PRIVACY IDENTIFIER REMEDIATION
First Claim
1. A method of privacy identifier remediation, comprising the steps of:
- capturing a privacy identifier at a front end server;
forwarding the privacy identifier to a secure server installation;
at the secure server installation, obtaining a token to replace the privacy identifier, the token being unique and meaningless in relation to the privacy identifier;
forwarding the token from the secure server installation to a back end server; and
processing the token as a proxy for the privacy identifier at the back end server.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure server installation is provided that abstracts credit card identifiers from its server, network, application and database environments, thus reducing investment in securing, segregating and/or isolating these environments in their entirety. The secure server installation intercepts credit card transactions sent from front end applications to back end applications, and forwards tokens in replacement of credit card identifiers for processing by the back end applications.
The same secure server installation can be applied for the encryption, storage (data-at-rest), transmission of private data within a network of other private or sensitive data not limited to social insurance numbers, drivers license numbers, phone numbers, bank account numbers, etc.
70 Citations
32 Claims
-
1. A method of privacy identifier remediation, comprising the steps of:
-
capturing a privacy identifier at a front end server; forwarding the privacy identifier to a secure server installation; at the secure server installation, obtaining a token to replace the privacy identifier, the token being unique and meaningless in relation to the privacy identifier; forwarding the token from the secure server installation to a back end server; and processing the token as a proxy for the privacy identifier at the back end server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of privacy identifier remediation, comprising the steps of:
-
capturing a privacy identifier at a front end server; forwarding the privacy identifier to a secure server installation; at the secure server installation, encrypting the privacy identifier to generate an encrypted privacy identifier with the keyed hash of the privacy identifier, generating a token uniquely associated with the privacy identifier, the token being meaningless in relation to the privacy identifier and storing the token and encrypted privacy identifier; forwarding the token to a back end server; and processing the token as a proxy for the privacy identifier at the back end server. - View Dependent Claims (15, 16, 17)
-
-
18. A method of credit card identifier remediation, comprising the steps of:
-
receiving a credit card processing request, the request containing a credit card identifier; obtaining a token to replace the credit card identifier, the token being unique and meaningless in relation to the credit card identifier; and forwarding the token for processing as a proxy for the credit card identifier. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A secure server installation, comprising:
-
one or more servers connected via a firewall to a network router; and the one or more servers being configured to; receive a privacy processing request, the request containing a privacy identifier; encrypting the privacy identifier for safe storage of the encrypted privacy identifier, the encrypted privacy identifier being encrypted with a key for decryption; obtain a token to replace the privacy identifier, the token being unique and meaningless in relation to the privacy identifier; and forward the token for processing as a proxy for the privacy identifier. - View Dependent Claims (31, 32)
-
Specification