Abstract: A system and method for privatizing computer data involves the steps of opening a plurality of original data files, fragmenting said original data files into fragments, and interspersing said fragments among each other forming composite files (privacy protected files). The method then includes the steps of creating a reconstitution file, which identifies hidden dispersion locations and placement of individual fragments to reconstruct the original data files. Finally, the composite files are dispersed to hidden locations. To enhance security, each fragment may be disguised through a multiplicity of high speed mathematical operations, which are directed by a fragment handling guide drawn from a random table, before interspersing fragments in the composite files.
Abstract: A system and method for privatizing computer data comprises the steps of opening a plurality of original data files, fragmenting said original data files into fragments, and interspersing said fragments among each other forming composite files (privacy protected files). The method then comprises the steps of creating a reconstitution file, which identifies hidden dispersion locations and placement of individual fragments to reconstruct the original data files. Finally, the composite files are dispersed to hidden locations. To enhance security, each fragment may be disguised through a multiplicity of high speed mathematical operations, which are directed by a fragment handling guide drawn from a random table, before interspersing fragments in the composite files.