1301 W 25 St STE 310, Austin, TX 78705 810 Hester #39 S CROSSING, Round Rock, TX 78681 PO Box 78083, Washington, DC 20013 810 Hesters Xing Rd, Round Rock, TX 78681 5122460686
Benjamin Collins Director, President
APTUS TECHNOLOGIES HOLDINGS, INC
1301 W 25 St STE 310, Austin, TX 78705 810 Hesters Xing Rd, Round Rock, TX 78681
Benjamin T. Collins Principal
Finnigan Films Inc Business Services at Non-Commercial Site
208 Jefferson Ave, Miami, FL 33139
Benjamin T Collins Managing
BKC GROUP LLC
444 W Rivo Alto Dr, Miami Beach, FL 33139 284 Lafayette St #2D, New York, NY 10012
Benjamin Collins President, Director, Mbr
THE PRIMUS GROUP, LLC US Government Agencies Staffing
810 Hesters Xing Rd STE 122, Round Rock, TX 78681 810 Hstrs Xing, Round Rock, TX 78681 N1699 Willow Brk Rd, Lake Geneva, WI 53147 9109646277
Us Patents
Accelerated Encryption And Decryption Of Files With Shared Secret And Method Therefor
- Austin TX, US Vihar R Rai - Cedar Park TX, US Benjamin M Collins - Williamsburg VA, US
International Classification:
H04L 9/08 H04L 29/06 H04L 9/30 H04L 9/06
Abstract:
A non-transitory computer-readable medium for sharing protected content, comprising instruction stored thereon. When executed on a processor, the instruction performs steps of deriving a shared secret, processing the shared secret using a secure hash algorithm 256 cryptographic hash to produce a primary encryption key, and encrypting a secondary encryption key using the primary encryption key. When the shared secret is derived between a private key and a public key of a first user, encrypting the protected content using the secondary encryption key, and transmitting the encrypted protected content to a server to be accessed by the second user. When the shared secret is derived between the private key of the first user and a public key of a second user, transmitting the secondary encryption key to the second user. The second user uses the secondary encryption key to decrypt the encrypted protected content on the server.
Creating And Utilizing Black Keys For The Transport Layer Security (Tls) Handshake Protocol And Method Therefor
A non-transitory computer-readable medium comprising a black zone and a plurality of other electronic components for protecting a data exchange from a malicious attack on the data, that when executed on a processor, perform the steps comprising receiving a client hello message from a client, transmitting a server hello message, receiving a pre-master secret message encrypted with a server public key, storing the pre-master secret, protecting the black zone from malicious attacks on data by isolating hardware of the black zone from the plurality of other electronic components, calculating a master secret in the black zone, storing the master secret as a black key in the black zone, receiving a changed cipher specification and finished message encrypted with a session key, and transmitting a finished message encrypted with a symmetric key. The server hello message comprises a certificate.