Skip to main content

PrivaceraCloud Documentation

View of encryption processes

:

This conceptual graphic with annotation shows the general process of Privacera Encryption. This same process is also illustrated in Encryption architecture and UDF flow.

The Privacera encryption process. An endpoint is called to encrypt raw data, the data is encrypted, and then an endpoint is called to decrypt the encrypted data.

The Privacera encryption process is as follows:

  1. An endpoint is called to encrypt raw data.

    1. The scheme policy protecting access to encryption functions is checked.

    2. The encryption scheme encrypts the data according to its associated format, algorithm, and scope.Encryption formats, algorithms, and scopes

  2. The data is encrypted.

  3. An endpoint is called to decrypt the encrypted data.

    1. The scheme policy protecting access to encryption functions is checked.

    2. The same encryption scheme that encrypted the data is used to decrypt according to the encryption scheme's format, algorithm, and scope.Encryption formats, algorithms, and scopes

    3. The presentation scheme obfuscates the decrypted data for presentation to the user.