US 12,353,576 B2
System and method for securely transferring data using encryption keys
Robert E. Nelson, Franktown, CO (US); and Aron J. Seader, Colorado Springs, CO (US)
Assigned to Eclypses, Inc., Marco Island, FL (US)
Filed by Eclypses, Inc., Marco island, FL (US)
Filed on Jan. 24, 2022, as Appl. No. 17/582,392.
Application 17/582,392 is a continuation in part of application No. 17/193,569, filed on Mar. 5, 2021, granted, now 11,522,707.
Application 17/582,392 is a continuation in part of application No. 17/193,564, filed on Mar. 5, 2021, granted, now 11,720,693.
Prior Publication US 2022/0284113 A1, Sep. 8, 2022
Int. Cl. H04L 29/06 (2006.01); G06F 21/00 (2013.01); G06F 21/14 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); H04L 9/08 (2006.01)
CPC G06F 21/6209 (2013.01) [G06F 21/14 (2013.01); G06F 21/602 (2013.01); H04L 9/0869 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A system, comprising:
a first computing device comprising:
one or more first memory units; and
one or more first processors coupled to the first memory units and configured, upon executing one or more first instructions, to:
obfuscate data for transmittal to a second computing device;
utilize a first pseudo random bit generator to pseudo randomly generate a first encryption key;
store the first encryption key in first transient memory only;
encrypt, using the first encryption key, the obfuscated data for transmittal to the second computing device;
delete or destroy the first encryption key from first transient memory; and
transmit the encrypted data for receipt by the second computing device; and
the second computing device comprising:
one or more second memory units; and
one or more second processors coupled to the second memory units and configured, upon executing one or more second instructions, to:
receive the encrypted data;
utilize a second pseudo random bit generator to pseudo randomly generate, in real time following reception of the encrypted data, a second encryption key that matches the first encryption key;
store the second encryption key in second transient memory only;
decrypt the encrypted data using the second encryption key;
delete or destroy the second encryption key from second transient memory;
un-obfuscate the data; and
transmit the data for use.