Technology

Absio offers software libraries that can be embedded in your application, service or website to enable automatic key management and data encryption


Absio technology functions across platforms and devices without requiring connection to a central server, providing strong data security without sacrificing data mobility or availability. Multi-language software development kits (SDKs) enable developers to easily integrate automatic key management and data-level encryption into new and existing software applications and services with a few lines of code. No need to separately manage keys and certificates, add hardware, or rely on a third-party service.

Public Key Infrastructure

The Absio libraries automatically generate a unique ID and private/public key pairs for each user (human, device or system). Private keys are automatically stored in an encrypted key file. If data needs to be shared between users, public keys can be sent to the Absio Broker application to enable authentication and key exchange, or managed directly by your application or service.

Key Management

The Absio libraries automatically generate keys for digital signing, authentication, data integrity and data encryption. All keys are generated on the device, server or browser running the application or service using the libraries. Keys can be stored and managed via the default library providers, or directly by your application or service.

Data Encryption

The Absio libraries can consume data from an application, service or webpage, and create an Absio Secure Message or Absio Secure Container. Secure Messages are for small data payloads transmitted between systems. Secure Containers are used for persistent data that may be shared with multiple users. Each Secure Message or Secure Container is encrypted with a unique encryption key. Only authorized users have the ability to decrypt the secret keys needed to view the data content.

Data Integrity Verification

Each Absio Secure Message or Absio Secure Container has a unique set of secret keys. Secure Messages are encrypted and digitally signed with the originator's private keys to provide source and integrity verification. Secure Containers are individually encrypted, and keyed-hash message authentication code is used for data validation. Data integrity is verified prior to decryption, and all encryption keys are signed with the originator's private key to provide source verification.

Flexible Storage Options

Encrypted data objects, data keys, private key files and public keys can be stored wherever needed to support the data security, workflow, performance and availability requirements of your software. If encrypted data objects and keys are stored together, they can be protected by Absio’s patented Obfuscating File System—a randomized directory of individually-encrypted, nonsensically-named objects with no identifying attributes.

Absio Technology Benefits

Comprehensive Data Security

  • Automatic key generation and management
  • Object-level encryption and decryption without calling a central server
  • User-specific data access and permissions
  • Content and metadata integrity and availability everywhere

Flexible Architecture

  • Flexible key and data storage options
  • Associate metadata from existing information systems
  • Can be implemented selectively or incrementally
  • No need to trust or rely on a third-party service

Easy to Implement

  • Simple API
  • No keys to generate or manage
  • No additional hardware required
  • No cryptography expertise needed

Articles and White Papers