[go: up one dir, main page]

Haunts, 2019 - Google Patents

Azure Key Vault Usage Patterns

Haunts, 2019

Document ID
4891180164534478059
Author
Haunts S
Publication year
Publication venue
Applied Cryptography in. NET and Azure Key Vault: A Practical Guide to Encryption in. NET and. NET Core

External Links

Snippet

In the preceding chapters, we built a sophisticated encryption example with the ability to encrypt data with the efficiency of AES, and uses RSA to make it easier to swap encryption keys with other users. We then looked at how to leverage and set up Azure Key Vault, which …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Similar Documents

Publication Publication Date Title
JP7104248B2 (en) An encrypted asset encryption key part that allows the assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
US20200119904A1 (en) Tamper-proof privileged user access system logs
US9031876B2 (en) Managing keys for encrypted shared documents
KR20230157929A (en) Transfer cryptocurrency from a remote access restricted wallet
US10599863B2 (en) Database encryption to provide write protection
JP7235668B2 (en) REGISTRATION METHOD, COMPUTER AND PROGRAM
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
Wüst et al. Zlite: Lightweight clients for shielded zcash transactions using trusted execution
WO2020123926A1 (en) Decentralized computing systems and methods for performing actions using stored private data
US11206131B1 (en) Post quantum unique key per token system
CN105022966A (en) Database data encryption and decryption method and system
US10043015B2 (en) Method and apparatus for applying a customer owned encryption
CN110264193A (en) In conjunction with the receipt storage method and node of user type and type of transaction
US20160092698A1 (en) Tokenization Column Replacement
CN113015991A (en) Secure digital wallet processing system
CN117459230A (en) A key escrow method based on blockchain and key sharing
US11997191B2 (en) System and method for protecting secret data items using multiple tiers of encryption and secure element
US20220191034A1 (en) Technologies for trust protocol with immutable chain storage and invocation tracking
Haunts et al. Azure Key Vault Usage Patterns
Kumar et al. Data security and encryption technique for cloud storage
KR102289478B1 (en) System and method for providing electronic signature service
US11153299B2 (en) Secure data transport using trusted identities
Ajay et al. Access control framework in the cloud based on multi-Blockchain with light privacy protection
Rao et al. Data security in cloud computing
Zhang An overview of advantages and security challenges of cloud computing