摘要 |
In some embodiments, techniques for data security may include encoding and decoding unreadably encoded data, such as data encrypted with a public key or tokenized. In some embodiments, techniques for data security may include distributing an encrypted private key. In some embodiments, unreadable data may be encrypted and/or decrypted using time-varying keys.;In some embodiments, techniques for data security may include combining information and a policy, and encoding the combined information and policy, wherein encrypting the combined information and policy is performed using a public key, or via tokenization.;In some embodiments, techniques for data security may include receiving data, wherein the data has been encoded, decoding the data, determining a first datum and a second datum, wherein the first datum and the second datum are associated with the decoded data, and determining a policy, wherein the policy is associated with the first datum. |
主权项 |
1. A method for security, comprising:
Receiving account information relating to an account; receiving a policy identifying one or more permitted parties for a financial transaction involving the account information without accessing the account related to the account information; combining the account information and the policy, wherein combining the account information and policy includes forming the combined information and policy so that a partial characteristic of the account information may be extracted from the combined information and policy; generating a token to reference the account information using a format that is compatible for use in referencing the account information but not including the account information; associating the token with the combined information and policy by storing the token with the combined information and policy in a relational database, the token being a key of the relational database; encrypting the combined information and policy by a public key; extracting the partial characteristic from the combined information and policy; and providing the extracted partial characteristic in response to a request from a requesting party, the request including the token, wherein the extracted partial characteristic is provided by a transmitter via a data network. |