| CPC H04L 9/3213 (2013.01) [H04L 9/0656 (2013.01); H04L 9/0869 (2013.01)] | 20 Claims |

|
1. A computer-implemented method comprising:
at an electronic device having a processor:
receiving, by a node, an encrypted token comprising a first set of sensitive data, wherein the encrypted token was generated by a randomization service based on a mapping structure;
determining, based on the encrypted token, a second set of sensitive data using a detokenization process;
generating, based on the second set of sensitive data, a rebuilt token using a retokenization process;
determining whether the encrypted token is validated by comparing the encrypted token and the rebuilt token; and
in response to determining that the encrypted token is validated, providing the first set of sensitive data to an application interface of a first process executing using a first set of computing resources that are isolated from a second set of computing resources that the node allocates to the randomization service.
|