Key protection method and device
A technology of key protection and key vault, applied in the field of key protection methods and devices, can solve the problems of stealing user keys, threats to user data and business integrity, and easy leakage of keys, and achieves a solution to reducing security threats. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0179] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the application, not all of them.
[0180] The network architecture and business scenarios described in the embodiments of the present invention are to more clearly illustrate the technical solutions of the embodiments of the present invention, and do not constitute limitations on the technical solutions provided by the embodiments of the present invention. Those of ordinary skill in the art know that With the evolution of the network architecture and the emergence of new service scenarios, the technical solutions provided by the embodiments of the present invention are also applicable to similar technical problems.
[0181] figure 1 It is a schematic diagram of the architecture of a cloud service involv...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com