Tokenizing sensitive data

ABSTRACT

Included are systems and methods for tokenizing sensitive data. Some of the systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. Some systems and/or methods include creating a token identifier that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor.

CROSS REFERENCE

This application is a continuation of U.S. application Ser. No.13/117,599, filed May 27, 2011, which is hereby incorporated byreference in its entirety.

BACKGROUND

In many financial transactions, a user may purchase a product (such as atangible product, a service product, etc.) by using a credit card, debitcard, gift card, prepaid card, and/or other payment mechanism thatincludes sensitive data. Similarly, many other electronic transactionsmay utilize sensitive data, such as a social security number, atelephone number, an email address, etc., where the owner of thatinformation trusts a vendor or other party to securely maintain thesensitive data. However, due to the nature of electronic transactions,each vendor that receives the sensitive data from the user must takemeasures to ensure the security of the sensitive data. As the user maytransact with dozens of different vendors and other entities and each ofthose entities may receive the sensitive data, security holes maydevelop and the sensitive data may be compromised.

SUMMARY

Included are embodiments for tokenizing sensitive data. Some embodimentsof a method may be configured to receive sensitive data from a vendor,determine a token key for the vendor, and utilize a proprietaryalgorithm, based on the token key to generate a vendor-specific tokenthat is associated with the sensitive data. Some embodiments includecreating a token identifier that comprises data related to the token keysending the vendor-specific token and the token identifier to thevendor.

Also included are embodiments of a system. Some embodiments of thesystem include a memory component that stores logic that when executedby the system, causes the system to receive sensitive data from avendor, determine a token key for the vendor, the token key identifyinga proprietary algorithm for generating a token, and utilize theproprietary algorithm, based on the token key to generate avendor-specific token that is associated with the sensitive data.Similarly, in some embodiments, the logic further causes the system tocreate a token identifier that comprises data related to the token keyand send the vendor-specific token and the token identifier to thevendor.

Also included are embodiments of a non-transitory computer-readablemedium. Some embodiments of the non-transitory computer-readable mediuminclude logic that causes a computing device to receive sensitive datafrom a vendor, determine a token key for the vendor, and utilize aproprietary algorithm, based on the token key to generate a token thatis associated with the sensitive data. Some embodiments may furthercause the computing device to create a token identifier that comprisesdata related to the token key and send the token and the tokenidentifier to the vendor.

Other embodiments and/or advantages of this disclosure will be or maybecome apparent to one with skill in the art upon examination of thefollowing drawings and detailed description. It is intended that allsuch additional systems, methods, features, and advantages be includedwithin this description and be within the scope of the presentdisclosure.

BRIEF DESCRIPTION

Many aspects of the disclosure can be better understood with referenceto the following drawings. The components in the drawings are notnecessarily to scale, emphasis instead being placed upon clearlyillustrating the principles of the present disclosure. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views. While several embodiments are described inconnection with these drawings, there is no intent to limit thedisclosure to the embodiment or embodiments disclosed herein. On thecontrary, the intent is to cover all alternatives, modifications, andequivalents.

FIG. 1 depicts a computing environment for tokenizing sensitive data,according to embodiments disclosed herein;

FIG. 2 depicts a computing architecture for tokenizing sensitive data,according to embodiments disclosed herein;

FIG. 3 depicts a flowchart for utilizing a database model to send atoken and token identifier to a vendor, according to embodimentsdisclosed herein;

FIG. 4 depicts a flowchart for using an algorithmic model to send atoken and token identifier to a vendor, according to embodimentsdisclosed herein;

FIG. 5 depicts a flowchart for canceling a transaction utilizing a tokenand token identifier in a database model, according to embodimentsdisclosed herein;

FIG. 6 depicts a flowchart for canceling a transaction utilizing a tokenand token identifier in an algorithmic model, according to embodimentsdisclosed herein;

FIG. 7 depicts a flowchart for updating tokens in a database model,according to embodiments disclosed herein;

FIG. 8 depicts a flowchart for updating tokens in an algorithmic model,according to embodiments disclosed herein;

FIG. 9 depicts a flowchart for associating a common token key for aplurality of related entities, according to embodiments disclosedherein;

FIG. 10 depicts a flowchart for updating tokens for a plurality ofrelated entities, according to embodiments disclosed herein.

DETAILED DESCRIPTION

Embodiments disclosed herein include a system and/or method fortokenizing sensitive data. As a background, theft of sensitive data(such as credit card numbers, prepaid debit card numbers, socialsecurity numbers, etc.) has become a serious problem. As more and morevendors store sensitive data on their local systems, the security ofthat data may be compromised. Hackers and others with malicious intentmay access sensitive data and utilize that data for identity theft,credit card theft, etc. While many vendors may encrypt the sensitivedata, such encryptions may be subject to security issues. Additionally,storage of sensitive data at a vendor computing device is not desirable.

Embodiments disclosed herein include a vendor computing device and atokenization computing device. The vendor computing device may includeand/or be coupled to a receiving device, such as a card swiping device.The receiving device may be coupled to the internet or other network andmay be configured for communication with the tokenization computingdevice. The vendor computing device may also be configured to receiveand store tokens and token identifiers from the tokenization computingdevice. In some embodiments, the tokens are a 16 digit value and thetoken identifier is a 6 byte value. However, this is just an example, asany size token and/or token identifier may be utilized, depending on theembodiment. Regardless, the tokenization computing device may becommunicatively coupled to the vendor computing device. The tokenizationcomputing device may include a software application to facilitatereceiving of sensitive data; tokenization of the sensitive data tocreate a token, such as a vendor-specific token; generation of a tokenidentifier; and/or perform other actions. Additionally, in someembodiments, the token and token identifier may be algorithmicallycompiled into a single value rather than discrete values. This singlevalue may additionally be decompiled into separate values to derive thetoken and token identifier values that are utilized to process atransaction.

As an example, a vendor may input sensitive data into the receivingdevice. The receiving device can encrypt the sensitive data (in thiscase card data) and send this encrypted data to the tokenizationcomputing device. The tokenization computing device may then generatetoken, based on a random number assignment, an algorithm, and/or viaanother mechanism. The tokenization computing device may additionallygenerate a token identifier. The token identifier is then linked to thetoken and is configured to provide token generation data, token versiondata, as well as a sanity value to ensure correctness of the token. Thesanity value may be similar to a check value, depending on theembodiment. More specifically, the sanity value is calculated as aresult of using clear data as input into a predetermined algorithm. Thisdata is used to validate the result from a tokenization. When a mismatchbetween the sanity value and the tokenization occurs, this indicatesthat the detokenization process has failed. The token and tokenidentifier may then be sent to the vendor computing device, which storesthe token and token identifier, with a link between the two. The vendorcomputing device may then utilize the token for customer transactions,customer statistics, returns, settlement files, etc. without storing orotherwise having direct access to the actual card number.

Similarly, when the vendor wishes to access the card data for a storedtoken, the vendor can send the token and corresponding token identifierto the tokenization computing device. The tokenization computing devicecan access the token and identifier to determine the card data. Thetokenization computing device can detokenize the token, based on thetoken generation identified in the token identifier. Upondetokenization, the tokenization computing device can verify that thecorrect card number was determined by decryption of the sanity value inthe token identifier. The tokenization computing device can then encryptthe card number and send the encrypted card number to the vendor.

In some embodiments, the tokenization computing device may be instructedto rotate tokens on a predetermined schedule. The schedule may bedetermined by the vendor, government entity, and/or via other mechanism.More specifically, in some embodiments, rotation may occur as a resultof an alleged or actual network/data breach, an industry regulationrequirement and/or a network regulation requirement. Regardless, thetokenization computing device can receive one or more tokens (withcorresponding token identifiers) from a vendor. From the tokenidentifiers, the tokenization computing device can determine a currentgeneration of token. From this data, the tokenization computing devicecan determine the card number and verify this with the sanity value inthe token identifier. Once the card number has been determined, thetokenization computing device can re-tokenize the token. There-tokenization can be simply to update the generation and/or to utilizea different tokenization mechanism. Regardless, once the token has beenupdated, the token identifier may be also updated to reflect this changein the token, as well as to create a sanity value for verification. Theupdated tokens and token identifiers may then be sent to the vendor.

Referring now to the drawings, FIG. 1 depicts a computing environmentfor tokenizing sensitive data, according to embodiments disclosedherein. As illustrated in FIG. 1, a network 100 may include a wide areanetwork, such as the Internet, a local area network (LAN), a mobilecommunications network, a public service telephone network (PSTN) and/orother network and may be coupled to a user computing device 102 a, avendor computing device 102 b, a vendor receiving device 103, and atokenization computing device 104.

The user computing device 102 a may be any mobile or non-mobilecomputing device configured for facilitating electronic transactions. Asan example, the user computing device 102 a may include a personalcomputer that is configured to make online purchases. A user of the usercomputing device 102 a may submit sensitive data, which may includefinancial sensitive data (such as a credit card number, debit cardnumber, prepaid card number, bank account number, etc.) and/ornon-financial sensitive data (such as a name, an address, a telephonenumber, a social security number, etc.) to facilitate payment for thistransaction. Depending on the particular embodiment, the sensitive datamay be numeric or alpha-numeric in form. Regardless, this data may besent to the vendor computing device 102 b, which may communicate withthe tokenization computing device 104, as described below.

Similarly, the vendor computing device 102 b may also include a mobileor non-mobile personal computer (or other computing device) forfacilitating transactions. In the example above, the vendor computingdevice 102 b may be configured as an online vendor for receivingelectronic orders from user computing device 102 a. In such embodiments,the vendor computing device 102 b may receive the sensitive data fromthe user and submit the sensitive data to the tokenization computingdevice 104 for processing.

In some embodiments however, the vendor computing device 102 b may belocated in a physical establishment for in-store purchases. In suchembodiments, the vendor computing device 102 b may be coupled to thevendor receiving device 103 for receiving the sensitive data directlyfrom a card or other device. As such, the vendor receiving device 103may be configured as a card swiping machine, which may be coupled toand/or integral with the vendor computing device 102 b. Once thesensitive data is received, the vendor computing device 102 b can sendthe sensitive data to the tokenization computing device 104 forprocessing.

The tokenization computing device 104 may again include any mobile ornon-mobile computing device and function as part of a financialinstitution, such as a bank, lender, mortgage company, etc. Thetokenization computing device 104 may receive the sensitive data fromthe user computing device 102 a and/or vendor computing device 102 b, asdescribed above and may include a memory component 140 that stores tokenlogic 144 a and token identifier (ID) logic 144 b. With the token logic144 a and the token ID logic 144 b, tokenization and de-tokenization ofsensitive data may be performed.

The token logic 144 a may be configured to cause the tokenizationcomputing device 104 to generate a token for a piece of sensitive data.Calculation of the token may include identifying a key that defines thecurrent token. The token logic 144 a may also cause the tokenizationcomputing device 104 to provide the sensitive data for canceling orderswith the vendor, updating/rotating tokens, etc. The token ID logic 144 bmay cause the tokenization computing device 104 to create a tokenidentifier field that is coupled to a token. More specifically, thetoken identifier may be configured to identify a current version of thetoken; provide a verification that the generated token (or sensitivedata) is correct and/or provide the key that was used to generate thistype of token. In some embodiments, the token ID logic 144 b may also beconfigured to provide a rollout identifier for associating tokens fromdifferent vendors together, as described in more detail, below.

It should be understood that while the user computing device 102 a,vendor computing device 102 b, the vendor receiving device 103, and thetokenization computing device 104 are depicted in FIG. 1 as personalcomputers and/or servers, these are merely examples. More specifically,in some embodiments any type of computing device (e.g. mobile computingdevice, personal computer, server, etc.) may be utilized for any ofthese components. Additionally, while each of these computing devices102-104 is illustrated in FIG. 1 as a single piece of hardware, this isalso an example. Depending on the particular embodiment, each of thecomputing devices 102-104 may represent a plurality of computers,servers, databases, etc.

It should also be understood that while the token logic 144 a and tokenID logic 144 b are depicted in the tokenization computing device 104,this is also just an example. In some embodiments, the user computingdevice 102 a, the tokenization computing device 104, and/or the vendorcomputing device 102 b may include this and/or similar logicalcomponents.

FIG. 2 depicts a computing architecture for tokenizing sensitive data,according to embodiments disclosed herein. In the illustratedembodiment, the tokenization computing device 104 includes at least oneprocessor 230, input/output hardware 232, network interface hardware234, a data storage component 236 (which includes token data 238 a,token ID data 238 b, and/or other data), and the memory component 140.The memory component 140 may be configured as volatile and/ornonvolatile memory and, as such, may include random access memory(including SRAM, DRAM, and/or other types of RAM), flash memory, securedigital (SD) memory, registers, compact discs (CD), digital video discs(DVD), and/or other types of non-transitory computer-readable mediums.Depending on the particular embodiment, these non-transitorycomputer-readable mediums may reside within the tokenization computingdevice 104 and/or external to the tokenization computing device 104.

Additionally, the memory component 140 may be configured to storeoperating logic 242, the token logic 144 a, and/or the token ID logic144 b. The operating logic 242 may include an operating system, basicinput output system (BIOS), and/or other hardware, software, and/orfirmware for operating the tokenization computing device 104. The tokenlogic 144 a and the token ID logic 144 b may each include a plurality ofdifferent pieces of logic, each of which may be embodied as a computerprogram, firmware, and/or hardware, as an example. A local interface 246is also included in FIG. 2 and may be implemented as a bus or otherinterface to facilitate communication among the components of thetokenization computing device 104.

The processor 230 may include any processing component operable toreceive and execute instructions (such as from the data storagecomponent 236 and/or memory component 140). The input/output hardware232 may include and/or be configured to interface with a monitor,positioning system, keyboard, mouse, printer, image capture device,microphone, speaker, gyroscope, compass, and/or other device forreceiving, sending, and/or presenting data. The network interfacehardware 234 may include and/or be configured for communicating with anywired or wireless networking hardware, including an antenna, a modem,LAN port, wireless fidelity (Wi-Fi) card, WiMax card, mobilecommunications hardware, and/or other hardware for communicating withother networks and/or devices. From this connection, communication maybe facilitated between the tokenization computing device 104 and othercomputing devices. The processor 230 may also include and/or be coupledto a graphical processing unit (GPU).

It should be understood that the components illustrated in FIG. 2 aremerely exemplary and are not intended to limit the scope of thisdisclosure. As an example, while the components in FIG. 2 areillustrated as residing within the tokenization computing device 104,this is merely an example. In some embodiments, one or more of thecomponents may reside external to the tokenization computing device 104.It should also be understood that, while the tokenization computingdevice 104 in FIG. 2 is illustrated as a single device, this is alsomerely an example. In some embodiments, the token logic 144 a and thetoken ID logic 144 b may reside on different devices. Additionally,while the tokenization computing device 104 is illustrated with thetoken logic 144 a and the token ID logic 144 b as separate logicalcomponents, this is also an example. In some embodiments, a single pieceof logic may perform the described functionality.

FIG. 3 depicts a flowchart for utilizing a database model to send atoken and token identifier to a vendor, according to embodimentsdisclosed herein. As illustrated at block 330, encrypted sensitive datamay be received from a vendor. More specifically, at the point of sale,a vendor (or user) may enter sensitive data for a transaction. Thereceived sensitive data may be encrypted, such that transmission of thesensitive data to the tokenization computing device 104 is at leastsomewhat secure. This may be referred to as a point-to-point orend-to-end encryption. At block 332, the received sensitive data may bedecrypted. At block 334, a determination may be made regarding whetherthe received sensitive data has previously been tokenized. A lookup maybe performed on the sensitive data to see if a token has already beengenerated. If so, at block 336, the previously generated token and tokenidentifier may be accessed. If at block 334, a token has not beengenerated, at block 338 a token and token ID may be generated.Generation of a token may include determining the vendor. Once thevendor is determined, a token key may be determined. The token may thenbe generated, based on an algorithm that depends on the token key.Additionally, the token identifier may identify the key (which mayinclude a version number of the token), as well as a token sanity valuefor ensuring that the token is accurately generated. At block 340, thetoken and token ID may be sent to the vendor.

With the token and token ID, the vendor no longer needs to utilize thereceived sensitive data for the user. As such, subsequent interactionbetween the user and vendor may be facilitated with the token. Thisallows secure transactions between the user and vendor, as well asbetween the vendor and the financial institution.

FIG. 4 depicts a flowchart for using an algorithmic model to send atoken and token identifier to a vendor, according to embodimentsdisclosed herein. More specifically, while the embodiment of FIG. 3involves storage of tokens and/or token IDs at the tokenizationcomputing device 104, the embodiment of FIG. 4 is directed to analgorithmic model that does not store these values. More specifically,at block 430, encrypted sensitive data may be received from a vendor. Atblock 432, the sensitive data may be decrypted. At block 434, a tokencan be generated. Similar to the block 338 from FIG. 3, the tokenizationcomputing device 104 may determine the vendor that sent the sensitiveinformation to determine a token key to utilize. With the tokenizationkey, the tokenization computing device 104 can generate the token. Atblock 436, a corresponding token identifier may be created. As discussedabove, the token identifier may identify the token version number, thetoken key, and/or a sanity value. At block 438, the token and tokenidentifier may be sent to the vendor

FIG. 5 depicts a flowchart for canceling a transaction utilizing a tokenand token identifier in a database model, according to embodimentsdisclosed herein. As illustrated at block 530, a request to cancel atransaction may be received, where the request includes a token andtoken identifier. At block 532, a determination may be made from thetoken identifier regarding generation associated with the token. Atblock 534, based on the determined generation, a determination may bemade regarding where the associated sensitive data is stored. At block536, the sensitive data that corresponds to the received token may beretrieved. Additionally the token identifier may be utilized to checkwhether the retrieved sensitive data is the correct sensitive data. Atblock 538, the sensitive data may be utilized to cancel the transaction.At block 540, a confirmation of the cancelation may be sent to thevendor.

FIG. 6 depicts a flowchart for canceling a transaction utilizing a tokenand token identifier in an algorithmic model, according to embodimentsdisclosed herein. Similar to FIG. 4 above, FIG. 6 relates to analgorithmic model, where the sensitive data may not be stored and/oraccessed. At block 630, a request to cancel a transaction may bereceived, where the request includes a token and token identifier. Atblock 632, a token key may be determined from the token identifier. Atblock 634, the token key may be utilized to generate the correspondingsensitive data. At block 636, the token identifier may be utilized todetermine the accuracy of the generated sensitive data. At block 638,the sensitive data may be utilized to cancel the transaction. At block640 a confirmation of the cancelation may be sent to the vendor.

FIG. 7 depicts a flowchart for updating tokens in a database model,according to embodiments disclosed herein. As illustrated, at block 730,a request to change a token may be received, where the request includesa token and token identifier. While FIG. 7 indicates that a single tokenand a single token identifier being received, it should be understoodthat depending on the particular embodiment, a plurality of tokens andtoken identifiers may be received in a token batch. Regardless, at block732, the token identifier may be utilized to determine a location ofsensitive data. At block 734, the sensitive data may be retrieved, a newtoken may be generated, and the token identifier may be updated. The newtoken may be generated based on a new token key for a particular vendor.Once the token key is determined a proprietary algorithm may be utilizedto generate the token. Additionally, the token key may be updated toidentify the new version. The token key may additionally include asanity value to ensure tokenization and/or detokenization is accuratelyperformed. At block 736, the new token and token identifier may bestored. At block 738, the new token and token identifier may be sent tothe vendor.

FIG. 8 depicts a flowchart for updating tokens in an algorithmic model,according to embodiments disclosed herein. As illustrated in block 830,a request to change a token may be received, where the request includesa token and a token identifier. While FIG. 8 indicates that a singletoken and a single token identifier are received, it should beunderstood that depending on the particular embodiment, a plurality oftokens and token identifiers may be received in a token batch. At block832, a token key and version may be determined from the tokenidentifier. At block 834, the token key may be utilized to generate anupdated token. At block 836, the token identifier may be updated toreflect the new token key version. At block 838, the new token and thenew token identifier may be sent to the vendor.

FIG. 9 depicts a flowchart for associating a common token key for aplurality of related entities, according to embodiments disclosedherein. As illustrated in block 930, an indication that entities havejoined together may be received, where the indication includes a requestto associate tokens from each entity. As mentioned above, a plurality ofentities may join together and wish to use similar tokens across all theentities. As such, a rollup identifier may include a pointer that pointsthe tokens to the common token key. At block 932, a token and tokenidentifier may be received from at least one of the entities. At block934, the token and token identifier may be updated and a rollupidentifier may be generated, which points to a common token key.Additionally, the rollup identifier may be stored in a lookup table forlater access. At block 936, the updated token and token identifier maybe sent to the vendor.

FIG. 10 depicts a flowchart for updating tokens for a plurality ofrelated entities, according to embodiments disclosed herein. Asillustrated in block 1030, a request to rotate tokens may be received.At block 1032, a lookup table may be accessed to determine whether thetokens are associated with a rollup identifier. A determination may befirst made into the token identifier to determine a token key, tokenversion, etc.; however depending on the particular embodiments, thetoken identifier may not identify whether the present token is relatedto tokens from other entities. At block 1034, in response to determiningthat the tokens are associated with a rollup identifier, a token key maybe determined that is utilized for all entities in the group ofentities. At block 1036, the tokens may be updated according to thetoken identifier and/or rollup identifier. At block 1038, the updatedtokens and/or token identifiers may be sent to the vendor.

One should note that the flowcharts included herein show thearchitecture, functionality, and operation of a possible implementationof software. In this regard, each block can be interpreted to representa module, segment, or portion of code, which comprises one or moreexecutable instructions for implementing the specified logicalfunction(s). It should also be noted that in some alternativeimplementations, the functions noted in the blocks may occur out of theorder and/or not at all. For example, two blocks shown in succession mayin fact be executed substantially concurrently or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved.

It should be understood that conditional language, such as, amongothers, “can,” “could,” “might,” or “may,” unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements, and/or steps are in any way required forone or more particular embodiments or that one or more particularembodiments necessarily include logic for deciding, with or without userinput or prompting, whether these features, elements and/or steps areincluded or are to be performed in any particular embodiment.

It should be emphasized that the above-described embodiments are merelypossible examples of implementations, merely set forth for a clearunderstanding of the principles of this disclosure. Many variations andmodifications may be made to the above-described embodiment(s) withoutdeparting substantially from the spirit and principles of thedisclosure. Further, the scope of the present disclosure is intended tocover all permutations and sub-permutations of all elements, features,and aspects discussed above. All such modifications and variations areintended to be included herein within the scope of this disclosure.

Therefore, at least the following is claimed:
 1. A method fortokenization of sensitive data, comprising: receiving, by a tokenizationcomputing device, sensitive data from a vendor computing deviceassociated with a vendor; determining, by the tokenization computingdevice, a token key and a token identifier for the sensitive data,wherein the token key is unique to the vendor; generating, by thetokenization computing device, a vendor-specific token that isassociated with the sensitive data, wherein the vendor-specific token isbased on at least in part on the token key; storing, by the tokenizationcomputing device, the vendor-specific token and the token identifier,the token identifier configured to provide token generation data, tokenversion data, token key data, and a validation value; receiving, by thetokenization computing device, a request to change the vendor-specifictoken; generating, by the tokenization computing device, a new token forassociating with the sensitive data, wherein the new token is generatedutilizing a new token key for a particular vendor; updating, by thetokenization computing device, the token identifier for the new token,the updated token identifier configured to provide updated tokengeneration data, token version data, token key data, and the validationvalue; updating, by the tokenization computing device, the token key toinclude the updated token version data and the validation value;generating, by the tokenization computing device, a rollup identifierassociated with the vendor-specific token, wherein the rollup identifierprovides a pointer to the token key, wherein the token key is common toa plurality of entities; and sending, by the tokenization computingdevice, the token identifier and the new token to the vendor computingdevice using wireless communication.
 2. The method of claim 1, furthercomprising decrypting, by the tokenization computing device, thesensitive data from the vendor computing device.
 3. The method of claim1, wherein the sensitive data includes at least one of the following: acredit card number, a card number, and a prepaid card number, a bankaccount number, a social security number, a telephone number, and anaddress.
 4. The method of claim 1, further comprising: receiving, by thetokenization computing device, a request to rotate the new token;accessing, by the tokenization computing device, a table to determinewhether the new token is associated with a rollup identifier; inresponse to determining that the new token is associated with the rollupidentifier, determining, by the tokenization computing device, a newtoken key that is utilized for entities in a predetermined group;updating, by the tokenization computing device, the new token accordingto the new token key; and sending, by the tokenization computing device,the updated new token and the token identifier to the vendor.
 5. Themethod of claim 1, further comprising: receiving, by the tokenizationcomputing device, an indication of joining of the vendor with a secondentity, wherein the indication includes a request to associate the newtoken with another token from the second entity; updating, by thetokenization computing device, the token identifier to generate a rollupidentifier that points to a common token key for the vendor and thesecond entity; and sending, by the tokenization computing device, theupdated token and the token identifier to the vendor.
 6. A system fortokenization of sensitive data, comprising: a processor; and a memorycomponent that is coupled to the computing device and stores logic thatwhen executed by the processor, causes the system to perform at leastthe following: receive from a vendor computing device a request tochange a vendor-specific token that is associated with sensitive data,wherein the vendor computing device is associated with a vendor, whereinthe vendor-specific token is generated based at least in part on a tokenkey that is unique to the vendor, wherein the request is accompanied bya token identifier that is associated with the vendor-specific token,and wherein the vendor-specific token and the token identifier arelinked in a database, wherein the token identifier configured to providetoken generation data, token version data, token key data, and avalidation value; utilize the token identifier to determine a locationof the sensitive data; retrieve the sensitive data; generate a new tokenfor associating with the sensitive data, wherein the new token isgenerated utilizing a new token key for a particular vendor; update thetoken identifier for the new token, the updated token identifierconfigured to provide updated token generation data, token version data,token key data, and the validation value; update the token key toinclude the updated token version data and the validation value;generate a rollup identifier associated with the vendor-specific token,wherein the rollup identifier provides a pointer to the token key,wherein the token key is common to a plurality of entities; and send thenew token and the token identifier to the vendor computing device usingwireless communication.
 7. The system of claim 6, wherein the sensitivedata includes at least one of the following: a credit card number, adebit card number, a prepaid card number, a social security number, abank account number, a telephone number, and an address.
 8. The systemof claim 6, wherein the logic further causes the system to store the newtoken and the token identifier.
 9. The system of claim 6, wherein thelogic further causes the system to perform at least the following:receive sensitive data from the vendor computing device; determine thetoken key for the vendor; link the vendor-specific token and the tokenidentifier in the database; generate the vendor-specific token; andcreate the token identifier that comprises data related to the tokenkey.
 10. The system of claim 6, wherein the logic further causes thesystem to perform at test the following: Receive a request to rotate thenew token; access a table to determine whether the new token isassociated with a rollup identifier; in response to determining that thenew token is associated with a rollup identifier, determine a new tokenkey that is utilized for entities in a predetermined group; update thenew token according to the new token key; and send the updated new tokenand the token identifier to the vendor computing device.
 11. Anon-transitory computer-readable medium for tokenization of sensitivedata that stores a program that when executed by a computing device,causes the computing device to perform at least the following: receive arequest to change a token that is associated with sensitive data,wherein the token is generated based at least in part on a token keythat is unique to a vendor, wherein the request is accompanied by atoken identifier that is associated with the token, and wherein thetoken and the token identifier are linked in a database, and the tokenidentifier configured to provide token generation data, token versiondata, token key data, and a validation value: identify the token key anda version for the token from the token identifier; generate a new tokenfor associating with the sensitive data, wherein the new token isgenerated utilizing a new token key for a particular vendor; update thetoken identifier, for the new token to reflect a new version of thetoken, the updated token identifier configured to provide updated tokengeneration data, token version data, token key data, and the validationvalue; update the token key to include the updated token version dataand the validation value; generate a rollup identifier associated withthe new token, wherein the rollup identifier provides a pointer to acommon token key for a plurality of entities; and send the new token andthe token identifier to a vendor computing device using wirelesscommunication.
 12. The non-transitory computer-readable medium of claim11, wherein the sensitive data includes at least one of the following: acredit card number, a debit card number, a prepaid card number, a bankaccount number, a social security number, a telephone number, and anaddress.
 13. The non-transitory computer-readable medium of claim 11,wherein the program further causes the computing device to perform atleast the following: receive a request to rotate the token; access atable to determine whether the token is associated with a rollupidentifier; in response to determining that the token is associated witha rollup identifier, determine a new token key that is utilized forentities in a predetermined group; and update the token according to thenew token key.
 14. The non-transitory computer-readable medium of claim11, wherein the program further causes the computing device to store thenew token and the token identifier.
 15. The non-transitory computereadable medium of claim 11, wherein the program further causes thecomputing device to perform at least the following: receive anindication of joining of the vendor with a second entity, wherein theindication includes a request to associate the token with another tokenfrom the second entity; update the token identifier to generate a rollupidentifier that points to a common token key to the vendor and thesecond entity; and send the updated token and the token identifier tothe vendor computing device.