My Oracle Support Banner

Encrypting and Decrypting Data Queries (Doc ID 2995287.1)

Last updated on JANUARY 09, 2024

Applies to:

Oracle Communications Billing and Revenue Management - Version and later
Information in this document applies to any platform.


Q1: How to encrypt some fields for usage events generated by ECE, so that when they reach BRM event tables are stored as encrypted?

Q2: Clarity on two types of encryption keys, documentation Reference:

Q3: How is the data encrypted? will it be with the key mentioned in or with some other key?

Q4: Will the data be encrypted after decrypting the AES key with hidden key (as the key is encrypted with hidden key) mentioned in file or will it be encrypted with the key mentioned in

Q5: Is the key mentioned in file also encrypted and won’t be of any use if it’s hacked?

Q6: How can we hide the encryption key in file?

Q7: What is the difference between mentioning &ozt and &aes before encrypt key?

Q8: Is there a way to return the encrypted data only instead of decrypted data via search API with some flag option or some other way?

Q9: Is there any way to decrypt the text without an API call?




To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!

In this Document

My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.