Tag

key management

0 views collected around this technical thread.

IT Services Circle
IT Services Circle
May 20, 2024 · Backend Development

Why Redis Can Become a Performance Bottleneck and How to Avoid It

The article explains several common reasons why Redis may degrade performance—such as network latency, misuse of high‑complexity commands, the KEYS command, clustered key expirations, and big‑key operations—and provides practical mitigation techniques like batch commands, TTL randomization, and lazy deletion.

BackendOptimizationRedis
0 likes · 8 min read
Why Redis Can Become a Performance Bottleneck and How to Avoid It
Laravel Tech Community
Laravel Tech Community
Jun 18, 2023 · Operations

tssh v0.1.3 Release: Installation and Usage Guide

The article introduces tssh v0.1.3, a SSH client that supports multiple private keys and password‑protected keys, explains how to install it on client machines, configure SSH keys and passwords, and use it to manage and connect to multiple servers efficiently.

Command LineOperationsSSH
0 likes · 6 min read
tssh v0.1.3 Release: Installation and Usage Guide
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 2, 2023 · Mobile Development

Android File‑Based Encryption (FBE) Key Management and Architecture Overview

The article explains Android’s multi‑layered file‑based encryption system, describing how FDE, FBE and metadata encryption work together, and detailing the end‑to‑end key‑management flow that spans the HAL, VOLD, Linux kernel, fscrypt, the Trusted Execution Environment and hardware crypto engines to generate, derive, and program per‑file encryption keys.

AndroidFile-Based EncryptionKernel
0 likes · 21 min read
Android File‑Based Encryption (FBE) Key Management and Architecture Overview
Weimob Technology Center
Weimob Technology Center
May 12, 2022 · Information Security

Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture

This article explains how WKMS addresses rising data‑protection regulations by offering a hierarchical key‑management service, masking SDK, AES‑based encryption, robust disaster‑recovery, and high‑throughput performance testing, illustrating a secure yet scalable solution for modern enterprises.

Cloud Nativedata encryptioninformation security
0 likes · 10 min read
Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 19, 2021 · Information Security

eCryptfs: Architecture, Usage, and Encryption Process

eCryptfs is a Linux kernel‑integrated stacked filesystem that encrypts both file names and contents using per‑file symmetric keys protected by passphrase‑or public‑key‑encrypted key wrappers, managed by a user‑space daemon and kernel keyring, with Ubuntu installation via ecryptfs‑utils, mount commands, and a read/write flow that incurs performance overhead and cache‑based security risks.

Linux kerneleCryptfsencrypted filesystem
0 likes · 6 min read
eCryptfs: Architecture, Usage, and Encryption Process
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 10, 2021 · Information Security

Introduction and Business Practice of Cloud KMS for Data Security at iQIYI

iQIYI’s security team created a Cloud KMS platform that, in line with China’s Data Security Law, provides HSM‑backed key lifecycle management, API‑driven encryption, high‑availability deployment and fine‑grained access control, enabling its membership services to meet compliance, cut development effort by ~80 %, halve operational workload and lower costs, while laying groundwork for future features such as traffic splitting and zero‑intrusion integration.

Business PracticeCloud ComputingCloud KMS
0 likes · 7 min read
Introduction and Business Practice of Cloud KMS for Data Security at iQIYI
Practical DevOps Architecture
Practical DevOps Architecture
May 14, 2021 · Databases

Redis Basic Commands and Key Operations Tutorial

This article provides a concise tutorial on essential Redis commands, covering basic operations, database selection, key management, expiration settings, and practical examples demonstrated through the Redis CLI, including how to list keys with patterns, check existence, and clear databases.

CommandsDatabaseRedis
0 likes · 7 min read
Redis Basic Commands and Key Operations Tutorial
Beike Product & Technology
Beike Product & Technology
Mar 19, 2021 · Information Security

Key Management System (KMS) Overview and Common Cryptographic Security Risks

The article outlines typical cryptographic security risks such as weak algorithms, insufficient key lengths, poor key management, and then introduces a comprehensive Key Management System (KMS) architecture, its core functions, key hierarchy, and practical application scenarios like API signing and data encryption.

API signingKMScryptography
0 likes · 9 min read
Key Management System (KMS) Overview and Common Cryptographic Security Risks
vivo Internet Technology
vivo Internet Technology
Jan 13, 2021 · Information Security

Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios

The article explains RSA key files by detailing the underlying mathematics of prime factorization and modular exponents, introduces a six‑layer abstraction from raw values to application use, demonstrates OpenSSL and keytool commands for generation, conversion, and inspection, and illustrates common deployment scenarios such as HTTPS and MySQL SSL.

ASN.1OpenSSLPKCS
0 likes · 19 min read
Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios
Architect's Tech Stack
Architect's Tech Stack
Nov 13, 2020 · Databases

How to Safely Scan Large Redis Keyspaces with the SCAN Command

This article explains why using the KEYS command on massive Redis datasets can cause service blockage, analyzes the underlying O(n) traversal cost, and demonstrates how the incremental SCAN command with cursor, MATCH, and COUNT options provides a non‑blocking alternative for efficiently iterating keys.

DatabaseRedisSCAN
0 likes · 5 min read
How to Safely Scan Large Redis Keyspaces with the SCAN Command
Architecture Digest
Architecture Digest
Aug 29, 2020 · Databases

Cleaning Up Shared Redis Keys After a Business Line Decommission: Challenges and Solutions

This article describes how a team released resources after shutting down a business line, focusing on the difficulties of deleting Redis keys from a shared cluster, the step‑by‑step approach using code search, Python scripts, SCAN and DEBUG OBJECT commands, and the implementation of a custom key‑prefix serializer to prevent future issues.

Database CleanupOperationsPython
0 likes · 7 min read
Cleaning Up Shared Redis Keys After a Business Line Decommission: Challenges and Solutions
Tencent Cloud Developer
Tencent Cloud Developer
Aug 3, 2020 · Information Security

Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions

The article outlines enterprise data‑security risks and regulatory demands, reviews symmetric, asymmetric and hash techniques, highlights cloud‑encryption and key‑management challenges, and presents Tencent Cloud’s comprehensive solutions—including KMS, BYOK, white‑box keys, virtual HSMs, and integrated database encryption—to protect data throughout its lifecycle.

Cloud ComputingTencent Cloudcompliance
0 likes · 20 min read
Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions
Aikesheng Open Source Community
Aikesheng Open Source Community
Oct 9, 2019 · Databases

Guide to MySQL InnoDB Tablespace Encryption: Overview, Configuration, Key Management, Import/Export, Backup and Restore

This article provides a comprehensive guide to MySQL InnoDB tablespace encryption, covering its architecture, supported plugins, configuration steps, key rotation, limitations, encrypted table operations, import/export procedures, and backup/restore methods using mysqlbackup and innobackupex.

BackupInnoDBMySQL
0 likes · 17 min read
Guide to MySQL InnoDB Tablespace Encryption: Overview, Configuration, Key Management, Import/Export, Backup and Restore
Architects' Tech Alliance
Architects' Tech Alliance
Dec 12, 2018 · Information Security

Understanding Enterprise Self‑Encrypting Drives (SED), Key Management Controllers (KMC) and NetApp Encryption Technologies

This article explains how enterprise self‑encrypting drives (SED) work with FIPS‑compliant key management controllers (KMC), details the encryption and key lifecycle processes, compares SED variants, and introduces NetApp's NSE and NVE storage encryption solutions for secure data protection.

KMCNetAppencryption
0 likes · 13 min read
Understanding Enterprise Self‑Encrypting Drives (SED), Key Management Controllers (KMC) and NetApp Encryption Technologies
360 Tech Engineering
360 Tech Engineering
Nov 8, 2018 · Blockchain

Key Management Standards for Bitcoin Wallets

This article explains the fundamentals of Bitcoin wallet key management, covering the relationships between private keys, public keys, and addresses, the different wallet types, and the essential BIP standards (BIP‑0032, BIP‑0039, BIP‑0043, BIP‑0044) that define deterministic key derivation and mnemonic generation.

BIPBlockchainHD-wallet
0 likes · 14 min read
Key Management Standards for Bitcoin Wallets
JD Tech
JD Tech
Jul 10, 2018 · Big Data

Deploying Hadoop KMS for Transparent HDFS Encryption: A Step‑by‑Step Guide

This article details a complete, hands‑on deployment of Hadoop KMS on a CentOS‑based Hadoop 2.6.1 cluster, covering environment setup, configuration file changes, key generation, service startup, encryption‑zone creation, user permission tuning, verification procedures, and common troubleshooting tips.

HDFSHadoopKMS
0 likes · 19 min read
Deploying Hadoop KMS for Transparent HDFS Encryption: A Step‑by‑Step Guide
Architects' Tech Alliance
Architects' Tech Alliance
Jan 3, 2018 · Information Security

Data Security and Encryption Technologies: Standards, Solutions, and Best Practices

Data breaches have surged, affecting governments, enterprises, and security vendors, prompting the need for robust encryption across storage, application, and gateway layers, with standards such as FIPS 140‑2 and solutions from Vormetric and SafeNet offering transparent, compatible, and managed encryption for on‑premises and cloud environments.

FIPS140-2cloud encryptiondata security
0 likes · 9 min read
Data Security and Encryption Technologies: Standards, Solutions, and Best Practices