The scrub process begins with your list of addresses. When you import your list
into the Registry Compliance application, a number of things occur. The
importer reads line-by-line, checking to see that each line contains a valid,
properly formatted address, based on the type of file you specified on the
Scrub Profile Options
page. If a line is blank, contains unreadable
characters, or contains an improperly formatted address, the line is skipped
and logged. In this manner, only valid addresses continue through the scrubbing
process.
Once an address is checked for validity, the address is transformed into a
digital hash
code so that it is no longer human-readable. The hash code
consists of 32 letters and numbers that are unique to each address, not unlike
the way a human fingerprint is unique to each person. The original address
cannot be recovered from its hash code just as you can't tell a person's eye
color, height or other personal data from her fingerprint.
If you are scrubbing e-mail addresses, as each address is hashed
into its hash
code, the domain portion of the e-mail address (everything after the @
symbol) is removed. Since residents of each jurisdiction may register an entire
Internet domain, these domains must also be checked against the registries. The
domains are hashed in the same way as the e-mail addresses, thus producing two
lists of 32-character codes: one for e-mail addresses and one for domains.
The hash codes are the data that the application scrubs. Your
human-readable lists never leave your computer. Naturally, the system limits
the amount of data that can be scrubbed at once so as to deter ill-intentioned
users from abusing the system. Notwithstanding, if you encounter the data
limit, you can split your list into multiple smaller lists and scrub each one
individually.
Once the application receives your data (your hash codes), it checks each code
against the jurisdictions' registries. The registries are also stored in a
hashed form, so that they are not human-readable. The system simply checks to
see whether any of your hash codes match any of the hash codes in the
registries. If matches are found, the system makes a list of the matched hash
codes to be removed. When you authorize the application to export your
data, it removes each matched address from your original list.
Once the matched addresses have been removed from your list, you are asked to
save the cleaned list as a text file. In addition to your cleaned list and
legal information header, this file further contains a digital signature to
guarantee that the file is genuine.
Digital Signature
The digital signature is a standard practice for ensuring the validity of
documents. It is generated by hashing your cleaned list into a 32-character
code. (See above for more information about hashing.) That 32-character code is
then encrypted into a 128-bit code, using the same cryptographic techniques
that protect your personal information when using the Internet. This coded
signature is saved by the Registry Compliance system and is written into the
cleaned-list file so that your file can be proven to be genuine. As long as you
do not modify the original file, your digital signature can be used to verify
that the file is a true original output file of the Registry Compliance
application.
Verifying the Digital Signature
Should the need arise to prove that your file is genuine, you may do so by
contacting customer service and requesting a digital signature verification
request.
Software Support Main Menu