A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by the computer system for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester by the computer system.