US 12,141,324 B2
Systems and methods for tokenization of personally identifiable information (PII) and personal health information (PHI)
Tim M. Watkins, Chesterfield, MO (US)
Assigned to MASTERCARD INTERNATIONAL INCORPORATED, Purchase, NY (US)
Filed by MASTERCARD INTERNATIONAL INCORPORATED, Purchase, NY (US)
Filed on Dec. 4, 2023, as Appl. No. 18/528,460.
Application 18/528,460 is a continuation of application No. 17/897,891, filed on Aug. 29, 2022, granted, now 11,835,996.
Application 17/897,891 is a continuation of application No. 16/936,158, filed on Jul. 22, 2020, granted, now 11,429,749, issued on Aug. 30, 2022.
Prior Publication US 2024/0111900 A1, Apr. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/36 (2013.01); G16H 10/60 (2018.01); H04L 9/32 (2006.01); H04L 29/06 (2006.01)
CPC G06F 21/6254 (2013.01) [G06F 21/36 (2013.01); G16H 10/60 (2018.01); H04L 9/3213 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A data security system for enabling tokenized access to sensitive data, the data security system comprising a token provisioning computing device including at least one processor communicatively coupled to a memory device, the at least one processor configured to:
receive, from a remote client computing device of a data subject, a request for an access token to provide a service provider computing device with access to the sensitive data associated with the data subject, wherein the request includes one or more authorization parameters including one or more data identifiers each for identifying a data element included in a set of the sensitive data accessible to the service provider computing device;
generate (i) a first access token that enables access to a first subset of sensitive data included in the set of sensitive data according to the one or more authorization parameters, and (ii) a second access token that enables access to a second subset of sensitive data included in the set of sensitive data according to the one or more authorization parameters;
store the first and second access tokens in a token database with the one or more corresponding authorization parameters;
receive, from the service provider computing device, a first data access request including a first candidate access token;
identify the first subset of sensitive data accessible to the service provider computing device by matching the first candidate access token to the stored first access token; and
transmit the first subset of sensitive data to the service provider computing device.