Security system utilizing vaultless tokenization and encryption
First Claim
1. A data security system utilizing vaultless tokenization and encryption, the system comprising:
- one or more memory components having computer readable code store thereon; and
one or more processing components operatively coupled to the one or more memory components, wherein the one or more processing components are configured to execute the computer readable code to;
identify data for secure storage;
encrypt the data into encrypted data, wherein encrypting the data further comprises encrypting the data using format preserving encryption;
split the encrypted data into two or more encrypted data segments when the data meets a threshold number of characters;
access one or more random token tables containing random tokens;
retrieve two or more random token segments that are mapped to the two or more encrypted data segments from the one or more random token tables;
combine the two or more random token segments into a tokenized sequence; and
return the tokenized sequence.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention includes securing data using vaultless tokenization and encryption. The present invention uses static random token tables in conjunction with encryption methods in order to tokenize sensitive data for the purposes of secure transfer and storage. The present invention is configured to identify data for secure storage, split the data into two or more data segments, access one or more static random token tables containing random tokens, retrieve two or more random tokens from the one or more static random tables for each of the two or more data segments, combine the two or more random tokens into a tokenized sequence, and return the tokenized sequence. Moreover, additional encryption may occur before or after the data is split and/or before or after combining the random tokens into a tokenized sequence.
-
Citations
20 Claims
-
1. A data security system utilizing vaultless tokenization and encryption, the system comprising:
-
one or more memory components having computer readable code store thereon; and one or more processing components operatively coupled to the one or more memory components, wherein the one or more processing components are configured to execute the computer readable code to; identify data for secure storage; encrypt the data into encrypted data, wherein encrypting the data further comprises encrypting the data using format preserving encryption; split the encrypted data into two or more encrypted data segments when the data meets a threshold number of characters; access one or more random token tables containing random tokens; retrieve two or more random token segments that are mapped to the two or more encrypted data segments from the one or more random token tables; combine the two or more random token segments into a tokenized sequence; and return the tokenized sequence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer implemented method for vaultless tokenization and encryption of data, the method comprising:
-
identifying, by one or more processor components, data for secure storage; encrypting the data into encrypted data, wherein encrypting the data further comprises encrypting the data using format preserving encryption; splitting, by the one or more processor components, the encrypted data into two or more encrypted data segments; accessing, by the one or more processor components, one or more random token tables containing random tokens; retrieving, by the one or more processing components, two or more random token segments that are mapped to the two or more encrypted data segments from the one or more random token tables; combining, by the one or more processing components, the two or more random token segments into a tokenized sequence; and returning, by the one or more processing components, the tokenized sequence. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer program product for vaultless tokenization and encryption of data, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured to identify data for secure storage; an executable portion configured to encrypt the data into encrypted data, wherein encrypting the data further comprises encrypting the data using format preserving encryption; an executable portion configured to split the encrypted data into two or more encrypted data segments; an executable portion configured to access one or more random token tables containing random tokens; an executable portion configured to retrieve two or more random token segments that are mapped to the two or more encrypted data segments from the one or more random token tables; an executable portion configured to combine the two or more random token segments into a tokenized sequence; and an executable portion configured to return the tokenized sequence. - View Dependent Claims (17, 18, 19, 20)
-
Specification