Endpoint and Authentication: #
To use Protecto.ai’s token-based masking, you need to send a PUT request to the following endpoint:
METHOD: PUT
Endpoint: https://portal.protecto.ai/api/vault/unmask
For authentication, include the following token in the request headers:
Headers: {“Authorization”: “Bearer <AUTH_TOKEN>”}
Note: To obtain the <auth token>
, please refer to the Step-by-Step Guide to Obtain Your Auth Token.

Request Payload: #
Here’s an example of a request payload to unmask data:
{ "unmask": [ { "token_value": "<PER>VJYe 03W</PER>, an <NATIONALITY>Q534kH4v</NATIONALITY>, can be reached via email at <EMAIL>1AI0s@Uzm3a</EMAIL> or phone at <PHN>+8-065-029-0616</PHN>; his portfolio is available at <URL>Hn9el.h15bIG.iCUsA</URL>, and he resides at <ADDRESS>0ht 0Ij D1l7uy</ADDRESS>, <ADDRESS>KfybCji45d</ADDRESS>, <ADDRESS>8x</ADDRESS>, <ADDRESS>0SF</ADDRESS>" } ] }
token_value
(string): The token for which the original value needs to be retrieved.
{ "data": [ { "value": "John Doe, an American, can be reached via email at johndoe@example.com or phone at +1-123-456-7890; his portfolio is available at www.johndoeportfolio.com, and he resides at 123 Elm Street, Springfield, IL, USA", "token_value": "<PER>VJYe 03W</PER>, an <NATIONALITY>Q534kH4v</NATIONALITY>, can be reached via email at <EMAIL>1AI0s@Uzm3a</EMAIL> or phone at <PHN>+8-065-029-0616</PHN>; his portfolio is available at <URL>Hn9el.h15bIG.iCUsA</URL>, and he resides at <ADDRESS>0ht 0Ij D1l7uy</ADDRESS>, <ADDRESS>KfybCji45d</ADDRESS>, <ADDRESS>8x</ADDRESS>, <ADDRESS>0SF</ADDRESS>", "toxicity_analysis": { "toxicity": 0.000597277597989887, "severe_toxicity": 0.00012354821956250817, "obscene": 0.00019149390573147684, "threat": 0.00012092456745449454, "insult": 0.0001770917879184708, "identity_attack": 0.00014092971105128527 } } ], "success": true, "error": { "message": "" } }
Advantage :
Authorized Data Access: Unmasking allows authorized personnel to access the original, unmasked data when needed, while still keeping the data protected during other stages of processing or storage.
Note : Unmasking should be performed under strict controls, only by authorized individuals, and in compliance with data protection policies and regulations. Organizations should carefully weigh the benefits and risks of unmasking, based on their specific use cases and security requirements.