System for accepting non harming mail at a receptacle

ABSTRACT

A system that determines if mail contains life-harming materials before the mail enters the interior of a receptacle, i.e., mail box. This invention accomplishes the foregoing by scanning mail in a control chamber of a receptacle that is addressed to a recipient which contains material that may or may not be life-harming; capturing an image of the face of the mail, which includes the name and physical address of the recipient and the postal indicia; processing the image on the face of the mail to identify the mailer and the mail to access the possibility of the presence of life-harming material in the mail. If certain information in the image on the face of the mail is known, the mail will be allowed to enter an inner chamber of the receptacle.

CROSS REFERENCE TO RELATED APPLICATIONS

Reference is made to commonly assigned co-pending patent applications: Ser. No.: 10/015,464 filed Dec. 12, 2001, entitled “Method And System For Accepting Non-Harming Mail At A Home Or Office” in the name of Ronald P. Sansone; Ser. No.: 10/015,376 filed Dec. 12, 2001, entitled “System For Accepting Non-Life-Harming Mail From People Who Are Authorized To Deposit Mail In A Receptacle” in the name of Ronald P. Sansone; Ser. No.: 10/015,423 filed Dec. 12, 2001, entitled “Method And System For Accepting Non-Toxic Mail That Has An Indication Of The Mailer On The Mail” in the name of Ronald P. Sansone; and Ser. No.: 10/015,469 filed Dec. 12, 2001, entitled “System For A Recipient To Determine Whether Or Not They Received Non-Life-Harming Materials” in the name of Ronald P. Sansone.

FIELD OF THE INVENTION

The invention relates generally to the field of mail delivery systems and, more particularly, to methods that detect the presence of life harming materials.

BACKGROUND OF THE INVENTION

People have used the United States Postal Service (USPS) and other courier services, e.g., Federal Express®, Airborne®, United Parcel Service,® DHL®, etc., hereinafter called “carriers”, to deliver materials to recipients to whom the sender does not want to deliver personally. Unfortunately, sometimes the delivered materials may be illegal and/or hazardous to the health of the recipient and to the party who is delivering the goods, e.g., life-harming. Examples of life harming materials are explosives; gun powder; blasting material; bombs; detonators; smokeless powder; radioactive materials; ammunition; atomic weapons; chemical compounds or any mechanical mixture containing any oxidizing and combustible units, or other ingredients in such proportions, quantities, or packing that ignite by fire, friction, concussion, percussion or detonation of any part thereof which may and is intended to cause an explosion; poisons; carcinogenic materials; caustic chemicals; hallucinogenic substances; illegal materials; drugs that are illegal to sell and/or dispense; and substances which, because of their toxicity, magnification or concentration within biological chains, present a threat to biological life when exposed to the environment, etc.

Soon after the Sep. 11, 2001, terrorist attack on the United States, someone and/or a group of people has been adding harmful biological agents to the mail. The addition of harmful biological agents to the mail submitted to the USPS has caused the death of some people and necessitated the closure of some post offices and other government office buildings. Thus, there is an urgent need to exclude life-harming materials that are included in the mail.

SUMMARY OF THE INVENTION

This invention overcomes the disadvantages of the prior art by providing a system that enables carriers of letters, flats and/or packages (hereinafter “mail”) that are addressed to a recipient to determine the identity of the person or group that placed an indicia and other information on mail, i.e., the person or group who applied for a license to use the meter. The identity of the mailing would also be uniquely identified. Since the identity of the mailer and specific item being mailed in a receptacle would be known, people would not likely place life-harming material in the mail if they would likely be apprehended. Thus, this invention is able to assess the likelihood that the mail contains life-harming materials before the mail enters the interior of a receptacle, i.e., mailbox. Hence, the carrier may be able to remove mail from the mail stream at its entry point to the mail stream before it causes human harm and/or causes extensive property damage.

This invention accomplishes the foregoing by scanning mail in a control chamber of a receptacle that is addressed to a recipient which contains material that may or may not be life harming; capturing an image of the face of the mail, which includes the name and physical address of the recipient and the postal indicia; and processing the image on the face of the mail to identify the mailer and the mail to assess the possibility of the presence of life harming material in the mail.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of this invention.

FIG. 2 is a drawing of receptacle 500 of FIG. 1 in greater detail.

FIG. 3A is a drawing of scanner and data processors 15 and 45 of FIG. 1 in greater detail.

FIG. 3B is a drawing of mail box controller 513 of FIG. 2 in greater detail.

FIG. 4 is a drawing of a mail piece containing a postal indicia that was affixed by a electronic meter.

FIG. 5 is a drawing of a mail piece containing an Information-Based Indicia.

FIG. 6 is a drawing of a flow chart of the scan/validate process.

FIG. 7 is a block diagram of a PSD based PC mailing system.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

Referring now to the drawings in detail, and more particularly to FIG. 1, the reference character 11 represents an electronic postage meter. Postage meter 11 includes a funds vault 12, that represents the value of the postage that may be used by meter 11; an accounting and encryption module 13 that contains information that is used to print indicia 18; a printer 14; a scanner and processor 15; a controller 16; a clock and calendar 6; a user I/O 17; and, a signal I/O 56. Accounting and encryption module 13 obtains a security code that may be obtained from address field 9 of mail piece 10 and information contained in postage meter 11. The manner in which the aforementioned security code is obtained is disclosed in the Sansone et al U.S. Pat. No. 4,831,555 entitled “Unsecured Postage Applying System” herein incorporated by reference. User I/O 17 comprises a keyboard in which an operator may enter information into meter 11, and a display in which an operator of meter 11 may read information about meter 11. Funds vault 12, accounting and encryption module 13, indicia printer 14, scanner and processor 15, clock and calendar 6, and user I/O 17 are coupled to controller 16. Clock and calendar 6 provides an internal source of time and date for controller 16. Thus, clock and calendar 6 will supply the instant date and time that meter 11 affixed the indicia to mail piece 10. Scanner and processor 15 will store the above information in buffer 54 (described in the description of FIG. 3A).

Actions performed by meter 11 are communicated to controller 16. Controller 16 controls the actions of postage meter 11. Clock and calendar 6 also permit controller 16 to store the date and time that postal indicia 18 was affixed to mail piece 10. Controller 16 uses the weighing of the mail piece to determine the correct postage, and enables meter 11 to affix the correct postage to the mail piece. Controller 16 is described in Wu's U.S. Pat. No. 5,272,640 entitled “Automatic Mail-Processing Device With Full Functions” herein incorporated by reference.

The user of meter 11 places the mail piece to be mailed on a scale (not shown) and enters the classification of the material to be mailed, i.e., first class mail, standard mail, parcel post, etc., into the keyboard of I/O 17, and relevant information regarding the object to be mailed is displayed on the display of I/O 17.

Printer 14 will print postal indicia 18 on mail piece 10. Scanner and processor 15 scans address field 9 and sender return address field 8 of mail piece 10. Then, scanner and processor 15 segments the information contained in fields 8 and 9 and stores the segmented information, i.e., tracking code 7. Tracking code 7 may be similar to or the same as the security code determined by accounting encryption module 13. For instance, a unique tracking number may be composed by assembling a number that includes the meter number, the date of mailing the mail piece, the time of day, the postage placed on the mail piece, the zip code of the licensee of the meter, the name, address, city, state and zip code of the sender of the mail piece, and the name, address, city, state and zip code of the recipient of the mail piece. It will be obvious to one skilled in the art that any combination of the aforementioned variables may be used if the meter number is included. In the United States, meter manufactures identify their meters by one or two alpha characters before the meter number. It will also be obvious to one skilled in the art that many other variables may be used to produce unique tracking numbers.

I/O 56 is coupled to modem 20 and scanner and processor 15. Modem 23 is coupled to modem 20 via communications path 24, and modem 21 is coupled to modem 23 via communications path 25. Modem 23 is coupled to postage meter data center computer 26. Modem 23 is coupled to postal data center 516 via communications path 521. Computer 26 manages the day-to-day operation of its postage meters metering, i.e., installing new postage meters, withdrawing postage meters, and refilling postage meters with customer funds.

Computer 26 is coupled to postal funds data base 27. Data base 27 stores postal funds that have been used and credited to meters 11 and 41. Computer 26 is also coupled to outbound mail data buffer 28 that receives information about mail piece 10 from postage meter 11, i.e., tracking number 7 and address field 9; inbound mail data buffer 29 that receives information about mail piece 10 from postage meter 41, i.e., tracking number 7 and address field 9; letter box entry data buffer 518 that buffers the scanned data from receptacle 500 (FIG. 2), and upload data computer 30 that receives and processes information from buffers 28 and 29. Processed mail data base 31 is coupled to upload data computer 30. Processed mail data base 31 stores the result of the output of computer 30 and makes it available to computer 26 for transmission to meter 11.

Postage meter 41 includes a funds vault 42 that represents the value of the postage that may be used by meter 41; an accounting and encryption module 43 that contains information that is used to print postal indicium; a printer 44; a scanner and processor 45; a controller 46; a clock and calendar 58 that permits controller 46 to store the date and time that scanner 45 scanned mail piece 10; a user I/O 47; and a I/O 57. Funds vault 42, accounting and encryption module 43, indicia printer 44, scanner and processor 45, and user I/O 47 are coupled to controller 46. I/O 57 is the interface between scanner and processor 45 and modem 21 and is used to upload data from meter 41 to computer 26 via modems 21 and 23. Clock and calendar 58 will supply the instant date and time that scanner 45 reads mail piece 10. The above information will be stored in buffer 54 of FIG. 3A.

Thus, meter 41 is the same as meter 11. In this example, meter 41 is being used as the receiving meter, and meter 11 is being used as a sending meter. It will be obvious to those skilled in the art that meter 11 may be a receiving meter and meter 41 a sending meter, and that additional meters may be connected to computer 26.

After indicia 18 is affixed to mail piece 10 by postage meter 11, mail piece 10 is placed in slot 507 (FIG. 2) before it enters control chamber 510 and inner chamber 514 of receptacle 500. Mail deposited in inner chamber 514 of receptacle 500 will subsequently enter USPS mail delivery process 32. The description and operation of receptacle 500 is described in the description of FIG. 2. The post delivers mail piece 10 to the owner of electronic postage meter 41. Mail piece 10 will be scanned by scanner and processor 45 of meter 41. Scanner and processor 45 segments the data and stores it for uploading to computer 26 via modems 21 and 23. Information from meter 11 regarding mail piece 10 was previously sent to computer 26 via modems 20 and 23. The information transmitted by meter 11 is tracking number 7, address field 8 and address field 9. The information transmitted by meter 41 is tracking number 7, return address field 8 and address field 9, the date and time mail piece 10 was scanned by meter 41, and the serial number of meter 41.

FIG. 2 is a drawing of mail receptacle 500 of FIG. 1. Receptacle 500 has a front panel 501 containing a slot 508 for receptacle identification cards 600 and 610 (FIGS. 11A and 11B) and a mail slot 507 for depositing mail, a top panel 505, side panels 502, and a back panel 503 having a door 504 for access to life-harming materials, and a door 506 for access to non-life-harming materials. Receptacle 500 has a control chamber 510 that contains a scanner 511 and a transport 512. Card 600 or card 610 are placed in slot 508 and transported by transport 512 to scanner 511 so that scanner 511 may read the information on the card. Then transport 512 ejects card 600 or card 610 through slot 508. When mail and/or mail piece 10 (FIG. 1) is deposited face up in slot 507, mail piece 10 will enter control chamber 510. The face of mail piece 10 will be scanned and read by scanner 511 while being moved by transport 512. Receptacle controller 513 will interpret the foregoing information regarding mail piece 10. Controller 513 will communicate with postal data center 516 (FIG. 1) via data buffer and modem 520. Data center 516 communicates with computer 26 (FIG. 1) which accesses buffer 29 to determine if a record of the mail currently in control chamber 510 appears in inbound mail data buffer 29.

If the information on the face of the mail piece in control chamber 510 does not match the information in inbound mail data buffer 29 the mail in control chamber 510 is of questionable origin and may be suspected of having life harming material. The mail will remain in control chamber 510, and a signal will be sent by controller 513 to postal data center 516 to inform the proper authorities to unlock door 504, remove the possibly tainted mail and activate door 519 to close slot 507 and prevent any mail from entering chamber 510. Controller 513 will also activate LED 517, which will indicate “Out Of Service” or “May contain life harming materials”, etc.

If the information on the face of the mail piece in control chamber 510 matches the information in buffer 29, the mail in control chamber 510 is not of questionable origin and is not suspected of having life harming material. The information will be stored in mail box entry data buffer 518 (FIG. 1) and computer 26 will authorize controller 513 to open door 515 and enable transport 512 to move the mail in control chamber 510 to inner chamber 514. Mail piece 10 and the other mail in inner chamber 514 may be removed by opening locked door 506.

FIG. 3A is a drawing of scanner and data processors 15 and 45 of FIG. 1 in greater detail. The operator of meter 41 may use I/O 47 to select the meter mode to place a postal indicia on mail piece 10 or the scan mode to read the postal indicia on mail piece 10. When the operator of meter 41 selects the scan mode, controller 46 turns control of meter 41 over to scan process controller 51. Mail piece 10 will be moved under scanner 55 and transported through meter 41 (not shown). Scanner 55 will store the image of mail piece 10 in image processing buffer memory 52, convert the image by using the process mentioned in block 53, and store the processed image in processed mail data buffer 54. Then, the optical character recognition process 53 will begin. Process 53 will segment the image into its various components, i.e., amount of postage, meter number, date mail piece 10 mailed, place mail piece 10 mailed, security code 89, tracking number 7, recipient address 9, and return address 8, etc. At this point, a recognition process will take the segmented components of the aforementioned image and convert them into an ASCII text field. In the identification process, it will be determined whether or not the ASCII information is in the correct format. Now the extracted information will be placed in processed mail data buffer 54. Clock and calendar 58 will be used to determine when mail piece 10 was scanned, and Data I/O 57 will be used to convey the information stored in processed mail data buffer 54 to modem 21 at predetermined times.

The operator of meter 11 may use user /O 17 to select the meter mode to place a postal indicia on mail piece 10 or the scan mode to read the postal indicia on mail piece 10. When the operator of meter 11 selects the meter mode, controller 16 turns control of meter 11 over to meter process controller 51. While mail piece 10 is being printed, it is scanned by scanner 55.

Scanner 55 will store the image of mail piece 10 in image processing buffer memory 52, while mail piece 10 is being printed by meter 11. Scanner 55 will also convert the image by using the process shown in block 53 and store the processed image in processed mail data buffer 54. Then, the optical character recognition process 53 will begin. Process 53 will segment the image into its various components, i.e., amount of postage, meter number, date mail piece 10 mailed, place mail piece 10 mailed, security code 89 (FIG. 4), tracking number 7, recipient address 9, and return address 8, etc. At this point, the recognition process will take the segmented components of the aforementioned image and convert them into an ASCII text field. In the identification process, it will be determined whether or not the ASCII information is in the correct format. Now the extracted information will be placed in processed mail data buffer 54. Clock and calendar 6 will be used to note when an indicia was affixed to mail piece 10, and when mail piece 10 was scanned. Data I/O 56 will be used to convey the information stored in processed mail data buffer 54 to modem 20 at a predetermined time.

FIG. 3B is a drawing of mail box controller 513 of FIG. 2 in greater detail. Controller 513 may be activated when a piece of mail is properly inserted into slot 507. Controller 513 turns control over to process 536. Process 536 begins at scan process controller 535. Mail piece 10 will be moved under scanner 511 and transported control chamber 510 (FIG. 2). Scanner 511 will store the image of mail piece 10 in image processing buffer memory 530, convert the image by using the process mentioned in OCR processes 531 and store the processed image in image processing buffer memory 530. Then, the optical character recognition process 531 will begin. Process 531 will segment the image into its various components, i.e., amount of postage, meter number, date mail piece 10 mailed, place mail piece 10 mailed, security code 89 (FIG. 4), tracking number 7, recipient address 9, and return address 8, etc. At this point, a recognition process will take the segmented components of the aforementioned image and convert them into an ASCII text field. In the identification process, it will be determined whether or not the ASCII information is in the correct format. Now the extracted information will be placed in current mail piece data buffer 532. Clock and calendar 533 will be used to determine when mail piece 10 was scanned, and data buffer and modem 520 will be used to convey the information stored in current mail piece data buffer 532 to postal data center 516 (FIG. 1) at predetermined times.

Postal data center 516 sends the above mail data to computer 26 and, in turn, computer 30 validates the above data in buffer 28. Upload data computer 30 informs computer 26, which in turn informs postal data center 516 whether or not the above data was stored in buffer 28. If the data is stored in buffer 28, the mail is not suspect and is allowed to enter inner chamber 514 (FIG. 2) of receptacle 510. If the data is not stored in buffer 28, the mail is suspect and is not allowed to enter inner chamber 514 of receptacle 510. Postal data center 516 communicates the above to controller 513 via modem 520. If the mail is suspect, mail box controller 513 will activate display 517 and activate door 519 (FIG. 2) to close slot 507.

FIG. 4 is a drawing of a mail piece containing a postal indicia that was affixed by an electronic meter. Mail piece 10 has a recipient address field 9 and a sender address field 8. A postal indicia 36 is affixed to mail piece 10. Indicia 36 contains a dollar amount 85; the date 86 that postal indicia 36 was affixed to mail piece 10; the place 87 that mail piece 10 was mailed; the postal meter serial number 88; an eagle 83; a security code 89; and, a tracking number 7. Security code 89 and tracking number 7 are unique numbers that are derived from address field 9 and information contained in the postage meter that affixed indicia 36. The manner in which security code 89 and tracking number 7 are obtained is disclosed in the Sansone, et al. U.S. Pat. No. 4,831,555 entitled “Unsecured Postage Applying System” herein incorporated by reference.

FIG. 5 is a drawing of a mail piece 10 containing an indicia 37. Mail piece 10 has a recipient address field 9 and a sender address field 8. Mail piece 10 contains USPS Information-Based Indicia (IBI) 37. The United States Postal Service Engineering Center recently published a notice of proposed specification that describes an Information-Based Indicia. The postal indicia 37 contains a dollar amount 93; the date 94 that the postal indicia was affixed to mail piece 10; the place 95 that mail piece 10 was mailed; the postal security device serial number 96; a FIM code 97; a 2D encrypted bar code 98; and, a tracking number 7. Serial number 96 may be derived from bar code 98 or be equal to bar code 98. Bar code 98 is a unique number that is derived from address field 9 and information contained in the postal security device that affixed IBI 37. The manner in which information contained in bar code 98 is obtained is disclosed in the Sansone, et al. U.S. Pat. No. 4,831,555 entitled “UNSECURED POSTAGE APPLYING SYSTEM,” herein incorporated by reference. Mail piece 10 also contains an indication 38 of the class of mail piece 10.

FIG. 6 is a drawing of a flow chart of the scan/validate process for the meter and the PSD. The user selects the scan process and inserts a mail piece for the meter. For the receiving PSD 342 (FIG. 7) the user selects the scan process and inserts a mail piece into scanner and processor 345. Block 899 processes the mail piece and sends a start process signal to the scan controller. This process is used by meter controller 46 of FIG. 1. Then the program goes to block 901. Block 901 determines whether or not the scan mode has been selected. If the scan mode has not been selected, then the program goes back to block 901. If the scan mode has been selected, the program goes to block 903 and sets N=0. Then the program goes to decision block 902. Block 902 determines whether or not the edge of mail piece 10 has been sensed. If the edge of mail piece 10 has not been sensed, then the program goes back to block 902. If the edge of mail piece 10 has been sensed, then the program goes to block 904 to set N=N+1, where N is a piece count of the image of a mail piece.

Now the program goes to block 905 to scan mail piece 10. At this point, the program goes to decision block 906. Block 906 determines whether or not the trailing edge of mail piece 10 has been sensed. If the trailing edge of mail piece 10 has not been sensed, then the program goes back to block 906. If the trailing edge of mail piece 10 has been sensed, then the program goes to goes to block 907. Block 907 transfers the Nth image from the scan buffer block 52 to the transient image buffer block 908. Then, in block 909, the program adds the N, piece count of the image of the mail piece meter number, and date and time to the header for the record. Then the program goes to block 915 to segment the image. Then the program goes to block 916 to recognize segmented images. In block 917, the program identifies the segmented characters. Now the program goes to block 918 to extract ASCII data fields. At this point, the program goes to block 919 to transfer the data to processed image buffer 920 and clear transient buffer. Now the program goes to decision block 902 and to block 920 processed image buffer. Then the program goes to decision block 925. Block 925 determines whether or not the data is correct. If the data is incorrect, the program goes to block 940 to request a rescan. If the data is correct, the program goes to block 926 to transfer the data to the final buffer. Then the program goes to block 927 the final data records buffer. At this point, the program goes to decision block 930. Decision block 930 determines whether or not data center computer 26 is requesting data. If block 930 determines that computer 26 is not requesting data, the program goes to decision block 931. Decision block 931 determines whether or not it is time to send data. If block 931 determines that it is time to send data, the program goes to block 935. If block 931 determines that it is not time to send data, the program goes back to the input of block 930. If block 930 determines that computer 26 is requesting data, then the program proceeds to block 935. Block 935 reads all final data records in block 927 and transfers them to I/O 56, 57 or 347 (FIGS. 1 and 7).

Now the program goes to decision block 937. Decision block 937 determines whether or not data centers 26 or 326 have received a validation message. If block 937 determines that a validation message has not been received, the program goes back to the input of block 937. If block 937 determines that a validation message has been received, the program goes to block 938 to display the message on I/O 56, 57 or 347. Then the program goes to block 936 to clear final data buffer records block 927. At this point, the program goes back to decision block 902.

FIG. 7 is a block diagram of a PSD based PC mailing system. Personal computer (PC) 311 includes a PC controller 316, a user I/O 317, and a PC I/O 356. PSD 312 obtains a security code that may be obtained from address field 309 of mail piece 310 and information contained in PC 311. User I/O 317 comprises a keyboard in which an operator may enter information into PC 311 and a display in which an operator of PC 311 may read information about PC 311. A clock and calendar inside PSD 312 will supply the instant date and time that printer 314 affixed the indicia to mail piece 310. Scanner and processor 315 will store the above information in PC 311.

Actions performed by PC 311 are communicated to controller 316. Controller 316 controls the actions of PC 311. Controller 316 uses the weighing of the mail piece to determine the correct postage, and enables printer 314 to affix the correct postage to mail piece 310.

The user of PC 311 places the mail piece to be mailed on a scale (not shown) and enters the classification of the material to be mailed, i.e., first class mail, second class mail, parcel post, etc., into the keyboard of I/O 317, and relevant information regarding the object to be mailed is displayed on the display of I/O 317.

Printer 314 will print postal indicia 318 on mail piece 310. Scanner and processor 315 scans address field 309 and sender return address field 308 of mail piece 310. Then scanner and processor 315 segments the information contained in fields 308 and 309 and stores the segmented information i.e., tracking code 307. Tracking code 307 may be similar to or the same as the security code determined by PSD 312. It will be obvious to one skilled in the art that there are many different methods to produce unique tracking numbers.

PC I/O 356 is coupled to modem 320 and scanner and processor 315. Modem 323 is coupled to modem 320 via communications path 324, and modem 321 is coupled to modem 323 via communications path 325. Modem 323 is coupled to PSD meter manufacturer data center computer 326. Modem 323 is coupled to postal data center 516 via communications path 527. Computer 326 manages the day-to-day operation of its PSD's metering, i.e., installing new PSD's, withdrawing PSD's, and refilling PSD's with customer funds.

Computer 326 is coupled to postal funds data base 327. Data base 327 stores postal funds that have been used and credited to PC 311 and 341. Computer 326 is also coupled to outbound mail data buffer 328 that receives information about mail piece 310 from PC 311, i.e., tracking number 307 and address field 309; inbound mail data buffer 329, that receives information about mail piece 310 from PC 341, i.e., tracking number 307 and address field 309; mail box entry data buffer 525 that buffers scanned data from receptacle 500; and, upload data computer 330 that receives and processes information from buffers 328 and 329. Processed mail data base 331 is coupled to upload data computer 330. Processed mail data base 331 stores the result of the output of computer 330 and makes it available to computer 326 for transmission to PSD 311.

PSD 341 includes a PC controller 346; user I/O 347; and PC I/O 357. PSD 342 is coupled to PC I/O 357. PC I/O 357 is coupled to modem 321, and modem 321 is coupled to modem 323 via path 325. Scanner and processor 345 is coupled to PC I/O 357, and printer 344 is coupled to PC I/O 357. PSD 342 will supply the instant date and time that scanner 345 reads mail piece 310. The above information will be stored in PC 311.

Thus, PC 341 is the same as PC 311. In this example, PC 341 is being used as the receiving PC, and PC 311 is being used as a sending PC. It will be obvious to those skilled in the art that PC 311 may be a receiving PC, and PC 341 a sending PC, and that additional PC's may be connected to computer 326.

After indicia 318 is affixed to mail piece 310 by PC 311, mail piece 310 is placed in slot 507 (FIG. 2) before it enters inner chamber 514 of receptacle 500. Mail deposited in inner chamber 514 of receptacle 500 will subsequently enter postal mail delivery process 332. The description and operation of receptacle 500 is described in the description of FIG. 2. The post delivers mail piece 310 to the owner of PC 341. Mail piece 310 will be scanned by scanner and processor 345 of PC 341. Scanner and processor 345 segments the data and stores it for uploading to computer 326 via modems 321 and 323. Information from PC 311 regarding mail piece 310 was previously sent to computer 326 via modems 320 and 323. The information transmitted by PC 311 is tracking number 307 and address field 309. The information transmitted by PC 341 is tracking number 307 and address field 309, the date and time mail piece 310 was scanned by PC 341 and the serial number of PC 341.

The above specification describes a new and improved system for monitoring mail before it enters the mail stream. It is realized that the above description may indicate to those skilled in the art additional ways in which the principles of this invention may be used without departing from the spirit. Therefore, it is intended that this invention be limited only by the scope of the appended claims. 

1. An incoming mail monitoring system, said system comprises: a plurality of mailers' units that stores unique information contained in a postal indicia affixed to mail; a plurality of receptacles that reads and stores the unique information contained in the postal indicia before the mail enters the interior of the receptacle; and a data center that receives information stored by the mailers' units and the receptacles to identify the mailer and assess the possibility of the presence of life-harming material in the mail.
 2. The system claimed in claim 1, wherein the receptacle units include a scanner that reads the postal indicia.
 3. The system claimed in claim 2, wherein the scanner captures and interprets the information contained in the postal indicia.
 4. The system claimed in claim 2, wherein the scanner is located in a control chamber.
 5. The system claimed in claim 4, wherein the control chamber has a locked door for isolating suspect mail.
 6. The system claimed in claim 4, wherein the interior of the receptacle comprises: a inner chamber that receives mail from the control chamber that is not suspected of having life harming material.
 7. The system claimed in claim 6, wherein the inner chamber has a locked door in which when open mail may be removed from the inner chamber.
 8. The system claimed in claim 4, further including a slot for depositing mail into the control chamber.
 9. The system claimed in claim 8, further including: means for closing the slot when the mail in the control chamber is suspected of containing life harming substances.
 10. The system claimed in claim 8, further comprising means for indicating a message indicating the status of the receptacle.
 11. The system claimed in claim 1, wherein the data center correlates the recipient address of the mail with unique information contained in the postal indicia.
 12. The system claimed in claim 1, wherein the mailer's unit includes the time and date that the postal indicia was affixed to the mail in the unique information contained in the postal indicia.
 13. The system claimed in claim 12, wherein the mailer's unit includes other information regarding the mail piece in the unique information contained in the postal indicia.
 14. The system claimed in claim 13, wherein the data center further includes: means for comparing information received from the mailer's unit with information received from one of the receptacle units.
 15. The system claimed in claim 14, wherein the data center further includes: means for comparing other information received from the mailer's unit with information received from one of the receptacle units.
 16. The system claimed in claim 15 wherein the receptacle unit includes: means for informing the post of possibility of the presence of life-harming material in the mail.
 17. The system claimed in claim 1, wherein the mailer's unit includes means for automatically transmitting information to the data center at predetermined intervals.
 18. The system claimed in claim 1, wherein the receptacle includes means for automatically transmitting information to the data center at predetermined intervals.
 19. The system claimed in claim 1, wherein the postal indicia is on a label that is affixed to the mail piece.
 20. The system claimed in claim 1, wherein the postal indicia is printed on a piece of paper that may be seen through an envelope forming the mail piece.
 21. The system claimed in claim 1, wherein the unique information is encrypted.
 22. The system claimed in claim 1, wherein the unique information is printed in an area other than the indicia area of the mail piece.
 23. The system claimed in claim 1, wherein the mailer's units are digital postage meter units.
 24. The system claimed in claim 1, wherein the mailer's units are digital processors.
 25. The method claimed in claim 1, wherein the unique information contained in the postal indicia includes a security code.
 26. The method claimed in claim 25, wherein the security code is obtained from a recipient address field on the mail and information contained in a postage meter that produces the postal indicia. 