About 1,514,657 results (4,660 milliseconds)

How end-to-end encryption in Google Messages provides more ...

https://support.google.com/messages/answer/10262381?hl=en
Google Messages supports end-to-end encryption when messaging other users using Google Messages over Rich Communication Services (R.

Default encryption at rest | Security | Google Cloud

https://cloud.google.com/docs/security/encryption/default-encryption
... term storage use, and AES is often included as part of customer compliance ... Other cryptographic protocols exist in the library and were historically ...

About client-side encryption - Google Workspace Admin Help

https://support.google.com/a/answer/10741897?hl=en
With Google Workspace Client-side encryption (CSE), you can add another layer of encryption to your organization's data—like files and emails ...

US6009177A - Enhanced cryptographic system and method with ...

https://patents.google.com/patent/US6009177A/en
An example of a public encryption key escrow certificate format is shown in FIG. 12. The certificate contains, among other things, the name of the ...

Use customer-managed encryption keys | Cloud Storage | Google ...

https://cloud.google.com/storage/docs/encryption/using-customer-managed-keys
... name() << " was successful, but the encryption is not set." << "This is ... Learn about other encryption options available in Cloud Storage. Rotate ...

What is encryption and how does it work? | Google Cloud

https://cloud.google.com/learn/what-is-encryption
Data encryption is important because it helps protect people's privacy, and secures data from attackers and other cybersecurity threats. Encryption is often ...

US9577993B2 - System and method for authenticating users ...

https://patents.google.com/patent/US9577993B2/en
As another example, users of the members may communicate the group agreed connect name ... name and encryption key/solution. As shown in FIG. 7D , the ...

Customer-managed encryption keys (CMEK) | Cloud KMS | Google ...

https://cloud.google.com/kms/docs/cmek
Keys created using Autokey function identically to other ... CMEK-protected resources have a metadata field that holds the name of the key that encrypts it.

CryptoCrack - Ragbaby

https://sites.google.com/site/cryptocrackprogram/user-guide/cipher-types/other/ragbaby
Other · Bacon · Bifid · Cadenus · Checkerboard · CM ... cipher letter. The numerical key is based on the word number in the plaintext and the position in the word ...

Customer-managed Cloud KMS keys | BigQuery | Google Cloud

https://cloud.google.com/bigquery/docs/customer-managed-encryption
Click the name of the key ring that contains the key. Click the checkbox for the encryption key to which you want to add the role. The Permissions tab opens.

US7668310B2 - Cryptographic computation using masking to ...

https://patents.google.com/patent/US7668310B2/en
Each word automatically includes plurals and close synonyms. Adjacent words ... Grounds Of Opposition, European Patent 1092297 in the name of Cryptography ...

Payment data cryptography for merchants | Google Pay API for ...

https://developers.google.com/pay/api/android/guides/resources/payment-data-cryptography
Card. The following properties make up a payment credential for the CARD payment method: Name, Type ...

EP0739560B1 - Cryptographic system and method with key escrow ...

https://patents.google.com/patent/EP0739560B1/en
An example of a public encryption key escrow certificate format is shown in FIG. 12. The certificate contains, among other things, the name of the ...

US5761311A - Blind encryption - Google Patents

https://patents.google.com/patent/US5761311A/en
Each word automatically includes plurals and close synonyms. Adjacent words that are implicitly ANDed together, such as (safety belt), are treated as a ...

US20120204032A1 - Encryption key exchange system and method ...

https://patents.google.com/patent/US20120204032A1/en
The record includes a field for the SN 22, at least one field for at least one encryption key or digital certificate, and other fields such as name, company ...

US9094378B1 - Homomorphic cryptography on numerical values in ...

https://patents.google.com/patent/US9094378B1/en
For example, if the client replaces each address field with a pseudonym for the street name and optionally, keeps all other records encrypted, the client can ...

Encrypt disks with customer-supplied encryption keys | Compute ...

https://cloud.google.com/compute/docs/disks/customer-supplied-encryption
By adding the --no-require-csek-key-create , both disks are created, one encrypted using the key file, and the other encrypted using Google-owned and managed ...

US20110293096A1 - Multi-Level Key Management - Google Patents

https://patents.google.com/patent/US20110293096A1/en
A cipher is stronger than another cipher if it makes determining ... cryptography service information comprises: a name of a cryptography algorithm; and.

US20020021804A1 - System and method for data encryption ...

https://patents.google.com/patent/US20020021804A1/en
Keywords and boolean syntax (USPTO or EPO format): seat belt searches these two words, or their plurals and close synonyms. "seat belt" searches this exact ...

AEAD encryption functions | BigQuery | Google Cloud

https://cloud.google.com/bigquery/docs/reference/standard-sql/aead_encryption_functions
Keyset protocol buffer message: the JSON keyset should be a JSON object containing objects and name ... another-location/keyRings/my-key-ring/cryptoKeys/my ...