Encryption method and device of storage equipment and storage medium
A storage device and encryption method technology, applied in the field of communication, can solve problems such as complex key structure, no encryption, and re-acquisition of data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] Such as figure 1 As shown, the encryption methods of the storage device include:
[0037] Step 101: Obtain the status indication of the NFC storage device;
[0038] Step 102: When the state indication indicates that the NFC storage device is in an encrypted state, based on the decryption information sent by the NFC terminal device, control the NFC storage device to enter the decryption state; wherein the decryption information includes at least the identity of the NFC terminal device;
[0039] Step 103: When the status indication indicates that the NFC storage device is in the decrypted state, control the NFC storage device to enter the encrypted state based on the encrypted information sent by the NFC terminal device; wherein the encrypted information includes at least the identity of the NFC terminal device.
[0040] Here, the subject of execution of steps 101 to 103 may be a processor of the NFC storage device. The NFC storage device can be a USB flash drive with N...
Embodiment 2
[0097] Based on the same inventive concept, an embodiment of the present invention also provides an encryption device for a storage device, which is applied to an NFC storage device. Such as Figure 11 As shown, the encryption device includes: a processor 111 and a memory 112, wherein,
[0098] The processor 111 is used to execute the program stored in the memory 112 to realize the following steps:
[0099] Obtain the status indication of the NFC storage device;
[0100] When the status indication indicates that the NFC storage device is in an encrypted state, based on the decryption information sent by the NFC terminal device, the NFC storage device is controlled to enter the decryption state; wherein the decryption information includes at least the identity of the NFC terminal device;
[0101] When the status indication indicates that the NFC storage device is in a decrypted state, based on the encrypted information sent by the NFC terminal device, the NFC storage device i...
Embodiment 3
[0112] Based on the same inventive concept, an embodiment of the present invention also provides a computer-readable storage medium, such as a memory including a computer program, the above-mentioned computer program can be executed by the processor of the terminal to complete the method in one or more of the foregoing embodiments step.
[0113] Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) having computer-usable program code embodied therein.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


