Abstract: Disclosed are computer program products, systems, and methods for transmitting, storing, and intermixing separate data sources. First source data and second source data are split into microshard data fragments that are less than a maximum size. One of the microshard data fragments is selected. A pointer value is determined. The pointer value identifies a location for at least one external storage resource, a file or object on the external storage resource, and a location in the file or object for storing the selected microshard data fragment. At least part of the pointer value is stored in a distinct storage resource that does not include the microshard data fragments.
Abstract: A set of methods are proposed to increase data security, both in motion and at rest, by creating microshard data fragments. Microshard data fragments are subsets of a data file which are smaller than a defined atomic unit of value (e.g. a fraction of the size of a social security number or valuable password that one seeks to protect). These microshard data fragments are then dispersed across several physical locations, obscuring the value. Additional techniques are proposed to further frustrate unauthorized reassembly attempts and to create system efficiencies.
Abstract: A set of methods are proposed to increase data security, both in motion and at rest, by creating microshard data fragments. Microshard data fragments are subsets of a data file which are smaller than a defined atomic unit of value (e.g. a fraction of the size of a social security number or valuable password that one seeks to protect). These microshard data fragments are then dispersed across several physical locations, obscuring the value. Additional techniques are proposed to further frustrate unauthorized reassembly attempts and to create system efficiencies.