Table-connected tokenization
First Claim
1. A method for improving the security of data in a tokenization environment, comprising:
- receiving data to be tokenized, the received data comprising a first portion of received data, a second portion of received data, a third portion of received data, and a fourth portion of received data, the first portion, second portion, third potion, and fourth portion comprising different portions of the received data;
receiving a first token table from a first server and a second token table from a second server different from the first server, the first server configured to select the first token table based on a value of the first portion of received data and the second server configured to select the second token table based on a value of the second portion of received data, the first token table and second token table each mapping each of a plurality of input values to a different token value; and
after selecting the token table, transforming the received data to produce tokenized data by;
accessing an initialization vector based on a value of the third portion of received data;
modifying, by a hardware processor, the fourth portion of the received data using the initialization vector to produce a modified fourth portion of the received data;
replacing, by the hardware processor, the modified fourth portion of the received data with a first token mapped by the first token table to a value of the modified fourth portion of the received data to produce a first tokenized portion of the received data; and
replacing, by the hardware processor, the first tokenized portion of the received data with a second token mapped by the second token table to a value of the first tokenized portion of the received data to produce a second tokenized portion of the received data.
1 Assignment
0 Petitions
Accused Products
Abstract
A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive data, and retrieves an initialization vector (IV) from an IV table using a first portion of the sensitive data. A second portion of the sensitive data is modified using the accessed initialization vector. A token table is selected from a set of token tables using a third portion of the sensitive data. The modified second portion of data is used to query the selected token table, and a token associated with the value of the modified second portion of data is accessed. The second portion of the sensitive data is replaced with the accessed token to form tokenized data.
19 Citations
20 Claims
-
1. A method for improving the security of data in a tokenization environment, comprising:
-
receiving data to be tokenized, the received data comprising a first portion of received data, a second portion of received data, a third portion of received data, and a fourth portion of received data, the first portion, second portion, third potion, and fourth portion comprising different portions of the received data; receiving a first token table from a first server and a second token table from a second server different from the first server, the first server configured to select the first token table based on a value of the first portion of received data and the second server configured to select the second token table based on a value of the second portion of received data, the first token table and second token table each mapping each of a plurality of input values to a different token value; and after selecting the token table, transforming the received data to produce tokenized data by; accessing an initialization vector based on a value of the third portion of received data; modifying, by a hardware processor, the fourth portion of the received data using the initialization vector to produce a modified fourth portion of the received data; replacing, by the hardware processor, the modified fourth portion of the received data with a first token mapped by the first token table to a value of the modified fourth portion of the received data to produce a first tokenized portion of the received data; and replacing, by the hardware processor, the first tokenized portion of the received data with a second token mapped by the second token table to a value of the first tokenized portion of the received data to produce a second tokenized portion of the received data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tokenization system for improving the security of data in a tokenization environment, comprising:
-
a non-transitory computer-readable storage medium storing executable instructions that, when executed by a processor, perform steps comprising; receiving data to be tokenized, the received data comprising a first portion of received data, a second portion of received data, a third portion of received data, and a fourth portion of received data, the first portion, second portion, third potion, and fourth portion comprising different portions of the received data; receiving a first token table from a first server and a second token table from a second server different from the first server, the first server configured to select the first token table based on a value of the first portion of received data and the second server configured to select the second token table based on a value of the second portion of received data, the first token table and second token table each mapping each of a plurality of input values to a different token value; and after selecting the token table, transforming the received data to produce tokenized data by; accessing an initialization vector based on a value of the third portion of received data; modifying, by a hardware processor, the fourth portion of the received data using the initialization vector to produce a modified fourth portion of the received data; replacing, by the hardware processor, the modified fourth portion of the received data with a first token mapped by the first token table to a value of the modified fourth portion of the received data to produce a first tokenized portion of the received data; and replacing, by the hardware processor, the first tokenized portion of the received data with a second token mapped by the second token table to a value of the first tokenized portion of the received data to produce a second tokenized portion of the received data; and a hardware processor configured to execute the instructions. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing executable computer instructions that when executed by a hardware processor perform steps for improving the security of data in a tokenization environment, comprising:
-
receiving data to be tokenized, the received data comprising a first portion of received data, a second portion of received data, a third portion of received data, and a fourth portion of received data, the first portion, second portion, third potion, and fourth portion comprising different portions of the received data; receiving a first token table from a first server and a second token table from a second server different from the first server, the first server configured to select the first token table based on a value of the first portion of received data and the second server configured to select the second token table based on a value of the second portion of received data, the first token table and second token table each mapping each of a plurality of input values to a different token value; and after selecting the token table, transforming the received data to produce tokenized data by; accessing an initialization vector based on a value of the third portion of received data; modifying, by a hardware processor, the fourth portion of the received data using the initialization vector to produce a modified fourth portion of the received data; replacing, by the hardware processor, the modified fourth portion of the received data with a first token mapped by the first token table to a value of the modified fourth portion of the received data to produce a first tokenized portion of the received data; and replacing, by the hardware processor, the first tokenized portion of the received data with a second token mapped by the second token table to a value of the first tokenized portion of the received data to produce a second tokenized portion of the received data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification