METHOD AND APPARATUS FOR TOKENIZATION OF SENSITIVE SETS OF CHARACTERS
First Claim
1. A method for tokenizing sensitive data in a distributed system comprising a local server and a central server, the method comprising:
- receiving, at the local server from the central server, a token table mapping each of a plurality of character strings to a different token;
receiving, at the local server, sensitive data comprising a string of characters;
querying, by the local server, the token table with a subset of the string of characters to identify a token mapped to the subset of the string of characters;
replacing, by the local server, the subset of the string of characters with the identified token to create tokenized data; and
providing the tokenized data to the central server for storage.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for secure handling of sensitive sets of characters in a distributed hierarchical system are disclosed, comprising at least one local server on a lower hierarchic level and at least one central server at a higher hierarchic level. The method comprises the steps: receiving a sensitive set of characters in said local server; replacing a part of said sensitive set of characters with a token to form a tokenized set of characters, said token belonging to a subset of possible tokens assigned to the local server by the central server; transferring at least one of said sensitive set of characters and said tokenized set of characters to the central server; and canceling said sensitive set of characters from said local server within a limited time from said transferring, while maintaining said tokenized set of characters in a local database connected to said local server.
-
Citations
20 Claims
-
1. A method for tokenizing sensitive data in a distributed system comprising a local server and a central server, the method comprising:
-
receiving, at the local server from the central server, a token table mapping each of a plurality of character strings to a different token; receiving, at the local server, sensitive data comprising a string of characters; querying, by the local server, the token table with a subset of the string of characters to identify a token mapped to the subset of the string of characters; replacing, by the local server, the subset of the string of characters with the identified token to create tokenized data; and providing the tokenized data to the central server for storage. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for tokenizing sensitive data, the system comprising:
-
a non-transitory computer readable storage medium storing executable program code comprising code for; receiving, from a central server, a token table mapping each of a plurality of character strings to a different token; receiving sensitive data comprising a string of characters; querying the token table with a subset of the string of characters to identify a token mapped to the subset of the string of characters; replacing the subset of the string of characters with the identified token to create tokenized data; and providing the tokenized data to the central server for storage; and a processor for executing the program code. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for tokenizing sensitive data in a distributed system comprising a plurality of local server and a central server, the method comprising:
-
providing, by the central server to each of the plurality of local servers, a token table mapping each of a plurality of character strings to a different token, each of the plurality of local servers configured to tokenize sensitive data using a token from the token server provided to the local server to form tokenized data; receiving, by the central server, tokenized data from one or more of the local servers; and storing, by the central server, received tokenized data. - View Dependent Claims (16, 17)
-
-
18. A system for tokenizing sensitive data, the system comprising:
-
a non-transitory computer readable storage medium storing executable program code comprising code for; providing, to each of a plurality of local servers, a token table mapping each of a plurality of character strings to a different token, each of the plurality of local servers configured to tokenize sensitive data using a token from the token server provided to the local server to form tokenized data; receiving tokenized data from one or more of the local servers; and storing received tokenized data; and a processor for executing the program code. - View Dependent Claims (19, 20)
-
Specification