System and method for mail verification

ABSTRACT

A system and method is provided for transmitting mail verification data over a wide area network, such as the Internet, in response to receiving and authenticating at least a portion of mail identification (ID) data. In one embodiment of the present invention, a mail verification application is adapted to store at least a verifying portion (e.g., an identifiable code portion, a shipping portion, a recipient portion, etc.) of mail ID data in memory. The mail ID data is then affixed to a mail object. The mail object is then manually delivered to a recipient. At least an authenticating portion of the mail ID data is then provided to a reception device. The reception device, which communicates with the mail ID device over a wide area network, transmits at least the authenticating portion of the mail ID data to the mail verification application operating on the mail ID device. The mail verification application then compares the authenticating portion of the mail ID data with the verifying portion stored in memory. If the authenticating portion of the mail ID data is authenticated, mail verification data is sent to the reception device. In one embodiment of the present invention, at least a portion of the mail verification data includes authenticating data, securing data, sender data, recipient data, mail-content data, downloadable-product data, sender-web-page data, and/or third-party-web-page data.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.10/271,471, filed Oct. 15, 2002, which claims the benefit pursuant to 35U.S.C. § 119(e) of U.S. Provisional Patent Application No. 60/330,031filed Oct. 16, 2001, which applications are specifically incorporatedherein, in their entirety, by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to mail verification, and moreparticularly to a system and method of authenticating at least one mailobject by providing at least a portion of mail identification data overa wide area network, such as the Internet, in order to receive mailverification data.

2. Description of Related Art

Currently there are two ways to provided mail objects (e.g., letters,documents, packages, etc.) to an end user; that being electronically(e.g., email, etc.) and through traditional mail services (e.g., U.S.Postal Service, Federal Express, UPS, Courier, etc.). However, becausecertain mail objects cannot be delivered electronically (either becauseits impossible or impractical), they are delivered using traditionalmail services.

There are several problems with delivering mail objects throughtraditional mail services. First, the mail object is typically securedinside packaging (e.g., envelops, boxes, etc.) before it is provided tothe mail service. Thus, neither the mail service nor the recipient isaware of the contents of the package until such package is opened by therecipient. This creates a problem in that hazardous mail objects (i.e.,Anthrax, explosives, etc.) are not detected until they are opened by therecipient, thus exposing the recipient to the hazardous material. Italso creates a problem in that mail objects (in general) are not knownuntil they are opened by the recipient, thus making it difficult for therecipient (or his designee) to properly screen, sort or avoid certainmail objects (e.g., offensive mail, annoying mail, etc).

Second, a manually delivered mail object is limited to a one-wayproduction of a finite set of information and/or products. This becomesproblematic when the sender of the mail object is interested inproviding or receiving additional information (e.g., productinstructions, warranty information, etc.). Finally, contents that can bedelivered electronically (e.g., advertisements, software, etc.) areoften included in mail objects that are delivered via traditional mailservices. The drawback with this is that it increases the costassociated with producing and/or delivering the mail object and increasethe size of the mail object. For at least these reasons, a need existsin the industry for a system and method of providing mail verificationdata in response to receiving mail ID data over a wide area network,such as the Internet.

SUMMARY OF THE INVENTION

The present invention provides a system and method for providing mailverification data over a wide area network, such as the Internet, inresponse to receiving and authenticating at least a portion of mailidentification (ID) data. Preferred embodiments of the present inventionoperate in accordance with at least one reception device, a mailidentification (ID) device, a memory, and a mail verificationapplication adapted to communicate with the reception device over a widearea network, such as the Internet. Specifically, the mail verificationapplication is adapted to store at least a verifying portion of mail IDdata in memory. In one embodiment of the present invention, theverifying portion of the mail ID data includes an identifiable codeportion (e.g., an alpha code, a numeric code, an alphanumeric code, asymbolic code, a digital code, etc.), a shipping portion (e.g., shipdate, shipping location, shipping method, etc.) and/or a recipientportion (e.g., the recipients name, address, email address, IP address,account number, social security number, etc.). The mail ID data is thenaffixed to a mail object. The mail object, which may further include amail-to-address, a return-mail-address, and/or postage, is then manuallydelivered to a recipient. In one embodiment of the present invention,the mail ID data further includes mail-to-address data,return-mail-address data, and/or postage data.

At least an authenticating portion of the mail ID data is then providedto the reception device. The reception device, which communicates withthe mail ID device over a wide area network, transmits at least theauthenticating portion of the mail ID data to the mail verificationapplication operating on the mail ID device. The mail verificationapplication then compares the authenticating portion of the mail ID datawith the verifying portion stored in memory. If the authenticatingportion corresponds to the verifying portion (e.g., matches, isreasonably related, etc.), then mail verification data is sent to thereception device. In one embodiment of the present invention, at least aportion of the mail verification data includes authenticating data(indicating that the mail ID data has been authenticated), securing data(indicating who secured the mail object), sender data (indicating whosent the mail object), recipient data (indicating the intended recipientof the mail object) and/or additional data (e.g., the contents of themail object, downloadable product data, sender web-page information,third party advertisements, etc).

In one embodiment of the present invention, the mail ID device furtherincludes an input device adapted to provide at least a verifying portionof the mail ID data to the mail verification application and/or anoutput device adapted to affix the mail ID data on the mail object. Inanother embodiment of the present invention, the reception deviceincludes an input device for receiving at least an authenticatingportion of the mail ID data from the mail object and/or a mailauthenticating application adapted to receive at least theauthenticating portion of the mail ID data from the input device andprovide at least the authenticating portion of the mail ID data to themail ID device. In another embodiment of the present invention, the U.S.Postal Service (or an interim authenticating or screening entity) is therecipient of the mail object, thus interacting with the reception deviceto receive mail verification data.

A more complete understanding of the system and method for providingmail verification data in response to receiving at least a portion ofmail ID data will be afforded to those skilled in the art, as well as arealization of additional advantages and objects thereof, by aconsideration of the following detailed description of the preferredembodiment. Reference will be made to the appended sheets of drawingswhich will first be described briefly.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates one embodiment of the mail verification system.

FIG. 2 illustrates a mail ID device communicating with a plurality ofreception devices over a wide area network, such as the Internet.

FIG. 3 illustrates one embodiment of the mail ID device and thereception device depicted in FIG. 1.

FIG. 4 is a flow chart illustrating one method of providing mailverification data in response to receiving at least a portion of mail IDdata.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The present invention provides a system and method for providing mailverification data over a wide area network, such as the Internet, inresponse to receiving and authenticating at least a portion of mailidentification (ID) data. In the detailed description that follows, likeelement numerals are used to describe like elements illustrated in oneor more figures.

Preferred embodiments of the present invention operate in accordancewith at least one reception device, a mail identification (ID) device, amemory, and a mail verification application adapted to communicate withthe reception device over a wide area network, such as the Internet.FIG. 1 illustrates one embodiment of the mail verification system 10,which includes a mail ID device 110 and a reception device 120communicating through a wide area network 102, such as the Internet. Itshould be appreciate, as depicted in FIG. 2, that the receptiondevice(s) 120 includes, but is not limited to, personal computers, settop boxes, personal digital assistances (PDAs), mobile phones, land-linephones, televisions, bar code readers, and all other physically andwirelessly connected reception devices generally known to those skilledin the art. It should further be appreciated that the number ofreception devices 120 depicted in FIGS. 1 and 2 are merely to illustratehow the present invention operates, and are not intended to furtherlimit the present invention.

As shown in FIG. 3, the mail ID device 110 further includes a mailverification application 112 and a memory 114. The mail verificationapplication 112 is adapted to store at least a portion (i.e., averifying portion) of mail ID data in the memory 114, receive at least aportion (i.e., an authenticating portion) of mail ID data from thereception device 120, and provide mail verification data if the portionof the mail ID data received from the reception device 120 isauthenticated. It should be appreciated that the mail verificationapplication 112 may further be adapted to generate the mail ID data andprovide it to an external device (e.g., a printer, etc.) or receive atleast a verifying portion of the mail ID data from an external device(e.g., a scanner, etc.). It should also be appreciated that the mailverification application 112 may exist as a single application, or asmultiple applications (locally and/or remotely stored) that operatetogether to perform the verification functions as described herein. Itshould further be appreciated that the location of the memory device 114depicted in FIG. 3 is not intended to further limit the presentinvention. Thus, a memory device that is, for example, external to themail ID device 110 is within the spirit and scope of the presentinvention.

Referring back to FIG. 1, where the dashed arrows indicate datatransactions and the solid arrow indicates physical movement, mail IDdata 132 is affixed to a mail object 130 (as used in its broader senseto encompass the packaging that surrounds the content). It should beappreciated that mail ID data can be encoded/encrypted (e.g., using barcode data, digital data, etc.) to prevent fraudulent usage. It shouldfurther be appreciated that affixing the mail ID data 132 on the mailobject 130 includes, but is not limited to, printing or attaching mailID data directly on the outer surface of the mail object 130 orprinting/storing the mail ID data 132 on labels, ICs, smart cards, RFIDtags, or any other data storage devices (or materials) generally knownto those skilled in the art, and attaching them to the outer surface ofthe mail object 130. It should also be appreciated that the location ofthe mail ID data 132 on the mail object 130 in FIG. 1 is merely toexemplify how the invention operates, and is not intended to furtherlimit the present invention. Thus, affixing the mail ID data 132 in someother location, such as over the sealing flap of an envelope, is withinthe spirit and scope of this invention.

At least a portion (i.e., a verifying portion) of the mail ID data 132(either before or after the mail ID data is affixed) is stored in themail ID device 110, or more particular (as shown in FIG. 3) in a memory114 located within the mail ID device 110. Specifically, the mailverification application 112 either receives or generates at least theverifying portion of the mail ID data 132. The verifying portion is thenstored in the memory 114. In one embodiment of the present invention,the verifying portion of the mail ID data includes a identifiable codeportion (e.g., an alpha code, a numeric code, and alphanumeric code, asymbolic code, a digital code, etc.), a shipping portion (e.g., shipdate, shipping location, shipping method, etc.), and/or a recipientportion (e.g., the recipients name, address, email address, IP address,account number, social security number, etc.). The mail object 130,which may further include a mail-to-address 134, a return-mail-address136, and/or postage 138, can then be manually delivered to a recipient.It should be appreciated that the mail ID data 132 can also be encoded(e.g., in a bar code, etc.) to include mail-to-address data,return-mail-address data, and/or postage data. In other words, forexample, mail ID data could be encoded to include both coded data andpostage-account data.

Once the recipient (or their designee) receives the mail object 130, atleast an authenticating portion of the mail ID data 132 is provided tothe reception device 120. The reception device 120, which communicateswith the mail ID device 110 over a wide area network 102, transmits atleast the authenticating portion of the mail identification data to themail verification application 112 operating on the mail ID device 110.The mail verification application 112 then compares the authenticatingportion of the mail ID data with the verifying portion stored in memory114. If the received portion is authenticated, or corresponds to theverifying portion (e.g., matches, is reasonably related, etc.), thenmail verification data is sent to the reception device 120.

In one embodiment of the present invention, at least a portion of themail verification data includes authenticating data (e.g., image data,audio data, etc.) indicating that the mail ID data has beenauthenticated. This would allow, for example, the reception device 120to produce at least one authenticating image on a display and/or performat least one authenticating sound on a speaker. In another embodiment ofthe present invention at least a portion of the mail verification dataincludes securing data (indicating who secured the mail object), senderdata (indicating who sent the mail object), recipient data (indicatingwho is to receive the mail object) and/or additional data (e.g., thecontents of the mail object, downloadable product data, sender web-pagedata, third party advertisements, etc).

In another embodiment of the present invention, the mail ID deviceand/or the reception device further include an input device (e.g., 118,124) adapted to receive at least a portion of the mail ID data. Itshould be appreciated that that the input devices depicted and discussedherein (e.g., 118, 124) include, but are not limited to, scanners (e.g.,bar code scanners, etc.), keyboards, RFID readers, smart card readers,IC readers, and all other input devices generally known to those skilledin the art.

In another embodiment of the present invention, the mail ID devicefurther includes an output device 116 adapted to affix (e.g., print,store, etc.) the mail ID data on the mail object. It should beappreciated that affixing the mail ID data on the mail object includes,but is not limited to, printing or attaching mail ID data directly onthe outer surface of the mail object or printing/storing the mail IDdata on labels, ICs, smart cards, RFID tags, or any other data storagedevices (or materials) generally known to those skilled in the art, andattaching them to the outer surface of the mail object. It shouldfurther be appreciated that the output device depicted and describedherein (e.g., 116) includes, but is not limited to, printers, datastorage device (e.g., device capable of storing data on ICs, smartcards, RFID tags, etc.), and all other output devices generally known tothose skilled in the art.

In another embodiment of the present invention, as shown in FIG. 3, thereception device 120 further includes a mail authenticating application122 adapted to receive at least the authenticating portion of the mailID data from the input device 124 and provide at least theauthenticating portion of the mail ID data to the mail ID device. Itshould be appreciated that the mail authenticating application 122 mayexist as a single application, or as multiple applications (locallyand/or remotely stored) that operate together to perform theauthenticating functions as described herein.

In one embodiment of the present invention, the mail ID data furtherincludes software-booting data adapted to boot the mail authenticatingapplication, an email application and/or a browser application. Eitherone of these applications could then be used to provide at least anauthenticating portion of said mail ID data to said mail ID device,provide additional information to said mail ID device (or the sender ofthe mail object), and/or receive additional information from either themail ID device, the sender of the mail object, or a third-party. Inanother embodiment, the mail verification data further includessoftware-booting data adapted to boot an email application and/or abrowser application. Either one of these applications could then be usedto provide additional information to the mail ID device and/or receiveadditional information from either the mail ID device, the sender of themail object, or a third party.

In another embodiment of the invention, the reception device 120, ormore particularly the mail authenticating application 122 is adapted toprovide a reply email to the mail ID device 130 or the sender of themail object. This reply email may either be sent automatically, toacknowledge the reception of the mail ID data and/or mail verificationdata, or manually, to allow the recipient to communicate with the mailID device and/or sender of the mail object. In another embodiment of theinvention the mail verification application 112 is adapted to providethe mail verification data to the reception device 120 via an email.

In another embodiment of the present invention, the U.S. Postal Service(or an interim authenticating or screening entity) is the recipient (asdefined by this application) of the mail object 130, thus interactingwith the reception device 120 to receive mail verification data. If mailis authenticated (or approved in the case of screening), the mail object130 is forwarded on to the actual intended recipient.

FIG. 4 is a flow chart illustrating one method of providing mailverification data in response to receiving at least a portion of themail ID data. Specifically, in step 402 mail ID data is affixed to amail object. At step 404, a verifying portion of the mail ID data isstored in a memory device. The mail object is then delivered to itsrecipient (or designee) at step 406. At step 408, a reception devicereceives at least an authenticating portion of the mail ID data. Thereception device then provides at least the authenticating portion to amail ID device at step 410. If the authenticating portion of the mail IDdata corresponds to the verifying portion of the mail ID data, then mailverification data is provided to the reception device at step 412. Itshould be appreciated that storing the verifying portion of the mail IDdata before the mail ID data is affixed to the mail object is within thespirit and scope of the present invention.

Having thus described multiple embodiments of a system and method ofproviding mail verification data in response to receiving mail ID data,it should be apparent to those skilled in the art that certainadvantages of the system have been achieved. It should also beappreciated that various modifications, adaptations, and alternativeembodiments thereof may be made within the scope and spirit of thepresent invention. The invention is further defined by the followingclaims.

1. A method for creating a unique identifier for a physical mail object,comprising: a sender of said physical mail object using a computer to(1) generate a unique numeric value for said physical mail object, (2)concatenate said unique numeric value with shipping method data andsender data, wherein said shipping method data identifies a shippingmethod of said physical mail object, and said sender data identifies asender of said physical mail object, and (3) encode said concatenateddata into a single bar code; and affixing said single bar code to saidphysical mail object, wherein said concatenated data is used by a mailcarrier to authenticate said physical mail object.
 2. The method ofclaim 1, wherein said step of using said computer to concatenate saidunique numeric value with shipping method data and sender data, furthercomprises using said computer to concatenate said unique numeric valuewith said shipping method data, said sender data and recipient data,wherein said recipient data identifies a recipient of said physical mailobject.
 3. The method of claim 1, further comprising: storing an entryin a database, said database being in communication with a computingdevice; physically moving said physical mail object through a mailsystem; scanning said single bar code on said physical mail object toacquire said concatenated data; providing said concatenated data over anetwork to said computing device; and using said computing device tocompare said concatenated data with said entry in said database, andprovide mail verification data if there is correspondence between saidconcatenated data and said entry.
 4. The method of claim 2, furthercomprising: storing an entry in a database, said database incommunication with a computing device; physically moving said physicalmail object through a mail system; scanning said single bar code on saidphysical mail object to acquire said concatenated data; providing saidconcatenated data over a network to said computing device; and usingsaid computing device to compare said concatenated data with said entryin said database, and provide mail verification data if there iscorrespondence between said concatenated data and said entry.
 5. Themethod of claim 3, wherein said step of using said computing device toprovide mail verification data, further comprises using said computingdevice to provide mail verification data to said sender of said physicalmail object if there is correspondence between said concatenated dataand said entry.
 6. The method of claim 3, wherein said step of usingsaid computing device to provide mail verification data, furthercomprises using said computing device to provide mail verification datato a recipient of said physical mail object if there is correspondencebetween said concatenated data and said entry.
 7. A system for creatinga unique identifier for a physical mail object, comprising: a computerof a sender of said physical mail object, wherein said computer isconfigured to (1) generate a unique numeric value for said physical mailobject, (2) concatenate said unique numeric value with shipping methoddata and sender data, wherein said shipping method data identifies ashipping method of said physical mail object, and said sender dataidentifies a sender of said physical mail object, and (3) encode saidconcatenated data into a single barcode; and an output device configuredto affix said single bar code to said physical mail object, wherein saidconcatenated data is used by a mail carrier to authenticate saidphysical mail object.
 8. The system of claim 7, wherein said computer isin communication with a computing device of a said mail carrier via anetwork, and is further configured to receive shipping data for saidphysical mail object via said network and from said computing device. 9.The system of claim 7, wherein said computer is further configured toconcatenate said unique numeric value with said shipping method data,said sender data and recipient data, wherein said recipient dataidentifies a recipient of said physical mail object.
 10. The system ofclaim 7, further comprising: an input device configured to scan saidsingle bar code on said physical mail object to acquire saidconcatenated data; and a computing device of said mail carrier, whereinsaid computing device is configured to provide said concatenated data toa second computing device in communication with a database via anetwork, and receive mail verification data via said network and fromsaid second computing device if there is correspondence between saidconcatenated data and an entry in said database.
 11. The system of claim9, further comprising: an input device configured to scan said singlebar code on said physical mail object to acquire said concatenated data;and a computing device of said mail carrier, wherein said computingdevice is configured to provide said concatenated data to a secondcomputing device in communication with a database via a network, andreceive mail verification data via said network and from said secondcomputing device if there is correspondence between said concatenateddata and an entry in said database.
 12. A method for creating a uniqueidentifier for a physical mail object, comprising: a sender of saidphysical mail object using a computer to (1) generate a unique numericvalue for said physical mail object, (2) concatenate said unique numericvalue with sender data, wherein said sender data identifies a sender ofsaid physical mail object, and (3) encode said unique numeric value andsaid sender data into a single set of encoded data; and affixing saidsingle set of encoded data to said physical mail object, wherein saidunique numeric value and said sender data are used together by a mailcarrier to authenticate said physical mail object.
 13. The method ofclaim 12, wherein said step of using said computer to concatenate saidunique numeric value with sender data, and encode said unique numericvalue and said sender data into a single set of encoded data, furthercomprises using said computer to concatenate said unique numeric valuewith shipping method data and said sender data, wherein said shippingmethod data identifies a method of shipping said physical mail object,and encode said unique numeric value, said shipping method data and saidsender data into said single set of encoded data.
 14. The method ofclaim 13, wherein said step of using said computer to concatenate saidunique numeric value with shipping method data and said sender data, andencode said unique numeric value, said shipping method data and saidsender data into a single set of encoded data, further comprises usingsaid computer to concatenate said unique numeric value with shippingmethod data, said sender data and recipient data, wherein said recipientdata identifies a recipient of said physical mail object, and encodesaid unique numeric value, said shipping method data, said sender dataand said recipient data into a single set of encoded data.
 15. Themethod of claim 13, wherein said unique numeric value, said shippingmethod data and said sender data are used together by said mail carrierto authenticate said physical mail object.
 16. The method of claim 14,wherein said unique numeric value, said shipping method data, saidsender data and said recipient data are used together by said mailcarrier to authenticate said physical mail object.
 17. The method ofclaim 12, further comprising: storing an entry in a database, saiddatabase being in communication with a computing device; physicallymoving said physical mail object through a mail system; scanning saidsingle set of encoded data on said physical mail object to acquire saidconcatenated data; providing said concatenated data over a network tosaid computing device; and using said computing device to compare saidconcatenated data with said entry in said database, and provide mailverification data if there is a match between said concatenated data andsaid entry.
 18. The method of claim 13, further comprising: storing anentry in a database, said database being in communication with acomputing device; physically moving said physical mail object through amail system; scanning said single set of encoded data on said physicalmail object to acquire said concatenated data; providing saidconcatenated data over a network to said computing device; and usingsaid computing device to compare said concatenated data with said entryin said database, and provide mail verification data if there is a matchbetween said concatenated data and said entry.
 19. The method of claim14, further comprising: storing an entry in a database, said databasebeing in communication with a computing device; physically moving saidphysical mail object through a mail system; scanning said single set ofencoded data on said physical mail object to acquire said concatenateddata; providing said concatenated data over a network to said computingdevice; and using said computing device to compare said concatenateddata with said entry in said database, and provide mail verificationdata if there is a match between said concatenated data and said entry.20. The method of claim 12, wherein said step of affixing said singleset of encoded data to said physical mail object, further comprisesstoring said single set of encoded data on an RFID device affixed tosaid physical mail object.