| CPC G06F 16/215 (2019.01) [G06F 16/2365 (2019.01); G06F 16/24558 (2019.01); G06F 16/27 (2019.01); G06F 21/602 (2013.01); G06F 21/6254 (2013.01)] | 20 Claims |

|
1. A non-transitory, computer-readable storage medium comprising instructions recorded thereon, wherein the instructions, when executed by at least one data processor of a system, cause the system to:
obtain a first token and a second token,
wherein the first token includes first information that is data masked,
wherein the second token includes second information that is data masked,
wherein the first information is different from the second information;
compare the first token and the second token to determine whether the first token and the second token match;
upon determining that the first token and the second token do not match:
obtain a third token from a database storing unique tokens,
wherein the third token includes third information that is data masked,
wherein the third token is unique in the database;
without accessing the first information in human-readable form and the third information in human-readable form, compare the first token and the third token by comparing the first information that is data masked and the third information that is data masked to obtain a first indication of whether the first token and the third token match;
without accessing the second information in human-readable form and the third information in human-readable form, compare the second token and the third token by comparing the second information that is data masked and the third information that is data masked to obtain a second indication of whether the second token and the third token match;
upon determining that the first token and the third token match and that the second token and the third token match:
determine that the first token and the second token match; and
reduce memory footprint associated with the database by storing in the database a composite token including the first information and the second information,
wherein the first information and the second information are data masked.
|