Quantum Q-EKM User's Guide Page 89

  • Download
  • Add to my manuals
  • Print
  • Page
    / 93
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 88
Quantum Encryption Key Manager User’s Guide 76
E
EKM
Encryption Key Management. A system whereby encryption
keys are generated, stored, protected, transferred, loaded, and
used.
encryption The conversion of data into a cipher. A key is required to
encrypt and decrypt the data. Encryption provides protection
from persons or software that attempt to access the data without
the key.
I
IP
Internet Protocol. The method or protocol by which data is
transmitted from one computer (or host) to another over the
Internet using a system of addresses and gateways.
J
JCE
Java Cryptography Extension.
JCEKS Java Cryptography Extension Keystore.
K
keystore
A database of private keys and their associated digital
certificate chains used to authenticate the corresponding public
keys.
L
library managed encryption (LME)
A system of encryption whereby the
library manages the interaction with the encryption-capable tape
drive. LME does not require any ISV support and is transparent
to the application. Q-EKM works with library managed
encryption.
P
private key
One key in an asymmetric key pair, typically used for
decryption. Q-EKM uses private keys to unwrap protected AES
data keys prior to decryption.
public key One key in an asymmetric key pair, typically used for
encryption. Q-EKM uses public keys to wrap (protect) AES data
keys prior to storing them on the tape cartridge.
Q
Q-EKM
Quantum Encryption Key Manager. A Java application that
handles encryption key management (EKM) via Quantum’s tape
libraries.
Page view 88
1 2 ... 84 85 86 87 88 89 90 91 92 93

Comments to this Manuals

No comments