Table-connected tokenization
First Claim
1. A method for tokenizing data, comprising:
- receiving sensitive data to be tokenized;
querying an initialization vector table with a first portion of the sensitive data comprising less than all of the sensitive data to access an initialization vector;
modifying, by one or more hardware processors, a second portion of the sensitive data different than the first portion of the sensitive data with the initialization vector;
selecting a token table from a set of token tables based on a third portion of the sensitive data; and
tokenizing, by one or more hardware processors, the modified second portion of the sensitive data using the selected token table.
3 Assignments
0 Petitions
Accused Products
Abstract
A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive data, and retrieves an initialization vector (IV) from an IV table using a first portion of the sensitive data. A second portion of the sensitive data is modified using the accessed initialization vector. A token table is selected from a set of token tables using a third portion of the sensitive data. The modified second portion of data is used to query the selected token table, and a token associated with the value of the modified second portion of data is accessed. The second portion of the sensitive data is replaced with the accessed token to form tokenized data.
-
Citations
20 Claims
-
1. A method for tokenizing data, comprising:
-
receiving sensitive data to be tokenized; querying an initialization vector table with a first portion of the sensitive data comprising less than all of the sensitive data to access an initialization vector; modifying, by one or more hardware processors, a second portion of the sensitive data different than the first portion of the sensitive data with the initialization vector; selecting a token table from a set of token tables based on a third portion of the sensitive data; and tokenizing, by one or more hardware processors, the modified second portion of the sensitive data using the selected token table. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A tokenization system comprising:
-
an interface module configured to receive sensitive data to be tokenized; and a tokenization module comprising one or more hardware processors configured to tokenize the sensitive data by; querying an initialization vector table with a first portion of the sensitive data comprising less than all of the sensitive data to access an initialization vector; modifying a second portion of the sensitive data different than the first portion of the sensitive data with the initialization vector; selecting a token table from a set of token tables based on a third portion of the sensitive data; and tokenizing the modified second portion of the sensitive data using the selected token table. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for tokenizing data, comprising:
-
receiving sensitive data to be tokenized; selecting an initialization vector from a set of initialization vectors based on a first portion of the sensitive data comprising less than all of the sensitive data; selecting a token table from a set of token tables based on a second portion of the sensitive data; and tokenizing, by one or more hardware processors, a third portion of the sensitive data different than the first portion of the sensitive data and the second portion of the sensitive data using the selected token table and the selected initialization vector.
-
Specification