Data reencryption techniques
A computer-implemented method for reencrypting data. A key management service receives a web service application programming interface or other request to reencrypt data from a first key to a second key, where the first key and the second key are managed by the key management service on behalf of a...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A computer-implemented method for reencrypting data. A key management service receives a web service application programming interface or other request to reencrypt data from a first key to a second key, where the first key and the second key are managed by the key management service on behalf of a user of the service. The key management service response to the request by performing the associated operations and providing a response with the reencrypted data. |
---|