摘要 |
A secure end-to-end communication system is implemented via one or more security processing devices. In one embodiment, a method includes: loading, by a key manager, a first set of keys into a security device; encrypting first data with the first set of keys using the security device; and sending, over a network, the encrypted first data to an external site or a mobile device. The method may further include: requesting the encrypted data from the external site or mobile device; receiving, over the network, the encrypted first data; and decrypting the received encrypted first data with the first set of keys using the security device. |
主权项 |
1. A method, comprising:
receiving first data from an internal network of a first data source; loading, by a key manager, a first set of keys into a first security device associated with the first data source; encrypting the first data with the first set of keys using the first security device; receiving, by transport network equipment from the first security device, the encrypted first data; sending, by the transport network equipment, over an external network, the encrypted first data to an external site that stores data received from each of a plurality of data sources; after the sending to the external site, requesting the encrypted first data from the external site; in response to the requesting, receiving, by the transport network equipment, over the external network, the encrypted first data; decrypting, by the first security device using the first set of keys, the received encrypted first data; and providing, from the first security device, the decrypted first data to the internal network. |