CN109543436B - Improved method for android device encryption process user experience - Google Patents
Improved method for android device encryption process user experience Download PDFInfo
- Publication number
- CN109543436B CN109543436B CN201811456737.9A CN201811456737A CN109543436B CN 109543436 B CN109543436 B CN 109543436B CN 201811456737 A CN201811456737 A CN 201811456737A CN 109543436 B CN109543436 B CN 109543436B
- Authority
- CN
- China
- Prior art keywords
- encryption
- animation
- executing
- service
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of information security, and particularly relates to an improvement method for user experience of an android device encryption process. The method mainly solves the problem that the asynchronism of the prior android device in starting the minimum framework service can cause the first-time starting animation to be interrupted only by half. The main technical scheme comprises: s1, when the minimum framework service is started, judging whether the value of Vold.decrypt is equal to trigger _ restart _ min _ frame, if yes, executing S2, otherwise executing S1; s2, loading an encryption prompting animation through a bootanimation thread; s3, when the minimum framework service is started, executing S4 if a CryptKeeper interface appears, otherwise executing S2; s4, exiting the animation; and S5, encrypting the data, restarting the system and ending the encryption.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an Android system encryption method.
Background
With the continuous development of an Android operating system, the application range of the Android system is continuously expanded. Therefore, in order to protect the legitimate rights and interests of developers and users of Android applications, the Android programs need to be protected from security, and programs written in the Java language are easily subjected to reverse cracking. The main problem privacy of the Android system is faced in security. In the manual encryption process of a user, an interface of the current android device is almost blank, the user waits for more than 1 minute on the blank interface, the time is the restart process of the system frame, and if the user does not know that the device is in the restart frame service, the user can think that a machine is dead and forcibly restarts, so that the encryption process fails. The encrypted equipment needs to start a minimum frame service for a user to input a password in the starting or restarting process, the starting process of the minimum frame service can load a starting animation by default, when the password is matched, the whole frame service needs to load the starting animation once in the restarting process, and the same starting animation is loaded twice, so that misleading is caused to the user. Furthermore, the asynchrony in starting the minimal framework service results in the interruption of the first boot animation only half way through, and the user experience is poor.
Disclosure of Invention
The invention aims to solve the problem that the asynchronism of the prior android device in starting the minimum framework service can cause the first-time starting animation to be interrupted only by half.
The technical scheme adopted by the invention is as follows:
an improved method for android device encryption process user experience, comprising the steps of:
step S1, obtaining pre-encryption equipment context information;
step S2, closing main type service;
step S3, unloading the data partition and mounting a tmpfs file system;
step S4, when the minimum framework service is started, judging whether the system attribute Vold.decrypt value is equal to trigger _ restart _ min _ frame, if yes, executing step S5, otherwise executing step S4;
step S5, loading an encryption prompting animation through a bootanimation thread;
step S6, when the minimum frame service is started, if a CryptKeeper interface appears, executing step S7, otherwise, executing step S5;
step S7, the animation exits;
in step S8, data encryption is performed, and when the digest is valid, the system is restarted, and encryption is completed.
In the above technical solution, when the encrypted device is restarted, the attribute value of ro.
In summary, due to the adoption of the technical scheme, the beneficial effects of the invention are as follows:
1. the process interface of the android device system framework restart can provide user prompt animation when the interface is about 1-minute black.
2. Another boot animation is provided during password matching of an encrypted device during boot or reboot.
3. The asynchrony of starting the minimal framework services does not cause the first boot animation to be interrupted in half.
Drawings
Fig. 1 is a flowchart of an improved method for user experience in an android device encryption process of the present invention.
FIG. 2 is a CryptKeeper interface.
FIG. 3 is a user prompt animation or mp4 interface.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
The present invention will be described in detail with reference to fig. 1.
The present invention is intended to solve two problems:
firstly, in the manual encryption process of the current android device, the interface is almost blank and unfriendly! The user needs to wait for more than 1 minute on a very dark interface, which is the process of restarting the system frame, and if the user does not know that the device is in the service of the restart framework, the user can think that the machine is dead and forcibly restarts, which causes the failure of the encryption process.
And secondly, in the starting or restarting process of the encrypted equipment, a minimum framework service is required to be started for a user to input a password, the starting process of the minimum framework service can load the starting animation once by default, and when the password is matched, the starting animation needs to be loaded once in the whole framework service restarting process, so that the same starting animation is loaded twice, and misleading is caused to the user. Furthermore, the asynchrony in starting the minimal framework service results in the interruption of the first boot animation only half way through, and the user experience is poor.
And thirdly, the problem of poor user experience exists in android equipment in the market such as millet, MotoZ, three stars and the like. Improvements in user experience with respect to the encryption process and the mount process are not currently available.
The key points of the solution are as follows:
1. the user prompts animation or mp4 when designing the android device encryption of the image, as follows in FIG. 3:
2. when the minimum framework service is started, the user prompt animation is loaded when the system attribute Vold. decrypt value is equal to trigger _ restart _ min _ frame.
3. When the minimum framework service is started and a CryptKeeper interface appears, the following figure 2 is shown: the user prompts that the animation is played completely;
4. encrypted device restart time ro. crypt. state attribute value is "encrypted", while the vold. crypt attribute value is set to "trigger _ default _ encryption". Decryption determines what animation is played by reading the value of the attribute' vold. When the encrypted disk is mounted successfully, the value of attribute vold.
The scheme works as follows:
1. when a user manually encrypts a device through a setting, security, an interface of the encrypted device, a series of changes of system attribute vold. Trigger _ shutdown _ frame- - -Trigger _ post _ fs _ data
- - -trigger _ restart _ min _ frame. Rc, a change in vold. decryption triggers a corresponding reaction of the system, and when vold. decryption is trigger _ restart _ min _ frame, the system starts a minimum framework service to display the CryptKeeper interface.
2. The system needs to do the following before restarting the minimum framework services:
-retrieving stored context information related to encryption of the device.
Calculating the size of the equipment to be encrypted, taking the encrypted key, and closing the main type service.
And thirdly, unloading the data partition, and mounting tmpfs to create a file system.
Initializing the encryption context information, obtaining a key according to password, salt value and the like, storing two pieces of key information, and restarting the min _ frame.
3. In the above process, the device screen is completely dark and has a long duration. As the amount of user data increases, the time may be longer, and the user experience may be poor. Therefore, in the process of starting the minimum framework service, an encryption prompt animation is loaded through the bootanimation thread until a CryptKeeper interface appears. The user does not feel the abnormality.
The above-mentioned embodiments only express the specific embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for those skilled in the art, without departing from the technical idea of the present application, several changes and modifications can be made, which are all within the protection scope of the present application.
Claims (1)
1. An improved method for android device encryption process user experience, comprising the steps of:
step S1, obtaining pre-encryption equipment context information;
step S2, closing main type service;
step S3, unloading the data partition and mounting a tmpfs file system;
step S4, when the minimum framework service is started, judging whether the system attribute Vold.decrypt value is equal to trigger _ restart _ min _ frame, if yes, executing step S5, otherwise executing step S4;
step S5, loading an encryption prompting animation through a bootanimation thread;
step S6, when the minimum frame service is started, if a CryptKeeper interface appears, executing step S7, otherwise, executing step S5;
step S7, the animation exits;
step S8, performing data encryption, restarting the system when the create is trigger _ restart _ frame, and ending the encryption;
when the encrypted device is restarted, the attribute value of ro.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811456737.9A CN109543436B (en) | 2018-11-30 | 2018-11-30 | Improved method for android device encryption process user experience |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811456737.9A CN109543436B (en) | 2018-11-30 | 2018-11-30 | Improved method for android device encryption process user experience |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109543436A CN109543436A (en) | 2019-03-29 |
CN109543436B true CN109543436B (en) | 2022-09-16 |
Family
ID=65852219
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811456737.9A Active CN109543436B (en) | 2018-11-30 | 2018-11-30 | Improved method for android device encryption process user experience |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109543436B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388054A (en) * | 2008-09-22 | 2009-03-18 | 浪潮电子信息产业股份有限公司 | Method for saving Linux startup scripts and configuration file by NVRAM to implement system encrypt |
CN103150516A (en) * | 2013-03-01 | 2013-06-12 | 中科创达软件股份有限公司 | Method and device for enabling Android system equipment to enter temporary mode |
CN108196898A (en) * | 2016-12-08 | 2018-06-22 | 中兴通讯股份有限公司 | System remapping method, device and electronic equipment |
-
2018
- 2018-11-30 CN CN201811456737.9A patent/CN109543436B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388054A (en) * | 2008-09-22 | 2009-03-18 | 浪潮电子信息产业股份有限公司 | Method for saving Linux startup scripts and configuration file by NVRAM to implement system encrypt |
CN103150516A (en) * | 2013-03-01 | 2013-06-12 | 中科创达软件股份有限公司 | Method and device for enabling Android system equipment to enter temporary mode |
CN108196898A (en) * | 2016-12-08 | 2018-06-22 | 中兴通讯股份有限公司 | System remapping method, device and electronic equipment |
Non-Patent Citations (1)
Title |
---|
物联网下的信息安全;喻伟 等;《中国高新科技》;20180630;第7-8页 * |
Also Published As
Publication number | Publication date |
---|---|
CN109543436A (en) | 2019-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11120130B2 (en) | Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation | |
EP2681689B1 (en) | Protecting operating system configuration values | |
US9703635B2 (en) | Method, computer program, and computer for restoring set of variables | |
WO2015196982A1 (en) | Android malicious program detecting and processing methods and apparatuses, and device | |
CN101578609A (en) | Secure booting a computing device | |
US11055414B2 (en) | Method for a secured start-up of a computer system, and configuration comprising a computer system and an external storage medium connected to the computer system | |
CN107241298B (en) | Application control method, terminal and system | |
CN110598384B (en) | Information protection method, information protection device and mobile terminal | |
EP3452911B1 (en) | Recovery environment for a virtual machine | |
CN112148314B (en) | Mirror image verification method, device and equipment of embedded system and storage medium | |
JP2020004390A (en) | Automatic verification method and system | |
CN114978605A (en) | Page access method and device, electronic equipment and storage medium | |
CN110674525A (en) | Electronic equipment and file processing method thereof | |
CN109543436B (en) | Improved method for android device encryption process user experience | |
CN105786575A (en) | Mobile terminal and data elimination avoiding method thereof during system rewriting | |
US8924306B2 (en) | Remote computer rebooting tool | |
KR20080071576A (en) | Method and apparatus for securing digital content | |
US20230409339A1 (en) | Muscle/memory wire lock of device component(s) | |
CN113660100B (en) | Method, system and electronic equipment for generating soft token seed | |
CN115640589A (en) | Security protection equipment, service execution method, device and storage medium | |
CN110516468B (en) | Method and device for encrypting memory snapshot of virtual machine | |
EP3123384B1 (en) | Protecting an item of software | |
CN106776087B (en) | Terminal equipment and starting method thereof | |
US11163908B2 (en) | Device state driven encryption key management | |
JP2014021715A (en) | Information processing device, and control method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |