摘要 |
<p>A method and system are disclosed for securing sensitive data from unauthorized access or use. Using a computer, a data set is encrypted based on a first key. Data splitting information is generated, which is usable to determine into which of a plurality of shares of data a unit of data of the encrypted data set will be placed. The encrypted data set is then separated into the plurality of shares based on the data splitting information. Data indicative of the first key is included in the plurality of shares. The plurality of shares is encrypted. Each of the plurality of shares is stored in respective separate storage locations, and information required to decrypt the plurality of shares is stored elsewhere. The data set is restorable by accessing less than all, but at least a threshold number of, the plurality of shares and the information. The method and system is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users, or in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity. m LO -j E></p> |