×

System and methods for format preserving tokenization of sensitive information

  • US 8,458,487 B1
  • Filed: 03/03/2011
  • Issued: 06/04/2013
  • Est. Priority Date: 03/03/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for format preserving tokenization of sensitive data for use in a computer-implemented data processing operation so as to protect the sensitive data from unauthorized access by persons not having authorization to the sensitive data, the sensitive data provided in an input data string having a predetermined number of characters, comprising the computer-implemented steps of:

  • receiving an input data string from a client process corresponding to sensitive data derived in connection with the client process for tokenization;

    accessing a tokenization strategy that contains information determining a first predetermined number of characters as a head of a tokenized data string and a second predetermined number of characters as a tail of the tokenized data string;

    storing the first predetermined number of characters of the input data string in a secure database as a first portion of the tokenized data string, the tokenized data string comprising an entry in the secure database;

    storing the second predetermined number of characters of the input data string in the secure database as a second portion of the tokenized data string;

    parsing the input data string of the first and second predetermined number of characters of the input data string to thereby derive a remaining portion of the input data string, the remaining portion comprising characters, each having an original value;

    encrypting the remaining portion of the input data string with an encryption key associated with the client process to obtain a ciphertext representation of the remaining portion of the input data string;

    generating a token body portion corresponding to the remaining portion of the input data string, the token body portion determined by a predetermined token generation algorithm that is independent of the data original values of the characters in the remaining portion of the input data string;

    storing the ciphertext representation of the remaining portion of the input data string and the token body portion in the secure database in association with the first portion and the second portion of the input data string, with the first portion of the input data string, the token body portion, and the second portion of the input data string forming a tokenized data string that has the same format as the input data string but is not cryptographically decipherable to derive the input data string;

    receiving a Lookup With Sensitive Data function call from the client process in association with the step of receiving an input data string sensitive data;

    calculating a unique digest of the input data string;

    accessing the secure database using the unique digest to determine whether there is an entry in the secure database corresponding to the input data string;

    in response to a determination that the secure database contains such an entry, retrieving the tokenized data string associated with the input data string; and

    returning the tokenized data string associated with the input data string to the client process.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×