CPC G06F 21/54 (2013.01) [G06F 21/31 (2013.01); G06F 21/604 (2013.01)] | 17 Claims |
1. A computer-implemented method for electronic data obfuscation and protection using independent destructible data objects, wherein the computer-implemented method comprises:
receiving a request to store a set of data in a database;
splitting the set of data into a data portion and a key portion;
storing the data portion in a first storage location and the key portion in a second storage location;
associating a destructible data object with the data portion, wherein the destructible data object comprises executable code that, when executed, initiates a countdown process, whereby if the data portion is stored on a non-trusted computing system, the countdown process decrements a countdown value;
determining that the data portion is stored on a trusted computing system;
freezing the countdown value associated with the data portion, wherein freezing the countdown value prevents the countdown value from being decremented; and
based on detecting that the data portion is no longer stored on the trusted computing system, starting or restarting a countdown process associated with the data portion,
wherein the countdown process comprises:
decrementing the countdown value;
detecting that the countdown value has reached a defined countdown threshold; and
automatically execute one or more protective actions on the data portion.
|