CN109543436A - A kind of improved method about Android device encryption flow user experience - Google Patents

A kind of improved method about Android device encryption flow user experience Download PDF

Info

Publication number
CN109543436A
CN109543436A CN201811456737.9A CN201811456737A CN109543436A CN 109543436 A CN109543436 A CN 109543436A CN 201811456737 A CN201811456737 A CN 201811456737A CN 109543436 A CN109543436 A CN 109543436A
Authority
CN
China
Prior art keywords
encryption
vold
decrypt
animation
trigger
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811456737.9A
Other languages
Chinese (zh)
Other versions
CN109543436B (en
Inventor
毛凤翔
贾彦茹
赵雪
韩冰
钟凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinyang College
Original Assignee
Xinyang College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinyang College filed Critical Xinyang College
Priority to CN201811456737.9A priority Critical patent/CN109543436B/en
Publication of CN109543436A publication Critical patent/CN109543436A/en
Application granted granted Critical
Publication of CN109543436B publication Critical patent/CN109543436B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The invention belongs to field of information security technology more particularly to a kind of improved methods about Android device encryption flow user experience.Purport is to solve the problems, such as that existing Android device will lead to first time boot animation and be only put into half in the asynchronism for starting minimum framework services and is just interrupted.Main technical schemes include: S1, when starting minimum framework services judge whether system property Vold.decrypt value is equal to trigger_restart_min_framework, are to execute S2, otherwise execute S1;S2, an encryption prompt animation is loaded by bootanimation thread;S3, minimum framework services starting finish, and the interface CryptKeeper occur and then execute S4, otherwise execute S2;S4, animation exit;S5, data encryption is executed, restarts system, encryption terminates.

Description

A kind of improved method about Android device encryption flow user experience
Technical field
The present invention relates to field of information security technology more particularly to a kind of android system encryption methods.
Background technique
With the continuous development of Android (Android) operating system, the application range of android system is constantly expanded Exhibition.Therefore in order to protect the developer of Android application program and the legitimate rights and interests of user, need to Android program into Row security protection, the program that Java language is write are easy to inversely be cracked.Android system is faced in secure context Main problem privacy.For current Android device in the manual ciphering process of user, interface is black a piece of, and user will be black Interface wait clock more than 1 point, this time is the process that system framework is restarted, if user does not know that equipment is being restarted If framework services, it can think that machine is died, and restarts by force, ciphering process is caused to fail.The equipment encrypted is in booting or again During opening, needs to start a minimum framework services and to input password for user, in this minimum framework services start-up course, Default can load a boot animation, work as password match, and in entire framework services restarting process, and it is dynamic to need to load primary booting It draws, boot animation same in this way is loaded with twice, causes to mislead to user.And start the asynchronism meeting of minimum framework services Cause first time boot animation to be only put into half to be just interrupted, user experience is very poor.
Summary of the invention
Present invention aims at solve existing Android device to will lead to for the first time in the asynchronism for starting minimum framework services Boot animation is only put into the problem of half is just interrupted.
The technical solution adopted by the invention is as follows:
A kind of improved method about Android device encryption flow user experience, which comprises the steps of:
Step S1, pre-encrypt device context information is obtained;
Step S2, the service of main classification is closed;
Step S3, data subregion, carry tmpfs file system are unloaded;
Step S4, judge whether system property Vold.decrypt value is equal to trigger_ when starting minimum framework services Restart_min_framework is to then follow the steps S5, no to then follow the steps S4;
Step S5, an encryption prompt animation is loaded by bootanimation thread;
Step S6, minimum framework services starting finishes, and the interface CryptKeeper occurs and thens follow the steps S7, otherwise executes Step S5;
Step S7, animation exits;
Step S8, data encryption is executed, restarts as vold.decrypt=trigger_restart_framework and is System, encryption terminate.
In above-mentioned technical proposal, ro.crypto.state attribute value is " encrypted " when the equipment encrypted is restarted, It is " trigger_default_encryption " that vold.decrypt attribute value is arranged simultaneously, by reading attributes " The value of vold.decrypt " come determine play which kind of animation, when vold.decrypt value be " trigger_default_ Encryption " just plays user encryption and prompts animation, after encrypting the success of disk carry, the value of attribute vold.decrypt For " trigger_restart_framework plays boot animation at this time.
In conclusion by adopting the above-described technical solution, this reality advantageous effect of the invention is:
1. the process interface that Android device system framework is restarted can provide user's prompt when can be black 1 minute or so dynamic It draws.
2. it is dynamic to provide another booting during the equipment encrypted inputs password match in booting or restarting process It draws.
3. the asynchronism for starting minimum framework services is interrupted without it will lead to first time boot animation and be only put into half.
Detailed description of the invention
Fig. 1 is the flow chart of the improved method of Android device encryption flow user experience of the present invention.
Fig. 2 is the interface CryptKeeper.
Fig. 3 is that user prompts animation or the interface mp4.
Specific embodiment
All features disclosed in this specification or disclosed all methods or in the process the step of, in addition to mutually exclusive Feature and/or step other than, can combine in any way.
It elaborates below with reference to Fig. 1 to the present invention.
The invention solves two problems:
One, for current Android device in the manual ciphering process of user, interface is black a piece of, unfriendly!User will be Black interface waits clock more than 1 point, this time is the process that system framework is restarted, if user does not know equipment If restarting framework services, it can think that machine is died, and restarts by force, ciphering process is caused to fail.
Two, the equipment encrypted in booting or restarting process, need to start a minimum framework services come it is defeated for user Enter password, in this minimum framework services start-up course, default can load a boot animation, work as password match, entire frame During server resets, and need to load a boot animation, boot animation same in this way is loaded with twice, is caused to user It misleads.And the asynchronism for starting minimum framework services will lead to first time boot animation and only be put into half and is just interrupted, user It experiences very poor.
Three, all there is this poor user experience in the Android device of market such as millet, MotoZ, three magnitudes.About adding Improvement in terms of close process and carry process user experience does not occur also at present.
Solution core element:
1, user prompts animation or mp4, following Fig. 3 when the Android device encryption of the design image:
2, when starting minimum framework services, when system property Vold.decrypt value is equal to trigger_restart_ When min_framework, load user prompts animation.
3, minimum framework services starting finishes, and when there is the interface CryptKeeper, following Fig. 2: user prompts animation play It finishes;
4, ro.crypto.state attribute value is " encrypted " when the equipment encrypted is restarted, and is arranged simultaneously Vold.decrypt attribute value is " trigger_default_encryption ".Pass through reading attributes " vold.decrypt " Value determines which kind of animation played, and user encryption prompt is just played if it is " trigger_default_encryption " dynamic It draws.After encrypting the success of disk carry, the value of attribute vold.decrypt is " trigger_restart_framework, at this time Play boot animation.
This programme work is as follows:
1, user passes through setting --- safety --- encryption equipment interface when encrypting equipment manually, can trigger system property A series of variations of vold.decrypt (decryption), the change procedure of value are as follows: Trigger_shutdown_framework--- Trigger_post_fs_data
---trigger_restart_min_framework.In init.rc, the variation of Vold.decrypt can be triggered System is reacted accordingly, and as vold.decrypt=trigger_restart_min_framework, system will start one Minimum framework services are used to show the interface CryptKeeper.
2, system needs to do following thing before restarting minimum framework services:
1. obtain storage encrypts related contextual information with equipment.
2. calculating instrument size to be encrypted, encryption key is taken, the service of main classification is closed.
3. unloading data subregion, carry tmpfs. creates file system.
4. initialization encryption contextual information obtains key according to passwd and salt value etc., two parts of key letters are stored Breath, restarts min_framework.
3, in the above process, device screen is to go complete night, and the duration is longer.With amount of user data Increase, the time can be longer, user experience and difference.Therefore in minimum framework services start-up course, pass through bootanimation line Journey prompts animation to load an encryption, until the interface CryptKeeper occurs.User would not feel there is exception.
The specific embodiment of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously The limitation to the application protection scope therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, under the premise of not departing from technical scheme design, various modifications and improvements can be made, these belong to this The protection scope of application.

Claims (2)

1. a kind of improved method about Android device encryption flow user experience, which comprises the steps of:
Step S1, pre-encrypt device context information is obtained;
Step S2, the service of main classification is closed;
Step S3, data subregion, carry tmpfs file system are unloaded;
Step S4, judge whether system property Vold.decrypt value is equal to trigger_ when starting minimum framework services Restart_min_framework is to then follow the steps S5, no to then follow the steps S4;
Step S5, an encryption prompt animation is loaded by bootanimation thread;
Step S6, minimum framework services starting finishes, and the interface CryptKeeper occurs and thens follow the steps S7, no to then follow the steps S5;
Step S7, animation exits;
Step S8, data encryption is executed, restarts system as vold.decrypt=trigger_restart_framework, Encryption terminates.
2. a kind of improved method about Android device encryption flow user experience according to claim 1, feature exist In ro.crypto.state attribute value is " encrypted " when the equipment encrypted is restarted, while vold.decrypt is arranged Attribute value is " trigger_default_encryption ", and broadcasting is determined by the value of reading attributes " vold.decrypt " Which kind of animation, when the value of vold.decrypt is that " trigger_default_encryption " just the prompt of broadcasting user encryption is dynamic Draw, after encrypting the success of disk carry, the value of attribute vold.decrypt is " trigger_restart_framework, at this time Play boot animation.
CN201811456737.9A 2018-11-30 2018-11-30 Improved method for android device encryption process user experience Active CN109543436B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811456737.9A CN109543436B (en) 2018-11-30 2018-11-30 Improved method for android device encryption process user experience

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811456737.9A CN109543436B (en) 2018-11-30 2018-11-30 Improved method for android device encryption process user experience

Publications (2)

Publication Number Publication Date
CN109543436A true CN109543436A (en) 2019-03-29
CN109543436B CN109543436B (en) 2022-09-16

Family

ID=65852219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811456737.9A Active CN109543436B (en) 2018-11-30 2018-11-30 Improved method for android device encryption process user experience

Country Status (1)

Country Link
CN (1) CN109543436B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388054A (en) * 2008-09-22 2009-03-18 浪潮电子信息产业股份有限公司 Method for saving Linux startup scripts and configuration file by NVRAM to implement system encrypt
CN103150516A (en) * 2013-03-01 2013-06-12 中科创达软件股份有限公司 Method and device for enabling Android system equipment to enter temporary mode
CN108196898A (en) * 2016-12-08 2018-06-22 中兴通讯股份有限公司 System remapping method, device and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388054A (en) * 2008-09-22 2009-03-18 浪潮电子信息产业股份有限公司 Method for saving Linux startup scripts and configuration file by NVRAM to implement system encrypt
CN103150516A (en) * 2013-03-01 2013-06-12 中科创达软件股份有限公司 Method and device for enabling Android system equipment to enter temporary mode
CN108196898A (en) * 2016-12-08 2018-06-22 中兴通讯股份有限公司 System remapping method, device and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
喻伟 等: "物联网下的信息安全", 《中国高新科技》 *

Also Published As

Publication number Publication date
CN109543436B (en) 2022-09-16

Similar Documents

Publication Publication Date Title
US10430350B1 (en) Secure storage of data through a multifaceted security scheme
CN104581214B (en) Multimedia content guard method based on ARM TrustZone systems and device
CN106462718B (en) Store the rapid data protection of equipment
US8473739B2 (en) Advanced content authentication and authorization
JP5992457B2 (en) Protecting operating system configuration values
US9767317B1 (en) System to provide cryptographic functions to a markup language application
US9800561B2 (en) Secure sharing of user annotated subscription media with trusted devices
JP2014089652A (en) Information processing apparatus
WO2016026532A1 (en) User authentication using a randomized keypad over a drm secured video path
TWI526866B (en) Code protection using online authentication and encrypted code execution
JP2014089644A (en) Processor, processor control method and information processing apparatus
US20120179915A1 (en) System and method for full disk encryption authentication
CN104134022A (en) Information hiding and protecting method based on image
US9197407B2 (en) Method and system for providing secret-less application framework
CN105721903A (en) Method and system for playing online videos
CN108650526B (en) Identification method, computer equipment and storage medium
US20080172750A1 (en) Self validation of user authentication requests
CN108052828B (en) Method and device for generating screen recording file, terminal and storage medium
CN109543436A (en) A kind of improved method about Android device encryption flow user experience
US8832845B2 (en) Apparatus, method and program
WO2016202292A1 (en) Video encryption method and video decryption method, and mobile terminal
US8374338B2 (en) Transport packet decryption testing in a client device
CN112243154B (en) Set top box safe starting method, equipment and medium
CN107484028B (en) Video playing method and device
CN112434327A (en) Information protection method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant