20240039724. METHOD AND APPARATUS FOR REVERSIBLE TOKENIZATION WITH SUPPORT FOR EMBEDDABLE ROLE-BASED ACCESS CONTROL simplified abstract (Springcoin, Inc.)

From WikiPatents
Jump to navigation Jump to search

METHOD AND APPARATUS FOR REVERSIBLE TOKENIZATION WITH SUPPORT FOR EMBEDDABLE ROLE-BASED ACCESS CONTROL

Organization Name

Springcoin, Inc.

Inventor(s)

David William Kravitz of San Jose CA (US)

Michael Young of San Diego CA (US)

Mollie Zechlin Halverson of Anaheim CA (US)

Matthew Benjamin Smith of Playa Vista CA (US)

METHOD AND APPARATUS FOR REVERSIBLE TOKENIZATION WITH SUPPORT FOR EMBEDDABLE ROLE-BASED ACCESS CONTROL - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240039724 titled 'METHOD AND APPARATUS FOR REVERSIBLE TOKENIZATION WITH SUPPORT FOR EMBEDDABLE ROLE-BASED ACCESS CONTROL

Simplified Explanation

The abstract of the patent application describes a system where participants can request the generation of tokens that represent sanitized versions of data. These tokens can be compared across participants and can be used to privately retrieve the original data when necessary. Role-based access control scope parameters and tokenization processor-specific secrets can be embedded into reversible tokens, allowing for updates without affecting the tokens. Alternatively, these parameters and secrets can be embedded into tokens and corresponding key tokens, allowing for the retrieval of keying material used to generate ciphertext.

  • Participants can request tokens that represent sanitized versions of data.
  • Tokens can be compared across participants.
  • Tokens can be used to privately retrieve the original data.
  • Role-based access control scope parameters and tokenization processor-specific secrets can be embedded into reversible tokens.
  • Tokens remain invariant under updates of tokenization processor secrets.
  • Role-based access control scope parameters and tokenization processor-specific secrets can also be embedded into tokens and corresponding key tokens.
  • Authorized presentation of a token allows for the recovery of the corresponding key token.
  • Keying material used to generate ciphertext can be retrieved to recover the corresponding plaintext.

Potential applications of this technology:

  • Secure data sharing and collaboration among participants.
  • Privacy-preserving data analysis and research.
  • Secure storage and retrieval of sensitive information.

Problems solved by this technology:

  • Protecting sensitive data from unauthorized access.
  • Enabling secure data sharing without exposing the original data.
  • Maintaining privacy and confidentiality in data processing and storage.

Benefits of this technology:

  • Enhanced data security and privacy.
  • Improved control over data access and sharing.
  • Facilitates compliance with data protection regulations.


Original Abstract Submitted

participants as requestors using a requesting network element request one or more tokenization processors to generate tokens that represent a sanitized version of data such that the resultant tokens are amenable to comparison across participants. as circumstances warrant, one or more such tokens can be submitted to the tokenization processor(s) to privately retrieve the original data. role-based access control scope parameters and tokenization processor-specific tokenization processor secrets can be embedded into reversible tokens that remain invariant under updating of the tokenization processor secrets across tokenization processors. by another approach, role-based access control scope parameters and tokenization processor-specific tokenization processor secrets are embedded into tokens and corresponding key tokens such that upon authorized presentation of a token by a requestor, the corresponding key token is recovered so that the keying material that was used to generate ciphertext is retrievable in order to recover the corresponding plaintext.