A cryptographic key split combiner, which includes a number of key split generators (42, 48, and 56) for generating cryptographic key splits (32, 34, 36, 38, and 64) and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key (62), and a process for forming cryptographic keys. Each of the key split generators (42, 48 and 56) generates key splits (32, 34, 36, 38, and 64) from seed data (40, 44, 46, 50, 52, 54, 58, and 60). The key split generators may include a random split generator (42) for generating a random key split (32) based on reference data (40) and
encryption date / time (44). Other key split generators may include a token split generator (48) for generating a token key split (34) based on
label data (46) and organization data (50), a console split generator (56) for generating a console key split (36) based on current maintenance data (52) and previous maintenance data (54), and a biometric split generator for generating a biometric key split (38) based on
biometric data (58). All splits may further be based on
static data, which may be updated, for example by modifying a prime number divisor of the
static data. The
label data may be read from a storage medium, and may include user
authorization data. The
label data may be associated with label categories and subcategories of addresses, which are meaningful to a user who is specifying or determining the intended recipient(s) of the encrypted information or object. An array associated with a
software component object may use key splits (32, 34, 36, 38, and 64) which determine which methods and properties are allowed and control access to the
memory address for those allowed methods and properties. The resulting cryptographic key (62) may be, for example, a
stream of symbols, at least one symbol block, or a key matrix.