The Protecto Masking API detects and replaces Personally Identifiable Information (PII) in text with secure and consistent tokens, ensuring data privacy and compliance Character Encoding Support Our APIs are fully compatible with UTF-8 encoding, enabling seamless handling of special characters and multilingual text in both request and response payloads. HTTP Methodology The Protecto API adheres...
Protecto’s Masking API identifies and substitutes Personally Identifiable Information (PII) in text with secure tokens. Protecto API uses appropriate HTTP verbs for every action. Method :PUT Personally identifiable elements will maintain a uniform token if they are associated with the same token name. For instance, if “George” is the original value, consistent tokens will be...
Token-based data masking is a powerful technique that enables users to customize the masking of sensitive data according to their specific requirements. In this blog post, we will explore how to use token-based data masking with Protecto.ai. We’ll cover the endpoint, request method, payload, response, advantages, and various customization options available. Note: Check our supporting...
This technique masks data based on user-specified token types (e.g., Text token,Numeric Token etc.) .as well as predefined formats (e.g., Phone, Email etc.). Note: Check our supporting format Endpoint and Authentication: To use Protecto.ai’s token-based masking, you need to send a PUT request to the following endpoint: METHOD: PUT Route: api/vault/mask For authentication, include the...
This method automatically identifies and masks personal/sensitive data within specific sentences. Endpoint and Authentication: To use Protecto.ai’s token-based masking, you need to send a PUT request to the following endpoint: METHOD: PUT Route: api/vault/mask For authentication, include the following token in the request headers: Headers: {“Authorization”: “Bearer <AUTH_TOKEN>”} Note: To obtain the <auth token>, please refer to...
Unmasking in tokenization refers to the process of reversing the tokenization procedure to retrieve the original sensitive data from its tokenized form. It is the opposite of tokenization, where sensitive information is replaced with tokens to enhance security and privacy. Endpoint and Authentication: To use Protecto.ai’s token-based masking, you need to send a PUT request...
When an API fails, it means that the intended operation or task could not be completed as expected. API failures can occur for various reasons, including client-side errors, server-side issues, network problems, or incorrect API usage. Here’s what typically happens when an API fails: HTTP Status Codes: APIs often use HTTP status codes to indicate...
1. Payload Length Error Sample Input: {"mask": [ ]} Error Response: {"data": null,"success": false,"error": {"message": "Payload is empty"}} When the payload length is empty, your application should respond with an appropriate error message indicating that the payload is empty. 2. Missing ‘mask’ Key in Payload Sample Input: [{ "value": "George Williams","token_name": "Numeric Token"}] Error Response:...
unmask api error messages: error_code: 500 if payload length is empty sample input:{“unmask”:[{}]} { “data”: null, “success”: false, “error”: { “message”: “Payload is empty” }} if ‘unmask’ key not in payload sample input:[{“token_value”:”2333″}]} error response: { “data”: null, “success”: false,”error”: { “message”: “unmask data missing”}} if ‘token_value’ not in unmask payload sample input:{“unmask”:[{“token_value”:” “}]} error...
Below are the list of PII/PHI enabled by default. Supported Entites ...
The asynchronous masking technique assists in concealing large volumes of data. Utilizing this method enables you to submit a mask request and receive a tracking ID. The tracking ID can then be employed to retrieve the status of the submitted request. Endpoint and Authentication: To use Protecto.ai’s token-based masking, you need to send a PUT...
The asynchronous unmasking approach assists in unmasking large volumes of data. Using this method permits you to submit an unmask request, and in return, you receive a tracking ID. The tracking ID is utilized to check the status of the corresponding request. Endpoint and Authentication: To use Protecto.ai’s token-based masking, you need to send a...
The asynchronous status method enables us to monitor the status of both masking and unmasking processes.The user has to give the tracking id of the mask or unmask Async as the input in the Request This approach enables you to track the status of the asynchronous request you’ve submitted. The possible statuses include “SUCCESS”,”PENDING”,”IN-PROGRESS”,”FAILED” and...
Overview Protecto is designed to identify and score content based on the presence of toxic language, such as inflammatory remarks or discriminatory statements. This guide provides an understanding of how Protecto scores content and the types of toxic content it identifies. Scoring System Protecto assigns a score to content indicating the severity of toxic content:...
This API endpoint performs unmasking while analyzing the text for toxicity, providing detailed toxicity metrics for each unmasked value. METHOD: PUT ROUTE: /api/vault/unmask Headers: { “Authorization”: “Bearer <NAMESPACE_USER_API_KEY >” } Request payload { "policy_name": "Anonymization-policy-1", "unmask": [ { "token_value": " <PER>hSw8kAEB10 ITItAd8FsN</PER> lives in <ADDRESS>748785848000</ADDRESS> " } ] } NOTE: policy_name is an optional parameter...
This API will identify and mask the personal data elements in the given text using the metadata associated with the specified policy. If no policy is specified, it will use the default metadata configuration. Prerequisite: Create the Policy METHOD: PUT ROUTE: api/vault/mask Headers: { “Authorization”: “Bearer <NAMESPACE_USER_API_KEY >” } Request payload: { "policy_name": "Anonymization-policy-1",...
New Feature: Users can now send custom attributes in the Mask and UnMask APIs. This feature allows users to tag specific details (such as page numbers) for better tracking when dealing with data that appears across multiple pages. For example, if the same data exists on multiple pages and users want to track which page...
Users can now define prefixes and suffixes for entities in their policies. The policy name should be used during masking/unmasking to generate tokens with the specified prefix and suffix. Prerequisite: Create the Policy and Update the Prefix and suffix in the Metadata API Mask API METHOD: PUT Route: /api/vault/mask For authentication, include the following token in...
Protecto offers below token types to secure sensitive data through tokenization. Here’s a summary of the supported token types: Token Name Eg/Input Eg/Output Default Token George FreTdf Note: output Length will be the same as the input text length. Text Token kumar@ss.fss.com LEFQS@cTdqGVB2Ay Numeric Token (408)- 426 – 9989 (07432)- 29915 – 56713 Special Token...
Protecto offers below Format to secure sensitive data through tokenization. Here’s a summary of the supported token types: Format Name Allowed Delimiters Valid Example Output (Masked) Pin [“”] 7865 yhtj Insurance Number [” “, “-“, “,”, “:”] 123-45-6789 3456-54-6789 Phone Number [” “, “.”, “-“, “(“, “)”, “+”, “x”, “extension”, “ext”, “,”] +1 (234) 567-8900...
© All Rights Reserved 2023 | Protecto