Delivery point validation system
First Claim
1. A method for processing data using a computer, comprising:
- receiving, by the computer, a data element including at least a name or an address;
forming, by the computer utilizing a cryptographic procedure, a cryptographic value from the data element;
extracting a plurality of samples from a binary representation of the cryptographic value, each of the plurality of samples comprising one or more bits of said binary representation of the cryptographic value, the samples identifying one or more bits of previously stored data, the previously stored data representing a list of valid data elements and being formed by the cryptographic procedure from the list;
querying whether the received data element is included in the list of the valid data elements;
checking bit values of the bits of the previously stored data based on each of the plurality of bit samples; and
determining, using the computer, whether the data element is included in the list based on a result of the checking.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods consistent with the present invention encode a list so users of the list may make inquiries to the coded list without the entire content of the list being revealed to the users. Once each item in the list has been encoded by an encoder, a bit array with high and low values may be used to represent the items in the list. The bit array may be embodied in a validation system for allowing users to query the list to determine whether an inquiry item is on the list. The validation system determines which bits to check by executing the same coding process executed by the encoder. If all the bits are high, then the inquiry item is determined to be part of the list, if at least one of the bits is low, then the inquiry item is determined not to be part of the original list.
-
Citations
29 Claims
-
1. A method for processing data using a computer, comprising:
-
receiving, by the computer, a data element including at least a name or an address; forming, by the computer utilizing a cryptographic procedure, a cryptographic value from the data element; extracting a plurality of samples from a binary representation of the cryptographic value, each of the plurality of samples comprising one or more bits of said binary representation of the cryptographic value, the samples identifying one or more bits of previously stored data, the previously stored data representing a list of valid data elements and being formed by the cryptographic procedure from the list; querying whether the received data element is included in the list of the valid data elements; checking bit values of the bits of the previously stored data based on each of the plurality of bit samples; and determining, using the computer, whether the data element is included in the list based on a result of the checking. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium including program code, which, when executed by a processor, causes the processor to perform a method for processing data, the method comprising:
-
receiving, by the computer, a data element including at least a name or an address; forming, by the computer utilizing a cryptographic procedure, a cryptographic value from the data element; extracting a plurality of samples from a binary representation of the cryptographic value, each of the each of the plurality of samples comprising one or more bits of said binary representation of the cryptographic value, the samples identifying one or more bits of previously stored data, the previously stored data representing a list of valid data elements and being formed by the cryptographic procedure from the list; querying whether the received data element is included in the list of the valid data elements; checking bit values of the bits of the previously stored data based on each of the plurality of bit samples; and determining, using the computer, whether the data element is included in the list based on a result of the checking. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system for processing data comprising:
-
a receiver that receives a data item comprising at least a name or an address; an encoder that forms, by utilizing a cryptographic procedure, a cryptographic value from the data element; an extraction circuit that extracts a plurality of samples from a binary representation of the cryptographic value, each of the plurality of samples comprising one or more bits of said binary representation of the cryptographic value, the samples identifying one or more bits within previously stored data, the previously stored data representing a list of valid data elements and being formed by the cryptographic procedure from the list; and a validation component that query whether the received data element is included in the list of the valid data elements, checks bit values of the bits of the previously stored data based on each of the plurality of bit samples, and determines whether the data element is included in the list based on a checking result. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification