Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method and device of storage equipment and storage medium

A storage device and encryption method technology, applied in the field of communication, can solve problems such as complex key structure, no encryption, and re-acquisition of data

Pending Publication Date: 2020-04-17
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above three encryption methods have the following disadvantages: A. False encryption, without real encryption, you can read the files on the original U disk through a password cracking tool or install the flash on other PCB boards, and the security is poor
The disadvantage is that the password must be kept in mind at all times, because once the password is forgotten, the data cannot be retrieved through other methods, and the key structure is complicated, large in size and high in cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device of storage equipment and storage medium
  • Encryption method and device of storage equipment and storage medium
  • Encryption method and device of storage equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Such as figure 1 As shown, the encryption methods of the storage device include:

[0037] Step 101: Obtain the status indication of the NFC storage device;

[0038] Step 102: When the state indication indicates that the NFC storage device is in an encrypted state, based on the decryption information sent by the NFC terminal device, control the NFC storage device to enter the decryption state; wherein the decryption information includes at least the identity of the NFC terminal device;

[0039] Step 103: When the status indication indicates that the NFC storage device is in the decrypted state, control the NFC storage device to enter the encrypted state based on the encrypted information sent by the NFC terminal device; wherein the encrypted information includes at least the identity of the NFC terminal device.

[0040] Here, the subject of execution of steps 101 to 103 may be a processor of the NFC storage device. The NFC storage device can be a USB flash drive with N...

Embodiment 2

[0097] Based on the same inventive concept, an embodiment of the present invention also provides an encryption device for a storage device, which is applied to an NFC storage device. Such as Figure 11 As shown, the encryption device includes: a processor 111 and a memory 112, wherein,

[0098] The processor 111 is used to execute the program stored in the memory 112 to realize the following steps:

[0099] Obtain the status indication of the NFC storage device;

[0100] When the status indication indicates that the NFC storage device is in an encrypted state, based on the decryption information sent by the NFC terminal device, the NFC storage device is controlled to enter the decryption state; wherein the decryption information includes at least the identity of the NFC terminal device;

[0101] When the status indication indicates that the NFC storage device is in a decrypted state, based on the encrypted information sent by the NFC terminal device, the NFC storage device i...

Embodiment 3

[0112] Based on the same inventive concept, an embodiment of the present invention also provides a computer-readable storage medium, such as a memory including a computer program, the above-mentioned computer program can be executed by the processor of the terminal to complete the method in one or more of the foregoing embodiments step.

[0113] Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) having computer-usable program code embodied therein.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an encryption method of storage equipment, which is applied to near field communication (NFC) storage equipment, and comprises the following steps of: obtaining a state indication of the NFC storage equipment; when the state indication represents that the NFC storage device is in an encrypted state, controlling the NFC storage device to enter a decrypted state based on decryption information sent by the NFC terminal device, wherein the decryption information at least comprises an identity label of the NFC terminal equipment; when the state indication represents that the NFC storage device is in the decrypted state, controlling the NFC storage device to enter the encrypted state based on the encrypted information sent by the NFC terminal device, wherein the encrypted information at least comprises an identity label of the NFC terminal equipment. The embodiment of the invention further discloses an encryption device of the storage equipment and astorage medium.

Description

technical field [0001] The present invention relates to communication technology, in particular to an encryption method, device and storage medium of a storage device. Background technique [0002] An encrypted USB flash drive refers to a USB flash drive that encrypts and decrypts the contents of the USB flash drive. At present, there are three main encryption methods for encrypted U disks on the market: A. False encryption, which only hides files, sets a password, only verifies identity, and does not change the actual storage content. B. Soft encryption, built-in or attached software, encrypts data, generally uses AES (Advanced Encryption Standard, Chinese name Advanced Encryption Standard) encryption algorithm, and can also be divided into encryption area and non-encryption area. C. Hardware encryption, built-in hardware encryption, transparent encryption, complete encryption invisibly, verify when reading, some have some special functions, such as applying encryption to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/78
CPCG06F21/602G06F21/78G06F21/60G11C7/10
Inventor 刘维维胡伟
Owner ZTE CORP