FIELD: data protection.
SUBSTANCE: first request is received via the first network for a hardware security module of a set of hardware security modules controlled by a provider of a computational resource service, the provider of the computational resource service is prescribed, based at least partially on parameters included in the first request, to connect the hardware security module of the set of hardware security modules to the second network, and the second request in the first network is routed to the hardware security module of the second network.
EFFECT: providing the possibility of using the hardware security module as the computational resource service.
20 cl, 8 dwg
Title | Year | Author | Number |
---|---|---|---|
PROVIDING DEVICES AS SERVICE | 2014 |
|
RU2648956C2 |
MULTIFUNCTIONAL IDENTIFICATION OF A VIRTUAL COMPUTING NODE | 2015 |
|
RU2679188C2 |
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC SECURITY AS SERVICE | 2014 |
|
RU2630751C2 |
OBJECTS OF VIRTUAL NETWORK INTERFACE | 2012 |
|
RU2646343C1 |
OBJECTS OF VIRTUAL NETWORK INTERFACE | 2012 |
|
RU2595517C2 |
IMPLEMENTING SECURE INFORMATION EXCHANGE IN RUNTIME SYSTEM | 2012 |
|
RU2584570C2 |
ADVANCE AUTHORIZATION OF DIGITAL REQUESTS | 2016 |
|
RU2713703C2 |
ROBUST AND SECURE HARDWARE-COMPUTER SYSTEM IN CLOUD COMPUTING ENVIRONMENT | 2013 |
|
RU2557476C2 |
TRANSLATING SERVICE BASED ON ELECTRONIC COMMUNITY | 2015 |
|
RU2604984C1 |
MOBILE AUTHENTICATION IN MOBILE VIRTUAL NETWORK | 2015 |
|
RU2707717C2 |
Authors
Dates
2021-12-28—Published
2014-03-12—Filed