{"id":9508,"date":"2010-01-01T00:00:37","date_gmt":"2010-01-01T05:00:37","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=9508"},"modified":"2017-11-06T13:32:46","modified_gmt":"2017-11-06T18:32:46","slug":"format-preserving-encryption-fpe-and-pseudonymization-demonstration","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/","title":{"rendered":"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video]"},"content":{"rendered":"<p>This video is a demonstration of using IRI Workbench to apply format preserving encryption (FPE) and pseudonymization to select fields in a data file to protect personally identifiable information (PII) and protected health information (PHI). The demonstration shows how to build FieldShield scripts that apply these protection functions in the same pass and execution which can be run as a batch or from the command line.<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" width=\"1140\" height=\"641\" src=\"https:\/\/www.youtube.com\/embed\/szeKl6PZ1wE?feature=oembed\" frameborder=\"0\" gesture=\"media\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This video is a demonstration of using IRI Workbench to apply format preserving encryption (FPE) and pseudonymization to select fields in a data file to protect personally identifiable information (PII) and protected health information (PHI). The demonstration shows how to build FieldShield scripts that apply these protection functions in the same pass and execution which<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\" title=\"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video]\">Read More<\/a><\/div>\n","protected":false},"author":10,"featured_media":11757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,91,1030],"tags":[],"class_list":["post-9508","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-iri-workbench","category-vlog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video] - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video] - IRI\" \/>\n<meta property=\"og:description\" content=\"This video is a demonstration of using IRI Workbench to apply format preserving encryption (FPE) and pseudonymization to select fields in a data file to protect personally identifiable information (PII) and protected health information (PHI). The demonstration shows how to build FieldShield scripts that apply these protection functions in the same pass and execution whichRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-01T05:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-06T18:32:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png\" \/>\n\t<meta property=\"og:image:width\" content=\"839\" \/>\n\t<meta property=\"og:image:height\" content=\"423\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Susan Gegner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Susan Gegner\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\"},\"author\":{\"name\":\"Susan Gegner\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63\"},\"headline\":\"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video]\",\"datePublished\":\"2010-01-01T05:00:37+00:00\",\"dateModified\":\"2017-11-06T18:32:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\"},\"wordCount\":85,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png\",\"articleSection\":[\"Data Masking\/Protection\",\"IRI Workbench\",\"VLOG\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\",\"name\":\"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video] - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png\",\"datePublished\":\"2010-01-01T05:00:37+00:00\",\"dateModified\":\"2017-11-06T18:32:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png\",\"width\":839,\"height\":423},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63\",\"name\":\"Susan Gegner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g\",\"caption\":\"Susan Gegner\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/susang\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video] - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/","og_locale":"en_US","og_type":"article","og_title":"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video] - IRI","og_description":"This video is a demonstration of using IRI Workbench to apply format preserving encryption (FPE) and pseudonymization to select fields in a data file to protect personally identifiable information (PII) and protected health information (PHI). The demonstration shows how to build FieldShield scripts that apply these protection functions in the same pass and execution whichRead More","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/","og_site_name":"IRI","article_published_time":"2010-01-01T05:00:37+00:00","article_modified_time":"2017-11-06T18:32:46+00:00","og_image":[{"width":839,"height":423,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png","type":"image\/png"}],"author":"Susan Gegner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Susan Gegner"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/"},"author":{"name":"Susan Gegner","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63"},"headline":"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video]","datePublished":"2010-01-01T05:00:37+00:00","dateModified":"2017-11-06T18:32:46+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/"},"wordCount":85,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png","articleSection":["Data Masking\/Protection","IRI Workbench","VLOG"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/","name":"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video] - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png","datePublished":"2010-01-01T05:00:37+00:00","dateModified":"2017-11-06T18:32:46+00:00","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png","width":839,"height":423},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/format-preserving-encryption-fpe-and-pseudonymization-demonstration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Format Preserving Encryption (FPE) and Pseudonymization Demonstration [video]"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63","name":"Susan Gegner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g","caption":"Susan Gegner"},"url":"https:\/\/beta.iri.com\/blog\/author\/susang\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/format-preserving-encryption.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9508"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=9508"}],"version-history":[{"count":5,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9508\/revisions"}],"predecessor-version":[{"id":11758,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9508\/revisions\/11758"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/11757"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=9508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=9508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=9508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}