Capital One Services, LLC (20240232422). De-Tokenization Patterns And Solutions simplified abstract

From WikiPatents
Jump to navigation Jump to search

De-Tokenization Patterns And Solutions

Organization Name

Capital One Services, LLC

Inventor(s)

Naveen Teja Koduru of Frisco TX (US)

Kishore Doppalapudi of Frisco TX (US)

Siva Vegesana of Frisco TX (US)

De-Tokenization Patterns And Solutions - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240232422 titled 'De-Tokenization Patterns And Solutions

The patent application describes methods and systems for de-tokenization of data files, allowing for the extraction of sensitive information from tokenized data.

  • De-tokenization service controller identifies tokenized data fields based on a schema associated with the file.
  • Decryption system decrypts tokens and sends sensitive values to the controller.
  • De-tokenization service controller generates a de-tokenized data file with decrypted values replacing tokenized data.
  • Validated file may be generated by adding fields indicating validation results based on rules.
  • De-tokenized data file can be re-tokenized before storage in a re-tokenized data storage.

Potential Applications: - Enhancing data security and privacy by securely extracting sensitive information from tokenized data. - Streamlining data processing and analysis by converting tokenized data back to its original form. - Facilitating compliance with data protection regulations by securely handling sensitive data.

Problems Solved: - Ensures secure extraction of sensitive information from tokenized data files. - Simplifies the process of working with tokenized data by providing a method for de-tokenization. - Helps organizations maintain data integrity and security while handling sensitive information.

Benefits: - Improved data security and privacy protection. - Enhanced data processing efficiency and accuracy. - Compliance with data protection regulations and standards.

Commercial Applications: Title: Secure Data De-Tokenization System This technology can be utilized in industries such as finance, healthcare, and e-commerce to securely handle sensitive data, streamline data processing, and ensure compliance with data protection laws. The market implications include increased trust from customers, improved data security practices, and enhanced operational efficiency.

Questions about Data De-Tokenization: 1. How does de-tokenization enhance data security and privacy? 2. What are the potential challenges associated with re-tokenizing de-tokenized data files?


Original Abstract Submitted

methods and systems of data de-tokenization are described herein to provide solutions to utilizing tokenized data files. a de-tokenization service controller may extract instances of tokenized data by determining a schema associated with a tokenized file, wherein the schema identifies which fields contain tokenized data. a decryption system may decrypt the tokens and send decrypted sensitive values to the de-tokenization service controller. the de-tokenization service controller may then generate a de-tokenized data file comprising a plurality of records corresponding to the plurality of original tokenized records, using the decrypted sensitive values in place of the instances of tokenized data. in some embodiments, the methods may further comprise generating a validated file by adding one or more fields indicating the results of validation based on a set of validation rules. the methods may further comprise re-tokenizing the de-tokenized data file, before storing the data files again in a re-tokenized data storage.