检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          2832 results found
          • Managing Encrypted Disks - Dedicated Distributed Storage Service

            Managing Encrypted Disks - Dedicated Distributed Storage Service

            For how to create encrypted disks, see Create a Disk. Detaching Encrypted Disks Before you detach a disk encrypted by a custom key, check whether the custom key is disabled or scheduled for deletion.

            Help > Dedicated Distributed Storage Service > User Guide > Disk Management
          • Encrypted Equality Query - GaussDB

            Encrypted Equality Query - GaussDB

            Encrypted Equality Query GS_CLIENT_GLOBAL_KEYS GS_CLIENT_GLOBAL_KEYS_ARGS GS_COLUMN_KEYS GS_COLUMN_KEYS_ARGS GS_ENCRYPTED_COLUMNS GS_ENCRYPTED_PROC Parent topic: System Catalogs

            Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > System Catalogs and System Views > System Catalogs
          • Encrypted Equality Query - GaussDB

            Encrypted Equality Query - GaussDB

            Encrypted Equality Query GS_CLIENT_GLOBAL_KEYS GS_CLIENT_GLOBAL_KEYS_ARGS GS_COLUMN_KEYS GS_COLUMN_KEYS_ARGS GS_ENCRYPTED_COLUMNS GS_ENCRYPTED_PROC Parent topic: System Catalogs

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > System Catalogs and System Views > System Catalogs
          • Managing Encrypted EVS Disks - Elastic Volume Service

            Managing Encrypted EVS Disks - Elastic Volume Service

            The details are as follows: Encrypt the DK Before being used to encrypt service data, a DK is first encrypted by a CMK. Only encrypted DKs can be stored or transferred.

            Help > Elastic Volume Service > User Guide
          • Encrypted Functions and Operators - GaussDB

            Encrypted Functions and Operators - GaussDB

            However, the local CEK is verified, and the function can be successfully executed only when the encrypted column contains cekoid that exists on the local host. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 -- For example, if the int_type encrypted table exists, int_col2 is the encrypted

            Help > GaussDB > Developer Guide(Centralized_V2.0-3.x) > SQL Reference > Functions and Operators
          • Encrypted Functions and Operators - GaussDB

            Encrypted Functions and Operators - GaussDB

            However, the local CEK is verified, and the function can be successfully executed only when the encrypted column contains a cekoid that exists on the local host. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 -- For example, if the int_type encrypted table exists, int_col2 is the encrypted

            Help > GaussDB > Developer Guide(Distributed_V2.0-3.x) > SQL Reference > Functions and Operators
          • Encrypted Functions and Operators - GaussDB

            Encrypted Functions and Operators - GaussDB

            However, the local CEK is verified, and the function can be successfully executed only when the encrypted column contains a cekoid that exists on the localhost. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 -- For example, if the int_type encrypted table exists, int_col2 is the encrypted

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > SQL Reference > Functions and Operators
          • Encrypted Functions and Operators - GaussDB

            Encrypted Functions and Operators - GaussDB

            However, the local CEK is verified, and the function can be successfully executed only when the encrypted column contains a cekoid that exists on the localhost. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 -- For example, if the int_type encrypted table exists, int_col2 is the encrypted

            Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > SQL Reference > Functions and Operators
          • Setting Encrypted Equality Query - GaussDB

            Setting Encrypted Equality Query - GaussDB

            Setting Encrypted Equality Query Overview Using gsql to Operate an Encrypted Database Using JDBC to Operate an Encrypted Database Using Go Driver to Operate an Encrypted Database Forward Compatibility and Security Enhancement Encrypted Functions and Stored Procedures

            Help > GaussDB > Feature Guide(Centralized_V2.0-8.x)
          • Setting Encrypted Equality Queries - GaussDB

            Setting Encrypted Equality Queries - GaussDB

            Setting Encrypted Equality Queries Overview Using gsql to Operate an Encrypted Database Using JDBC to Operate an Encrypted Database Forward Compatibility and Security Enhancement Encrypted Functions and Stored Procedures

            Help > GaussDB > Feature Guide(Distributed_V2.0-8.x)
          • Enabling or Disabling Encrypted Backup - TaurusDB

            Enabling or Disabling Encrypted Backup - TaurusDB

            This parameter is mandatory when encrypted backup is enabled and is not required when encrypted backup is disabled. Range kms Default Value N/A kms_key_id No String Definition KMS ID.

            Help > TaurusDB > API Reference > APIs (Recommended) > Backup Management
          • Creating and Unmounting an Encrypted File System - Scalable File Service Turbo

            Creating and Unmounting an Encrypted File System - Scalable File Service Turbo

            Creating and Unmounting an Encrypted File System Creating an Encrypted File System To create encrypted SFS Turbo file systems, no authorization is required.

            Help > Scalable File Service Turbo > User Guide > Data Encryption
          • Why Does the Encrypted HLS URL in the Original Streaming URL Remain Unchanged After the Encrypted HLS URL Is Changed? - Video On Demand

            Why Does the Encrypted HLS URL in the Original Streaming URL Remain Unchanged After the Encrypted HLS URL Is Changed? - Video On Demand

            Why Does the Encrypted HLS URL in the Original Streaming URL Remain Unchanged After the Encrypted HLS URL Is Changed? If the URL for obtaining the key is changed, you need to re-encrypt the video. Otherwise, the new encryption key does not take effect. Parent topic: Security

            Help > Video On Demand > FAQs > Security
          • GES Graphs Are Encrypted Using KMS - Config

            GES Graphs Are Encrypted Using KMS - Config

            Rule Logic If a GES graph is not encrypted using KMS, this graph is noncompliant. If a GES graph is encrypted using KMS, this graph is noncompliant. Parent topic: Graph Engine Service

            Help > Config > User Guide > Resource Compliance > Built-In Policies > Graph Engine Service
          • Does OBS Support Encrypted Upload? - Object Storage Service

            Does OBS Support Encrypted Upload? - Object Storage Service

            Does OBS Support Encrypted Upload? OBS provides server-side encryption function. You can encrypt objects while uploading. Data is encrypted on the server and then stored in OBS.

            Help > Object Storage Service > FAQs > Server-Side Encryption
          • Protecting Data in Transit Using Encrypted Transmission - Scalable File Service Turbo

            Protecting Data in Transit Using Encrypted Transmission - Scalable File Service Turbo

            As data needs to be encrypted and decrypted, you may experience a slight decrease in performance when encrypted transmission is used. Configuring Encrypted Transmission and Mounting the File System (Linux) Install stunnel.

            Help > Scalable File Service Turbo > User Guide > Data Encryption
          • Source Encrypted Table Check - Data Replication Service

            Source Encrypted Table Check - Data Replication Service

            Source Encrypted Table Check MySQLor TaurusDB as the Source Table 1 Source encrypted table check Check Item Source encrypted table check Description Check whether there are encrypted tables in the source database.

            Help > Data Replication Service > Troubleshooting > Solutions to Failed Check Items > Database Parameters
          • Checking Whether Encrypted Backup Is Enabled - TaurusDB

            Checking Whether Encrypted Backup Is Enabled - TaurusDB

            Checking Whether Encrypted Backup Is Enabled Function This API is used to check whether encrypted backup is enabled. Before calling this API: Learn how to authorize and authenticate it. Obtain the required region and endpoint.

            Help > TaurusDB > API Reference > APIs (Recommended) > Backup Management
          • Creating an Encrypted Task in the Result - Database Security Service

            Creating an Encrypted Task in the Result - Database Security Service

            The query result is encrypted data, as shown in Figure 5. Figure 5 Encrypted data Parent topic: Sensitive Data Discovery

            Help > Database Security Service > User Guide > Database Security Encryption Management > System administrator operation guide > Sensitive Data Discovery
          • Setting Encrypted Transmission for a General-Purpose Cloud Phone - CloudDevice

            Setting Encrypted Transmission for a General-Purpose Cloud Phone - CloudDevice

            Setting Encrypted Transmission for a General-Purpose Cloud Phone KooPhone allows you to enable encrypted transmission for general-purpose cloud phones. After encrypted transmission is enabled, data exchanged between the cloud phone and the device can be protected.

            Help > CloudDevice > User Guide > Setting Security Control Policies for a General-Purpose Cloud Phone
          Total results: 2832
          • Previous
          • 1
          • 2
          • 3
          • 4
          • 5
          • ...
          • 142
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement