作者: Girish Bablani , Scott Colin Cottrille , Dennis Batchelder , Anatoliy Panasyuk
DOI:
关键词: Cloud computing 、 Key escrow 、 Encryption 、 Computer security 、 Computer network 、 Mobile device 、 Network service 、 Service (systems architecture) 、 Computer science 、 Credential 、 Data as a service
摘要: Data protection services for portable, handheld, or mobile device are provided in part by one more cooperating network data service(s), such as a cloud service, that provide volatile encryption/decryption key information to the device(s). Decryption key(s) retrieved on demand application of from service other based an analysis and user credential(s). Retrieval keys can be triggered automatically meeting set pre-conditions application, explicitly implicitly requested input application. Thus, decryption real time, on-demand, defining lifetime prior expiration keys.