A cryptographic key split combiner, which includes a number of key split
generators (42, 48, and 56) for generating cryptographic key splits (32,
34, 36, 38, and 64) and a key split randomizer for randomizing the
cryptographic key splits to produce a cryptographic key (62), and a
process for forming cryptographic keys. Each of the key split generators
(42, 48 and 56) generates key splits (32, 34, 36, 38, and 64) from seed
data (40, 44, 46, 50, 52, 54, 58, and 60). The key split generators may
include a random split generator (42) for generating a random key split
(32) based on reference data (40) and encryption date/time (44). Other
key split generators may include a token split generator (48) for
generating a token key split (34) based on label data (46) and
organization data (50), a console split generator (56) for generating a
console key split (36) based on current maintenance data (52) and
previous maintenance data (54), and a biometric split generator for
generating a biometric key split (38) based on biometric data (58). All
splits may further be based on static data, which may be updated, for
example by modifying a prime number divisor of the static data. The label
data may be read from a storage medium, and may include user
authorization data. The label data may be associated with label
categories and subcategories of addresses, which are meaningful to a user
who is specifying or determining the intended recipient(s) of the
encrypted information or object. An array associated with a software
component object may use key splits (32, 34, 36, 38, and 64) which
determine which methods and properties are allowed and control access to
the memory address for those allowed methods and properties. The
resulting cryptographic key (62) may be, for example, a stream of
symbols, at least one symbol block, or a key matrix.