Table-Connected Tokenization
First Claim
1. A method for improving the security of data in a tokenization environment, comprising:
- receiving data to be tokenized;
accessing a first token table from a first server based on a value of a first bit of the received data, a second token table from a second server based on a value of a second bit of the received data, a third token table from a third server based on a value of a third bit of the received data, and a fourth token table from a fourth server based on a value of a fourth bit of the received data; and
tokenizing the received data by;
replacing, by a hardware processor, a portion of the received data with a first token mapped by the first token table to a value of the portion of the received data to produce first tokenized data;
replacing, by the hardware processor, a portion of the first tokenized data with a second token mapped by the second token table to a value of the portion of the first tokenized data to produce second tokenized data;
replacing, by the hardware processor, a portion of the second tokenized data with a third token mapped by the third token table to a value of the portion of the second tokenized data to produce third tokenized data; and
replacing, by the hardware processor, a portion of the third tokenized data with a fourth token mapped by the fourth token table to a value of the portion of the third tokenized data to produce tokenized data.
1 Assignment
0 Petitions
Accused Products
Abstract
A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive data, and retrieves an initialization vector (IV) from an IV table using a first portion of the sensitive data. A second portion of the sensitive data is modified using the accessed initialization vector. A token table is selected from a set of token tables using a third portion of the sensitive data. The modified second portion of data is used to query the selected token table, and a token associated with the value of the modified second portion of data is accessed. The second portion of the sensitive data is replaced with the accessed token to form tokenized data.
0 Citations
20 Claims
-
1. A method for improving the security of data in a tokenization environment, comprising:
-
receiving data to be tokenized; accessing a first token table from a first server based on a value of a first bit of the received data, a second token table from a second server based on a value of a second bit of the received data, a third token table from a third server based on a value of a third bit of the received data, and a fourth token table from a fourth server based on a value of a fourth bit of the received data; and tokenizing the received data by; replacing, by a hardware processor, a portion of the received data with a first token mapped by the first token table to a value of the portion of the received data to produce first tokenized data; replacing, by the hardware processor, a portion of the first tokenized data with a second token mapped by the second token table to a value of the portion of the first tokenized data to produce second tokenized data; replacing, by the hardware processor, a portion of the second tokenized data with a third token mapped by the third token table to a value of the portion of the second tokenized data to produce third tokenized data; and replacing, by the hardware processor, a portion of the third tokenized data with a fourth token mapped by the fourth token table to a value of the portion of the third tokenized data to produce tokenized data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tokenization system for improving the security of data in a tokenization environment, comprising:
-
a non-transitory computer-readable storage medium storing executable instructions that, when executed by a processor, perform steps comprising; receiving data to be tokenized; accessing a first token table from a first server based on a value of a first bit of the received data, a second token table from a second server based on a value of a second bit of the received data, a third token table from a third server based on a value of a third bit of the received data, and a fourth token table from a fourth server based on a value of a fourth bit of the received data; and tokenizing the received data by; replacing, by a hardware processor, a portion of the received data with a first token mapped by the first token table to a value of the portion of the received data to produce first tokenized data; replacing, by the hardware processor, a portion of the first tokenized data with a second token mapped by the second token table to a value of the portion of the first tokenized data to produce second tokenized data; replacing, by the hardware processor, a portion of the second tokenized data with a third token mapped by the third token table to a value of the portion of the second tokenized data to produce third tokenized data; and replacing, by the hardware processor, a portion of the third tokenized data with a fourth token mapped by the fourth token table to a value of the portion of the third tokenized data to produce tokenized data; and a hardware processor configured to execute the instructions. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing executable computer instructions that when executed by a hardware processor perform steps for improving the security of data in a tokenization environment, comprising:
-
receiving data to be tokenized; accessing a first token table from a first server based on a value of a first bit of the received data, a second token table from a second server based on a value of a second bit of the received data, a third token table from a third server based on a value of a third bit of the received data, and a fourth token table from a fourth server based on a value of a fourth bit of the received data; and tokenizing the received data by; replacing, by a hardware processor, a portion of the received data with a first token mapped by the first token table to a value of the portion of the received data to produce first tokenized data; replacing, by the hardware processor, a portion of the first tokenized data with a second token mapped by the second token table to a value of the portion of the first tokenized data to produce second tokenized data; replacing, by the hardware processor, a portion of the second tokenized data with a third token mapped by the third token table to a value of the portion of the second tokenized data to produce third tokenized data; and replacing, by the hardware processor, a portion of the third tokenized data with a fourth token mapped by the fourth token table to a value of the portion of the third tokenized data to produce tokenized data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification