Patent application number | Description | Published |
20130212007 | TOKENIZATION IN PAYMENT ENVIRONMENTS - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 08-15-2013 |
20130212019 | TOKENIZATION OF PAYMENT INFORMATION IN MOBILE ENVIRONMENTS - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 08-15-2013 |
20130212024 | TOKENIZATION IN DISTRIBUTED PAYMENT ENVIRONMENTS - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 08-15-2013 |
20130212666 | TOKENIZATION IN MOBILE ENVIRONMENTS - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 08-15-2013 |
20140059088 | Tokenization of Date Information - Financial regulations can require the storing of transaction date information when conducting financial transactions. To improve the security of storing such information, date information can be tokenized prior to storage. Client devices used in conducting and processing transactions can access date information rules and token tables for use in tokenizing date information. The client device can also require and use starting date when tokenizing date information. To tokenize the date information, a client device can convert the date information into an integer, for instance based on a number of days from a starting date, and can use the date integer as an input to one or more token tables. The token tables output a tokenized date integer, which can be converted into a tokenized date using a second starting date. The tokenized date can then be stored for subsequent access. | 02-27-2014 |
20140090081 | Privacy Preserving Data Search - Database entries can be protected by indexing the entries using a plurality of indexes, each associated with a level of access rights. A level of access rights can be determined from a search query, and an index can be selected based on the determined level of access rights. A search key can be generated based on the received query, and the selected index can be searched using the search query. Database entries mapped to the values of the selected index returned in response to the search can be outputted. Each index is associated with a different granularity defining the number and/or ambiguity of search results returned in response to searching an index. | 03-27-2014 |
20140177825 | Asymmetric Tokenization - An asymmetric encoding environment includes a plurality of secure computer systems, each configured to perform one or more encoding operations on received data using one or more encoding components inaccessible to the other secure computer systems. A first secure computer system receives sensitive data and tokenizes the sensitive data using a first token table inaccessible to a second secure computer system to produce first tokenized data. The second secure computer system receives the first tokenized data and tokenizes the sensitive data using a second token table inaccessible to the first secure computer system to produce second tokenized data. The second secure computer system can store the second tokenized data for subsequent access. The first and second secure computer systems can perform additional data protection techniques, such as encryption and data modification using initialization vectors. In such embodiments, each secure computer system uses an encryption key and/or initialization vector inaccessible to the other secure computer system. | 06-26-2014 |
20140283131 | Assignment of Security Contexts to Define Access Permissions for File System Objects - A system and method are provided for restricting various operations in a file system based on security contexts. An object security context including permissible roles and defining a set of access permissions associated with each of the permissible roles is assigned to a file system object. A user security context is assigned to a user based on authentication information from the user, and the user security context identifies a user role for the user. An executable security context is assigned to an executable program. When the user has launched the executable program, a process is created and assigned the user security context and the executable security context. Responsive to the process attempting to access the file system object, at least one of the user security context and executable security context is verified against the object security context to determine if the attempted access should be allowed. | 09-18-2014 |
20150039519 | Tokenization in Mobile Environments - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 02-05-2015 |
20150089574 | Columnar Table Data Protection - Shuffling data stored in columnar tables improves data storage security, particularly when used in conjunction with other security operations, such as tokenization and cryptography. A data table is accessed, and pointer values of at least one column of the accessed table are shuffled, generating a protected table. An index table mapping index values to the shuffled pointer values is generated, allowing a user with access to both the protected table and the index table to generate the original table. Without both tables, users are only able to see either the shuffled data or the index values. Example shuffling methods include, but are not limited to, random shuffling, grouped shuffling, sorting by column value, and sorting by index value. | 03-26-2015 |