Registry Compliance Logo

Software Support - Scrub Process Overview

The scrub process begins with your list of addresses. When you import your list into the Registry Compliance application, a number of things occur. The importer reads line-by-line, checking to see that each line contains a valid, properly formatted address, based on the type of file you specified on the Scrub Profile Options page.  If a line is blank, contains unreadable characters, or contains an improperly formatted address, the line is skipped and logged. In this manner, only valid addresses continue through the scrubbing process.

Once an address is checked for validity, the address is transformed into a digital hash code so that it is no longer human-readable. The hash code consists of 32 letters and numbers that are unique to each address, not unlike the way a human fingerprint is unique to each person. The original address cannot be recovered from its hash code just as you can't tell a person's eye color, height or other personal data from her fingerprint.

If you are scrubbing e-mail addresses, as each address is hashed into its hash code, the domain portion of the e-mail address (everything after the @ symbol) is removed. Since residents of each jurisdiction may register an entire Internet domain, these domains must also be checked against the registries. The domains are hashed in the same way as the e-mail addresses, thus producing two lists of 32-character codes: one for e-mail addresses and one for domains.

The hash codes are the data that the application scrubs. Your human-readable lists never leave your computer. Naturally, the system limits the amount of data that can be scrubbed at once so as to deter ill-intentioned users from abusing the system. Notwithstanding, if you encounter the data limit, you can split your list into multiple smaller lists and scrub each one individually.

Once the application receives your data (your hash codes), it checks each code against the jurisdictions' registries. The registries are also stored in a hashed form, so that they are not human-readable. The system simply checks to see whether any of your hash codes match any of the hash codes in the registries. If matches are found, the system makes a list of the matched hash codes to be removed.  When you authorize the application to export your data, it removes each matched address from your original list.

Once the matched addresses have been removed from your list, you are asked to save the cleaned list as a text file. In addition to your cleaned list and legal information header, this file further contains a digital signature to guarantee that the file is genuine.

Digital Signature

The digital signature is a standard practice for ensuring the validity of documents. It is generated by hashing your cleaned list into a 32-character code. (See above for more information about hashing.) That 32-character code is then encrypted into a 128-bit code, using the same cryptographic techniques that protect your personal information when using the Internet. This coded signature is saved by the Registry Compliance system and is written into the cleaned-list file so that your file can be proven to be genuine. As long as you do not modify the original file, your digital signature can be used to verify that the file is a true original output file of the Registry Compliance application.

Verifying the Digital Signature

Should the need arise to prove that your file is genuine, you may do so by contacting customer service and requesting a digital signature verification request.

Software Support Main Menu