×

Exclusive encryption

  • US 7,685,415 B2
  • Filed: 11/10/2004
  • Issued: 03/23/2010
  • Est. Priority Date: 01/17/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method implemented by one or more computing devices, the method comprising:

  • receiving an encrypted identifier, wherein a syntactical correctness of a plaintext name, encoded and mapped within the identifier that is encrypted, is verifiable, by the one or more computing devices, by checking a part of the encrypted identifier without decrypting the encrypted identifier;

    decrypting the encrypted identifier;

    decoding the decrypted identifier, the decoding comprising;

    initializing a string to null;

    counting a number of leading one bits that precede the first zero bit in the decrypted identifier; and

    for each group of sixteen bits following the first zero bit that follows the leading one bits;

    checking whether a leading eight bits of the group of sixteen bits are all zero bits;

    if the leading eight bits are not all zero bits, then appending the group of sixteen bits to the string;

    if the leading eight bits are all zero bits, then generating a decoded character by decoding the next eight bits after the leading eight bits using a coding table, and checking whether the decoded character is a particular character;

    if the decoded character is not the particular character, then appending the decoded character to the string;

    if the decoded character is the particular character, then checking whether any more one bits remain in the encoded identifier;

    if any more one bits remain in the encoded identifier then appending the decoded character to the string; and

    if no more one bits remain in the encoded identifier, then;

    appending a series of particular characters to the string, wherein the series of particular characters includes a number of particular characters equal to the number of counted leading one bits; and

    reversing the order of characters in the string, wherein after the reversing the string comprises the decoded decrypted identifier;

    demapping the decoded decrypted identifier into the plaintext name; and

    outputting, by the one or more computing devices, the plaintext name.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×