postal
security device also having within the secure housing a first memory sized to
accommodate the body of data, said first memory of a type not requiring
electrical
power to maintain the contents thereof, said postal security device also
having within
the secure housing a second memory not large enough to accommodate the body of
data, said second memory of a type requiring electrical power to maintain the
contents
thereof, said postal security device also comprising a battery powering the
second
memory and a tamper switch mechanically coupled with the secure housing so
that
upon tampering with the secure housing the second memory is disconnected from
the
battery, said postal security device further comprising an encryption key
stored within
said second memory, said postal security device further comprising a
cryptographic
engine, said body of data encrypted by the cryptographic engine with respect
to the
encryption key.
2. A method for use with a postal security device comprising a secure
housing, and within the secure housing a body of data having a size, said
postal security
device also having within the secure housing means for generating print data
for
printing of postage indicia, said generating of said print data relying in
part on the body
of data, said postal security device also having within the secure housing a
first
memory sized to accommodate the body of data, said first memory of a type not
requiring electrical power to maintain the contents thereof, said postal
security device
also having within the secure housing a second memory not large enough to
accommodate the body of data, said second memory of a type that requires
electric
power to maintain its contents, said postal security device also comprising a
battery
powering the second memory and a tamper switch mechanically coupled with the
secure housing so that upon tampering with the secure housing the second
memory is
disconnected from the battery, said postal security device further comprising
an
8

encryption key stored within said second memory, said postal security device
further
comprising a cryptographic engine; the method comprising the steps of:
storing the encryption key within the second memory;
encrypting the body of data by the cryptographic engine with respect to the
encryption key;
storing the encrypted body of data in the first memory;
determining if tampering has occurred; and
in the event of tampering, removing power from the second memory.
3. A method for use with a postal security device comprising a secure
housing, and within the secure housing a body of data having a size, said
postal security
device also having within the secure housing means for generating print data
for
printing of postage indicia, said generating of said print data relying in
part on the body
of data, said postal security device also having within the secure housing a
first
memory sized to accommodate the body of data, said first memory of a type not
requiring electrical power to maintain the contents thereof, said postal
security device
also having within the secure housing a second memory not large enough to
accommodate the body of data, said second memory of a type that clears its
contents
upon a predetermined voltage, said postal security device also comprising a
tamper
switch mechanically coupled with the secure housing so that upon tampering
with the
secure housing the second memory has said predetermined voltage, said postal
security
device further comprising an encryption key stored within said second memory,
said
postal security device further comprising a cryptographic engine; the method
comprising the steps of:
storing the encryption key within the second memory;
encrypting the body of data by the cryptographic engine with respect to the
encryption key; storing the encrypted body of data in the first memory;
determining if tampering has occurred; and
in the event of tampering, causing said predetermined voltage.
9

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 02324100 2008-01-15
TAMPER RESISTANT POSTAL SECURITY DEVICE WITH LONG BATTERY LIFE
f-5
Background
In recent years it has been proposed to print postal indicia by means of
conventional
nonsecure printers such as laser printers, ink-jet printers, and thermal
transfer printers. Such
printers are termed "nonsecure" because the printer itself is not in a secure
housing and
because the communications channel linking the printer to other apparatus is
nonsecure.
Under such a proposal, the question naturally arises what would prevent a user
from printing
the same postal indicium repeatedly, thereby printing postal indicia for which
no money has
been paid to the post office. The proposed anti-fraud measure is to store
information within
the indicia which would permit detecting fraud. The indicium would include not
only
human-readable text such as a date and a postage amount, but would also
include machine-
readable information, for example by means of a two-dimensional bar code. The
machine-
readable information would be cryptographically signed, and would include
within it some
information intended to make fraud more difficult. The information would
typically include
an identification of the postage meter license (granted by the meter
manufacturer or by the
postal authorities, depending on the country), an indication of the number of
mail pieces
franked, the postage amount, a postal security device identifier about which
more will be said
later, the date and time, and a zip code or post code of the mail piece
addressee.
The typical apparatus for printing such "encrypted indicia" postage includes
what is called a
postal security device or PSD. The PSD has a secure housing, and within the
secure housing
are the accounting registers as well as a cryptographic engine. The engine
permits
cryptographic authentication and signing for communication with an external
device such as

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
the computer of the meter manufacturer or of the post office. The engine also
permits
creation of postal indicia which contain specified information and which are
cryptographically signed. The PSD may well be physically small as compared to
traditional
postage meters. The PSD may be the size of a PCMCIA card or the size of a
smart card.
Within the PSD the memory must be protected against inadvertent damage due to
malfunction of the processor of the PSD, for example as set forth in US Pat.
No. 5668973,
Protection system for critical memory information owned by the same assignee
as the
assignee of the present application. The PSD must handle power failure in a
graceful fashion,
for example as set forth in US Pat. No. 5712542, Postage meter with improved
handling of
power failure, also owned by the same assignee as the assignee of the present
application.
To reduce smudging, the printer may preferably be that described in PCT
publication no.
97-46389, Printing apparatus, also owned by the same assignee as the assignee
of the present
application. While it has been proposed that the PSD contain a real-time clock
which is
keeping time continuously, desirably this requirement may be avoided as
described in PCT
publication no. 98-08325, Printing postage with cryptographic clocking
security, also owned
by the same assignee as the assignee of the present application. PSDs can form
part of a
network with multiple printers as described in PCT publication no. 98-13790,
Proof of
postage digital franking, also owned by the same assignee as the assignee of
the present
application.
The postal authorities face the question how the PSD can be protected from
tampering. For
example, the entire system of PSDs depends on the use of cryptographic keys.
The keys are
used for authenticating communications between the PSD and the manufacturer's
system or
the postal authority's system. Such communications are used to set up and
maintain the
PSDs, and are used to refill or "reset" the PSDs to reflect the ability to
print more postage.
The keys are also used to cryptographically "sign" information printed in the
postal indicia. If
the cryptographic keys were compromised, a user might be able to defraud the
post office or
the PSD manufacturer or both.
2

CA 02324100 2000-09-15
WO 99/48055 PCTIUS99/05891
Many approaches have been proposed for protection of such cryptographic keys
from
compromise. The usual approach is to place the cryptographic keys in a RAM
(random
access memory) of a type which keeps its contents only so long as the RAM
receives power
from a battery. The secure housing of the PSD is designed to include a tamper
switch, so that
if the secure housing is tampered with, the switch opens. The switch
interrupts power to the
RAM (and, in particular, interrupts battery power to the RAM) and its contents
are lost. In
this way the information in the RAM (for example, the cryptographic keys) is
protected from
tampering. Another proposed approach is to employ commercial memory chips
(such as the
Dallas Semiconductor DS1283 and Benchmarq bq3283) offer a pin on the package
which
will clear the memory based on a predetermined input voltage level. The tamper
switch is set
up to apply the predetermined voltage upon detection of tampering.
Many approaches have also been proposed for detection of the tampering. In EP
820 041, for
example, it is suggested that the secure housing of an old-style mechanical or
electromechanical postage meter be set up to contain an air pressure that is
distinctively
higher than or lower than normal atmospheric pressure. If the secure housing
is violated, the
pressure within the secure housing changes to match the ambient pressure. A
sensor within
the housing detects the pressure change and thus the violation. The sensor
disables further
function of the postage meter.
The approach of cutting power to a volatile memory such as the RAM discussed
above has a
drawback in that during periods of power-down, the RAM depends on an internal
battery to
avoid loss of the information in the RAM. Depending on the requirements of the
postal
authority, and on design decisions made by the PSD manufacturer, the quantity
of data
requiring protection may be quite large. The data to be protected may include
cryptographic
keys used for PSD configuration, keys used for remote resetting (refilling),
keys used for
signing postal indicia, and keys used for the management of the other keys. In
addition it may
be desired to protect the bit-images used to generate the human-readable
portion of the
printed indicia. A RAM big enough to hold all of these important items of data
will also
draw a non-negligible current from the internal battery. This may lead to a
limited and
commercially unacceptable battery life.
3

CA 02324100 2000-09-15
~i'/iJtS 9 9 / 0 5 8 9 1
P%W 2 9 MAR 2000
It would thus be desirable to have a PSD design which protects the many
important items of data
stored within, and yet which does not draw very much battery power and so
permits a
connnercially acceptable battery life.
Summary of the invention
In accordance with the invention, a postal security device (PSD) contains a
nonvolatile memory
which does not depend on battery power, such as an EEPROM, and contains a
nonvolatile
memory which does depend on battery power, such as a static RAM. The PSD also
contains an
encryption engine. An encryption key is developed and is stored in the static
RAM, which is sized
to be only large enough to contain the encryption key. A large body of data,
too large to fit in the
static RAM, is encrypted by means of the encryption engine and with reference
to the encryption
key, and is stored in the EEPROM. This body of data typically includes
cryptographic keys and
sensitive bit-images. When the PSD is powered, a large RAM (typically a
dynamic RAM) is
available to receive the large body of data, decrypted using the encryption
key. A-tamper sw'rtch
cuts power to both RAMs in the event of tampering. In this way, the battery
power required to
maintain the PSD during power-off periods is minimal, and yet the large body
of data will be
inaccessible in the event of tampering.
Description of the drawing
The uivention will be described with respect to a drawulg, of which:
Fig. 1 is a schematic functional block diagram of a system according to the
invention.
Detailed description
Fig. 1 shows a postal security device (PSD) in accordance with the invention.
The PSD has a
secure liousulg 11, a inicroprocessor 12 wluch conunuiucates on a bus 23 with
an input/output
(I/O) device 18, a memory which does uot require battery backup 13 wluch may
be for example an
EEPROM or
4
4MENDED S-~EEZ

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
flash memory, a relatively small RAM 14, a ROM 22, and a larger RAM 16. The
I/O device
18 communicates with external apparatus by means of communications channel 19
which
may be a serial asynchronous data line. External power 21 and ground 20 are
also defined.
The larger RAM 16, and most of the other active components, receive external
power. The
smaller RAM 14 is additionally able to receive power from a backup battery 15,
preferably a
lithium cell with a very long (e.g. ten year) life. A tamper switch 17 is
provided which, when
triggered, can cut power to both the small RAM 14 and the large RAM 16.
A large body of data is assumed to require protection from a tampering user.
The EEPROM
is selected to be large enough to hold this body of data after it has been
encrypted. When
power is applied and the system is stable, the body of data (or selected
portions thereof) is
decrypted and transferred to RAM 16. This decryption is performed by the
microprocessor
12 executing a decryption routine stored in the ROM 22, and the decryption is
done with
respect to a decryption key in the RAM 14. Alternatively the decryption may be
performed
by an optional engine omitted for clarity in Fig. 1. The decrypted data in RAM
16 are used as
needed for the ordinary functions of the PSD, which include communicating via
the
communications channel 19 with a user computer, with a manufacturer's system,
or with a
postal authority system, and can include generating postal indicia which are
to be printed by
means of a printer.
When external power 21 is cut off, or when the PSD undergoes a normal power-
down
routine, the information in the RAM 16 is lost. In contrast, the information
in the RAM 14 is
preserved even when external power 21 is lost, because of battery 15.
During normal operation the body of data that requires protection from a
tampering user (or
some portion of it) may be located "in the clear", that is, unencrypted, in
the RAM 16. In the
event that this data has changed, it may be necessary to encrypt the data and
to store it again
in the memory 13. This encryption is performed by the processor 12 executing
encryption
software in the ROM 22, or may optionally be performed by an encryption engine
omitted for
clarity in Fig. 1.
5

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
The power-down condition for the PSD 10 assumes that no power is present at
line 21. In
that event, the only powered device is RAM 14. RAM 14 was purposefully
selected to be
large enough to hold the encryption key but not much larger, and in any event
is smaller than
the large body of data that is understood to require protection from a
tampering user. Because
of the limited size of the RAM 14, it does not draw as much current from the
battery 15 as
would be drawn by a larger RAM such as RAM 16. Thus, the battery life is
optimized,
especially as compared with the shorter battery life that would result if the
large body of data
were all in battery-backed-up RAM.
Tampering may happen during a time when external power 21 is present. At a
minimum, the
tamper switch should cut power to the RAM 14. (Or, alternatively, the tamper
switch should
apply to RAM 14 the predetermined voltage that clears the RAM.) Preferably the
tamper
switch will also cut power to the RAM 16 (or clear the RAM 16), for the reason
that some of
the body of sensitive data may be present "in the clear" in the RAM 16, and
should not fall
into the hands of the tampering user. Alternatively the tamper switch might
trigger an
interrupt in the processor 12 which would cause the processor 12 to clear the
sensitive
portions of the RAM 16.
Tampering may also happen during a time when external power 21 is absent. In
such a case,
the RAM 16 is already, by definition, empty, as it is unpowered. The tamper
switch causes
the RAM 14 to be cleared. If the tampering user extracts the contents of the
memory 13, this
is of little significance, because the contents are useless unless decrypted
with the assistance
of the key that is no longer present in the RAM 14. If the PSD 10 is powered
up again after
the tampering, the decryption routine will not work because the key of RAM 14
is gone. In
addition, desirably the processor 12, under program control, will note the
fact that RAM 14 is
empty and will inunediately attempt to send a message via communications
channel 19 to the
manufacturer or to the postal authority.
Those skilled in the art will readily appreciate that design considerations
may prompt the use
of electrical components in addition to or instead of those shown in Fig. 1,
none of which
depart in any way from the invention. For example, dedicated cryptographic
chips may be
6

CA 02324100 2000-09-15
WO 99/48055 PCT/US99/05891
employed which take some of the computational burden from the microprocessor.
As another
example, the particular way in which the tamper switch cuts power to the RAM
may be
varied, and the particular type of tamper switch may be selected among several
types, all
without departing in any way from the invention. Those skilled in the art will
indeed have no
difficulty devising obvious variations and improvements to the invention, all
of which are
intended to be encompassed by the claims that follow.
7

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Le délai pour l'annulation est expiré 2019-03-18
Demande visant la révocation de la nomination d'un agent 2018-09-14
Demande visant la nomination d'un agent 2018-09-14
Inactive : Regroupement d'agents 2018-09-01
Demande visant la nomination d'un agent 2018-08-30
Inactive : Regroupement d'agents 2018-08-30
Demande visant la révocation de la nomination d'un agent 2018-08-30
Lettre envoyée 2018-03-19
Accordé par délivrance 2009-08-04
Inactive : Page couverture publiée 2009-08-03
Préoctroi 2009-05-11
Inactive : Taxe finale reçue 2009-05-11
Un avis d'acceptation est envoyé 2009-01-27
Lettre envoyée 2009-01-27
month 2009-01-27
Un avis d'acceptation est envoyé 2009-01-27
Inactive : CIB enlevée 2009-01-26
Inactive : Approuvée aux fins d'acceptation (AFA) 2009-01-02
Modification reçue - modification volontaire 2008-01-15
Inactive : Dem. de l'examinateur par.30(2) Règles 2007-07-16
Inactive : CIB de MCD 2006-03-12
Lettre envoyée 2004-01-12
Toutes les exigences pour l'examen - jugée conforme 2003-12-10
Exigences pour une requête d'examen - jugée conforme 2003-12-10
Requête d'examen reçue 2003-12-10
Lettre envoyée 2001-02-15
Inactive : Transfert individuel 2001-01-19
Inactive : Page couverture publiée 2000-12-13
Inactive : CIB en 1re position 2000-12-10
Inactive : Lettre de courtoisie - Preuve 2000-12-05
Inactive : Notice - Entrée phase nat. - Pas de RE 2000-12-01
Demande reçue - PCT 2000-11-29
Demande publiée (accessible au public) 1999-09-23

Historique d'abandonnement

Il n'y a pas d'historique d'abandonnement

Taxes périodiques

Le dernier paiement a été reçu le 2009-03-11

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Les taxes sur les brevets sont ajustées au 1er janvier de chaque année. Les montants ci-dessus sont les montants actuels s'ils sont reçus au plus tard le 31 décembre de l'année en cours.
Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
ASCOM HASLER MAILING SYSTEMS INC.
Titulaires antérieures au dossier
EDWARD J. NACLERIO
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document (Temporairement non-disponible). Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(yyyy-mm-dd) 
Nombre de pages   Taille de l'image (Ko) 
Dessin représentatif 2000-12-12 1 7
Abrégé 2000-09-14 1 51
Description 2000-09-14 7 333
Revendications 2000-09-14 2 98
Dessins 2000-09-14 1 17
Page couverture 2000-12-12 2 69
Description 2008-01-14 7 320
Revendications 2008-01-14 2 101
Dessin représentatif 2009-07-06 1 8
Page couverture 2009-07-06 2 49
Rappel de taxe de maintien due 2000-11-29 1 112
Avis d'entree dans la phase nationale 2000-11-30 1 195
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2001-02-14 1 113
Rappel - requête d'examen 2003-11-18 1 112
Accusé de réception de la requête d'examen 2004-01-11 1 188
Avis du commissaire - Demande jugée acceptable 2009-01-26 1 163
Avis concernant la taxe de maintien 2018-04-29 1 178
Correspondance 2000-11-29 1 25
PCT 2000-09-14 10 414
Taxes 2003-02-13 1 40
Taxes 2001-02-08 1 40
Taxes 2002-02-21 1 41
Taxes 2004-02-09 1 37
Taxes 2005-02-20 1 36
Taxes 2006-02-16 1 44
Taxes 2007-02-18 1 46
Taxes 2008-02-21 1 47
Correspondance 2009-05-10 1 30
Taxes 2009-03-10 1 47