×

Exclusive encryption

  • US 7,571,327 B2
  • Filed: 11/10/2004
  • Issued: 08/04/2009
  • Est. Priority Date: 01/17/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A completely computer-implemented method comprising:

  • receiving an encrypted identifier;

    checking a part of the encrypted identifier to verify, without decrypting the encrypted identifier, that the encrypted identifier is an encryption of an identifier that conforms to a specified syntax, wherein verifying that the encrypted identifier is an encryption of the identifier that conforms to the specified syntax comprises;

    checking whether a first block of the encrypted identifier is zero;

    determining that the encrypted identifier conforms to the syntax when the first block is not equal to zero; and

    determining that the encrypted identifier does not conform to the syntax when the first block is equal to zero;

    accessing one or more other encrypted identifiers that are each an encryption of an associated other identifier;

    verifying, without decrypting the encrypted identifier, that the encrypted identifier is not an encryption that matches any of the associated other identifiers of the one or more other encrypted identifiers; and

    determining, in the event that the verifying indicates that the encrypted identifier is an encryption of an identifier that conforms to the specified syntax and the verifying indicates that the encrypted identifier is not an encryption that matches any of the associated other identifiers, that the encrypted identifier is an encryption of a valid identifier,wherein in the event the encrypted identifier is an encryption of a valid identifier, the encrypted identifier is processed, the processing comprising;

    storing the encrypted identifier;

    orforwarding the encrypted identifier.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×