Abstract: Included are embodiments for tokenizing sensitive data. Some embodiments of systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. Some embodiments include creating a token identifier that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor.
Type:
Application
Filed:
May 27, 2011
Publication date:
November 29, 2012
Applicant:
FIFTH THIRD PROCESSING SOLUTIONS, LLC
Inventors:
Bryan T. Bailey, John Romer, Chris Doyle, Jeremy Gifford, Kevin Zibart