摘要 |
In a method of securing information, one or more software components are assembled from among a plurality of candidate software components. Each of the plurality of candidate software components have a respective unique algorithm adapted to implement a common interface for accessing the information. An information object incorporating at least the assembled software components is compiled. Consequently, each compiled information object provides a publicly known interface for accessing the information, while having a secret algorithm which differs from the algorithms implemented in other ones of the information object. Security and output algorithms compiled within each information object are unique, conventional decyphering software cannot be used, and the task of cracking the information object is extremely complex. |