US 12,407,491 B1
Standard encryption using pre- and post-transformations
Atis Straujums, Salaspils parish (LV); Nikita Larka, Rīga (LV); and Māris Valdats, Rīga (LV)
Assigned to Zimperium, Inc., Dallas, TX (US)
Filed by Zimperium, Inc., Dallas, TX (US)
Filed on Dec. 20, 2024, as Appl. No. 18/991,189.
Int. Cl. H04L 29/06 (2006.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01)
CPC H04L 9/0631 (2013.01) [H04L 9/0863 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method comprising:
receiving an input comprising cleartext data;
receiving, via an application program interface (API), a password from a user;
receiving, via the API, from a security service server, a derived key generated using the password;
generating an encryption key using the derived key for at least one of a pre-encryption, a core encryption and a post-encryption;
applying the pre-encryption to the input by performing one or more rounds of data transformations, the pre-encryption transforming the cleartext data into non-cleartext data;
applying the core encryption to the non-cleartext data, the core encryption comprising a standard encryption algorithm that transforms the non-cleartext data into encrypted ciphertext;
applying the post-encryption to the encrypted ciphertext, the post-encryption comprising one or more rounds of additional data transformations; and
generating, at a local client device, an encryption of the input based on an output from the post-encryption.