System and method for securing sensitive data
First Claim
Patent Images
1. A method for securing sensitive data in a technical environment, the method comprising:
- obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file;
executing, by the processor, the first file;
obtaining, by the processor, the second portion of the second file; and
assembling, by the processor, with the assembly key, the second file, wherein the assembled second file comprises the first portion of the second file and the second portion of the second file;
wherein the first portion of the second file comprises bytes with no logical meaning and the second portion of the second file comprises bytes with no logical meaning and wherein the assembled second file has logical meaning; and
wherein the first file comprises an application program that executes the assembled second file.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first portion of a second file and an assembly key to assemble the second file. The processor executes this first file and then obtains the second portion of the second file. The processor assembles the second file using the first portion, the second portion, and the assembly key.
-
Citations
20 Claims
-
1. A method for securing sensitive data in a technical environment, the method comprising:
-
obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file; executing, by the processor, the first file; obtaining, by the processor, the second portion of the second file; and assembling, by the processor, with the assembly key, the second file, wherein the assembled second file comprises the first portion of the second file and the second portion of the second file; wherein the first portion of the second file comprises bytes with no logical meaning and the second portion of the second file comprises bytes with no logical meaning and wherein the assembled second file has logical meaning; and wherein the first file comprises an application program that executes the assembled second file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product for securing data in a technical environment, the computer program product comprising a non-transitory computer readable storage medium and program code stored on the computer readable storage medium, the program code executable by a processing circuit to perform a method comprising:
-
obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file; executing, by the processor, the first file; obtaining, by the processor, the second portion of the second file; and assembling, by the processor, with the assembly key, the assembled second file, wherein the assembled second file comprises the first portion of the second file and the second portion of the second file; wherein the assembly key comprises a randomly generated number sequence and wherein each number in the assembly key represents a group of consecutive bytes of the assembled second file distributed in one of the first portion of the second file or the second portion of the second file. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer system for securing data in a technical environment, the computer system comprising a non-transitory computer readable storage medium, a processor, a file system, and program code stored on the computer readable storage medium and executable by the processor to perform a method comprising:
-
obtaining, by a processor, a first file, wherein upon execution by a processor the first file installs on a memory a first portion of a second file and an assembly key to assemble the second file, the assembled second file comprising the first portion of the second file and a second portion of the second file; executing, by the processor, the first file; obtaining, by the processor, the second portion of the second file; and assembling, by the processor, with the assembly key, the assembled second file, wherein the second file comprises the first portion of the second file and the second portion of the second file; wherein the assembly key comprises a randomly generated number sequence and wherein each number in the assembly key represents a group of consecutive bytes of the assembled second file distributed in one of the first portion of the second file or the second portion of the second file. - View Dependent Claims (20)
-
Specification