throbber
EXHIBIT 2011
`
`EXHIBIT 201 1
`
`Dynamics Inc. - Ex. 2011
`Page 1
`
`Dynamics Inc. - Ex. 2011
`Page 1
`
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`eP7L76Ad526e6
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`1/10
`
`Dynamics Inc. - Ex. 2011
`Page 2
`
`Tokenization is a generalized concept of a cryptographic hash. It means representing
`something by a symbol (‘token’).
`For instance, a social security number represents a citizen, a bank account number
`represents a user’s bank account, a labeled plastic token represents real money
`deposited at the casino’s cashier and so on.
`In the context of cryptography, a token is a symbol (or a group of symbols) that
`represents some sort of confidential information. It is done in such a way that no
`useful information is leaked when it is represented by its token. A cryptographic
`token is usually (but not always) the same as a cryptographic hash, a one-way
`function with the smallest probability that two different pieces of information have
`the same token representation.
`Most programmers and sysadmins know (or should know) that passwords are
`usually represented by tokens on the machines. For example, an old machine will not
`store the password “Belinda@112” but rather the token:
`as a result of a DES (Data Encryption Standard) operation with a salt value of wC.
`Tokenization in Banking and Financial Services
`by Martin Rupp (guest) on 24. July 2019
`EMV
` CSG
` Tokenization
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`2/10
`
`Dynamics Inc. - Ex. 2011
`Page 3
`
`One issue with tokens is that they can be broken if attackers are able to build a
`dictionary compiling the correspondence between the original value and the token.
`A token can also be a graphical/symbolic representation. For example, let us recall
`the “dancing men” from the famous Sherlock Holmes detective stories.
`Each letter of the alphabet has been tokenized by a “dancing man” symbol. The
`original letters are not exposed and then there is no way to understand the meaning
`of the original text that is protected, unless that the corresponding dictionary is
`known.
`In the banking industry, the PCI-DSS requirements usually command or recommend
`that credit card information, which is sensitive by nature, is tokenized or encrypted
`when stored in databases.
`Tokenization versus Encryption
`Tokenization can be seen as a form of encryption, where a big dictionary is created
`that links entries and tokens. Decryption is hardly possible or even totally impossible.
`The usage of that huge dictionary consists of looking at a symbol, then looking at an
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`Visa,4539694002170142
`Visa,4556495729549693
`Visa,4929090830103546
`Visa,4929745558911418
`Visa,4716198321731290
`Visa,4929676432242391
`Visa,4716480797748036
`Visa,4539159251288466
`Visa,4716611709749544
`Visa,4929778594511728
`
`8mSaFDbNyBdAm8PVmj4mFmvz
`8MqXgbBU4xVfXmdzLGkMnGyf
`fRtNNwJEqF7JcSQjja7SJTTy
`KU6U3wtnfYE6P8v9WDLhat8s
`mcuHJPawy9tEaK8JDh7YGAU5
`crk9X8KBDVHLjVK85hDNM6Ry
`kUEnrJTHq5YRNWeGDXpakK7v
`J9SfcJW2gkyWMp9pCQ47FnYT
`7xgq2MtMdkYujjG8PAKD3T4a
`KYea5C9rL7FFJ9zEBdXYgVjK
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`3/10
`
`Dynamics Inc. - Ex. 2011
`Page 4
`
`entry, and checking if the symbol represents the entry or not. It then differs from a
`normal encryption scheme that can decipher any symbol if given the right key. In
`tokenization, the “big” dictionary is the key itself and the only way to reverse tokens
`is to create the reversed dictionary, which is usually supposed to be impossible. But
`this is not always truly impossible. Recently, terabytes of “Rainbow Tables” have been
`created and can crack, for example, tokenized Windows passwords. 
`Note that “standard” cryptographic algorithms like AES or RSA can be effectively
`used to generate tokens, the goal being to map an entry to a token, and not
`consider decryption. 
`Finally and less obvious, “pure” random functions can be used to generate tokens.
`The correspondence between the information and the token representing it has
`been maintained in a dictionary. This is probably the best and ideal way to create
`tokens. For instance, for any information not already represented by a token, a new
`random 200 bits of data is generated and registered as a new entry in the dictionary.
`Encrypted data can be deciphered, but the tokens must be unmapped to make
`sense, so they add obfuscation to the security.
`Tokenization in the Banking Context
`In the banking industry, tokenization has great importance. For instance, the PAN
`(Primary Account Number) is not to be exposed in databases. Therefore, a
`token/surrogate PAN is usually substituted to represent the PAN. For example, the
`following dictionary shows a conversion between some PANs and tokens.
`

`

`4/19/2020
`
`(etc…)
`
`Tokenization in Banking and Financial Services
`(etc…)
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`4/10
`
`Dynamics Inc. - Ex. 2011
`Page 5
`

`Here the tokens do not preserve the original formatting. Tokens have better usage
`when they respect the like-to-like format rule. For instance a 16 digit PAN should be
`represented by a 16 digit token, eventually respecting the Luhn algorithm.
`Visa has a strong tokenization requirement and so does the EMV consortium, as
`described in “EMV® Payment Tokenisation Specification”. Here are a few stories
`from the banking industry to illustrate the everyday use of tokens.
`1) All EMV transactional data will be tokens
`The actual trend in the EMV tokenization is that ALL transaction data will become
`tokens! Not just the PAN or related card data… 
`2) Combating CNP fraud
`Card-not-present (CNP) fraud consists of using credit card data for fraudulent online
`“web” transactions. Such data consist of the PAN, expiration date, cardholder name
`and the CVV / CVC. These data are usually obtained by compromising unencrypted
`and unprotected databases merchant databases. Tokenization prevents merchants
`from storing card data but allows the storage of the token, which will be useless to
`attackers.
`3) Securing card-on-file
`Card-on-file is the process of collecting initial card data to store it and use it for
`recurring payments, for example. During the card-on-file process, tokens are
`requested and stored instead of credit card data. At each renewal period, the system
`will automatically send the tokens to the token gateway and charge the right
`account via de-tokenization. 
`4) Tokenization reduces false declines
`A false decline (false positive) occurs when a genuine customer within their spend
`limit cannot place an online transaction. The reasons behind this are complex and
`the error messages are usually generic on purpose. It has been proved that Network
`EMV tokenization reduces such false positives. 
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`5/10
`
`Dynamics Inc. - Ex. 2011
`Page 6
`
`Why Tokenization is Not Trivial
`At first glance, one may believe that tokenization is not hard, that the concept is
`simple and an average programmer could create a hash function that will transform
`any sort of information into tokens. That is a big mistake! Here are the design issues
`that challenge a good token generation service:
`1. The token vault. The vault where the dictionary information/token is maintained
`must be secure. Otherwise, there is no real point in the whole tokenization!
`2. Collision-free. The tokens should be collision-free otherwise there will be a risk
`that the wrong account may be charged in lieu of the right one! 
`3. Speed. The token generation and comparison in the vault should be fast. 
`4. No “Rainbow Tables.” The dictionary information/token should not be reversed
`and an inverse dictionary should never be built.
`5. Quality of service. Tokens should not be able to be corrupted by hardware or
`electrical faults.
`This is just an overview of the challenges created by a token generation service.
`Conclusion
`Tokenization is a major asset when considering data protection. It is not the same
`technique as encryption and must be considered to be used in addition to
`encryption in banking transactions. Tokenization is a very efficient way to prevent the
`leak of credit card data, especially PANs. On the other hand, it will never replace
`encryption. Tokenization is unable to create secure channels or provide
`authentication mechanisms but Tokenization is great for data protection.
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`
`
`
`
`
`
`
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`6/10
`
`Dynamics Inc. - Ex. 2011
`Page 7
`
`Martin Rupp (guest)  
`References and Further Reading
`More articles on tokenization (2018 - today), by Martin Rupp, Dawn M.
`Turner, and more.
`More articles on Crypto Service Gateway (2018 - today), by Chris Allen, Jo
`Lintzen, Terry Allen, Rob Stubbs, Stefan Hansen, Martin Rupp, and more.
`EMV Payment Tokenisation Frequently Asked Questions (FAQ)
`– General
`FAQ (2017), by the EMV Consortium
`PCI DSS Applicability in an EMV Environment, A Guidance Document,
`Version 1 (5 October 2010), by the PCI Security Standards Council
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`SHARE
`
`RECENT
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`7/10
`
`Dynamics Inc. - Ex. 2011
`Page 8
`
`Banking and Finance Amid Lockdowns – How eIDAS e-signatures are
`helping to keep it going
`Secure Connectivity for Mobile Banking and Payment Apps: HTTPS
`Vulnerabilities
`FACEBOOK
`TWITTER
`LINKEDIN
`E MAIL
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`MORE STORIES
`
`Enter your email here
`
`SUBMIT
`
`SUBSCRIBE
`
`RELATED ARTICLES
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`8/10
`
`Dynamics Inc. - Ex. 2011
`Page 9
`
`End-to-end Banking-grade Key Management - From On-premise to
`Multi-cloud BYOK
`The Challenges and advantages of EMV Tokenization
`Martin Rupp (guest)
`The biggest stories, delivered to your inbox.
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`Get in touch to better understand how our solutions secure ecommerce and billions of transactions worldwide.
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`9/10
`
`Dynamics Inc. - Ex. 2011
`Page 10
`
`Introducing a PCI DSS compliant Key Management System to a Bank
`Silas Mhembere (guest)
`OTHER RELATED ARTICLES: # EMV # CSG # TOKENIZATION
`Want to know how we can help ?
`CONTACT US
`e: enquiry@cryptomathic.com
`t: + 45 8676 2288
`HEADQUARTERS
`Cryptomathic A/S
`Jaegergardsgade 118
`DK-8000 Aarhus C
`Denmark
`Home
`About Us
`Company
`

`

`4/19/2020
`
`Tokenization in Banking and Financial Services
`
`https://www.cryptomathic.com/news-events/blog/tokenization-in-banking-and-financial-services
`
`10/10
`
`Dynamics Inc. - Ex. 2011
`Page 11
`
`Solutions
`Contact Us
`Offices
`News
`Events
`Blog
`Case studies
`White papers
`Resources
`Copyright © 1986-2020 Cryptomathic.     Credits and Privacy
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket