throbber
United States Patent [19]
`Haines et a1.
`
`[11] Patent Number:
`[45] Date of Patent:
`
`5,077,660
`Dec. 31, 1991
`
`[54]
`[75]
`
`[73]
`[21]
`[22]
`[51]
`[521
`[58]
`[56]
`
`REMOTE METER CONFIGURATION
`Inventors: John G. Haines, Oakland; Tracy F.
`Slaughter, Grass Valley; Charles P.
`Barker, Pleasanton, all of Calif.
`Assignee: f.m.e. Corporation, Hayward, Calif.
`Appl. No.: 328,112
`Filed:
`Mar. 23, 1989
`
`Int. Cl.5 ............................................ .. G06F 15/20
`US. Cl. .............................. .. 364/464.02
`Field of Search .................. .. 364/200, 464.02, 900
`References Cited
`U.S. PATENT DOCUMENTS
`
`. . . .. 380/37
`
`3,798,36O 3/1974 Feistel . . . . . . . . .
`
`. . . .. 380/37
`
`3,034,329 5/1962 Pitney C181. ........................ .. 70/314
`gvggg’ggz
`a“??? --------
`~ -
`- - '
`33
`.
`,
`c 1gg1ns eta.
`3,798,359 3/1974 Feistel . . . . .
`.
`340/8531
`3,800,284 3/1974 zucker et a1_ "
`340/3531
`3,360,911 1/1975 Hinman et aL
`, 364/900
`4,097,923 6/1978 Eckert, Jr. et al.
`380/21
`4,182,933 1/1980 Rosenblum .
`235/ 375
`4,222,518 9/1980 simiian
`235/375
`4,226,360 10/1930 sfmljan
`522/375
`4349971 2/1981 S‘m-l‘Fm ------ "
`N00
`' ‘ ' ‘ "
`4’253’158 2/1981 McF'ggans ‘ ' ‘ ' '
`364/900 X
`4,280,180 7/1981 Eckert et a1.
`.... .. 3154/900
`4,302,821 11/1981 Eckert et a1.
`“4/900 X
`4,310,720 V1982 Check’ Jr‘ _____ “
`235/380 X
`4,314,097 2/1932 Campbell, Jr_ _
`4,376,299 3/1983 Rivest ..................... .. 364/900
`4,424,573 1/ 1984 Eckert, Jr. et a].
`364/900
`4,447,890 5/ 1984 Dllwel 6t 81- ---- --
`364/900
`4,481,604 11/1934 Gilham 6‘ 31- ~~
`364/900
`z'4s4'ggz 1¥198g gums 6‘ al
`;$/9%
`’528’
`/ 198
`qderberg e‘ a '
`/9
`4,562,535 12/1985 Vincent et al. .
`364/200
`4,520,144 4/1986 Calvi ................ ..
`101/9307);
`4,636,975 V1987 Soderberg et a1_
`____ “ “4/900
`4,775,246 10/1988 Edelmann et al. .
`380/23
`4,775,931 10/1988 Dickie et a]. ...................... .. 364/200
`
`4,783,745 11/1988 Brookner et a1. ............ .. 364/46402
`
`. . . .. 364/464.02
`4,787,045 11/1988 Storace et a]. . . . . .
`364/46402
`4,812,992 3/1989 Storace et a1. ,
`. 364/464.02
`4,812,994 3/1989 Taylor et a]. .... ..
`4,837,714 6/1989 Brookner eta]. ................. .. 364/550
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`FOREIGN PATENT DOCUMENTS
`2636852 2/1978 Fed. Rep. of Germany .
`Primary Examiner—Parshotam S. Lall
`Assistant Examiner-Edward R. Cosimano
`Attorney, Agent, or Firm-Townsend and Townsend
`[57]
`ABSTRACT
`A technique for recon?guring in the ?eld postage me
`ters having a set of features that may be selectively
`enabled or disabled by software. The technique pro
`vides security so that the meter company
`always
`have a correct record of the con?guration of the meter
`-
`'
`r
`1
`f
`.
`.
`m the ?ak? The meter ‘5 .capab e o. bemg pm In“) a
`configuration mode by suitable entries from the key
`board, in wh1ch mode it is inhibited from printing post
`age. The meter has a storage reg1ster for a current or old
`meter type, and can receive a desired new meter type
`via keyboard entry. The meter generates an encrypted
`con?guration request code that is partially based on the
`values of the old and new meter types. The con?gura
`tion request code, when communicated to the data cen
`ter computer along with other validating identi?cation
`. f0
`t.
`is hecked b the data cent com “ter
`1“ ."m ‘on’
`c
`y
`.
`er
`I’ .
`which generates the con?guration request code usmg
`the same algorithm. If the two values agree, the data
`Center computer generates an encrypted con?guration
`enable code. This is communicated to the meter, which
`receives the computer generated con?guration enable
`code and also generates an internal con?guration enable
`code using the same algorithm as the data center com
`puter. If the con?guration enable codes agree, the meter
`v
`.t
`th M t
`t
`b with th
`W
`° "w" es
`6 0 me er ype “um 6?
`e "e
`meter type number, thereby recon?guring the meter.
`
`.
`
`.
`
`20 Claims, 7 Drawing Sheets
`
`30 /
`
`AGENTOBTNFS oomGuRAnoN
`aeoues'rcooemoumeraa
`
`32 {
`AGENTooNHmscoNHGLBAmN
`necu'esrcooewm-icarm
`COMPUTER AND oeTAms
`oomotmmoumoooe
`
`34 K
`AGEmoomRMscomGuRA'noN
`ENABLECODEWITH METER AND
`MEIERRECONFIGURES
`
`Petitioners Ex. 1005 Page 1
`
`

`

`U.S. Patent
`
`Dec. 31, 1991
`
`Sheet 1 of 7
`
`1o
`\I
`
`14 \
`
`13 \ KEYBOARD
`
`DISPLAY
`
`[16
`f,- BUILT-IN
`oEcooER/oRIvER
`
`X/YVALUE
`
`80's
`
`18
`
`[20
`
`(100K
`
`<__>
`
`24
`
`mm
`
`RAM
`
`v
`
`INTERMEDIATE
`smci
`
`[26
`OLD MTN
`CTID
`STID
`SERIALNO.
`RESETAMOINT
`
`NEW MTN
`
`I
`
`1
`
`I
`-
`ESERVED
`I
`BAM
`
`m
`
`I
`II_
`T
`m |
`
`4
`
`12 \
`
`PR'NT
`I--—-—> MECHANISM
`.
`
`METER
`INTERIOR
`
`oormoR \ \
`‘7
`METER
`Housm
`
`TO MAILING MACHINE
`
`FIG. 1
`
`Petitioners Ex. 1005 Page 2
`
`

`

`US. Patent
`
`Dec. 31, 1991
`
`Sheet 2 of 7
`
`5,077,660
`
`K30
`
`AGENT OBTAINS CONFIGURATION
`REQUEST CODE FROM METER
`
`/4 32
`AGENT CONFIRMS CONFIGURATION
`REQUEST CODE WITH CENTRAL
`COMPUTER AND OBTAINS
`CONFIGURATIW BQABLE CODE
`
`[54
`
`AGENT CONFIRMS CONFIGURATION
`ENABLE CODE WITH METER AND
`METER RECONFIGURES
`
`FIG. 2
`
`Petitioners Ex. 1005 Page 3
`
`

`

`US. Patent
`
`Dec. 31, 1991
`
`Sheet 3 of 7
`
`660
`5,077,
`
`METER
`
`AGENT
`[-42
`r40
`METER ENTERsMOOEBY CHANGING
`sELECT MEIER REMOTE
`CONFIGURATION MOOE ‘—_> MODE REGIsTER
`46
`ENTER NEW J
`MTN
`\
`
`I]!
`MEIER DISPLAYS NEEDED
`INFORMATION
`
`K“
`
`-----_-—> METER sTOREs NEw MTN IN BAM
`
`f‘ 48
`
`NO
`
`52 \
`<— NOTIFYAGENT
`/
`
`YES
`
`62
`
`35
`
`RREss CLEAR
`
`N
`IITII
`63 00mm
`?
`PRESS ENTER I”
`y
`
`-
`
`[
`
`INsTAILATION
`FLAGsET
`?
`
`INSTALLATION
`FLAGSET
`'2
`
`K‘ 58
`ENTER REsET
`AMOLNT
`I
`
`.
`
`4
`f6
`
`METER ENTERS CONFIGURATION
`>1 PENDING MOOE
`K6
`‘&
`METER OIsPIAYs CONFIGURATION
`REOLEsToOOE
`
`FIG.
`
`Petitioners Ex. 1005 Page 4
`
`

`

`US. Patent
`
`Dec. 31, 1991
`
`Sheet 4 of 7
`
`5,077,660
`
`DATA CENTER COMPUTER
`
`AGBIT
`
`/' 70
`ENTER CODES
`AND PASSWORD
`
`-(
`
`ENTER METER ./
`SERIALNUMBER
`
`K79
`
`NOTIFY AGENT —->
`
`[90
`
`I
`ENTER PREVIOUSLY WRITTEN
`DOWN DATA
`
`/'84
`
`K88
`ENTER CONFIGURATION REQUEST
`(III
`
`GENERATE OOQFIGURATIOJ
`IHJLESTOODE
`
`91
`No
`
`our
`MAICH
`
`-
`
`92
`
`/
`‘ NOTIFY AGENT
`
`YES
`[93
`GENERATE CONFIGURATION ENABLE
`CODE USING HSL VALUE
`
`K94
`
`INCREMENT
`CTID
`
`f 95
`DISPLAY ASCENDED CONFIGURATION
`BQABLE CODE
`
`FIG. 4
`
`Petitioners Ex. 1005 Page 5
`
`

`

`US. Patent
`
`Dec. 31, 1991
`
`Sheet 5 of 7
`
`5,077,660
`
`r100
`ENTER APPENDED HSL VALUE AND
`OONF'IGURA'I'IG‘J ENABLE CODE
`
`K102
`METER GB‘IERATES OU‘IFIGURATION
`ENABLE CODE USING HSL VALUE
`
`METER
`
`K105
`
`AGENT NOTIFIED ‘
`
`YE K106
`METER INCREMENTS
`CTID
`
`r107
`
`METER STORES
`HSL VALUE
`
`METER STORES RESET AMOLNT
`IN BAM
`
`L__
`
`|
`I
`
`I
`
`METER CLEARS CONFIGURATION
`FLAG
`
`Petitioners Ex. 1005 Page 6
`
`

`

`US. Patent
`
`Dec. 31, 1991
`
`Sheet 6 of 7
`
`5,077,660
`
`/' 14'
`
`10'
`\ KEYBOARD
`X/Y VALUE
`
`f 16'
`
`DISPLAY
`
`/ 13'
`
`_____ _ - SP5“?
`
`_ _
`
`_
`
`r202
`ve comnouzn
`
`:
`I
`:
`I
`I
`
`I
`|
`I
`:
`I
`|
`l
`:
`I
`l
`
`:
`
`I
`
`:
`I
`.
`20o
`:
`f 26
`I/
`I
`IAQQE___@_SE_____
`ow MIIINE
`R
`NEW MTN
`INSTALLATION FLAG
`RasErAMouNT
`INSTALLATION DATE
`c'rw/sno
`MEDER SERIAL #
`
`f 21 o
`
`f- 212
`
`(III
`cowARAToR '> VAUDATOR
`
`f 21
`
`Cm
`'NCREMENTOR
`
`K208
`CODEGENERATOR/ <_ DATA
`EmRYPrOR
`oomnousn
`I
`
`f 204
`
`r2”
`
`I
`|
`I
`:
`I
`I
`I
`I
`I
`I
`
`:
`
`I
`
`ACCT
`
`I _ . _ _ . _ _ _ _ _ _
`
`mmsnon
`
`I
`
`'
`
`:
`I
`r 20 I
`cLorx I<->‘
`I
`
`OPERA f 206
`Cam‘ IOIIEISR
`
`I
`
`:
`:
`'
`I
`
`FEATURES
`
`I _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .1
`
`SOFTWARE
`
`PRINT
`MECHANISM
`
`FIG.
`
`.
`
`METER INTERIOR
`
`I \ METER HOUSING
`
`Petitioners Ex. 1005 Page 7
`
`

`

`US. Patent
`
`Dec. 31, 1991
`
`Sheet 7 of 7
`
`5,077,660
`
`E11
`
`sELEcT METER nEnoTE
`CONFIGURATION uonE
`A46
`
`ENTER uEw
`m
`
`NOTIFY
`
`PRESS OLEAR' T
`
`PRESS ENTER
`L
`
`METER
`
`METER EITEns moE BY cmcmc
`MODE REGISTER
`1
`METER msmvs NEEDED
`momma
`
`METER STORES NEI m in am
`
`"44
`
`r448
`
`(I64 '
`METER ENTERS CONHGURATION
`mums uonE
`
`(I66
`METER msmvs GONHGURATION
`aEouEsT 000E
`'
`
`H6. 7
`
`Petitioners Ex. 1005 Page 8
`
`

`

`1
`
`REMOTE METER CONFIGURATION
`
`5,077,660
`2
`enable code and also generates an internal con?guration
`enable code using the same algorithm as the data center
`computer. If the con?guration enable codes agree, the
`meter overwrites the old meter type number with the
`new meter type number, thereby recon?guring the
`meter.
`A further understanding of the nature and advantages
`of the present invention can be realized by reference to
`the remaining portions of the speci?cation and the at
`tached drawings.
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. I is a block diagram of a preferred postage
`meter capable of being recon?gured in the ?eld;
`FIG. 2 is a high level ?owchart of the process fo
`recon?guring the postage meter;
`‘
`FIG. 3 is a detailed ?owchart of the procedure for the
`agent to obtain a con?guration request code generated
`by the meter in the second embodiment;
`FIG. 4 is a detailed flowchart of the procedure for the
`agent to con?rm the con?guration request code with
`the data center computer;
`FIG. Sis a detailed ?owchart of the procedure for the
`agent to enter the con?guration enable code into the
`meter;
`FIG. 6 is a block diagram of an alternative postage
`meter capable of being recon?gured in the ?eld; and
`FIG. 7 is a detailed ?owchart of the procedure for the
`agent to obtain a con?guration request code generated
`by the meter in the ?rst embodiment.
`
`25
`
`30
`
`20
`
`Related copending applications include: “REMOTE
`METER I/O CONFIGURATION", ?led Mar. 23,
`1989, Ser. No. 07/327,779; “SECURITY EXTEN
`SION PROCEDURE FOR REMOTE SETTING
`METE "’, ?led Mar. 23, I989, Ser. No. 07/328,099; and
`“EMERGENCY POST OFFICE FOR REMOTE
`SETTING METER", ?led Mar. 23, 1989, Ser. No.
`07/327,487.
`FIELD OF THE INVENTION
`The present invention relates generally to postage
`meters and more particularly to electronic meters capa
`ble of being recon?gured.
`BACKGROUND OF THE INVENTION
`With the advent of electronic postage meters, it has
`become possible to offer meter customers a large num
`ber of optional features. Each additional feature, how
`ever, creates a larger number of possible combinations
`of features. Therefore, in order for a meter company to
`provide a large selection of features, it must maintain a
`large inventory of meters. This is costly and inef?cient.
`In rental or leasemarkets, the inventory problem is
`increased by customer demands for a replacement
`meter of like features when the meter in service is dam
`aged or fails.
`A customer needing to replace the meter or wanting
`to change the features on his meter must wait for the
`agent of the meter company to obtain a meter having
`the desired set of features. If the agent does not have a
`large inventory, it becomes necessary to have a meter
`con?gured at the factory. Therefore, any attempts to
`reduce the number of meters in the pipeline will ad
`versely affect the length of time necessary to service the
`customer’s request.
`SUMMARY OF THE INVENTION
`The present invention provides a technique for se
`curely recon?guring postage meters in the ?eld,
`thereby allowing variation of the features of the meter.
`The technique is readily implemented in the meter soft
`ware. Because the technique provides security over the
`meter recon?guration process, only authorized meter
`recon?gurations can occur. Therefore, the company
`will always have a correct record of the con?guration
`of the meter in the ?eld.
`50
`The technique assumes that the meter has a set of
`features that may be selectively enabled or disabled by
`software. The meter is capable of being put into a con
`?guration mode by suitable entries from the keyboard,
`in which mode it is inhibited from printing postage. The
`55
`meter has a storage register for a current or old meter
`type, and can receive a desired new meter type via
`keyboard entry. The meter has software for generating
`an encrypted con?guration request code that is partially
`based on the values of the old and new meter types. The
`con?guration request code, when communicated to a
`60
`data center computer along with other validating iden
`ti?cation information, is checked by the data center
`computer which computes the con?guration request
`code using the same algorithm. If the two values agree,
`the data center computer generates an encrypted con
`?guration enable code that is partially based on the
`meter serial number. This is communicated to the me
`ter, which receives the meter generated con?guration
`
`35
`
`45
`
`65
`
`DETAILED DESCRIPTION OF THE SPECIFIC
`EMBODIMENTS
`Meter Overview : Structure
`FIG. 1 is a block diagram of a preferred postage
`meter 10 that can be recon?gured in the ?eld. Meter 10
`includes a print mechanism 12, accounting registers,
`and control electronics,‘ all enclosed within a secure
`meter housing 13. A keyboard 14 and a display 16 pro
`vide the user interface. A connector 17 provides an
`electrical connection with a mailing machine for con
`trol of the printing process. The control electronics
`includes a digital microprocessor 18 which controls the
`operation of the meter, including the basic functions of
`printing and accounting for postage, and optional fea
`tures such as department accounting and remote setting.
`The microprocessor is connected to a clock 20, a read
`only memory (ROM) 22, a random access memory
`(RAM) 24, and a battery augmented memory (BAM)
`26.
`ROM 22 is primarily used for storing nonvolatile
`information such as software and data/function tables
`necessary to run the microprocessor. The ROM can
`only be changed at the factory. RAM 24 is used for
`intermediate storage of variables and other data during
`meter operation. BAM 26 is primarily used to store
`accounting information that must be kept when the
`meter is powered down. The BAM is also used for
`storing certain flags and other information that is neces
`sary to the functioning of the microprocessor. Such
`information includes meter identifying data such as the
`meter serial number and BAM initialization date, and a
`number of parameters relevant to the remote con?gura
`tion of the meter.
`The meter is provided with a number of features that
`may be enabled or disabled by software. Representative
`features include department accounting (with various
`
`Petitioners Ex. 1005 Page 9
`
`

`

`4
`Selection Table to determine whether the meter is con
`?gured to have a certain feature or not and thereby
`execute the appropriate code.
`Upon the execution of the appropriate software code,
`the microprocessor returns to a scanning state as it waits
`for further user input.
`
`5,077,660
`3
`levels of sophistication and numbers of departments that
`can be tracked), set date prompt, low postage warning,
`calculator mode variable length security codes (see'
`Appendix D for details), and remote setting. The re
`mote setting feature is a capability of having the meter’s
`postage amount increased without removing the meter
`from the customer site. In a ?rst embodiment of the
`invention, the meter postage amount can be increased
`by a variable amount during the remote setting process.
`Alternatively, in a second embodiment of the invention,
`the meter postage amount can be increased by a ?xed
`increment called the ?xed remote setting amount. The
`?xed remote setting amount may then be varied during
`remote con?guration of the meter. Additionally, the
`meter may have four print wheels (maximum postage
`$99.99), but the high order print wheel may be disabled
`(maximum postage $9.99).
`In the ?rst and second embodiments, certain meter
`features are hardware con?gured and cannot be set by
`software. This includes the print indicium (U .8. Postal
`Service or United Parcel Service) and the position of
`the decimal point (four-bank whole cents or four-bank
`decimal cents). These features may be software con
`trolled and con?gurable in alternative embodiments of
`the invention.
`25
`Whether a feature or a feature set is enabled is con
`trolled by a meter type number (MTN) representing the
`set of features enabled. The MTN is stored in BAM and
`is checked by the microprocessor during meter power
`up and at some branch points in the software.
`
`30
`
`35
`
`40
`
`Meter Relationship with the Data Center Computer
`In the ?rst and second embodiments, the meter is
`con?gured to a standard feature set before leaving the
`factory. Because the feature set is known, the meter can
`be functional and still does not need to be registered on
`the data center computer until it has been recon?gured
`a ?rst time. In an alternative embodiments, the meter
`can be disabled state for security reasons until it has
`been recon?gured a ?rst time.
`During the recon?guration process, the meter’s serial
`number, present con?guration and other information
`speci?c to the meter (which were already stored in the
`meter’s memory during an initialization process at the
`factory) are entered on the data center computer. The
`meter and the computer are then able to generate identi
`cal encrypted codes by using the same encryption rou
`tine and input numbers. The encrypted codes help the
`data center computer maintain control over the feature
`set of each meter.
`.
`'
`Two input numbers used by the meter and the com
`puter to generate encrypted codes are the con?guration
`transaction identi?er (“CTID”) and the setting transac
`tion identi?er (“STID”). They are both speci?c to the
`meter and dependent upon the meter serial number.
`They may also be incremented after each use. The
`CT-ID is normally used for recon?guring the meter
`functions and the STID is normally used for remote
`setting the meter postage. Separate numbers are used
`for the separate procedures in order to maximize secu
`rity and minimize complexity caused by interdepen
`dence. The encryption routine is described in greater
`detail below.
`Meter Con?guration Method
`FIG. 2 is a high level ?owchart of the process neces
`sary for recon?guring the postage meter by an agent at
`a customer's site or at the agent’s technical service area.
`In a ?rst stage 30, the agent obtains a con?guration
`request code generated by the meter. This con?guration
`request code is essentially a password to the data center
`computer, and is based upon a combination of factors,
`the combination of which only the data center com
`puter would know. In a second stage 32, the agent con
`?rms the con?guration request code with the data cen
`ter computer. Upon con?rmation from the computer,
`the computer provides a con?guration enable code back
`to the agent. The con?guration enable code is essen
`tially a password from the data center computer to the
`meter stating that it is permissible to recon?gure to the
`desired feature set. In a third stage 34, the agent enters
`the con?guration enable code into the meter. The meter
`con?rms the con?guration enable code and recon?g
`ures itself.
`FIG. 3 is a detailed flowchart of stage 30 for the
`second embodiment. Some meters have displays that
`are sophisticated and allow for user prompting. There
`fore, in each of the steps described below where the
`meter requires certain information in order to move to
`the next step, some meters may prompt the agent to
`make that step.
`
`Meter Overview : Operation
`In order to simplify the software and enhance micro
`processor performance in the ?rst and second embodi
`ments, the microprocessor performs several initializa
`tion procedures during meter power-up. In some of the
`initialization procedures, the microprocessor uses the
`MTN stored in BAM to index in RAM the software
`code stored in ROM to tables also stored in ROM. This
`indexing allows the microprocessor to more quickly
`read the proper tables for information without having to
`repeatedly determine what table to read.
`One indexed table is a Meter Selection Table which
`contains information regarding what features the meter
`has based upon the MTN and the type of meter (i.e. US.
`Postal Service or United Parcel Service, four-bank
`whole cents or four-bank decimal cents, etc.). Another
`indexed table is a Key Table which contains the address
`of the appropriate software code to be executed when a
`key is pressed by the user. The Key Table indexing is
`also partially based upon the MTN. After the initializa
`tion procedures are performed, the microprocessor
`waits for user input.
`The microprocessor is able to determine user input by
`periodically scanning the keyboard. As a key is pressed,
`x and y coordinate values are determined by the micro
`processor. The microprocessor converts the x and y
`coordinate values to an equivalent ASCII byte. The
`microprocessor sends the ASCII byte to the display,
`which contains its own internal decoder and driver for
`displaying the ASCII information to the user. The mi
`croprocessor then determines what software code in
`ROM to execute based upon the ASCII byte by reading
`the indexed Key Table in ROM.
`The software code contains branch points where the
`microprocessor must read a table in ROM or a variable
`in BAM to determine which code to execute. For exam
`ple, the microprocessor may read the indexed Meter
`
`55
`
`60
`
`65
`
`Petitioners Ex. 1005 Page 10
`
`

`

`20
`
`5,077,660
`5
`6
`prompts the agent to enter the reset amount by which
`In a ?rst step 40, the agent then puts the meter into a
`remote con?guration mode by pressing a certain key
`postage will be increased through use of the remote
`setting feature (step 58). If the new MTN does not en
`sequence and entering a service access code. The key
`able the remote setting feature, i.e., the output of deci
`sequence is not obvious. This prevents customers and
`other unauthorized personnel from accidentally enter
`sion box 53 is “no”, the meter determines if the installa
`tion ?ag has been set (step 54). A set installation ?ag
`ing the con?guration mode. The service access code is
`known to the agent and must be entered after complet
`indicates that the meter has been “installed” in accor
`dance with the procedures described in Appendix A
`ing the key sequence within a limited time interval that
`is checked by the microprocessor in combination with
`and is linked with the post of?ce in the central data
`computer. The enablement status of the remote setting
`the clock. This further prevents customers and other
`unauthorized personnel from entering the con?guration
`feature may not be changed in a meter so installed. If the
`installation ?ag is set, the proposed recon?guration is
`mode.
`Upon entry of the predetermined key sequence and
`rejected and the agent so noti?ed (step 52). If the instal
`lation flag is not set, the meter displays the new MTN
`the agent access code, the meter enters the remote con
`for agent con?rmation (step 65).
`?guration mode by setting a mode register located in
`BAM (step 42). This prevents the meter from being
`If, however, the meter determines, at step 50, that the
`used for printing purposes while being recon?gured.
`new MTN will not change the enablement status of the
`remote setting feature, the meter next determines
`The meter then displays the meter serial number, the
`whether this status is enabled (step 56). If it is, the meter
`meter BAM initialization date, and the old meter type
`number (old MTN) (step 44). The BAM initialization
`determines if the installation flag is set (step 57). If the
`date is preferably a four digit number wherein the four
`installation ?ag is not set, the meter permits the agent to
`change the reset amount as part of the re-con?guration.
`digits YDDD express the date in which the meter was
`last initialized. The DDD stands for the number of days
`The meter prompts the agent to enter the reset amount
`since December 31 and Y is the least signi?cant digit of
`to be associated with the remote setting feature. If,
`however, the installation flag is set (step 57), or the new
`the year in which the meter was initialized. The old
`25
`MTN does not enable the remote setting feature (step
`MTN is a number that de?nes the present feature set
`that the meter is presently con?gured to.
`56), the meter omits step 58 and displays the new MTN
`for agent con?rmation (step 65).
`In the second embodiment, the meter also displays
`the Ascending Register amount or some other meter
`If the agent wants to start the process again with a
`speci?c identifying information (step 44). The Ascend
`new MTN, then the agent must press a selected key
`ing Register contains the amount of postage the meter
`such as the CLEAR key (step 62). If the agent wants to
`has printed since the meter has been initialized.
`continue, then the agent must press a selected key, such
`as the ENTER key, followed by the service access code
`The agent then enters the new MTN into the meter
`or some other con?rmation code (step 63). At this point,
`(step 46). This new number represents the set of features
`that the meter will have after recon?guration. The
`the meter puts the meter in a con?guration pending
`mode by setting a meter con?guration flag located in
`agent must then press a selected key, such as the
`BAM (step 64) Once in the con?guration pending
`ENTER key, followed by the service access code
`mode, the meter must be recon?gured properly or else
`within a limited time interval to indicate that the en
`it will not return to the print mode. This prevents tam
`tered new MTN is correct and desired. If the entered
`pering with the recon?guring of the meter. The meter
`new MTN is incorrect or not desired, the agent may let
`the timer'expire or press another selected key such as a
`remains in this mode even when the meter is turned off
`CLEAR key. The agent then enters the correct new
`and then turned back on.
`The meter then generates and displays an encrypted
`MTN or exits the remote con?guration mode. Once the
`meter con?guration request code (step 66). In the sec
`correct new MTN is entered, the agent must press the
`selected key (i.e., ENTER) followed by the service
`ond embodiment, the con?guration request code is par
`tially based on the Ascending Register amount or some
`access code within a limited time interval to indicate
`other meter identifying register, the old MTN, the new
`that it is the correct new MTN. The meter then stores
`MTN, and the remote setting amount. The encryption
`the new MTN in BAM (step 48).
`process for the ?rst and second embodiments is de
`The meter then performs a series of tests to determine
`scribed in further detail below.
`whether the meter is authorized to recon?gure to the
`new feature set represented by the new MTN. In the
`FIG. 4 is a ?owchart of stage 32 as shown in FIG. 2
`for the ?rst and second embodiments. The agent estab
`second embodiment, the meter also allows the agent to
`enter the ?xed remote setting amount following the
`lishes communication with the data center computer
`series of tests.
`over a standard telephone. In the ?rst and second em
`bodiments, the agent may communicate with the data
`The meter compares the new MTN with the old
`MTN to determine whether the remote setting feature
`center computer on a touch tone telephone by pressing
`will be among those features changed by the adoption
`the keys. Alternative embodiments may utilize a tele
`of the new MTN (step 50). If there will be such a
`phone communications device that includes a user or
`change (either enabling a disabled remote setting fea
`meter interface and a modem, or by voice recognition
`ture or disabling an enabled remote setting feature), the
`over a telephone.
`meter determines if the amount in the descending regis
`The agent ?rst enters various codes and a password
`to the computer (step 70). These include a transaction
`ter is equal to zero (step 51). If the amount in the de
`scending register is not equal to zero, the meter rejects
`code (which describes that the agent is attempting to do
`the attempted re-con?guration and noti?es the agent
`a remote con?guration for a meter) his employee num
`(step 52). If the amount in the descending register is
`ber, and his authorization code (which is a password to
`the data center computer for that employee).
`zero, the meter determines whether the new MTN ena
`bles the remote setting feature (step 53). If the new
`The agent then enters the meter serial number which
`MTN enables the remote setting feature, the meter
`was previously displayed by the meter but can also be
`
`35
`
`40
`
`45
`
`60
`
`65
`
`Petitioners Ex. 1005 Page 11
`
`

`

`7
`found on the exterior of the meter (step 76). If the data
`center computer determines that the serial number is
`within a valid range (step 78), then the user may con
`tinue. Otherwise, the computer will notify the agent
`that the serial number is not within a valid range (step
`79) and the agent must reenter the serial number or
`terminate the transaction.
`The agent then enters data previously obtained in
`step 44 and written down above (step 84). In the ?rst
`embodiment, this includes the BAM initialization date,
`the old MTN and the new MTN. In the second embodi
`ment, this includes the BAM initialization date, the old
`MTN, the new MTN, the Ascending Register amount,
`and the remote setting amount.
`The agent then enters the con?guration request code
`from the meter (step 88). From the information above,
`the computer is also able to generate a con?guration
`request code (step 90). The computer checks that its
`con?guration request code matches the con?guration
`request code generated by the meter (step 91). If they
`do not match, then the agent has improperly entered
`numbers, the meter has been improperly recon?gured,
`or some other error has occurred. If the codes do not
`match, then the agent is noti?ed (step 92) and must
`repeat the above steps starting with entering the meter
`serial number (step 76) or terminate the transaction.
`If the two codes match, then the computer generates
`an encrypted con?guration enable code using the cur
`rent high security length (HSL) value (step 93). The
`data center computer or other CTID counter then in
`crements the CTID located within the computer (step
`94). The HSL value is a level of security presently uti
`lized by the meter and data center computer which
`affects the length of codes passed between the meter
`and the data center computer (see encryption routine
`and Appendix D for details). The computer appends the
`HSL value to the con?guration enable code and con
`veys the appended code to the agent (step 95).
`FIG. 5 is a ?owchart of stage 34 shown above in FIG.
`2. The agent enters the appended computer generated
`HSL value and con?guration enable code into the
`meter (step 100). The meter then generates its own
`con?guration enable code using the appended HSL
`value (step 102) and compares that code with the en
`tered con?guration enable code (step 104). If the codes
`do not agree, then the agent is noti?ed (step 105) and the
`agent reenters the computer generated code. If the
`con?guration enable codes agree, then the meter knows
`that it is authorized to recon?gure. The meter then
`increments the CTID (step 106). The meter stores the
`new HSL value and the MTN in the HSL value loca
`tion and the meter type number location in BAM (steps
`107, 108). In the second embodiment, the meter also
`stores the ?ve-digit remote setting amount in the remote
`setting amount location BAM if it was entered (step
`110). The meter then clears the con?guration ?ag (step
`112), thereby allowing the meter to return from the
`con?guration pending mode to the print mode.
`
`Alternative Meter
`FIG. 6 is a block diagram of an alternative postage
`meter capable of being recon?gured in the ?eld. Primed
`reference numerals are used for blocks that correspond
`to those in FIG. 1.
`Meter 10' includes an external keyboard 14' and a
`display 16' to provide for user interface with the meter.
`A secure meter housing 13' encloses a print mechanism
`12‘, clock 20’, registers or ?ip-?ops 26’, and control
`
`65
`
`5,077,660
`8
`circuitry 200. The control circuitry includes several
`controllers and other hard-wired circuits in lieu of a
`microprocessor as shown in FIG. 1.
`The control circuitry includes an I/O controller 202
`which performs as an interface between the rest of the
`control circuitry and the keyboard and display. A data
`controller 204 performs as an interface between the
`registers and the rest of the control circuitry. An opera
`tions controller 206 controls the operations of the meter
`by executing the feature software stored in the registers.
`The operations controller knows which features to
`execute by checking the new MTN register stored in
`BAM. An inhibitor 207 checks the mode register stored
`in the registers to determine whether operations of the
`meter should be inhibited.
`A code generator/encryptor 208 continuously checks
`various registers in the registers and generates two en
`crypted codes based upon thos

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket