Delivery point validation system
First Claim
1. A method, implemented using a computer system, for representing a list comprising names using a bit array wherein bits in the bit array are initialized to a first value, comprising:
- extracting portions of a name, using the computer system;
combining the portions, using the computer system, to create a standardized item that is smaller than the name from which the portions were extracted;
converting the standardized item to a cryptographic value using a cryptographic algorithm and the computer system;
extracting a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; and
setting, using the computer system, bits at the bit positions to a second value according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods consistent with the present invention encode a list so users of the list may make inquiries to the coded list without the entire content of the list being revealed to the users. Once each item in the list has been encoded by an encoder, a bit array with high and low values may be used to represent the items in the list. The bit array may be embodied in a validation system for allowing users to query the list to determine whether an inquiry item is on the list. The validation system determines which bits to check by executing the same coding process executed by the encoder. If all the bits are high, then the inquiry item is determined to be part of the list, if at least one bit is low, then the inquiry item is determined not to be part of the original list.
-
Citations
54 Claims
-
1. A method, implemented using a computer system, for representing a list comprising names using a bit array wherein bits in the bit array are initialized to a first value, comprising:
-
extracting portions of a name, using the computer system; combining the portions, using the computer system, to create a standardized item that is smaller than the name from which the portions were extracted; converting the standardized item to a cryptographic value using a cryptographic algorithm and the computer system; extracting a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; and setting, using the computer system, bits at the bit positions to a second value according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, implemented using a computer system, for determining whether an inquiry item is on a list comprising names, wherein the names on the list have been standardized, wherein the list is represented by a bit array, and wherein the bit array was produced by converting the names into cryptographic values using a cryptographic algorithm and setting bits in the bit array to a set value based on bit samples of the cryptographic values, the method comprising:
-
standardizing an inquiry item, using the computer system, in a same manner as applied to the names on the list to create a standardized inquiry item; converting the standardized inquiry item into a cryptographic value using the cryptographic algorithm and the computer system, in a same manner as the names are converted to produce the bit array; extracting a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array and the second field identifying one or more bit positions within the group of bits; determining specific bits at the bit positions according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits; and using the computer system, determining that the inquiry item is on the list if the specific bits at the bit positions of the bit array equal the set value and determining that the inquiry item is not on the list if at least one of the specific bits at the bit positions of the bit array does not equal the set value. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer for representing a list comprising names using a bit array wherein bits in the bit array are initialized to a first value, the computer comprising:
-
a memory having programming instructions; and a processor, responsive to the programming instructions, configured to; extract portions of a name; combine the portions to create a standardized item; convert the standardized item to a cryptographic value using a cryptographic algorithm; extract a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; and set bits at the bit positions of the bit array to a second value according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A computer for determining whether an inquiry item is on a list comprising names, wherein the names on the list have been standardized, wherein the list is represented by a bit array having bits set to a first value and bits set to a second value, and wherein the bit array was produced by converting the names into cryptographic values using a cryptographic algorithm and setting bits of the bit array to the second value based on bit samples of the cryptographic values, the computer comprising:
-
a memory having programming instructions; and a processor, responsive to the programming instructions, configured to; standardize an inquiry item in a same manner as applied to the names on the list to create a standardized inquiry item; convert the standardized inquiry item into a cryptographic value using the cryptographic algorithm in a same manner as the names are converted to produce the bit array; extract a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; determine specific bits at the bit positions of the bit array according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits; and determine that the inquiry item is on the list if the specific bits at the bit positions of the bit array equal the second value and determine that the inquiry item is not on the list if at least one of the specific bits at the bit positions of the bit array does not equal the second value. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for representing a list comprising names using a bit array wherein bits in the bit array are initialized to a first value, comprising:
-
a standardizer configured to extract portions of a name and combine the portions to create a standardized item; a hashing function unit configured to convert the standardized item to a cryptographic value; an extraction circuit configured to extract a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; and an offset circuit configured to set bits at the bit positions of the bit array to a second value according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. A system for determining whether an inquiry item is on a list comprising names, wherein names on the list have been standardized, wherein the list is represented by a bit array having bits that are set to a first value and bits that are set to a second value, and wherein the bit array was produced by converting the names into cryptographic values using a cryptographic algorithm and setting bits in the bit array to the second value based on bit samples of the cryptographic values, the system comprising:
-
a standardizer configured to standardize an inquiry item in a same manner as applied to the names on the list to create a standardized inquiry item; a hashing function unit configured to convert the standardized inquiry item into a cryptographic value using the cryptographic algorithm in a same manner as the names are converted to produce the bit array; an extraction circuit configured to extract a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; an offset circuit configured to determine specific bits at the bit positions in the bit array according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits; and a processor configured to determine that the inquiry item is on the list if the specific bits at the bit positions of the bit array equal the second value and determine that the inquiry item is not on the list if at least one of the specific bits at the bit positions of the bit array does not equal the second value. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44)
-
-
45. A method, implemented using a computer system, for representing a list comprising license numbers using a bit array wherein the bit array is initialized to a first value, comprising:
-
extracting portions of a license number, using the computer system; combining the portions, using the computer system, to create a standardized item that is smaller than the license number from which the portions were extracted; converting the standardized item to a cryptographic value using a cryptographic algorithm and the computer system; extracting a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; setting bits at the bit positions of the bit array to a second value according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits; and storing the bit array for use in determining whether an inquiry item is on the list. - View Dependent Claims (46, 47, 48, 49)
-
-
50. A method, implemented using a computer system, for determining whether an inquiry item is on a list comprising license numbers, wherein the license numbers on the list have been standardized by extracting and combining portions of the license numbers, wherein the list is represented by a bit array, and wherein the bit array was produced by converting the license numbers into cryptographic values using a cryptographic algorithm and setting bits in the bit array to a set value based on bit samples of the cryptographic values, the method comprising:
-
extracting portions of the inquiry item, using the computer system, in a same manner as applied to the license numbers; combining the portions to create a standardized inquiry item in a same manner as applied to the license numbers; converting the standardized inquiry item into a cryptographic value using the cryptographic algorithm and the computer system in a same manner as the license numbers are converted to produce the bit array; extracting a plurality of n-bit samples from the cryptographic value, the n-bit samples including at least a first field and a second field, the first field identifying a group of bits of the bit array, and the second field identifying one or more bit positions within the group of bits; determining specific bits at the bit positions of the bit array according to the first field identifying the group of bits and the second field identifying the bit positions within the group of bits; using the computer system, determining that the inquiry item is on the list if the specific bits at the bit positions of the bit array equal the set value and determining that the inquiry item is not on the list if at least one of the specific bits at the bit positions of the bit array does not equal the set value; and outputting a result, using the computer system, indicating whether the inquiry item is or is not on the list. - View Dependent Claims (51, 52, 53, 54)
-
Specification