Technology

Absio offers software libraries that can be embedded in your application, service or website to enable automatic key management and data encryption


Absio technology functions across platforms and devices without requiring connection to a central server, providing strong data security without sacrificing data mobility or availability. Multi-language software development kits (SDKs) enable developers to easily integrate key management and encryption into software without having to add hardware or rely on a third-party service. All key generation and cryptographic processes happen on the device, server or browser running the software. The Absio Broker application can be used with the Absio SDKs to store and sync encrypted keys and data across multiple devices.

Public Key Infrastructure

The Absio libraries can automatically generate and manage keys for digital signing, authentication, data integrity and encryption. If asymmetric cryptography is used, copies of the public keys can automatically be sent to the Absio Broker application for verification and exchange. In addition, encrypted backup copies of private keys can be stored on the Absio Broker application for recovery purposes and/or for syncing between multiple devices.

Key Management

The Absio libraries can automatically generate and manage keys for digital signing, authentication, data integrity and encryption, enabling your application to natively perform key management without needing to call an external service. All keys are generated on the device, server or browser running the application, not by a remote key server.

Cryptography

The Absio libraries handle all cryptographic functions and then provide the appropriate key and/or data object to your application via API methods. The libraries support cross-platform, OS-independent key exchange, encryption and decryption, source and integrity authentication, pseudonymization, secure communications and secure data storage using only FIPS-compliant algorithms. All cryptography is performed at the application level, enabling data security by design and by default.

Flexible Storage Options

Encrypted data and keys can be stored wherever needed to support the security, workflow, performance and availability requirements of your application. If data and keys are stored together to enable offline access, they can be protected by Absio’s patented Obfuscating File System—a randomized directory of individually-encrypted, nonsensically-named objects with no identifying attributes.

Events

The Absio Broker application uses an event-driven architecture to track and distribute key and data events. Developers can use the events to synchronize information and any key and/or data changes between multiple devices. Analytics software can consume these events to archive and evaluate user or system behavior.

Absio Technology Benefits

Comprehensive Data Security

  • Cross-platform, OS-independent libraries

  • Automatic key management, key exchange, encryption, source and integrity authentication and pseudonymization

  • FIPS-compliant cryptography

  • Obfuscated, encrypted data store

Flexible Architecture

  • Flexible key and data storage options

  • Supports offline and limited connectivity environments

  • Associate metadata from existing information systems

  • Selectively utilize only the functionality you need

Easy to Implement

  • Simple API in multiple programming languages

  • No additional hardware required

  • No cryptography expertise needed

  • No need to trust or rely on a third-party service

ABSIO TECHNOLOGY PATENTS

  • Method and Apparatus for Providing Content – 8,751,799

  • Secure Data Storage – 8,627,104

  • Secure Data Storage – 9,104,888