Unmasking

Unmasking in tokenization refers to the process of reversing the tokenization procedure to retrieve the original sensitive data from its tokenized form. It is the opposite of tokenization, where sensitive information is replaced with tokens to enhance security and privacy.

Endpoint and Authentication: #

To use Protecto.ai’s token-based masking, you need to send a PUT request to the following endpoint:

METHOD: PUT

Endpoint: https://portal.protecto.ai/api/vault/unmask

For authentication, include the following token in the request headers:

Headers: {“Authorization”: “Bearer <AUTH_TOKEN>”}

Note: To obtain the <auth token>, please refer to the Step-by-Step Guide to Obtain Your Auth Token.

Request Payload: #

Here’s an example of a request payload to unmask  data:

Request Payload:
{
    "unmask": [
        {
            "token_value": "<PER>VJYe 03W</PER>, an <NATIONALITY>Q534kH4v</NATIONALITY>, can be reached via email at <EMAIL>1AI0s@Uzm3a</EMAIL> or phone at <PHN>+8-065-029-0616</PHN>; his portfolio is available at <URL>Hn9el.h15bIG.iCUsA</URL>, and he resides at <ADDRESS>0ht 0Ij D1l7uy</ADDRESS>, <ADDRESS>KfybCji45d</ADDRESS>, <ADDRESS>8x</ADDRESS>, <ADDRESS>0SF</ADDRESS>"
           
        }
    ]
}
Parameters :
  • token_value (string): The token for which the original value needs to be retrieved.
Response :
{
    "data": [
        {
            "value": "John Doe, an American, can be reached via email at johndoe@example.com or phone at +1-123-456-7890; his portfolio is available at www.johndoeportfolio.com, and he resides at 123 Elm Street, Springfield, IL, USA",
            "token_value": "<PER>VJYe 03W</PER>, an <NATIONALITY>Q534kH4v</NATIONALITY>, can be reached via email at <EMAIL>1AI0s@Uzm3a</EMAIL> or phone at <PHN>+8-065-029-0616</PHN>; his portfolio is available at <URL>Hn9el.h15bIG.iCUsA</URL>, and he resides at <ADDRESS>0ht 0Ij D1l7uy</ADDRESS>, <ADDRESS>KfybCji45d</ADDRESS>, <ADDRESS>8x</ADDRESS>, <ADDRESS>0SF</ADDRESS>",
            "toxicity_analysis": {
                "toxicity": 0.000597277597989887,
                "severe_toxicity": 0.00012354821956250817,
                "obscene": 0.00019149390573147684,
                "threat": 0.00012092456745449454,
                "insult": 0.0001770917879184708,
                "identity_attack": 0.00014092971105128527
            }
        }
    ],
    "success": true,
    "error": {
        "message": ""
    }
}

Advantage :

Authorized Data Access: Unmasking allows authorized personnel to access the original, unmasked data when needed, while still keeping the data protected during other stages of processing or storage.

Note : Unmasking should be performed under strict controls, only by authorized individuals, and in compliance with data protection policies and regulations. Organizations should carefully weigh the benefits and risks of unmasking, based on their specific use cases and security requirements.

Updated on May 15, 2025
What are your feelings

© All Rights Reserved 2023 | Protecto