Patent application number | Description | Published |
20080281682 | Voting system that allows voters to securely verify their votes - Various election methods are provided wherein voters are able to verify their votes through public means. In one embodiment, each of the ballots includes a ballot identifier and each of the choices thereon is associated with a selection identifier. After the completed ballots are received by the voting authority, the authority publishes the ballot identifiers obtained from the ballots in association with the selection identifiers of the selected choices to enable each voter to verify his or her vote. In another embodiment, the voter provides the ballot identifier and the selection identifiers of the selected choices on a delivery mechanism (e.g., envelope). The relevant identifiers are then obtained by the authority from the delivery mechanisms and published. In another embodiment, the voters generate their own selection identifiers on the ballot which are then published by the authority to enable each voter to verify his or her vote. | 11-13-2008 |
20080296375 | Method for assigning voter identifications in a vote by mail system - A method of conducting an election including storing a signature image for each voter, providing a plurality of return envelopes, providing an indicium having a barcode on each of the return envelopes, for each of the return envelopes, associating the barcode of the indicium with a respective one of the voters, and mailing each return envelope and a ballot to the voter with which the barcode data of the indicium of the envelope has been associated. When each return envelope including a completed ballot and a written signature thereon is received, the method includes obtaining from the return envelope the written signature and the barcode of the indicium provided thereon, using the obtained barcode to access the stored authorized signature image of the voter with which the barcode is associated, and comparing the obtained written signature to the authorized signature in the accessed image. | 12-04-2008 |
20080306885 | System and method for authenticating indicia using identity-based signature scheme - Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information. | 12-11-2008 |
20080314997 | Vote by mail envelope that protects integrity of ballot during signature verification - A vote-by-mail return envelope that includes a pouch portion for containing the ballot and a stub portion on which the voter applies his/her signature and method for processing are provided. Each portion of the envelope contains a respective barcode that identifies the respective portion. When the envelope is received at the vote-counting location, the stub is separated from the pouch, thereby separating the voter's signature, name, etc. from the ballot. The signature is then verified from the stub, and subsequent processing of the pouch uses the pouch barcode identifier as a link to the stub barcode identifier and/or to the result of the signature verification, to determine whether the ballot in the pouch is eligible for counting or whether some remedial procedure is necessary. | 12-25-2008 |
20090032591 | ELECTRONIC VOTING SYSTEM AND ASSOCIATED METHOD - An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored. | 02-05-2009 |
20090065564 | ENVELOPE THAT PROTECTS PRIVACY OF PRIMARY CONTENT WHEN INSERTING SECONDARY MATERIAL - An envelope that allows a mailer to partly seal an envelop such that the primary content is sealed within the envelope while still allowing a third party to insert secondary material into the envelope is provided. An envelope includes a first sheet and a second sheet that forms a first pouch between the second sheet and the first sheet. The first pouch has a top opening and a side opening. The envelope also includes a third sheet that forms a second pouch between the third sheet and the second sheet. The second pouch has a top opening. The envelope also has a first flap for closing both the top opening of the first pouch and the top opening of the second pouch. The envelope also includes a second flap for closing the side opening of the first pouch. | 03-12-2009 |
20090083187 | MAIL STERILIZATION INDICATOR - A mail piece having a sterilization indicator includes an irradiation status area applied to a part of said mail piece. The irradiation status area is adapted to be activated by radiation. The irradiation status area has a first color prior to activation by radiation. The irradiation status area has a second color subsequent to activation by radiation. A method for the processing a mail piece having a sterilization indicator embodying the present invention includes the steps of introducing the mail piece into a postal processing system. The mail piece has an irradiation status area which is adapted to be activated by radiation. The mail piece is radiated and processed to determine whether the radiation has activated the irradiation status area. | 03-26-2009 |
20090091119 | METHOD AND SYSTEM FOR PROTECTING PRIVACY OF SIGNATURES ON MAIL BALLOTS - Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a removable signature stub positioned on top of a signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and removes the signature stub. The signature is then covered by a label that conceals the signature under normal lighting conditions. To read the signature, light having a predetermined wavelength is directed onto the label, thereby rendering the label transparent and the signature visible. | 04-09-2009 |
20090103734 | METHOD AND SYSTEM FOR SECURING ROUTING INFORMATION OF A COMMUNICATION USING IDENTITY-BASED ENCRYPTION SCHEME - Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys. | 04-23-2009 |
20090159655 | VOTE BY MAIL SYSTEM THAT ALLOWS VOTERS TO VERIFY THEIR VOTES - A method of enabling a voter to verify that a ballot has been received and counted as intended in a vote by mail election that includes receiving the ballot from the voter in the mail, generating a vote verification mechanism for the voter, obtaining the voter's votes from the ballot and counting the votes in the election. The method further includes storing voter vote information including the voter's votes that were counted in the election, providing to the voter the vote verification mechanism and an acknowledgment that the ballot has been received and counted, and, after the election has been closed, receiving the vote verification mechanism from the voter, obtaining the voter vote information from storage using the vote verification mechanism, and displaying the voter vote information for the voter so that the voter can verify that his or her votes have in fact been counted as intended. | 06-25-2009 |
20090160174 | SECURE VOTE BY MAIL SYSTEM AND METHOD - A method of enabling a voter to vote by mail by using a secret vote code (SVC) that includes translating the SVC into a one-time code (OTC) valid only for the election, storing the OTC, and mailing to the voter a ballot, a return envelope, and a mechanism for enabling the SVC to be translated into a translated format. Further, the method includes receiving the return envelope from the voter that includes a completed ballot, the voter's signature, and the translated format, determining whether the signature obtained from the envelope matches a stored signature for the voter, obtaining a second one-time code based on the translated format and determining whether the second one-time code matches the stored one-time code. The ballot is counted only if it is determined that: (i) the signatures match, and (ii) the second one-time code matches the stored one-time code. | 06-25-2009 |
20090252901 | POSTAGE LABEL HAVING CONCEALED POSTAL INDICIUM - A postage payment label is provided which includes a substrate having an image provided thereon and a postage mark. The substrate and the image are able to transmit light of one or more first wavelengths (e.g., infrared or ultraviolet light) while the postage mark is able to absorb or reflect light of the one or more first wavelengths. Moreover, the image that is provided on the substrate is able to absorb and/or reflect light of one or more second wavelengths (e.g., visible light). Accordingly, when the image is illuminated with light of the one or more second wavelengths (e.g., visible light), the image conceals a portion or all of the postage mark. The postage mark (or relevant portion thereof), however, may be viewed when the image is illuminated with light of the one or more first wavelengths and not illuminated with light of the one or more second wavelengths. | 10-08-2009 |
20090307087 | METHOD FOR PROVIDING TARGETED ADVERTISING WHILE MAINTAINING PRIVACY OF PERSONAL INFORMATION OF RECIPIENTS - A method by which a services vendor, such as, without limitation, a health insurance company or a pharmaceutical company, among others, can provide targeted advertising to recipients based on the recipients' private personal information while still maintaining the confidentiality of such information. | 12-10-2009 |
20100058483 | METHOD FOR PROTECTING SIGNATURES STORED IN A DATABASE - A method of protecting the privacy of a signature that may be used in, for example, a vote by mail system, that includes creating a distorted version of the registration signature, storing the distorted version of the registration signature, and storing a mechanism for converting the distorted registration signature into an undistorted registration signature. The stored mechanism may later be used to reverse the distortion so that the undistorted signature can be used in a verification process. | 03-04-2010 |
20100141979 | SYSTEM AND METHOD FOR PRINTING DOCUMENTS HAVING A COPY DETECTION PATTERN - A method of printing a document includes generating commands in a computing device that include: (i) commands for printing based on document data, and (ii) an identification of a determined portion of the document data that is to be used in generating a printed copy detection pattern. The method further includes sending the printer control commands to an intermediate electronic device that stores a key, generating copy detection pattern data using the determined portion of the document data and the cryptographic key, and generating modified printer control commands that include commands for printing a first document portion based on the document data and a second document portion including the printed copy detection pattern based on the copy detection pattern data. Finally, the modified printer control commands are sent to a printing device. Also, a system is provided for implementing the method. | 06-10-2010 |
20100143578 | MULTIPLE COLOR FLUORESCENCE SECURITY IMPRINT - A method for creating a security mark includes applying a first color fluorescence ink to a substrate and applying a second color fluorescent ink to the substrate is provided. The second color fluorescent ink overlies at least a portion of the substrate where said first color fluorescent ink is applied. A third color is applied to the substrate adjacent the substrate area where said second color fluorescent ink is applied. The first color fluorescent ink, the second color fluorescent ink and the third color border are such that a security mark is formed on the substrate. The blue color fluorescence, the red color fluorescence and the third color on the substrate are such that when viewed through a lens the security mark optical characteristics change. The change is from the optical characteristics of the security mark when the security mark is not illuminated with fluorescence-exciting radiation to a different optical characteristics when the security mark is illuminated with fluorescence exciting radiation. | 06-10-2010 |
20100169649 | Image encryption for print-and-scan channels using pixel position permutation - An image encryption method that includes receiving image data based on an image, wherein the image data comprises a plurality of pixel values, and permuting a plurality of, and preferably all of, the pixel values using at least a secret key to create permuted image data. Also, an image decryption method that includes scanning a printed image to create scanned image data. The printed image is generated from permuted image data that is generated by permuting a plurality of first pixel values of first image data using at least a secret key, obtaining a plurality of second pixel values from the scanned image data, and reverse-permuting a plurality of the second pixel values using at least the secret key to create reverse-permuted scanned image data. | 07-01-2010 |