System and Method for Providing Mail Verification Data

ABSTRACT

A system and method is provided for transmitting information over a wide area network, such as the Internet, in response to receiving at least a portion of mail data. In one embodiment of the present invention, information is stored in a memory. Mail data is then affixed to a mail object. The mail object is then manually delivered to a recipient. The mail data is then provided to a reception device. The reception device then uses the mail data to retrieve the information from a mail device in communication with the memory. In a preferred embodiment, the mail data includes data corresponding to the recipient of the mail object, and the information includes data that identifies the recipient of the mail object and data that corresponds to a content of the mail object.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.14/528,675, filed Oct. 30, 2014, which is a continuation of U.S. patentapplication Ser. No. 13/848,370, filed Mar. 21, 2013, and issued on Dec.16, 2014 as U.S. Pat. No. 8,910,860, which is a continuation of U.S.patent application Ser. No. 13/560,306, filed Jul. 27, 2012, and issuedon Apr. 23, 2013 as U.S. Pat. No. 8,429,093, which is a continuation ofU.S. patent application Ser. No. 13/297,515, filed Nov. 16, 2011, andissued on Sep. 4, 2012 as U.S. Pat. No. 8,260,629, which is acontinuation of U.S. patent application Ser. No. 12/454,052, filed May11, 2009, and issued on Dec. 6, 2011 as U.S. Pat. No. 8,073,787, whichis a continuation of U.S. patent application Ser. No. 10/271,471, filedOct. 15, 2002, and issued on Oct. 19, 2010 as U.S. Pat. No. 7,818,268,which claims the benefit pursuant to 35 U.S.C. §119(e) of U.S.Provisional Patent Application No. 60/330,031 filed Oct. 16, 2001, whichapplications are specifically incorporated herein, in their entirety, byreference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to mail verification, and moreparticularly to a system and method of authenticating at least one mailobject by providing at least a portion of mail identification data overa wide area network, such as the Internet, in order to receive mailverification data.

2. Description of Related Art

Currently there are two ways to provided mail objects (e.g., letters,documents, packages, etc.) to an end user; that being electronically(e.g., email, etc.) and through traditional mail services (e.g., U.S.Postal Service, Federal Express, UPS, Courier, etc.). However, becausecertain mail objects cannot be delivered electronically (either becauseit's impossible or impractical), they are delivered using traditionalmail services.

There are several problems with delivering mail objects throughtraditional mail services. First, the mail object is typically securedinside packaging (e.g., envelops, boxes, etc.) before it is provided tothe mail service. Thus, neither the mail service nor the recipient isaware of the contents of the package until such package is opened by therecipient. This creates a problem in that hazardous mail objects (i.e.,Anthrax, explosives, etc.) are not detected until they are opened by therecipient, thus exposing the recipient to the hazardous material. Italso creates a problem in that mail objects (in general) are not knownuntil they are opened by the recipient, thus making it difficult for therecipient (or his designee) to properly screen, sort or avoid certainmail objects (e.g., offensive mail, annoying mail, etc).

Second, a manually delivered mail object is limited to a one-wayproduction of a finite set of information and/or products. This becomesproblematic when the sender of the mail object is interested inproviding or receiving additional information (e.g., productinstructions, warranty information, etc.). Finally, contents that can bedelivered electronically (e.g., advertisements, software, etc.) areoften included in mail objects that are delivered via traditional mailservices. The drawback with this is that it increases the costassociated with producing and/or delivering the mail object and increasethe size of the mail object. For at least these reasons, a need existsin the industry for a system and method of providing mail verificationdata in response to receiving mail ID data over a wide area network,such as the Internet.

SUMMARY OF THE INVENTION

The present invention provides a system and method for providing mailverification data over a wide area network, such as the Internet, inresponse to receiving and authenticating at least a portion of mailidentification (ID) data. Preferred embodiments of the present inventionoperate in accordance with at least one reception device, a mailidentification (ID) device, a memory, and a mail verificationapplication adapted to communicate with the reception device over a widearea network, such as the Internet. Specifically, the mail verificationapplication is adapted to store at least a verifying portion of mail IDdata in memory. In one embodiment of the present invention, theverifying portion of the mail ID data includes an identifiable codeportion (e.g., an alpha code, a numeric code, an alphanumeric code, asymbolic code, a digital code, etc.), a shipping portion (e.g., shipdate, shipping location, shipping method, etc.) and/or a recipientportion (e.g., the recipients name, address, email address, IP address,account number, social security number, etc.). The mail ID data is thenaffixed to a mail object. The mail object, which may further include amail-to-address, a return-mail-address, and/or postage, is then manuallydelivered to a recipient. In one embodiment of the present invention,the mail ID data further includes mail-to-address data,return-mail-address data, and/or postage data.

At least an authenticating portion of the mail ID data is then providedto the reception device. The reception device, which communicates withthe mail ID device over a wide area network, transmits at least theauthenticating portion of the mail ID data to the mail verificationapplication operating on the mail ID device. The mail verificationapplication then compares the authenticating portion of the mail ID datawith the verifying portion stored in memory. If the authenticatingportion corresponds to the verifying portion (e.g., matches, isreasonably related, etc.), then mail verification data is sent to thereception device. In one embodiment of the present invention, at least aportion of the mail verification data includes authenticating data(indicating that the mail ID data has been authenticated), securing data(indicating who secured the mail object), sender data (indicating whosent the mail object), recipient data (indicating the intended recipientof the mail object) and/or additional data (e.g., the contents of themail object, downloadable product data, sender web-page information,third party advertisements, etc).

In one embodiment of the present invention, the mail ID device furtherincludes an input device adapted to provide at least a verifying portionof the mail ID data to the mail verification application and/or anoutput device adapted to affix the mail ID data on the mail object. Inanother embodiment of the present invention, the reception deviceincludes an input device for receiving at least an authenticatingportion of the mail ID data from the mail object and/or a mailauthenticating application adapted to receive at least theauthenticating portion of the mail ID data from the input device andprovide at least the authenticating portion of the mail ID data to themail ID device. In another embodiment of the present invention, the U.S.Postal Service (or an interim authenticating or screening entity) is therecipient of the mail object, thus interacting with the reception deviceto receive mail verification data.

A more complete understanding of the system and method for providingmail verification data in response to receiving at least a portion ofmail ID data will be afforded to those skilled in the art, as well as arealization of additional advantages and objects thereof, by aconsideration of the following detailed description of the preferredembodiment. Reference will be made to the appended sheets of drawingswhich will first be described briefly.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates one embodiment of the mail verification system.

FIG. 2 illustrates a mail ID device communicating with a plurality ofreception devices over a wide area network, such as the Internet.

FIG. 3 illustrates one embodiment of the mail ID device and thereception device depicted in FIG. 1.

FIG. 4 is a flow chart illustrating one method of providing mailverification data in response to receiving at least a portion of mail IDdata.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The present invention provides a system and method for providing mailverification data over a wide area network, such as the Internet, inresponse to receiving and authenticating at least a portion of mailidentification (ID) data. In the detailed description that follows, likeelement numerals are used to describe like elements illustrated in oneor more figures.

Preferred embodiments of the present invention operate in accordancewith at least one reception device, a mail identification (ID) device, amemory, and a mail verification application adapted to communicate withthe reception device over a wide area network, such as the Internet.FIG. 1 illustrates one embodiment of the mail verification system 10,which includes a mail ID device 110 and a reception device 120communicating through a wide area network 102, such as the Internet. Itshould be appreciate, as depicted in FIG. 2, that the receptiondevice(s) 120 includes, but is not limited to, personal computers, settop boxes, personal digital assistances (PDAs), mobile phones, land-linephones, televisions, bar code readers, and all other physically andwirelessly connected reception devices generally known to those skilledin the art. It should further be appreciated that the number ofreception devices 120 depicted in FIGS. 1 and 2 are merely to illustratehow the present invention operates, and are not intended to furtherlimit the present invention.

As shown in FIG. 3, the mail ID device 110 further includes a mailverification application 112 and a memory 114. The mail verificationapplication 112 is adapted to store at least a portion (i.e., averifying portion) of mail ID data in the memory 114, receive at least aportion (i.e., an authenticating portion) of mail ID data from thereception device 120, and provide mail verification data if the portionof the mail ID data received from the reception device 120 isauthenticated. It should be appreciated that the mail verificationapplication 112 may further be adapted to generate the mail ID data andprovide it to an external device (e.g., a printer, etc.) or receive atleast a verifying portion of the mail ID data from an external device(e.g., a scanner, etc.). It should also be appreciated that the mailverification application 112 may exist as a single application, or asmultiple applications (locally and/or remotely stored) that operatetogether to perform the verification functions as described herein. Itshould further be appreciated that the location of the memory device 114depicted in FIG. 3 is not intended to further limit the presentinvention. Thus, a memory device that is, for example, external to themail ID device 110 is within the spirit and scope of the presentinvention.

Referring back to FIG. 1, where the dashed arrows indicate datatransactions and the solid arrow indicates physical movement, mail IDdata 132 is affixed to a mail object 130 (as used in its broader senseto include, but is not limited to, the packaging that surrounds the mailobject). It should be appreciated that mail ID data can beencoded/encrypted (e.g., using bar code data, digital data, etc.) toprevent fraudulent usage. It should further be appreciated that affixingthe mail ID data 132 on the mail object 130 includes, but is not limitedto, printing or attaching mail ID data directly on the outer surface ofthe mail object 130 or printing/storing the mail ID data 132 on labels,ICs, smart cards, RFID tags, or any other data storage devices (ormaterials) generally known to those skilled in the art, and attachingthem to the outer surface of the mail object 130. It should also beappreciated that the location of the mail ID data 132 on the mail object130 in FIG. 1 is merely to exemplify how the invention operates, and isnot intended to further limit the present invention. Thus, affixing themail ID data 132 in some other location, such as over the sealing flapof an envelope, is within the spirit and scope of this invention.

At least a portion (i.e., a verifying portion) of the mail ID data 132(either before or after the mail ID data is affixed) is stored in themail ID device 110, or more particular (as shown in FIG. 3) in a memory114 located within the mail ID device 110. Specifically, the mailverification application 112 either receives or generates at least theverifying portion of the mail ID data 132. The verifying portion is thenstored in the memory 114. In one embodiment of the present invention,the verifying portion of the mail ID data includes a identifiable codeportion (e.g., an alpha code, a numeric code, and alphanumeric code, asymbolic code, a digital code, etc.), a shipping portion (e.g., shipdate, shipping location, shipping method, etc.), and/or a recipientportion (e.g., the recipients name, address, email address, IP address,account number, social security number, etc.). The mail object 130,which may further include a mail-to-address 134, a return-mail-address136, and/or postage 138, can then be manually delivered to a recipient.It should be appreciated that the mail ID data 132 can also be encoded(e.g., in a bar code, etc.) to include mail-to-address data,return-mail-address data, and/or postage data. In other words, forexample, mail ID data could be encoded to include both coded data andpostage-account data.

Once the recipient (or their designee) receives the mail object 130, atleast an authenticating portion of the mail ID data 132 is provided tothe reception device 120. The reception device 120, which communicateswith the mail ID device 110 over a wide area network 102, transmits atleast the authenticating portion of the mail identification data to themail verification application 112 operating on the mail ID device 110.The mail verification application 112 then compares the authenticatingportion of the mail ID data with the verifying portion stored in memory114. If the received portion is authenticated, or corresponds to theverifying portion (e.g., matches, is reasonably related, etc.), thenmail verification data is sent to the reception device 120.

In one embodiment of the present invention, at least a portion of themail verification data includes authenticating data (e.g., image data,audio data, etc.) indicating that the mail ID data has beenauthenticated. This would allow, for example, the reception device 120to produce at least one authenticating image on a display and/or performat least one authenticating sound on a speaker. In another embodiment ofthe present invention at least a portion of the mail verification dataincludes securing data (indicating who secured the mail object), senderdata (indicating who sent the mail object), recipient data (indicatingwho is to receive the mail object) and/or additional data (e.g., thecontents of the mail object, downloadable product data, sender web-pagedata, third party advertisements, etc).

In another embodiment of the present invention, the mail ID deviceand/or the reception device further include an input device (e.g., 118,124) adapted to receive at least a portion of the mail ID data. Itshould be appreciated that that the input devices depicted and discussedherein (e.g., 118, 124) include, but are not limited to, scanners (e.g.,bar code scanners, etc.), keyboards, RFID readers, smart card readers,IC readers, and all other input devices generally known to those skilledin the art.

In another embodiment of the present invention, the mail ID devicefurther includes an output device 116 adapted to affix (e.g., print,store, etc.) the mail ID data on the mail object. It should beappreciated that affixing the mail ID data on the mail object includes,but is not limited to, printing or attaching mail ID data directly onthe outer surface of the mail object or printing/storing the mail IDdata on labels, ICs, smart cards, RFID tags, or any other data storagedevices (or materials) generally known to those skilled in the art, andattaching them to the outer surface of the mail object. It shouldfurther be appreciated that the output device depicted and describedherein (e.g., 116) includes, but is not limited to, printers, datastorage device (e.g., device capable of storing data on ICs, smartcards, RFID tags, etc.), and all other output devices generally known tothose skilled in the art.

In another embodiment of the present invention, as shown in FIG. 3, thereception device 120 further includes a mail authenticating application122 adapted to receive at least the authenticating portion of the mailID data from the input device 124 and provide at least theauthenticating portion of the mail ID data to the mail ID device. Itshould be appreciated that the mail authenticating application 122 mayexist as a single application, or as multiple applications (locallyand/or remotely stored) that operate together to perform theauthenticating functions as described herein.

In one embodiment of the present invention, the mail ID data furtherincludes software-booting data adapted to boot the mail authenticatingapplication, an email application and/or a browser application. Eitherone of these applications could then be used to provide at least anauthenticating portion of said mail ID data to said mail ID device,provide additional information to said mail ID device (or the sender ofthe mail object), and/or receive additional information from either themail ID device, the sender of the mail object, or a third-party. Inanother embodiment, the mail verification data further includessoftware-booting data adapted to boot an email application and/or abrowser application. Either one of these applications could then be usedto provide additional information to the mail ID device and/or receiveadditional information from either the mail ID device, the sender of themail object, or a third party.

In another embodiment of the invention, the reception device 120, ormore particularly the mail authenticating application 122 is adapted toprovide a reply email to the mail ID device 130 or the sender of themail object. This reply email may either be sent automatically, toacknowledge the reception of the mail ID data and/or mail verificationdata, or manually, to allow the recipient to communicate with the mailID device and/or sender of the mail object. In another embodiment of theinvention the mail verification application 112 is adapted to providethe mail verification data to the reception device 120 via an email.

In another embodiment of the present invention, the U.S. Postal Service(or an interim authenticating or screening entity) is the recipient (asdefined by this application) of the mail object 130, thus interactingwith the reception device 120 to receive mail verification data. If mailis authenticated (or approved in the case of screening), the mail object130 is forwarded on to the actual intended recipient.

FIG. 4 is a flow chart illustrating one method of providing mailverification data in response to receiving at least a portion of themail ID data. Specifically, in step 402 mail ID data is affixed to amail object. At step 404, a verifying portion of the mail ID data isstored in a memory device. The mail object is then delivered to itsrecipient (or designee) at step 406. At step 408, a reception devicereceives at least an authenticating portion of the mail ID data. Thereception device then provides at least the authenticating portion to amail ID device at step 410. If the authenticating portion of the mail IDdata corresponds to the verifying portion of the mail ID data, then mailverification data is provided to the reception device at step 412. Itshould be appreciated that storing the verifying portion of the mail IDdata before the mail ID data is affixed to the mail object is within thespirit and scope of the present invention.

Having thus described multiple embodiments of a system and method ofproviding mail verification data in response to receiving mail ID data,it should be apparent to those skilled in the art that certainadvantages of the system have been achieved. It should also beappreciated that various modifications, adaptations, and alternativeembodiments thereof may be made within the scope and spirit of thepresent invention. The invention is further defined by the followingclaims.

What is claimed is:
 1. A method of verifying mail identification data,comprising: affixing mail identification data to at least one mailobject, said mail identification data comprising a single set of encodeddata that includes at least a unique identifier, sender data, recipientdata and shipping method data, wherein said unique identifier consistsof a numeric value assigned by a sender of said at least one mailobject; storing at least a verifying portion of said mail identificationdata; submitting said at least one mail object to the United StatesPostal Service (USPS) for delivery to a recipient of said at least onemail object; receiving by a computer at least an authenticating portionof said mail identification data from at least one reception device viaa network, wherein said authenticating portion of said mailidentification data comprises at least said unique identifier, saidsender data, and said shipping method data, said computer is operated bysaid sender of said at least one mail object, and said at least onereception device is operated by the USPS; and providing by said computermail verification data via said network when said authenticating portionof said mail identification data corresponds with said verifying portionof said mail identification data.
 2. The method of claim 1, wherein saidstep of affixing mail identification data further comprises affixing abar code on said at least one mail object.
 3. The method of claim 1,wherein said step of affixing mail identification data further comprisesprinting said mail identification data at least indirectly on said atleast one mail object.
 4. The method of claim 1, wherein saidauthenticating portion of said mail identification data furthercomprises said recipient data.
 5. The method of claim 1, wherein saidstep of providing mail verification data further comprises providingsaid mail verification data to said at least one reception device. 6.The method of claim 1, wherein said step of providing mail verificationdata further comprises providing said mail verification data to saidrecipient of said at least one mail object.
 7. The method of claim 1,further comprising the step of sending a web page to a sender of said atleast one mail object, said web page including data related to said atleast one mail object.
 8. The method of claim 1, further comprising thestep of sending an email to a sender of said at least one mail object,said email including data related to said at least one mail object. 9.The method of claim 1, further comprising the step of sending an emailif said authenticating portion of said mail identification datacorresponds to said verifying portion of said mail identification data.10. A mail verification system for authenticating at least one mailobject including mail identification data, comprising: at least one mailverification device adapted to communicate with at least one receptiondevice via a network, said at least one reception device being operatedby a mail carrier, and said at least one mail verification devicecomprising: a memory; and a mail verification application operated by asender of said at least one mail object and adapted to: store at least averifying portion of mail identification data in said memory, said mailidentification data comprising a single set of encoded data thatincludes at least a unique identifier, sender data, recipient data, andshipping method data, wherein said unique identifier consists of anumeric value assigned by said sender of said at least one mail object;receive at least an authenticating portion of said mail identificationdata from said at least one reception device via said network, whereinsaid authenticating portion comprises at least said unique identifier,said sender data, and said shipping method data; and provide mailverification data via said network if at least said authenticatingportion of said mail identification data corresponds to said verifyingportion of said mail identification data.
 11. The system of claim 10,wherein said authenticating portion of said mail identification datafurther comprises said recipient data.
 12. The system of claim 10,wherein said step of providing mail verification data further comprisesproviding said mail verification data to a recipient of said at leastone mail object.
 13. The system of claim 10, further comprising the stepof sending a web page to a sender of said at least one mail object, saidweb page including data related to said at least one mail object. 14.The system of claim 10, further comprising the step of sending a webpage to said recipient if said authenticating portion of said mailidentification data corresponds to said verifying portion of said mailidentification data.
 15. The system of claim 10, wherein said mailverification application is further configured to store a shippinglocation of said at least one mail object on said memory.
 16. The systemof claim 10, wherein said mail verification application is furtherconfigured to store a shipping date of said at least one mail object onsaid memory.
 17. A method of verifying mail identification data,comprising: affixing mail identification data to a mail object, saidmail identification data comprising a single set of encoded data thatincludes at least a unique identifier, mailer data, recipient data andshipping method data, wherein said unique identifier consists of anumeric value assigned by a mailer of said mail object; storing at leasta verifying portion of said mail identification data; submitting saidmail object to the United States Postal Service (USPS) for delivery to arecipient of said mail object receiving by a computer at least anauthenticating portion of said mail identification data from at leastone reception device via a network, wherein said authenticating portionof said mail identification data comprises at least said uniqueidentifier, said mailer data, and said shipping method data, saidcomputer is operated by a mailer that provides said at least one mailobject to the USPS, and said at least one reception device is operatedby the USPS; and providing by said computer mail verification data viasaid network when said authenticating portion of said mailidentification data corresponds with said verifying portion of said mailidentification data.
 18. The method of claim 17, wherein saidauthenticating portion of said mail identification data furthercomprises said recipient data.
 19. The method of claim 17, wherein saidstep of providing mail verification data further comprises providingsaid mail verification data to said recipient of said mail object. 20.The method of claim 17, further comprising the step of sending a webpage to at least one of said sender of said mail object and saidrecipient of said mail object, said web page including data related tosaid mail object.