Jump to content

Talk:Tokenization (data security)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Jehochman (talk | contribs) at 16:29, 29 September 2020 (Reads like an Ad: fixes). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputing: Security Start‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computer security (assessed as Mid-importance).
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

Tokenizing is the operation of replacing one set of symbols with another, typically to make the resulting set of symbols smaller.

This is not the common usage of the term. In computer science it normally means to split a string up into tokens (e.g. key words, separators, etc.), not to replace a list of tokens with smaller tokens.

I am not familiar with the usage tokenizing given in the previous version of the article, but I will leave it as an alternative meaning of tokenizing until I can verify whether it is incorrect or not.

Steve-o 03:47, 15 Apr 2004 (UTC)

Tokenizing in politics has a different meaning that would be worth adding to this article, or putting into another one.--Lizzard 22:47, 13 September 2006 (UTC)[reply]

I expected this page to be about lexical analysis, not security. 66.75.141.47 (talk) 08:09, 30 August 2009 (UTC)[reply]

the section on human perception

  • remote enough to be situated in a different article
  • needs a cite
  • was left in for the time being pending suggestions for a more appropriate location



WTF? Where is all the content!? I expected to see lexical tokenization...but this page is empty. I think someone screwed up. Actually, it's worse than I thought. Clicking on "Discussion" for Tokenization leads to this page, the one for Data Security. The main tokenziation page is empty: http://en.wikipedia.org/wiki/Tokenization

Incomprehensible

I don't feel I'm especially dim, but after reading the first (below) and subsequent few paras of this page, I'm none the wiser. How does it help to tell me that tokenization is done using tokenization?

"Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. The token is a reference (i.e. identifier) that maps back to the sensitive data through a tokenization system. The mapping from original data to a token uses methods which render tokens infeasible to reverse in the absence of the tokenization system, for example using tokens created from random numbers.[1] The tokenization system must be secured and validated using security best practices [2] applicable to sensitive data protection, secure storage, audit, authentication and authorization. The tokenization system provides data processing applications with the authority and interfaces to request tokens, or detokenize back to sensitive data." — Preceding unsigned comment added by Holytrinity1 (talkcontribs) 13:27, 23 March 2015 (UTC)[reply]


Reads like an Ad

This could well be just a copy/paste from any of those websites from the companies who sell the service. As any technology it has it's limits and calling it secure is... well subjective at best. I'd rather vehemently object to the articles objectivity. Unpaid advertisement comes to mind.

"This secure billing application allows clients to safely and securely process recurring payments without the need to store cardholder payment information. Tokenization replaces the Primary Account Number (PAN) with secure, randomly generated tokens." eNTi (talk) 09:20, 11 July 2018 (UTC)[reply]

It definitely is written like a marketing piece and has a WP:PEACOCK issue which I have tagged. I have also run a WP:COPYVIO check to make sure that it was not copied from industry marketing materials. The opposite appears to be the case, industry marketing materials are using excerpts from this article. ~Kvng (talk) 14:50, 10 October 2018 (UTC)[reply]

I've made an attempt to fix several of these peacock terms. [1] Please point out any remaining examples. Jehochman Talk 16:29, 29 September 2020 (UTC)[reply]