Talk:Tokenization (data security)

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computing / Security (Rated Start-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computer Security.
 

Tokenizing is the operation of replacing one set of symbols with another, typically to make the resulting set of symbols smaller.

This is not the common usage of the term. In computer science it normally means to split a string up into tokens (e.g. key words, separators, etc.), not to replace a list of tokens with smaller tokens.

I am not familiar with the usage tokenizing given in the previous version of the article, but I will leave it as an alternative meaning of tokenizing until I can verify whether it is incorrect or not.

Steve-o 03:47, 15 Apr 2004 (UTC)

Tokenizing in politics has a different meaning that would be worth adding to this article, or putting into another one.--Lizzard 22:47, 13 September 2006 (UTC)

I expected this page to be about lexical analysis, not security. 66.75.141.47 (talk) 08:09, 30 August 2009 (UTC)

the section on human perception[edit]

  • remote enough to be situated in a different article
  • needs a cite
  • was left in for the time being pending suggestions for a more appropriate location



WTF? Where is all the content!? I expected to see lexical tokenization...but this page is empty. I think someone screwed up. Actually, it's worse than I thought. Clicking on "Discussion" for Tokenization leads to this page, the one for Data Security. The main tokenziation page is empty: http://en.wikipedia.org/wiki/Tokenization

Incomprehensible[edit]

I don't feel I'm especially dim, but after reading the first (below) and subsequent few paras of this page, I'm none the wiser. How does it help to tell me that tokenization is done using tokenization?

"Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. The token is a reference (i.e. identifier) that maps back to the sensitive data through a tokenization system. The mapping from original data to a token uses methods which render tokens infeasible to reverse in the absence of the tokenization system, for example using tokens created from random numbers.[1] The tokenization system must be secured and validated using security best practices [2] applicable to sensitive data protection, secure storage, audit, authentication and authorization. The tokenization system provides data processing applications with the authority and interfaces to request tokens, or detokenize back to sensitive data." — Preceding unsigned comment added by Holytrinity1 (talkcontribs) 13:27, 23 March 2015 (UTC)