CN104615941A - Fast encryption method and device for Android user partition and terminal equipment - Google Patents

Fast encryption method and device for Android user partition and terminal equipment Download PDF

Info

Publication number
CN104615941A
CN104615941A CN201510047613.5A CN201510047613A CN104615941A CN 104615941 A CN104615941 A CN 104615941A CN 201510047613 A CN201510047613 A CN 201510047613A CN 104615941 A CN104615941 A CN 104615941A
Authority
CN
China
Prior art keywords
block
user partition
bitmap
data
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510047613.5A
Other languages
Chinese (zh)
Inventor
姚冬冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201510047613.5A priority Critical patent/CN104615941A/en
Publication of CN104615941A publication Critical patent/CN104615941A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a fast encryption method and device for an Android user partition and terminal equipment. The method comprises the steps that an encryption layer of the user partition of the Android terminal equipment is set up; a data distribution bitmap with a Block as a unit is set up for the user partition according to a file system in an inner core of the Android terminal equipment, wherein the data distribution bitmap is used for showing the use state of the Blocks in the user partition; the original data of the used Blocks in the user partition are read according to the data distribution bitmap; the original data of the Blocks are encrypted; the encrypted data of the Blocks are written back to the user partition, and cover the original data of the Blocks. According to the fast encryption method and device for the Android user partition and the terminal equipment, the user partition of the Android terminal equipment is encrypted through information, recorded by the file system of the Android terminal equipment, of the used data blocks, invalid data are prevented from being encrypted when the user data are encrypted, and therefore the effect of shortening the time spent in encrypting the partition is achieved.

Description

The fast encrypt method of Android user partition, device and terminal device
Technical field
The embodiment of the present invention relates to the communications field, and more specifically, relates to the fast encrypt method of Android user partition, device and terminal device.
Background technology
Along with the function of smart mobile phone gets more and more, the content that user stores on mobile phone also becomes more and more abundanter, comprises the personal information such as various photo, chat record.Once mobile phone is lost accidentally, so these privacy informations all directly can fall into other people hand, very dangerous, and therefore, providing a kind of provides the safety approach of protection to become particularly important to the personal data on mobile phone.
Existing Android (Android) terminal device, mostly data storage partition is the ext4 file system based on Linux, and it is a kind of Journaling File System for block device exploitation, and itself does not provide the function of encryption.But linux kernel itself additionally provides the encryption layer function (dm-crypto) for block device, and it is the encryption layer that one deck is positioned on block device.Therefore, existing android system, provides based on dm-crypto and the file system encryption framework for block device file system (relative to YAFFS), whole user data subregion all can be carried out data encryption.
But because this encipherment scheme utilizes the encryption layer that block device layer builds to complete encryption, so during encryption None-identified whether go out equipment stores data effective, must be encrypted whole subregion, cause the process of whole encryption longer (about 1 hour).
Summary of the invention
The embodiment of the present invention provides a kind of fast encrypt method of Android user partition, device and terminal device, can improve the enciphering rate to Android user partition.
First aspect, provide a kind of fast encrypt method of Android user partition, the method comprises: the encryption layer creating the user partition of android terminal device; Be that the Data distribution8 bitmap that is unit with block Block is set up in this user partition according to the ext4 file system in the kernel of this android terminal device, wherein, this Data distribution8 bitmap is for representing the using state of Block in this user partition; The raw data of the Block used in this user partition is read according to this Data distribution8 bitmap; The raw data of this Block is encrypted; Data after being encrypted by this Block write back in this user partition, cover the raw data of this Block.
In conjunction with first aspect, in the implementation that the first is possible, be that described user partition sets up according to the file system in the kernel of described android terminal device be that the Data distribution8 bitmap of unit is implemented as with Block: according to the size of the core buffer of described android terminal device, from the using state of Block reading described user partition according to the ext4 file system circulation the kernel of described android terminal device, setting up for described user partition with Block is the Data distribution8 bitmap of unit.
In conjunction with the first possible implementation of first aspect or first aspect, in the implementation that the second is possible, according to the file system in the kernel of described android terminal device for the foundation of described user partition is implemented as with the Data distribution8 bitmap that block Block is unit: distribute and the bitmap of user partition described in initialization, wherein, bitmap array in the bitmap of described user partition and the Block one_to_one corresponding of described user partition, a described bitmap array is for representing the using state coupling of a Block; According to the Superblock information in the ext4 file system in the kernel of described android terminal device, obtain the use information of the Block of each correspondence in described user partition; The use information of the Block of correspondence each in described user partition is recorded in bitmap array corresponding to the bitmap of described user partition.
Second aspect, provide a kind of fast encrypt device of Android user partition, this device comprises: encryption layer generation unit, for creating the encryption layer of the user partition of android terminal device; Data distribution8 bitmap generation unit, for being that the Data distribution8 bitmap that is unit with block Block is set up in this user partition according to the ext4 file system in the kernel of this android terminal device, wherein, this Data distribution8 bitmap is for representing the using state of Block in this user partition; Ciphering unit, for reading the raw data of the Block used in this user partition according to this Data distribution8 bitmap, and be encrypted the raw data of this Block, then the data after being encrypted by this Block write back in this user partition, cover the raw data of this Block.
In conjunction with second aspect, in the implementation that the first is possible, this Data distribution8 bitmap generation unit specifically comprises: initialization subelement, for distributing and the bitmap of this user partition of initialization, wherein, bitmap array in the bitmap of this user partition and the block one_to_one corresponding of this user partition, this bitmap array is for representing the using state coupling of a block; Block message obtains subelement, for according to the superblock superblock information in the ext4 file system in the kernel of this android terminal equipment, obtains the use information of the block of each correspondence in this user partition; Block message write subelement, is recorded in bitmap array corresponding to the bitmap of this user partition for the use information of the block by correspondence each in this user partition.
The third aspect, provides a kind of android terminal device, and this terminal device comprises the device in the first possible implementation of second aspect or second aspect.
Based on above technical scheme, the fast encrypt method of the embodiment of the present invention, device and terminal device, be encrypted by utilizing the user partition of information to android terminal device of the data block used of the file system record of android terminal device, avoid also being encrypted invalid data when ciphering user data, thus reach the effect shortening subregion encryption times.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is an embodiment schematic diagram of the system architecture of terminal device in the embodiment of the present invention.
Fig. 2 is the fast encrypt method flow diagram of embodiment of the present invention Android user partition.
Fig. 3 is the particular flow sheet that the embodiment of the present invention is encrypted Android user partition.
Fig. 4 is the relation schematic diagram of embodiment of the present invention fast encrypt bitmap, superblock and block.
Fig. 5 is the particular flow sheet that the embodiment of the present invention creates fast encrypt figure.
Fig. 6 is the structural representation of embodiment of the present invention fast encrypt device.
Fig. 7 is another structural representation of embodiment of the present invention fast encrypt device.
Fig. 8 is the structural representation of embodiment of the present invention terminal device.
Fig. 9 is another structural representation of embodiment of the present invention terminal device.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Terminal (Terminal), subscriber equipment (User Equipment can be referred to as, be called for short " UE "), user etc., can through wireless access network (such as, Radio Access Network, be called for short " RAN ") communicate with one or more core net, it can be mobile terminal, as mobile phone (or being called " honeycomb " phone) and the computing machine with mobile terminal, such as, can be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device, they and wireless access network exchange language and/or data.
Superblock (Superblock), be positioned at the beginning part of fdisk, comprise the overall information of file system, the filesystem informations (its accurate information dependent file system) such as such as file system type, mount point, block size (Block size).According to Superblock, the use information of Block in fdisk can be determined.
Forth generation expansion Journal File System (The fourth extended file system, Ext4) being a kind of expansion Journal File System for ext3 system, is be the 4th edition of original extended file system (ext or extfs) of Linux exploitation specially.The file system that Android operation system adopts is ext4 file system.
A kind of structural representation of terminal device in Fig. 1 embodiment of the present invention.The recognition methods of the application scenarios that the embodiment of the present invention provides is introduced for Fig. 1, or the logical organization of the computing node of power consumption management method application.This computing node can be terminal device, and this terminal device is specifically as follows a smart mobile phone.As shown in Figure 1, the hardware layer of this terminal device comprises central processing unit (Center Processing Unit, CPU), graphic process unit (Graphic Processing Unit, GPU) etc., certainly storer can also be comprised, input-output apparatus, internal memory, Memory Controller Hub, network interface etc., input equipment can comprise keyboard, mouse, touch-screen etc., output device can comprise display device as liquid crystal display (Liquid CrystalDisplay, LCD), cathode-ray tube (CRT) (Cathode Ray Tube, CRT, ) holographic imaging (Holographic), projection (Projector) etc.Operating system (as Android, Firefox OS etc.) and some application programs can have been run on hardware layer.
Fig. 1 is for android system, introduce the software system architecture of terminal device, wherein, core library is the core of operating system, comprise appearance management device, media framework, relational database, 2G graphics engine storehouse, Web browser engine, kernel library and virtual machine (such as Dalvik Virtual Machine) etc., wherein, the identification of the application scenarios described by the embodiment of the present invention and the determination of power consumption control strategy can be implemented at virtual machine place (such as Dalvik Virtual Machine), the i.e. application program of virtual machine by compiling analysing terminal equipment is running, obtain the characteristic of described application program, according to the characteristic of described application program, the application scenarios information corresponding with the characteristic of described application program is determined from scene characteristic data centralization, described scene characteristic data set comprises the corresponding relation of the characteristic of plurality of application scenes information and multiple application program, application scenarios information corresponding to the characteristic of wherein said and described application program is for representing that described terminal device is current by the application scenarios used, according to described application scenarios information, concentrate from control strategy and determine the power consumption control strategy corresponding with described application scenarios information, described control strategy collection comprises the corresponding relation of described plurality of application scenes information and multiple power consumption control strategy, and the power consumption control instruction corresponding according to the power consumption control strategy generating that described and described application scenarios information is corresponding, power consumption control instruction is passed to kernel (linux kernel namely in Fig. 1), by interior corresponding hardware (the such as CPU checking terminal device, GPU or display device etc.) implement power consumption control.
In addition, this terminal device also comprises driving layer, ccf layer and application layer.Drive layer can comprise CPU driving, GPU driving, display controller driving etc.Ccf layer can comprise browser engine, typesetting engine, document parser etc.; Application layer can comprise the multiple application programs such as main interface (home), media player (MediaPlayer), browser (Browser).
Fig. 2 is the fast encrypt method flow diagram of embodiment of the present invention Android user partition.The method of Fig. 2 is performed by encryption device.The method of the embodiment of the present invention, can be applicable in terminal device as shown in Figure 1.As shown in Figure 2, the method can comprise:
201, create the encryption layer of the user partition of android terminal equipment.
Should be understood that the framework due to android system employing Linux, therefore, the user partition of android terminal device, is often presented as block device in android terminal device.
I/O equipment is roughly divided into two classes: block device and character device.Information is stored in the block of fixed size by block device, each piece of address having oneself.The size of data block is usually between 512 bytes to 32768 bytes.The essential characteristic of block device is each piece and can reads and writes independent of other block.Disk is modal block device.In (SuSE) Linux OS, block device only supports the access mode in units of block, as disk etc.
202, be that the Data distribution8 bitmap being unit with block Block is set up in this user partition according to the file system in the kernel of this android terminal equipment.
Wherein, this Data distribution8 bitmap is for representing the using state of Block in this user partition.
Particularly, after encryption layer creates, can according to the size of the core buffer of this android terminal device, from the using state of Block reading this user partition according to the ext4 file system circulation the kernel of this android terminal device, setting up for this user partition with Block is the Data distribution8 bitmap of unit.
203, the raw data of the block used in this user partition is read according to this Data distribution8 bitmap.
204, the raw data of this block is encrypted.
205, the data after this block encryption are write back in this user partition, covers the raw data of this block.
In the embodiment of the present invention, the user partition of information to android terminal device of the data block used of the file system record of android terminal device is utilized to be encrypted, avoid also being encrypted invalid data when ciphering user data, thus reach the effect shortening subregion encryption times.
Alternatively, step 202 is implemented as: distribute and the bitmap of this user partition of initialization, wherein, the bitmap array in the bitmap of this user partition and the Block one_to_one corresponding of this user partition, this bitmap array is for representing the using state coupling of a Block; According to superblock (Superblock) information in the ext4 file system in the kernel of this android terminal device, obtain the use information of the Block of each correspondence in this user partition; The use information of the Block of correspondence each in this user partition is recorded in bitmap array corresponding to the bitmap of this user partition.By Superblock information, android terminal device can the use information of Block in Obtaining Accurate user partition, thus can carry out data encryption for the Block used, and improves encryption efficiency.
Below, will in conjunction with specific embodiments, the method for the embodiment of the present invention is further described.
Fig. 3 is the particular flow sheet that embodiment of the present invention android terminal device is encrypted Android user partition.
301, create the encryption layer of user partition.
Similarly to the prior art, first, android terminal device creates the encryption layer of user partition.
302, obtain the data layout of user partition.
Particularly, android terminal device obtains the Data distribution8 on block device by the ext4 file system in access kernel, thus builds a fast encrypt bitmap for the Block of user partition.
When creating fast encrypt bitmap, information can be used by the Block of the large and small cycles write user partition of core buffer.The number of times of circulation can equal partition size/buffer size.If the value calculated is not integer, then get the number of times of the smallest positive integral larger than this value as circulation.
The data layout obtaining user partition creates the detailed process of fast encrypt bitmap, can with reference to the method for figure 4.
303, read the raw data of a unencrypted block.
After generation fast encrypt bitmap, android terminal device according to fast encrypt bitmap, can read the unencryption block that store valid data, obtains the raw data of this block.
304, by encryption layer by data encryption.
Android terminal device can with reference to prior art by the method that encryption layer is encrypted, and the embodiment of the present invention does not repeat them here.
305, enciphered data is write back user partition, covers raw data.
306, judge whether unencrypted usage data in addition.
After enciphered data is write back user partition by android terminal device, according to fast encrypt bitmap, unencrypted usage data in addition can be judged whether.If so, then step 303 is performed; Otherwise encryption terminates.
Fig. 4 is the relation schematic diagram of embodiment of the present invention fast encrypt bitmap, superblock and block.As shown in Figure 4, N+1 block is comprised in user partition (block device), in the Ext4 file system of core library, have N+1 corresponding superblock, then comprise N+1 bitmap array in fast encrypt bitmap, each bitmap array is for representing the using state of a data block.
Fig. 5 is the particular flow sheet that the embodiment of the present invention creates fast encrypt figure.Below, by composition graphs 4, the visioning procedure of fast encrypt figure is described.
501, distribute an initialization bitmap mated with block number on user partition.
Android terminal device can distribute an initialization bitmap, and the figure place of this bitmap equals the number of block on user partition (Block).For Fig. 4, the bitmap of a N+1 position is distributed in the user partition (block device) that can be Fig. 4, and initialization.
502, the superblock of the ext4 file system of inquiry kernel, obtains the use information of corresponding block according to superblock.
For Fig. 4, android terminal device can according to the information of superblock 0, and obtain the use information of block 0, wherein, block 0 is the block of superblock 0 correspondence.According to superblock 0, android terminal device can determine that block 0 is used.
503, the use information of block is saved in bitmap array corresponding to bitmap block.
Represent that block is used with " 1 ", " 0 " represents that block is not used, then the using state of block 0 " 1 " can be recorded in the 0th bitmap array of fast encrypt bitmap by android terminal device.
504, judge whether all superblocks having traveled through ext4 file system.
If do not traveled through, then perform step 502; Otherwise, terminate.
Travel through all Superblock successively, also just obtain the service condition of each Block successively, for service condition bitmap in fast encrypt storehouse and the actual service condition of user partition, to set up man-to-man reality corresponding.
So far, fast encrypt bitmap creates complete.
As can be seen from Fig. 4, embodiment illustrated in fig. 5, by setting up the fast encrypt storehouse of user partition, and be encrypted using Block according to fast encrypt storehouse, avoid also being encrypted invalid data when ciphering user data, thus reach the effect shortening subregion encryption times.
Fig. 6 is the structural representation of embodiment of the present invention fast encrypt device 600.In the embodiment of the present invention, fast encrypt device 600 is applicable to android terminal device.As shown in Figure 6, fast encrypt device 600 can comprise: encryption layer generation unit 610, Data distribution8 bitmap generation unit 620 and ciphering unit 630.Wherein,
Encryption layer generation unit 610, for creating the encryption layer of the user partition of android terminal device.
Data distribution8 bitmap generation unit 620, for being that the Data distribution8 bitmap that is unit with block Block is set up in this user partition according to the file system in the kernel of this android terminal device, wherein, this Data distribution8 bitmap is for representing the using state of Block in this user partition.
Should be understood that in existing Android operation system, its file system is ext4 system.Certainly, the possibility adopting other file system in Android operation system version afterwards is not got rid of yet.
Ciphering unit 630, for reading the raw data of the Block used in this user partition according to this Data distribution8 bitmap, and be encrypted the raw data of this Block, then the data after being encrypted by this Block write back in this user partition, cover the raw data of this Block.
In the embodiment of the present invention, fast encrypt device 600 utilizes the user partition of information to android terminal device of the data block used of the file system record of android terminal device to be encrypted, avoid also being encrypted invalid data when ciphering user data, thus reach the effect shortening subregion encryption times.
Should be understood that in concrete application, the functional realiey of fast encrypt device 600 may have different functions to divide.Such as, the function of encryption layer generation unit 610 is realized by block device, and the function of Data distribution8 bitmap generation unit 620 is realized by fast encrypt storehouse, and the function of ciphering unit is also realized by the encryption layer set up by block device, etc.
Alternatively, Data distribution8 bitmap generation unit 620 specifically for: according to the size of the core buffer of this android terminal device, from the using state of Block reading this user partition according to the ext4 file system circulation the kernel of this android terminal device, setting up for this user partition with Block is the Data distribution8 bitmap of unit.
Fig. 7 is another structural representation of embodiment of the present invention fast encrypt device 600.Alternatively, as an embodiment, as shown in Figure 7, Data distribution8 bitmap generation unit 620 specifically can comprise: initialization subelement 621, block message obtain subelement 622 and block message write subelement 623.Wherein,
Initialization subelement 621, for distributing and the bitmap of this user partition of initialization, wherein, the bitmap array in the bitmap of this user partition and the Block one_to_one corresponding of this user partition, this bitmap array is for representing the using state coupling of a Block;
Block message obtains subelement 622, for according to the Superblock information in the ext4 file system in the kernel of this android terminal device, obtains the use information of the Block of each correspondence in this user partition;
Block message write subelement, is recorded in bitmap array corresponding to the bitmap of this user partition for the use information of the Block by correspondence each in this user partition.
In addition, fast encrypt device 600 also can perform the method for Fig. 2, and realizes encryption device or android terminal device in Fig. 3, function embodiment illustrated in fig. 5, and the embodiment of the present invention does not repeat them here.
Fig. 8 is the structural representation of embodiment of the present invention terminal device 800.Terminal device 800 is android terminal device, comprises the fast encrypt device 600 in embodiment as shown in Figure 6,7.
Should understand, terminal device 800 can be mobile terminal, as mobile phone (or being called " honeycomb " phone) and the computing machine with mobile terminal, such as, can be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device, they and wireless access network exchange language and/or data.
Fig. 9 is the structural representation of embodiment of the present invention terminal device 900.This terminal device 900 comprises: at least one processor 901, at least one network interface 904 or other user interfaces 903, storer 905, at least one communication bus 902.Communication bus 902 is for realizing the connection communication between these assemblies.This terminal device 900 optionally comprises user interface 903, comprise display (such as, touch-screen, LCD, CRT, holographic imaging (Holographic) or projection (Projector) etc.), keyboard or pointing device are (such as, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc.).In the embodiment of the present invention, terminal device 900 is android terminal device.
Storer 905 can comprise ROM (read-only memory) and random access memory, and provides instruction and data to processor 901.A part for storer 905 can also comprise nonvolatile RAM (NVRAM).
In some embodiments, storer 905 stores following element, executable module or data structure, or their subset, or their superset:
Operating system 9051, comprises various system program, and such as, ccf layer shown in Fig. 1, core library layer, driving layer etc., for realizing various basic business and processing hardware based task;
Application program module 9052, comprises various application program, and such as, desktop (launcher) shown in Fig. 1, media player (Media Player), browser (Browser) etc., for realizing various applied business.
In embodiments of the present invention, by call storer 905 store program or instruction, processor 901 for:
Create the encryption layer of the user partition of terminal device 900;
Be that this user partition sets up according to the file system in the kernel of this terminal device 900 take Block as the Data distribution8 bitmap of unit, wherein, this Data distribution8 bitmap is for representing the using state of Block in this user partition;
The raw data of the Block used in this user partition is read according to this Data distribution8 bitmap;
The raw data of this Block is encrypted;
Data after being encrypted by this Block write back in this user partition, cover the raw data of this Block.
Alternatively, for being that this user partition is set up in the process of the Data distribution8 bitmap taking Block as unit according to the file system in the kernel of this terminal device 900, processor 901 specifically for:
Distribute and the bitmap of this user partition of initialization, wherein, the bitmap array in the bitmap of this user partition and the Block one_to_one corresponding of this user partition, this bitmap array is for representing the using state coupling of a Block;
According to the superblock Superblock information in the ext4 file system in the kernel of this terminal device 900, obtain the use information of the Block of each correspondence in this user partition;
The use information of the Block of correspondence each in this user partition is recorded in bitmap array corresponding to the bitmap of this user partition.
Should understand, terminal device 900 can be mobile terminal, as mobile phone (or being called " honeycomb " phone) and the computing machine with mobile terminal, such as, can be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device, they and wireless access network exchange language and/or data.
In addition, terminal device 900 also can perform method and the embodiment of Fig. 2, Fig. 3, Fig. 5, and the embodiment of the present invention does not repeat them here.
Visible, after adopting such scheme, be encrypted by utilizing the user partition of information to android terminal device of the data block used of the file system record of android terminal device, avoid also being encrypted invalid data when ciphering user data, thus reach the effect shortening subregion encryption times.
Those of ordinary skill in the art can recognize, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with the combination of electronic hardware or computer software and electronic hardware.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the system of foregoing description, device and unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
In several embodiments that the application provides, should be understood that disclosed system, apparatus and method can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.
If described function using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part of the part that technical scheme of the present invention contributes to prior art in essence in other words or this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.

Claims (8)

1. a fast encrypt method for Android user partition, is characterized in that, comprising:
Create the encryption layer of the user partition of Android android terminal device;
Be that the Data distribution8 bitmap that is unit with block Block is set up in described user partition according to the file system in the kernel of described android terminal device, wherein, described Data distribution8 bitmap is for representing the using state of Block in described user partition;
The raw data of the Block used in described user partition is read according to described Data distribution8 bitmap;
The raw data of described Block is encrypted;
Data after described Block encryption are write back in described user partition, covers the raw data of described Block.
2. the method for claim 1, is characterized in that, described is that the foundation of described user partition comprises with the Data distribution8 bitmap that block Block is unit according to the file system in the kernel of described android terminal device:
According to the size of the core buffer of described android terminal device, from the using state of Block reading described user partition according to the ext4 file system circulation the kernel of described android terminal device, setting up for described user partition with Block is the Data distribution8 bitmap of unit.
3. method as claimed in claim 1 or 2, is characterized in that, described is that the foundation of described user partition comprises with the Data distribution8 bitmap that block Block is unit according to the file system in the kernel of described android terminal device:
Distribute and the bitmap of user partition described in initialization, wherein, the bitmap array in the bitmap of described user partition and the Block one_to_one corresponding of described user partition, a described bitmap array is for representing the using state coupling of a Block;
According to the superblock Superblock information in the ext4 file system in the kernel of described android terminal device, obtain the use information of the Block of each correspondence in described user partition;
The use information of the Block of correspondence each in described user partition is recorded in bitmap array corresponding to the bitmap of described user partition.
4. a fast encrypt device for Android user partition, is characterized in that, comprising:
Encryption layer generation unit, for creating the encryption layer of the user partition of Android android terminal device;
Data distribution8 bitmap generation unit, for being that the Data distribution8 bitmap that is unit with block Block is set up in described user partition according to the file system in the kernel of described android terminal device, wherein, described Data distribution8 bitmap is for representing the using state of Block in described user partition;
Ciphering unit, for reading the raw data of the Block used in described user partition according to described Data distribution8 bitmap, and the raw data of described Block is encrypted, then the data after described Block encryption are write back in described user partition, cover the raw data of described Block.
5. device as claimed in claim 4, it is characterized in that, described Data distribution8 bitmap generation unit specifically for: according to the size of the core buffer of described android terminal device, from the using state of Block reading described user partition according to the ext4 file system circulation the kernel of described android terminal device, setting up for described user partition with Block is the Data distribution8 bitmap of unit.
6. the device as described in claim 4 or 5, is characterized in that, described Data distribution8 bitmap generation unit specifically comprises:
Initialization subelement, for distributing and the bitmap of user partition described in initialization, wherein, the bitmap array in the bitmap of described user partition and the Block one_to_one corresponding of described user partition, a described bitmap array is for representing the using state coupling of a Block;
Block message obtains subelement, for according to the superblock Superblock information in the ext4 file system in the kernel of described android terminal device, obtains the use information of the Block of each correspondence in described user partition;
Block message write subelement, is recorded in bitmap array corresponding to the bitmap of described user partition for the use information of the Block by correspondence each in described user partition.
7. a terminal device, is characterized in that, comprises the device as described in any one of claim 4 to 6.
8. terminal device as claimed in claim 7, it is characterized in that, described terminal device comprises mobile terminal or has the computing machine of mobile terminal.
CN201510047613.5A 2015-01-29 2015-01-29 Fast encryption method and device for Android user partition and terminal equipment Pending CN104615941A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510047613.5A CN104615941A (en) 2015-01-29 2015-01-29 Fast encryption method and device for Android user partition and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510047613.5A CN104615941A (en) 2015-01-29 2015-01-29 Fast encryption method and device for Android user partition and terminal equipment

Publications (1)

Publication Number Publication Date
CN104615941A true CN104615941A (en) 2015-05-13

Family

ID=53150380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510047613.5A Pending CN104615941A (en) 2015-01-29 2015-01-29 Fast encryption method and device for Android user partition and terminal equipment

Country Status (1)

Country Link
CN (1) CN104615941A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107333261A (en) * 2017-06-21 2017-11-07 努比亚技术有限公司 Method, storage medium and the mobile terminal of encryption data
CN109711208A (en) * 2018-11-19 2019-05-03 北京计算机技术及应用研究所 USB interface device data encryption conversion equipment and its working method
CN113542196A (en) * 2020-04-16 2021-10-22 北京威努特技术有限公司 Data message encryption determination method, device, system and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268489A (en) * 2014-09-26 2015-01-07 浪潮电子信息产业股份有限公司 Method for optimizing performance of encryption card based on DEVICE MAPPER

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268489A (en) * 2014-09-26 2015-01-07 浪潮电子信息产业股份有限公司 Method for optimizing performance of encryption card based on DEVICE MAPPER

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SSYATELANDISI: "给硬盘设一道密码:利用BitLocker加密硬盘重要文件", 《HTTPS://WWW.LANDIANNEWS.COM/ARCHIVES/5853.HTML》 *
陆继翔 等: "Android移动设备数据加密机制", 《无线互联科技》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107333261A (en) * 2017-06-21 2017-11-07 努比亚技术有限公司 Method, storage medium and the mobile terminal of encryption data
CN109711208A (en) * 2018-11-19 2019-05-03 北京计算机技术及应用研究所 USB interface device data encryption conversion equipment and its working method
CN109711208B (en) * 2018-11-19 2020-08-25 北京计算机技术及应用研究所 USB interface equipment data encryption conversion device and working method thereof
CN113542196A (en) * 2020-04-16 2021-10-22 北京威努特技术有限公司 Data message encryption determination method, device, system and storage medium
CN113542196B (en) * 2020-04-16 2023-03-24 北京威努特技术有限公司 Data message encryption determination method, device, system and storage medium

Similar Documents

Publication Publication Date Title
KR101434860B1 (en) Method for Verifying Integrity of Dynamic Code Using Hash
CN106201481A (en) Assembly management method and apparatus in application development system
CN107408081A (en) Reinforcement to memory is provided and resets protection
CN104536869A (en) Mobile terminal and resource management method thereof
CN105426223A (en) Application loading method and device
CN105631361A (en) Application program channel source identification method and device
CN110968554A (en) Block chain storage method, storage system and storage medium based on file chain blocks
CN103166911A (en) Version management server authority management method and version management server authority management equipment
CN104951342A (en) Method and device for adjusting starting sequence
CN104767761A (en) Cloud storage platform access control method and device
CN104468240A (en) Cloud terminal management method and device
CN104572917A (en) Method and device for locking data and distributed storage system
KR101734663B1 (en) Method for preventing reverse engineering of android application and apparatus for performing the method
CN104714957A (en) List structure changing method and device
CN104615941A (en) Fast encryption method and device for Android user partition and terminal equipment
US20170199912A1 (en) Behavior topic grids
CN103559464B (en) Social security IC-card personalization method, Apparatus and system
CN104731626A (en) Application installation method and device
CN109324838B (en) Execution method and execution device of single chip microcomputer program and terminal
CN104657631B (en) The processing method and processing device of the channel information of application
CN110968885A (en) Model training data storage method and device, electronic equipment and storage medium
CN111198692A (en) Installation package generation method and device
CN104272317A (en) Identification and execution of subsets of a plurality of instructions in a more secure execution environment
CN110262856B (en) Application program data acquisition method, device, terminal and storage medium
CN105528307B (en) A kind of method and electronic equipment of information processing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150513

RJ01 Rejection of invention patent application after publication