Tokenizing Sensitive Data
First Claim
Patent Images
1. A method for tokenization of sensitive data, comprising:
- receiving sensitive data from a vendor;
determining a token key for the vendor;
utilizing a proprietary algorithm, selected based on the token key, to generate a vendor-specific token that is associated with the sensitive data;
creating a token identifier that comprises data related to the token key; and
sending the vendor-specific token and the token identifier to the vendor.
8 Assignments
0 Petitions
Accused Products
Abstract
Included are embodiments for tokenizing sensitive data. Some embodiments of systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. Some embodiments include creating a token identifier that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor.
-
Citations
20 Claims
-
1. A method for tokenization of sensitive data, comprising:
-
receiving sensitive data from a vendor; determining a token key for the vendor; utilizing a proprietary algorithm, selected based on the token key, to generate a vendor-specific token that is associated with the sensitive data; creating a token identifier that comprises data related to the token key; and sending the vendor-specific token and the token identifier to the vendor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for tokenization of sensitive data, comprising:
a memory component that stores logic that when executed by the system, causes the system to perform at least the following; receive sensitive data from a vendor; determine a token key for the vendor, the token key identifying a proprietary algorithm for generating a token; utilize the proprietary algorithm, selected based on the token key, to generate a vendor-specific token that is associated with the sensitive data; create a token identifier that comprises data related to the token key; and send the vendor-specific token and the token identifier to the vendor. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium for tokenization of sensitive data that stores a program that when executed by a computing device, causes the computing device to perform at least the following:
-
receive sensitive data from a vendor; determine whether the sensitive data has previously been tokenized; in response to determining that the sensitive data has previously been tokenized, retrieve a stored token and a stored token identifier from a data storage component and send the stored token and the stored token identifier to the vendor; in response to determining that the sensitive data has not previously been tokenized; determine a token key for the vendor; utilize a proprietary algorithm, based on the token key to generate a generated token that is associated with the sensitive data; create a token identifier that comprises data related to the token key; and send the generated token and the token identifier to the vendor. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification