检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          2837 results found
          • (Optional) Encrypting a Model - Huawei HiLens

            (Optional) Encrypting a Model - Huawei HiLens

            /crypto_tool encode --model_file plainModelfile --cipher_file cipherModelfile model_file indicates the model file to be encrypted, and cipher_file indicates the encrypted model file.

            Help > Huawei HiLens > Developer Guide > Model Management Module
          • Modifying a VPN Connection - Virtual Private Network

            Modifying a VPN Connection - Virtual Private Network

            Modifying a VPN Connection Scenario A VPN connection is an encrypted communications channel established between a VPN gateway in a VPC and a customer gateway in your on-premises data center. You can modify a VPN connection when required.

            Help > Virtual Private Network > User Guide > S2C Enterprise Edition VPN > Enterprise Edition VPN Connection Management
          • Preparation - FunctionGraph

            Preparation - FunctionGraph

            Preparation Create two OBS buckets to store uploaded and encrypted/decrypted files, respectively. Create an agency to delegate FunctionGraph to access OBS resources.

            Help > FunctionGraph > Best Practices > Data Processing Practices > Using FunctionGraph to Encrypt and Decrypt Files in OBS
          • Does VOD Support the Function of Only Watching Videos on CloudSite But Not Downloading Them? - Video On Demand

            Does VOD Support the Function of Only Watching Videos on CloudSite But Not Downloading Them? - Video On Demand

            Encrypted videos cannot be distributed to others even if malicious users download them. Currently, only FLV and MP4 videos can be uploaded on PCs to CloudSite, and only MP4 videos can be uploaded on mobile devices.

            Help > Video On Demand > FAQs > Security
          • Data Protection - Auto Scaling

            Data Protection - Auto Scaling

            If you use an encrypted ECS to create an AS configuration, the AS configuration is encrypted as the ECS. Common encryption methods include image encryption and EVS disk encryption. For details, see User Encryption. Parent topic: Security

            Help > Auto Scaling > Service Overview > Security
          • How Do I Authorize a Key? - Image Management Service

            How Do I Authorize a Key? - Image Management Service

            Scenarios To share an encrypted image, you need to authorize the key used for encrypting the image. This section describes how to authorize a key. The key can only be a custom key. The default key cannot be authorized. Prerequisites You have confirmed the key to be authorized.

            Help > Image Management Service > FAQs > Accounts and Permissions
          • Security Functions - GaussDB

            Security Functions - GaussDB

            Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using keystr as the encryption password and returns encrypted strings.

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > SQL Reference > Functions and Operators
          • Using HSS to Handle Mining Attacks - Host Security Service

            Using HSS to Handle Mining Attacks - Host Security Service

            Using HSS to Handle Mining Attacks Scenario Mining, also called cryptocurrency mining, is a process of obtaining encrypted currencies through intensive computational operations. The process occupies victims' system and network resources and obtaining digital currency.

            Help > Host Security Service > Best Practices
          • Downloading Secret Backup - Data Encryption Workshop

            Downloading Secret Backup - Data Encryption Workshop

            The backup file is encrypted and encoded and cannot be directly read.

            Help > Data Encryption Workshop > API Reference > APIs > Secret Management APIs > Lifecycle Management
          • Replicating Images Within a Region - Image Management Service

            Replicating Images Within a Region - Image Management Service

            Replicate an encrypted image to an encrypted one. Keys for encrypting the images cannot be changed. If you want to change the key of an encrypted image, you can replicate this image to a new one and encrypt the new image using an encryption key.

            Help > Image Management Service > User Guide > Managing Private Images
          • Encrypting AK/SK for Deploying an APM Agent in a CCE Container - Application Performance Management

            Encrypting AK/SK for Deploying an APM Agent in a CCE Container - Application Performance Management

            Encrypting AK/SK for Deploying an APM Agent in a CCE Container Background When an APM Agent is deployed in a CCE container, the AK/SK must be encrypted for security purposes. Procedure Generate a JAR package that contains the decryption method.

            Help > Application Performance Management > Best Practices(2.0)
          • Uploading an Image File to an OBS Bucket - Cloud Data Center

            Uploading an Image File to an OBS Bucket - Cloud Data Center

            Uploading an Image File to an OBS Bucket Constraints Only an unencrypted image file or an image file encrypted using SSE-KMS can be uploaded to an OBS bucket. When uploading an image file, you must select an OBS bucket with the storage class of Standard.

            Help > Cloud Data Center > User Guide > Servers > Creating a Private Image for iMetal Servers > Scenario 1: No Image File Exported from the Original Server or VM
          • Uploading an Image File to an OBS Bucket - Cloud Data Center

            Uploading an Image File to an OBS Bucket - Cloud Data Center

            Uploading an Image File to an OBS Bucket Constraints Only an unencrypted image file or an image file encrypted using SSE-KMS can be uploaded to an OBS bucket. When uploading an image file, you must select an OBS bucket with the storage class of Standard.

            Help > Cloud Data Center > User Guide > Servers > Creating a Private Image for iMetal Servers > Scenario 2: External Image File Exported from the Original Server or VM
          • Adding a TLS Listener - Elastic Load Balance

            Adding a TLS Listener - Elastic Load Balance

            For more information, see Configuring TLS Security Policies for Encrypted Communication. Idle Timeout (s) Specifies the length of time for a connection to keep alive, in seconds.

            Help > Elastic Load Balance > User Guide > User Guide for Dedicated Load Balancers > Listener > Network Listeners
          • Encrypting Data in ECS - Data Encryption Workshop

            Encrypting Data in ECS - Data Encryption Workshop

            When creating an ECS, if you select an encrypted image, the system disk of the created ECS automatically has encryption enabled, with its encryption mode same as the image encryption mode. When creating an ECS, you can encrypt added data disks.

            Help > Data Encryption Workshop > Best Practices > Key Management Service > Using KMS to Encrypt and Decrypt Data for Cloud Services
          • What Is VPN? - Virtual Private Network

            What Is VPN? - Virtual Private Network

            Overview Virtual Private Network (VPN) establishes secure, reliable, and cost-effective encrypted connections between your on-premises network or data center and a virtual network on the cloud.

            Help > Virtual Private Network > Service Overview
          • Disk Encryption - Dedicated Distributed Storage Service

            Disk Encryption - Dedicated Distributed Storage Service

            Or, your services may be interrupted and data may never be restored as the encrypted disks become inaccessible. Relationships Between Encrypted Disks and Backups The encryption function can be used to encrypt system disks, data disks, and backups.

            Help > Dedicated Distributed Storage Service > Service Overview
          • Configuring Hadoop Data Encryption During Transmission - MapReduce Service

            Configuring Hadoop Data Encryption During Transmission - MapReduce Service

            integrity, and privacy functions are enabled. integrity: indicates that the RPC channels are not encrypted, and only the authentication and integrity functions are enabled. authentication: indicates that the RPC channels are not encrypted, and only the authentication packet is required

            Help > MapReduce Service > User Guide > MRS Cluster O&M > MRS Cluster Security Configuration > MRS Cluster Security Hardening
          • Configuring the TDE Function - Relational Database Service-RDS for MySQL

            Configuring the TDE Function - Relational Database Service-RDS for MySQL

            In the commands, tablename indicates the name of the table to be encrypted or decrypted.

            Help > Relational Database Service-RDS for MySQL > User Guide > Security and Encryption
          • RDS Instances Use KMS Encryption - Config

            RDS Instances Use KMS Encryption - Config

            Data will be encrypted on the server before being stored when you create a DB instance or scale up storage space. This reduces the risk of data leakage. Solution Create a key using the Data Encryption Workshop (DEW).

            Help > Config > User Guide > Resource Compliance > Built-In Policies > Relational Database Service
          Total results: 2837
          • Previous
          • 1
          • ...
          • 8
          • 9
          • 10
          • ...
          • 142
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement