Token-based secure data management

In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to...

Full description

Saved in:
Bibliographic Details
Main Authors McAdams, Darin Keith, Canavor, Darren E, Fielding, Jeffrey J, Kozolchyk, Jonathan, Mallya, Vaibhav
Format Patent
LanguageEnglish
Published 10.07.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, An expiration time may be assigned to sensitive data, and expired data and associated tokens may be deleted.
Bibliography:Application Number: US201715668644