Table-connected tokenization
First Claim
1. A method for improving the security of data in a tokenization environment, comprising:
- receiving data to be tokenized, the received data comprising a first portion of received data and a second portion of received data different from the first portion of the received data;
accessing an initialization vector table, a first token table from a first server, and a second token table from a second server;
querying the initialization vector table with a value of the first portion of the received data to identify a first initialization vector and a second initialization vector; and
after accessing the first token table and the second token table and after querying the initialization vector table, transforming the received data to produce tokenized data by;
modifying, by a hardware processor, the second portion of the received data using the first initialization vector to produce a first modified portion of the received data;
replacing, by the hardware processor, the first modified portion of the received data with a first token mapped by the first token table to a value of the first modified portion of the received data to produce a first tokenized portion of the received data;
modifying, by the hardware processor, the first tokenized portion of the received data using the second initialization vector to produce a second modified portion of the received data; and
replacing, by the hardware processor, the second modified portion of the received data with a second token mapped by the second token table to a value of the second modified portion of the received data to produce a second tokenized portion of the received data.
1 Assignment
0 Petitions
Accused Products
Abstract
A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive data, and retrieves an initialization vector (IV) from an IV table using a first portion of the sensitive data. A second portion of the sensitive data is modified using the accessed initialization vector. A token table is selected from a set of token tables using a third portion of the sensitive data. The modified second portion of data is used to query the selected token table, and a token associated with the value of the modified second portion of data is accessed. The second portion of the sensitive data is replaced with the accessed token to form tokenized data.
19 Citations
20 Claims
-
1. A method for improving the security of data in a tokenization environment, comprising:
-
receiving data to be tokenized, the received data comprising a first portion of received data and a second portion of received data different from the first portion of the received data; accessing an initialization vector table, a first token table from a first server, and a second token table from a second server; querying the initialization vector table with a value of the first portion of the received data to identify a first initialization vector and a second initialization vector; and after accessing the first token table and the second token table and after querying the initialization vector table, transforming the received data to produce tokenized data by; modifying, by a hardware processor, the second portion of the received data using the first initialization vector to produce a first modified portion of the received data; replacing, by the hardware processor, the first modified portion of the received data with a first token mapped by the first token table to a value of the first modified portion of the received data to produce a first tokenized portion of the received data; modifying, by the hardware processor, the first tokenized portion of the received data using the second initialization vector to produce a second modified portion of the received data; and replacing, by the hardware processor, the second modified portion of the received data with a second token mapped by the second token table to a value of the second modified portion of the received data to produce a second tokenized portion of the received data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tokenization system for improving the security of data in a tokenization environment, comprising:
-
a non-transitory computer-readable storage medium storing executable instructions that, when executed by a processor, perform steps comprising; receiving data to be tokenized, the received data comprising a first portion of received data and a second portion of received data different from the first portion of the received data; accessing an initialization vector table, a first token table from a first server, and a second token table from a second server; querying the initialization vector table with a value of the first portion of the received data to identify a first initialization vector and a second initialization vector; and after accessing the first token table and the second token table and after querying the initialization vector table, transforming the received data to produce tokenized data by; modifying, by a hardware processor, the second portion of the received data using the first initialization vector to produce a first modified portion of the received data; replacing, by the hardware processor, the first modified portion of the received data with a first token mapped by the first token table to a value of the first modified portion of the received data to produce a first tokenized portion of the received data; modifying, by the hardware processor, the first tokenized portion of the received data using the second initialization vector to produce a second modified portion of the received data; and replacing, by the hardware processor, the second modified portion of the received data with a second token mapped by the second token table to a value of the second modified portion of the received data to produce a second tokenized portion of the received data; and a hardware processor configured to execute the instructions. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing executable computer instructions that when executed by a hardware processor perform steps for improving the security of data in a tokenization environment, comprising:
-
receiving data to be tokenized, the received data comprising a first portion of received data and a second portion of received data different from the first portion of the received data; accessing an initialization vector table, a first token table from a first server, and a second token table from a second server; querying the initialization vector table with a value of the first portion of the received data to identify a first initialization vector and a second initialization vector; and after accessing the first token table and the second token table and after querying the initialization vector table, transforming the received data to produce tokenized data by; modifying, by a hardware processor, the second portion of the received data using the first initialization vector to produce a first modified portion of the received data; replacing, by the hardware processor, the first modified portion of the received data with a first token mapped by the first token table to a value of the first modified portion of the received data to produce a first tokenized portion of the received data; modifying, by the hardware processor, the first tokenized portion of the received data using the second initialization vector to produce a second modified portion of the received data; and replacing, by the hardware processor, the second modified portion of the received data with a second token mapped by the second token table to a value of the second modified portion of the received data to produce a second tokenized portion of the received data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification