Absio’s software-defined, Serverless Encryption™ technology is an easy-to-implement, flexible encryption solution that protects any form of data throughout its life cycle—from creation to deletion, everywhere it exists—without requiring organizations to manage keys and certificates, add hardware, decrease application performance or rely on a third-party service.

Absio technology enables software-defined, serverless, data encryption that functions across platforms and devices without requiring connection to a central server. Developers implement Absio technology through multi-language software development kits. No cryptography experience is necessary. A simple API enables developers to integrate the following features into new and legacy software applications with a few lines of code.



Automatic Public Key Infrastructure

Absio technology automatically generates a unique ID and private/public key pairs for signing and derivation for each system user. Private keys are stored in an encrypted key file, and public keys are sent to the zero-knowledge Absio Sharing Application for authentication and exchange.

Key Generation and Management

Absio technology generates a unique set of encryption keys for each data object to ensure confidentiality and content validation. These data keys are then uniquely encrypted for each user who has been given access to the data, and signed with the creator’s private keys to mitigate man-in-the-middle attacks. All keys are generated on the device running the application, not by a central key server.



Encryption and Decryption

Absio’s Serverless Encryption™ technology automatically encrypts any type of data generated or processed by an application prior to being stored or transmitted, without calling a central key server. Encrypted data objects and keys can be stored locally in an obfuscating file system, reducing network latency impacts and enabling local content to be encrypted and decrypted while offline.

Metadata Association

Absio technology can associate metadata from any source to content, enabling software applications to consume and execute on the metadata anywhere the data exists, even in an offline environment. The metadata can either be encrypted and bound to the data, or stored in a database for rapid identification and processing without providing access to sensitive content.



Backup, Synchronization and Sharing

The Absio Sharing Application can be used for encrypted key and data backup, synchronization and exchange. The encrypted data is transmitted via an encrypted TLS connection using one-time-use, signed, time-sensitive session tokens to prevent replay attacks.

Absio Technology Benefits


Comprehensive data security

  • — Automatic public key infrastructure with zero-knowledge server application
  • — Object-level encryption and decryption without calling a central server
  • — Encrypted transmission with one-time-use session tokens
  • — User-specific data access and permissions

Flexible architecture

  • — Can be configured as needed based on application requirements
  • — Associate metadata from existing information systems
  • — No need to trust or rely on a third-party service
  • — Can be implemented selectively or incrementally over time

Easy to implement

  • — Simple API
  • — No keys to generate or manage
  • — No additional hardware required
  • — No cryptography expertise needed