US 12,455,973 B1
Systems and methods for secure encryption
Paul Jerome Mathews, Brentwood, TN (US); Oleksandr Rozumii, Venda do Pinheiro (PT); and Gonçalo Alexandre Pinto Tomás, Almada (PT)
Assigned to TripleKey, LLC, Brentwood, TN (US)
Filed by TripleKey, LLC, Brentwood, TN (US)
Filed on Jan. 27, 2025, as Appl. No. 19/038,243.
Int. Cl. G06F 21/60 (2013.01); G06F 21/79 (2013.01); G06F 21/85 (2013.01)
CPC G06F 21/602 (2013.01) [G06F 21/79 (2013.01); G06F 21/85 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving encrypted data at a volatile memory of a first device;
in response to receiving the encrypted data at the volatile memory of the first device:
retrieving an asymmetric cryptographic key at the volatile memory of the first device, and
retrieving a symmetric cryptographic key from a non-volatile memory of a second device to cause the symmetric cryptographic key to be stored in the volatile memory of the first device and not a non-volatile memory of the first device;
decrypting the encrypted data based on the asymmetric cryptographic key and the symmetric cryptographic key to produce unencrypted data, without causing the unencrypted data to be stored in the non-volatile memory of the first device;
receiving a heartbeat signal at the first device and from the second device; and
in response to detecting an absence of the heartbeat signal at the first device, causing at least one of the asymmetric cryptographic key or the symmetric cryptographic key to be removed from the volatile memory of the first device.