Abstract:
A computer-implemented method for providing secure data management. The method includes obtaining data via a computing device, with the obtained data not being stored on non-volatile memory elements of the computing device. The method additionally includes encrypting the obtained data using a cryptographic key to generate encrypted data. Thereafter, the encrypted data is transmitted, via a communications network, to a server device for storage. The method additionally includes retrieving the encrypted data from the server. The method further includes decrypting the encrypted data to obtain decrypted data.
Abstract:
A computer-implemented method for providing secure data management. The method includes obtaining data via a computing device, with the obtained data not being stored on non-volatile memory elements of the computing device. The method additionally includes encrypting the obtained data using a cryptographic key to generate encrypted data. Thereafter, the encrypted data is transmitted, via a communications network, to a server device for storage. The method additionally includes retrieving the encrypted data from the server. The method further includes decrypting the encrypted data to obtain decrypted data.