May 2012 to 2000 Enterprise Integration ArchitectHitachi Consulting Houston, TX Nov 2011 to May 2012 Senior Solutions Architect and Project ManagerHitachi Consulting Dallas, TX May 2007 to May 2012 Solutions ArchitectHitachi Consulting Portland, OR May 2011 to Nov 2011 Senior Lawson ArchitectHitachi Consulting Dallas, TX Mar 2011 to May 2011 Senior Lawson ArchitectHitachi Consulting Dallas, TX May 2010 to Sep 2010 Lead SOA 11g EngineerHitachi Consulting Irving, TX Jan 2010 to Jul 2010 Lawson Lead Systems ArchitectHitachi Consulting Corinth, TX Aug 2009 to Dec 2009 SOA 10g DeveloperHitachi Consulting Wilmington, NC Feb 2009 to Aug 2009 Lead Interface Developer, LSF9 InstallerHitachi Consulting Schenectady, NY Nov 2007 to Nov 2008 Lawson Environment InstallerHitachi Consulting Abilene, TX Mar 2008 to Aug 2008 Lawson Developer and Environment InstallerBNSF Railways Fort Worth, TX Dec 2005 to May 2007 IT Audit Contractor
Education:
University of North Texas Denton, TX May 2006 Bachelor of Business Administration in computer programming and statistic models
A computer-implemented system for storing computer program instructions, which, when executed by a processor, cause the processor to perform a method of tokenization, the method comprising the steps of receiving a request for tokenization from a user, the request including a Session Token; decoding and validating the Session Token; retrieving a token definition, a token key, and a security policy; appending the user key and the token key to the received value to create an input value; replacing each input value character with a known character to create a replacement input value using a lookup table; generating a secure hash of the replacement input value to create a derived key; substituting characters of the replacement input value with a character from lookup tables to create a third input value; and returning the input value to the user.
A computer-readable medium storing computer program instructions, which, when executed by a processor, cause the processor to perform a method of tokenization, the method comprising the steps of receiving a request for tokenization from a user, the request including a Session Token; decoding and validating the Session Token; retrieving a token definition, a token key, and a security policy; appending the user key and the token key to the received value to create an input value; replacing each input value character with a known character to create a replacement input value using a lookup table; generating a secure hash of the replacement input value to create a derived key; substituting characters of the replacement input value with a character from lookup tables to create a third input value; and returning the input value to the user.