Centralized encryption management system
A centralized management and encryption processing technology, applied in the field of information encryption/decryption systems, can solve many labor and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] One embodiment of the present invention will be described below with reference to the drawings.
[0020] FIG. 1 is a diagram showing an example of the overall configuration of an encrypted centralized management system according to the present embodiment.
[0021] In FIG. 1, 1 is a cryptographic device, which has two ports. Devices such as a network printer 2, a DB server 3, and a network terminal device 4 are connected to one port, and a hub 5 is connected to the other port. The encryption device 1 performs data relay between devices such as a network printer 2 , a DB server 3 , a network terminal device 4 and a hub 5 .
[0022] The network printer 2 is a terminal on which encryption software cannot be physically installed. The DB server 3 is not suitable for a terminal on which redundant encryption software is installed due to issues such as stability of operation. The network terminal device 4 is a terminal that cannot run cryptographic software without an OS (Oper...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


