A
system, method, and apparatus for securing a date file or a cognitive
encryption key
data file stored in a storage medium or memory device. The date file or
encryption key file having stored instructions for an embedded autonomous
executable program which is executed each time there is an attempt to access, control, or manipulate the
encryption key file includes querying a user of the date file or encryption key file, the
user environment of the date file or encryption key file, or both, for information required for analyzing a
computational environment in relation to required security parameters for the cognitive date file or encryption key file. The information in relation to the security parameters is received and analyzed. The
computational environment of the user is determined and analyzed in relation to the required security parameters. Access to and / or use of the date file or encryption key file is either permitted or denied based on the analysis of the user and
computational environment. Autonomous embedded data
cognition enables data, cryptographic data,
authentication codes, etc. to perform real-time environmental configuration control, self-manage, self-obfuscate, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. Data-to-data reasoning and analyses can be performed.