| List of Figures | p. xiii |
| List of Tables | p. xvii |
| Foreword | p. xix |
| Preface | p. xxi |
| Acknowledgements | p. xxv |
| Introduction | p. 1 |
| What is Electronic Postage | p. 1 |
| Short History of Postage | p. 2 |
| Fraud, Meter Manipulation and Countermeasures | p. 9 |
| The Rise of Electronic Postage | p. 16 |
| Advancing Postal Markets | p. 20 |
| Postal Security | p. 20 |
| Postal Liberalization | p. 21 |
| Competitive Postal Operators | p. 22 |
| Postal Presorters | p. 23 |
| International Mail | p. 23 |
| Outlook | p. 24 |
| Electronic Postage Systems | p. 25 |
| General Model of E-Postage Systems | p. 25 |
| E-Postage Devices | p. 25 |
| E-Postage Minting System | p. 28 |
| Indicia | p. 32 |
| Mail Processing and Verification | p. 34 |
| Multi-Carrier Capabilities | p. 35 |
| E-Postage Devices | p. 35 |
| Interface to E-Postage Provider | p. 35 |
| Storing Electronic Postage | p. 36 |
| Computing Secure Indicia | p. 37 |
| Postal Security Devices | p. 38 |
| Value Added Services | p. 39 |
| Postage Rate Tables | p. 40 |
| Acquiring Usage Data from E-postage Devices | p. 43 |
| Preparing Traceable Mail | p. 45 |
| Postage or Date Correction | p. 46 |
| Reply Mail | p. 47 |
| Commercial Metering Services | p. 47 |
| Addressing, Mail Forwarding and Return Services | p. 48 |
| General Architecture of E-Postage Systems | p. 51 |
| E-Postage Devices | p. 51 |
| Closed Offline E-Postage Devices | p. 52 |
| Open Offline E-Postage Devices | p. 63 |
| Open Online E-postage Devices | p. 68 |
| E-Postage Provider System | p. 70 |
| Local and Remote State of an E-Postage Device | p. 72 |
| Offline E-Postage Device Interface | p. 73 |
| Online E-Postage Device Interface | p. 76 |
| Database of Remote States | p. 78 |
| System Operator Interface | p. 78 |
| Financial Interface | p. 79 |
| Postal Interface | p. 81 |
| Postal Registration Interface | p. 83 |
| Post Backoffice | p. 84 |
| Link to Bank | p. 84 |
| Link to E-Postage Provider | p. 84 |
| Link to Mail Processing Center | p. 85 |
| Mail Processing Centers | p. 85 |
| Processing Mail | p. 86 |
| Postage Verification at Mail Processing Centers | p. 87 |
| Cryptography Primer | p. 91 |
| Basic Cryptographic Mechanisms | p. 91 |
| Confidentiality and Privacy | p. 92 |
| Symmetric Encryption | p. 93 |
| Asymmetric Encryption | p. 94 |
| Constructions | p. 94 |
| Security of Encryption Mechanisms | p. 95 |
| Hash Functions | p. 96 |
| Constructions | p. 97 |
| Message Authentication | p. 98 |
| Message Authentication Codes | p. 100 |
| Digital Signatures | p. 101 |
| Security of Message Authentication Mechanisms | p. 102 |
| Key Management | p. 106 |
| Key Management Life Cycle | p. 107 |
| Random Bit Generators | p. 109 |
| Session Key Establishment | p. 112 |
| Public Key Certificates | p. 113 |
| Security Domains | p. 114 |
| Security Architecture | p. 117 |
| General Security Architecture | p. 119 |
| What is a Security Architecture | p. 119 |
| Offline E-Postage Systems | p. 119 |
| Mail Processing Domain (A) | p. 119 |
| Refill Domain (B) | p. 121 |
| Online E-Postage Systems | p. 121 |
| Mail Processing Domain (A) | p. 122 |
| Online E-Postage Domain (C) | p. 122 |
| Backoffice Security Domains | p. 123 |
| Provider Post Backoffice Domain (D) | p. 123 |
| Provider Bank Backoffice Domain (E) | p. 124 |
| Post Bank Backoffice Domain (F) | p. 125 |
| Summary of Cryptographic Keys | p. 125 |
| Industrial Offline E-Postage Systems | p. 127 |
| Industrial Offline E-Postage | p. 127 |
| The Closed Offline E-Postage Market | p. 127 |
| United States Postal Services | p. 128 |
| IBIP for Closed Systems | p. 129 |
| Postal Value Added Services | p. 134 |
| IBI-Lite for Closed Systems | p. 139 |
| Canada Post Corporation | p. 140 |
| Digital Meter Indicia Specification (DMIS) | p. 141 |
| Postal Value Added Services | p. 147 |
| Deutsche Post | p. 151 |
| Frankit | p. 152 |
| Postal Value Added Services | p. 160 |
| Netherlands Post (TPG Post) | p. 164 |
| Other Postal Markets | p. 165 |
| Preliminary Appraisal | p. 165 |
| Industrial Online E-Postage Systems | p. 167 |
| Industrial Online E-Postage | p. 167 |
| The Online E-Postage Market | p. 167 |
| United States Postal Services | p. 169 |
| IBIP for Open Online E-Postage Systems | p. 169 |
| Postal Value Added Services | p. 173 |
| IBI-Lite for Online E-Postage Systems | p. 174 |
| Deutsche Post | p. 174 |
| Stampit for Open Online E-Postage Systems | p. 175 |
| Postal Value Added Services | p. 180 |
| Security Risks in E-Postage Systems | p. 183 |
| Risk Management | p. 183 |
| Attacker Model | p. 185 |
| Backoffice Domains | p. 186 |
| Refill, Online E-Postage and Mail Delivery Domain | p. 186 |
| Threats to E-Postage Systems | p. 187 |
| Social Engineering | p. 187 |
| Backoffice Domains | p. 188 |
| Refill Domain and Online E-Postage Domain | p. 188 |
| Mail Processing Domain | p. 190 |
| Algorithmic Level | p. 191 |
| Security Safeguards | p. 195 |
| Revenue Reconciliation | p. 196 |
| Backoffice Domains | p. 196 |
| Refill Domain and Online E-Postage Domain | p. 197 |
| Mail Processing Domain | p. 199 |
| Privacy in E-Postage Systems | p. 201 |
| Anonymous Mail | p. 201 |
| R-Anonymous Mail | p. 202 |
| P-Anonymous Mail | p. 202 |
| Fully-Anonymous Mail | p. 203 |
| Anonymous Postmarks | p. 203 |
| Pseudonymity and Unlinkability | p. 203 |
| Anonymous Electronic Postmarks | p. 204 |
| Availability | p. 205 |
| Evaluation, Assurance and Postal Approval | p. 207 |
| Terminology | p. 207 |
| The Postal Approval Process | p. 207 |
| The Security Evaluation Process | p. 212 |
| Security Compliance Testing | p. 213 |
| FIPS 140 | p. 213 |
| International Postage Meter Approval Requirements | p. 216 |
| Security Model of Digital Postage Meters | p. 217 |
| FIPS 140 vs. Common Criteria | p. 219 |
| Integration Testing of E-Postage Provider System | p. 221 |
| Readability Testing | p. 222 |
| Postal Standardization Bodies | p. 223 |
| CEN TC 331 Postal Services | p. 223 |
| Universal Postal Union (UPU) | p. 224 |
| Outlook | p. 225 |
| The Future of Electronic Postage | p. 225 |
| References | p. 227 |
| List of Acronyms | p. 235 |
| About the Author | p. 241 |
| Index | p. 243 |
| Table of Contents provided by Ingram. All Rights Reserved. |