SlideShare a Scribd company logo
Introduction to Tokenization 
Prepared by @nabeelxy 
8/28/2014
What is tokenization? 
• Replace a value with a surrogate value called 
“token” 
value Tokenize token 
• Examples 
Value Token Comment 
1344 6423 1231 1521 aX73pQ43T1#+4oxT4 Token consists of alphanumeric values 
1344 6423 1231 1521 3124224578918001 Token consists of numeric values only 
1344 6423 1231 1521 aX73pQ43T1#+y1521 Token replaces the first 12 digits with a alphanumeric value
Properties of a Good Token 
• Format and length preserving 
• Some characteristics may be preserved (e.g. last four 
digits of CC#s) 
• Irreversible without some private information (i.e. 
given a token, it is difficult to find the value) 
• Distinguishable from the value 
– If the token is not distinguishable from the value, 
customers won’t be able to identify sensitive data and 
apply proper protection mechanisms; further, customers 
may inadvertently leak sensitive data thinking they are 
tokens
What is de-tokenization? 
• The reverse process of finding the actual value 
from a token 
token De-tokenize value
Why tokenize? 
• Reduced risk due to limited exposure of 
sensitive information (sensitive information is 
centralized in one location and downstream 
apps work with tokens) 
• Reduce the PCI scope (the number of nodes 
with sensitive data reduces) 
• Minimal changes to applications to support 
tokenization (tokenization is format and 
length preserving)
An Example – Tokenizing CC#s 
Point of Payment App 
Sale Tokenization 
System 
(2) Tokenize CC 
(3) Tokenized CC 
(1) Payment, CC 
Customer Data 
Warehouse 
(4) Tokenized CC 
Order Processing 
App 
CRM App 
[INTERNET] 
MERCHANT 
DATA CENTER 
(5) Tokenized CC
Single-use vs. Multi-use tokens 
Single-use token Multi-use token 
Usually used to represent a single 
transaction 
Usually used to represent a unique 
value (for example, CC#), usually 
used across multiple transactions 
A given value, it may map to 
multiple tokens 
Token maps to a unique value 
within the tokenization system 
Short lived Long lived
How to Generate Tokens? 
• Use a mathematically reversible cryptographic 
function (e.g. Format Preserving Encryption) 
• Use a one-way non-reversible cryptographic 
function (e.g. a hash function such as SHA-2) 
• Static tables mapping values to random 
tokens (tokens are not mathematically 
derived from values)
Tokenization Process
De-tokenization Process
How to manage tokens? 
• Two options 
– In-house 
– Third-party service provider 
• In-house tokenization server 
– Company owns and operates the token system and token database 
– The token server stores the original sensitive data 
– Usually used by large companies who wants to keep sensitive data 
• Third-party tokenization server (TaaS – Tokenization as a Service) 
– Third-party service providers generate tokens and give to companies 
– Usually used by small companies who do not want actual sensitive 
data 
– E.g. In CC transactions, the payment processor generates a token and 
gives only the token to merchant for future references (e.g.: recurring 
fees, refund, etc.) – sacrifice control and pay higher tax fee in 
exchange for convenience, reduced liability and cheaper PCI 
compliance.
Tokenization vs. Encryption 
Tokenization Encryption 
Output is format and length preserving Output is not generally format or length 
preserving (e.g. AES, RSA) (exception – 
FPE – Format Preserving Encryption, OPE 
– Order Preserving Encryption) 
May or may not use encryption as the 
mapping function (could use a hash 
function or a static mapping table) 
Encryption does not have any using 
tokenization internally 
Out is may or may not be reversible Output is always reversible given the key 
Regulatory compliance – PCI DSS Regulatory compliance – Safe Harbor, 
HIPAA 
A main use case is to reduce PCI scope by 
passing tokens to downstream 
applications 
A main use case is to ensure the 
confidentiality of data at rest (even if the 
storage media is compromised to lost, 
attackers are not able to see the actual 
data as they don’t have the keys)
How Tokenization is currently Used 
in the corporate market? 
• Use tokenization to replace sensitive data such as 
CC# with random numbers (3rd method of 
tokenization mentioned earlier) 
• Keep the sensitive data encrypted in a database 
• Since tokens preserve the length and format, 
changes to applications is minimal 
• The sensitive data is exposed only when it is 
necessary; otherwise, apps work with the tokens
References 
• PCI DSS Tokenization Guidelines, 2011

More Related Content

What's hot

Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
Narudom Roongsiriwong, CISSP
 
What is a Token Service Provider?
What is a Token Service Provider?What is a Token Service Provider?
What is a Token Service Provider?
Rambus Inc
 
Blockchain use cases in 2022 real world industry applications
Blockchain use cases in 2022 real world industry applicationsBlockchain use cases in 2022 real world industry applications
Blockchain use cases in 2022 real world industry applications
ArpitGautam20
 
Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
Jorge Sebastiao
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
Romit Bose
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Edureka!
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts
101 Blockchains
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
Ulf Mattsson
 
Crypto Wallet Types Explained
Crypto Wallet Types ExplainedCrypto Wallet Types Explained
Crypto Wallet Types Explained
101 Blockchains
 
Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)
James Neo
 
What is DeFi ? | Decentralized Finance
What is DeFi ? | Decentralized Finance What is DeFi ? | Decentralized Finance
What is DeFi ? | Decentralized Finance
zaarahary
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
Experfy
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
Ahmed Banafa
 
Asset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerAsset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game Changer
Jongseung Kim
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
AIMDek Technologies
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
Ogilvy Consulting
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
NexThoughts Technologies
 
►TOP 13 • Blockchain Use Cases
►TOP 13 • Blockchain Use Cases ►TOP 13 • Blockchain Use Cases
►TOP 13 • Blockchain Use Cases
Andrea Soto
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
Shreyas Chaudhari
 
Ethereum
EthereumEthereum

What's hot (20)

Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
What is a Token Service Provider?
What is a Token Service Provider?What is a Token Service Provider?
What is a Token Service Provider?
 
Blockchain use cases in 2022 real world industry applications
Blockchain use cases in 2022 real world industry applicationsBlockchain use cases in 2022 real world industry applications
Blockchain use cases in 2022 real world industry applications
 
Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Crypto Wallet Types Explained
Crypto Wallet Types ExplainedCrypto Wallet Types Explained
Crypto Wallet Types Explained
 
Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)
 
What is DeFi ? | Decentralized Finance
What is DeFi ? | Decentralized Finance What is DeFi ? | Decentralized Finance
What is DeFi ? | Decentralized Finance
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
Asset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerAsset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game Changer
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
►TOP 13 • Blockchain Use Cases
►TOP 13 • Blockchain Use Cases ►TOP 13 • Blockchain Use Cases
►TOP 13 • Blockchain Use Cases
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
Ethereum
EthereumEthereum
Ethereum
 

Similar to Introduction to Tokenization

Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
Precisely
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
TokenEx
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
ControlCase
 
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET-  	  Improved Vault based Tokenization to Boost Vault Lookup PerformanceIRJET-  	  Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET Journal
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
Kimberly Simon MBA
 
PyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptx
PyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptxPyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptx
PyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptx
nmeyen
 
Tokenization Webinar featuring Securosis - Intel
Tokenization Webinar featuring Securosis - IntelTokenization Webinar featuring Securosis - Intel
Tokenization Webinar featuring Securosis - Intel
Intel - API Security & Tokenization
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Precisely
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptxCRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends
HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and FriendsHITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends
HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends
Merchant Link
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
Ulf Mattsson
 
Crypto academy
Crypto academyCrypto academy
Crypto academy
Paul Gillingwater, MBA
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
Jonathan LeBlanc
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Agile Testing Alliance
 
Wireless LAN Security Fundamentals
Wireless LAN Security FundamentalsWireless LAN Security Fundamentals
Wireless LAN Security Fundamentals
Aruba, a Hewlett Packard Enterprise company
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
Trust Odia
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionSecuring Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-Motion
Precisely
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
Rishi Pathak
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
Nate Lawson
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
Initio
 

Similar to Introduction to Tokenization (20)

Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET-  	  Improved Vault based Tokenization to Boost Vault Lookup PerformanceIRJET-  	  Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
PyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptx
PyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptxPyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptx
PyData Sri Lanka 2023 Presentation - Nuzhi Meyen-V2.pptx
 
Tokenization Webinar featuring Securosis - Intel
Tokenization Webinar featuring Securosis - IntelTokenization Webinar featuring Securosis - Intel
Tokenization Webinar featuring Securosis - Intel
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptxCRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
 
HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends
HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and FriendsHITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends
HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
Crypto academy
Crypto academyCrypto academy
Crypto academy
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Wireless LAN Security Fundamentals
Wireless LAN Security FundamentalsWireless LAN Security Fundamentals
Wireless LAN Security Fundamentals
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionSecuring Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-Motion
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 

More from Nabeel Yoosuf

Building RESTful Applications
Building RESTful ApplicationsBuilding RESTful Applications
Building RESTful Applications
Nabeel Yoosuf
 
Introduction to OAuth 2.0 - Part 2
Introduction to OAuth 2.0 - Part 2Introduction to OAuth 2.0 - Part 2
Introduction to OAuth 2.0 - Part 2
Nabeel Yoosuf
 
Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0 - Part 1Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0 - Part 1
Nabeel Yoosuf
 
Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0  - Part 1Introduction to OAuth 2.0  - Part 1
Introduction to OAuth 2.0 - Part 1
Nabeel Yoosuf
 
API Façade Pattern
API Façade PatternAPI Façade Pattern
API Façade Pattern
Nabeel Yoosuf
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
Nabeel Yoosuf
 
Privacy Preserving Access Control for Third Party Data Management Systems
Privacy Preserving Access Control for Third Party Data Management SystemsPrivacy Preserving Access Control for Third Party Data Management Systems
Privacy Preserving Access Control for Third Party Data Management Systems
Nabeel Yoosuf
 
Efficient privacy preserving publish subscribe systems
Efficient privacy preserving publish subscribe systemsEfficient privacy preserving publish subscribe systems
Efficient privacy preserving publish subscribe systems
Nabeel Yoosuf
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and Practice
Nabeel Yoosuf
 
Efficient Filtering in Pub-Sub Systems using BDD
Efficient Filtering in Pub-Sub Systems using BDDEfficient Filtering in Pub-Sub Systems using BDD
Efficient Filtering in Pub-Sub Systems using BDD
Nabeel Yoosuf
 
Pub-Sub Systems and Confidentiality/Privacy
Pub-Sub Systems and Confidentiality/PrivacyPub-Sub Systems and Confidentiality/Privacy
Pub-Sub Systems and Confidentiality/Privacy
Nabeel Yoosuf
 
A Structure Preserving Approach for Securing XML Documents
A Structure Preserving Approach for Securing XML DocumentsA Structure Preserving Approach for Securing XML Documents
A Structure Preserving Approach for Securing XML Documents
Nabeel Yoosuf
 

More from Nabeel Yoosuf (12)

Building RESTful Applications
Building RESTful ApplicationsBuilding RESTful Applications
Building RESTful Applications
 
Introduction to OAuth 2.0 - Part 2
Introduction to OAuth 2.0 - Part 2Introduction to OAuth 2.0 - Part 2
Introduction to OAuth 2.0 - Part 2
 
Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0 - Part 1Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0 - Part 1
 
Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0  - Part 1Introduction to OAuth 2.0  - Part 1
Introduction to OAuth 2.0 - Part 1
 
API Façade Pattern
API Façade PatternAPI Façade Pattern
API Façade Pattern
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
 
Privacy Preserving Access Control for Third Party Data Management Systems
Privacy Preserving Access Control for Third Party Data Management SystemsPrivacy Preserving Access Control for Third Party Data Management Systems
Privacy Preserving Access Control for Third Party Data Management Systems
 
Efficient privacy preserving publish subscribe systems
Efficient privacy preserving publish subscribe systemsEfficient privacy preserving publish subscribe systems
Efficient privacy preserving publish subscribe systems
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and Practice
 
Efficient Filtering in Pub-Sub Systems using BDD
Efficient Filtering in Pub-Sub Systems using BDDEfficient Filtering in Pub-Sub Systems using BDD
Efficient Filtering in Pub-Sub Systems using BDD
 
Pub-Sub Systems and Confidentiality/Privacy
Pub-Sub Systems and Confidentiality/PrivacyPub-Sub Systems and Confidentiality/Privacy
Pub-Sub Systems and Confidentiality/Privacy
 
A Structure Preserving Approach for Securing XML Documents
A Structure Preserving Approach for Securing XML DocumentsA Structure Preserving Approach for Securing XML Documents
A Structure Preserving Approach for Securing XML Documents
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 

Introduction to Tokenization

  • 1. Introduction to Tokenization Prepared by @nabeelxy 8/28/2014
  • 2. What is tokenization? • Replace a value with a surrogate value called “token” value Tokenize token • Examples Value Token Comment 1344 6423 1231 1521 aX73pQ43T1#+4oxT4 Token consists of alphanumeric values 1344 6423 1231 1521 3124224578918001 Token consists of numeric values only 1344 6423 1231 1521 aX73pQ43T1#+y1521 Token replaces the first 12 digits with a alphanumeric value
  • 3. Properties of a Good Token • Format and length preserving • Some characteristics may be preserved (e.g. last four digits of CC#s) • Irreversible without some private information (i.e. given a token, it is difficult to find the value) • Distinguishable from the value – If the token is not distinguishable from the value, customers won’t be able to identify sensitive data and apply proper protection mechanisms; further, customers may inadvertently leak sensitive data thinking they are tokens
  • 4. What is de-tokenization? • The reverse process of finding the actual value from a token token De-tokenize value
  • 5. Why tokenize? • Reduced risk due to limited exposure of sensitive information (sensitive information is centralized in one location and downstream apps work with tokens) • Reduce the PCI scope (the number of nodes with sensitive data reduces) • Minimal changes to applications to support tokenization (tokenization is format and length preserving)
  • 6. An Example – Tokenizing CC#s Point of Payment App Sale Tokenization System (2) Tokenize CC (3) Tokenized CC (1) Payment, CC Customer Data Warehouse (4) Tokenized CC Order Processing App CRM App [INTERNET] MERCHANT DATA CENTER (5) Tokenized CC
  • 7. Single-use vs. Multi-use tokens Single-use token Multi-use token Usually used to represent a single transaction Usually used to represent a unique value (for example, CC#), usually used across multiple transactions A given value, it may map to multiple tokens Token maps to a unique value within the tokenization system Short lived Long lived
  • 8. How to Generate Tokens? • Use a mathematically reversible cryptographic function (e.g. Format Preserving Encryption) • Use a one-way non-reversible cryptographic function (e.g. a hash function such as SHA-2) • Static tables mapping values to random tokens (tokens are not mathematically derived from values)
  • 11. How to manage tokens? • Two options – In-house – Third-party service provider • In-house tokenization server – Company owns and operates the token system and token database – The token server stores the original sensitive data – Usually used by large companies who wants to keep sensitive data • Third-party tokenization server (TaaS – Tokenization as a Service) – Third-party service providers generate tokens and give to companies – Usually used by small companies who do not want actual sensitive data – E.g. In CC transactions, the payment processor generates a token and gives only the token to merchant for future references (e.g.: recurring fees, refund, etc.) – sacrifice control and pay higher tax fee in exchange for convenience, reduced liability and cheaper PCI compliance.
  • 12. Tokenization vs. Encryption Tokenization Encryption Output is format and length preserving Output is not generally format or length preserving (e.g. AES, RSA) (exception – FPE – Format Preserving Encryption, OPE – Order Preserving Encryption) May or may not use encryption as the mapping function (could use a hash function or a static mapping table) Encryption does not have any using tokenization internally Out is may or may not be reversible Output is always reversible given the key Regulatory compliance – PCI DSS Regulatory compliance – Safe Harbor, HIPAA A main use case is to reduce PCI scope by passing tokens to downstream applications A main use case is to ensure the confidentiality of data at rest (even if the storage media is compromised to lost, attackers are not able to see the actual data as they don’t have the keys)
  • 13. How Tokenization is currently Used in the corporate market? • Use tokenization to replace sensitive data such as CC# with random numbers (3rd method of tokenization mentioned earlier) • Keep the sensitive data encrypted in a database • Since tokens preserve the length and format, changes to applications is minimal • The sensitive data is exposed only when it is necessary; otherwise, apps work with the tokens
  • 14. References • PCI DSS Tokenization Guidelines, 2011