SYSTEM AND METHOD FOR SECURING SENSITIVE DATA
First Claim
Patent Images
1. A method for securing sensitive data in a technical environment, the method comprising:
- obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file;
executing, by the processor, the first file;
obtaining, by the processor, the second portion of the second file; and
assembling, by the processor, with the assembly key, the second file, wherein the second file comprises the first portion of the second file and the second portion of the second file.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first portion of a second file and an assembly key to assemble the second file. The processor executes this first file and then obtains the second portion of the second file. The processor assembles the second file using the first portion, the second portion, and the assembly key.
335 Citations
20 Claims
-
1. A method for securing sensitive data in a technical environment, the method comprising:
-
obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file; executing, by the processor, the first file; obtaining, by the processor, the second portion of the second file; and assembling, by the processor, with the assembly key, the second file, wherein the second file comprises the first portion of the second file and the second portion of the second file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 17)
-
-
14. A computer program product for securing data in a technical environment, the computer program product comprising a computer readable storage medium and program code stored on the computer readable storage medium, the program code executable by a processing circuit to perform a method comprising:
-
obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file; executing, by the processor, the first file; obtaining, by the processor, the second portion of the second file; and assembling, by the processor, with the assembly key, the second file, wherein the second file comprises the first portion of the second file and the second portion of the second file. - View Dependent Claims (15, 16, 18)
-
-
19. A computer system for securing data in a technical environment, the computer system comprising a computer readable storage medium, a processor, a file system, and program code stored on the computer readable storage medium and executable by the processor to perform a method comprising:
-
obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file; executing, by the processor, the first file; obtaining, by the processor, the second portion of the second file; and assembling, by the processor, with the assembly key, the second file, wherein the second file comprises the first portion of the second file and the second portion of the second file. - View Dependent Claims (20)
-
Specification