CN109543436B - Improved method for android device encryption process user experience - Google Patents

Improved method for android device encryption process user experience Download PDF

Info

Publication number
CN109543436B
CN109543436B CN201811456737.9A CN201811456737A CN109543436B CN 109543436 B CN109543436 B CN 109543436B CN 201811456737 A CN201811456737 A CN 201811456737A CN 109543436 B CN109543436 B CN 109543436B
Authority
CN
China
Prior art keywords
encryption
animation
executing
service
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811456737.9A
Other languages
Chinese (zh)
Other versions
CN109543436A (en
Inventor
毛凤翔
贾彦茹
赵雪
韩冰
钟凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinyang University
Original Assignee
Xinyang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinyang University filed Critical Xinyang University
Priority to CN201811456737.9A priority Critical patent/CN109543436B/en
Publication of CN109543436A publication Critical patent/CN109543436A/en
Application granted granted Critical
Publication of CN109543436B publication Critical patent/CN109543436B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of information security, and particularly relates to an improvement method for user experience of an android device encryption process. The method mainly solves the problem that the asynchronism of the prior android device in starting the minimum framework service can cause the first-time starting animation to be interrupted only by half. The main technical scheme comprises: s1, when the minimum framework service is started, judging whether the value of Vold.decrypt is equal to trigger _ restart _ min _ frame, if yes, executing S2, otherwise executing S1; s2, loading an encryption prompting animation through a bootanimation thread; s3, when the minimum framework service is started, executing S4 if a CryptKeeper interface appears, otherwise executing S2; s4, exiting the animation; and S5, encrypting the data, restarting the system and ending the encryption.

Description

Improved method for android device encryption process user experience
Technical Field
The invention relates to the technical field of information security, in particular to an Android system encryption method.
Background
With the continuous development of an Android operating system, the application range of the Android system is continuously expanded. Therefore, in order to protect the legitimate rights and interests of developers and users of Android applications, the Android programs need to be protected from security, and programs written in the Java language are easily subjected to reverse cracking. The main problem privacy of the Android system is faced in security. In the manual encryption process of a user, an interface of the current android device is almost blank, the user waits for more than 1 minute on the blank interface, the time is the restart process of the system frame, and if the user does not know that the device is in the restart frame service, the user can think that a machine is dead and forcibly restarts, so that the encryption process fails. The encrypted equipment needs to start a minimum frame service for a user to input a password in the starting or restarting process, the starting process of the minimum frame service can load a starting animation by default, when the password is matched, the whole frame service needs to load the starting animation once in the restarting process, and the same starting animation is loaded twice, so that misleading is caused to the user. Furthermore, the asynchrony in starting the minimal framework service results in the interruption of the first boot animation only half way through, and the user experience is poor.
Disclosure of Invention
The invention aims to solve the problem that the asynchronism of the prior android device in starting the minimum framework service can cause the first-time starting animation to be interrupted only by half.
The technical scheme adopted by the invention is as follows:
an improved method for android device encryption process user experience, comprising the steps of:
step S1, obtaining pre-encryption equipment context information;
step S2, closing main type service;
step S3, unloading the data partition and mounting a tmpfs file system;
step S4, when the minimum framework service is started, judging whether the system attribute Vold.decrypt value is equal to trigger _ restart _ min _ frame, if yes, executing step S5, otherwise executing step S4;
step S5, loading an encryption prompting animation through a bootanimation thread;
step S6, when the minimum frame service is started, if a CryptKeeper interface appears, executing step S7, otherwise, executing step S5;
step S7, the animation exits;
in step S8, data encryption is performed, and when the digest is valid, the system is restarted, and encryption is completed.
In the above technical solution, when the encrypted device is restarted, the attribute value of ro.
In summary, due to the adoption of the technical scheme, the beneficial effects of the invention are as follows:
1. the process interface of the android device system framework restart can provide user prompt animation when the interface is about 1-minute black.
2. Another boot animation is provided during password matching of an encrypted device during boot or reboot.
3. The asynchrony of starting the minimal framework services does not cause the first boot animation to be interrupted in half.
Drawings
Fig. 1 is a flowchart of an improved method for user experience in an android device encryption process of the present invention.
FIG. 2 is a CryptKeeper interface.
FIG. 3 is a user prompt animation or mp4 interface.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
The present invention will be described in detail with reference to fig. 1.
The present invention is intended to solve two problems:
firstly, in the manual encryption process of the current android device, the interface is almost blank and unfriendly! The user needs to wait for more than 1 minute on a very dark interface, which is the process of restarting the system frame, and if the user does not know that the device is in the service of the restart framework, the user can think that the machine is dead and forcibly restarts, which causes the failure of the encryption process.
And secondly, in the starting or restarting process of the encrypted equipment, a minimum framework service is required to be started for a user to input a password, the starting process of the minimum framework service can load the starting animation once by default, and when the password is matched, the starting animation needs to be loaded once in the whole framework service restarting process, so that the same starting animation is loaded twice, and misleading is caused to the user. Furthermore, the asynchrony in starting the minimal framework service results in the interruption of the first boot animation only half way through, and the user experience is poor.
And thirdly, the problem of poor user experience exists in android equipment in the market such as millet, MotoZ, three stars and the like. Improvements in user experience with respect to the encryption process and the mount process are not currently available.
The key points of the solution are as follows:
1. the user prompts animation or mp4 when designing the android device encryption of the image, as follows in FIG. 3:
2. when the minimum framework service is started, the user prompt animation is loaded when the system attribute Vold. decrypt value is equal to trigger _ restart _ min _ frame.
3. When the minimum framework service is started and a CryptKeeper interface appears, the following figure 2 is shown: the user prompts that the animation is played completely;
4. encrypted device restart time ro. crypt. state attribute value is "encrypted", while the vold. crypt attribute value is set to "trigger _ default _ encryption". Decryption determines what animation is played by reading the value of the attribute' vold. When the encrypted disk is mounted successfully, the value of attribute vold.
The scheme works as follows:
1. when a user manually encrypts a device through a setting, security, an interface of the encrypted device, a series of changes of system attribute vold. Trigger _ shutdown _ frame- - -Trigger _ post _ fs _ data
- - -trigger _ restart _ min _ frame. Rc, a change in vold. decryption triggers a corresponding reaction of the system, and when vold. decryption is trigger _ restart _ min _ frame, the system starts a minimum framework service to display the CryptKeeper interface.
2. The system needs to do the following before restarting the minimum framework services:
-retrieving stored context information related to encryption of the device.
Calculating the size of the equipment to be encrypted, taking the encrypted key, and closing the main type service.
And thirdly, unloading the data partition, and mounting tmpfs to create a file system.
Initializing the encryption context information, obtaining a key according to password, salt value and the like, storing two pieces of key information, and restarting the min _ frame.
3. In the above process, the device screen is completely dark and has a long duration. As the amount of user data increases, the time may be longer, and the user experience may be poor. Therefore, in the process of starting the minimum framework service, an encryption prompt animation is loaded through the bootanimation thread until a CryptKeeper interface appears. The user does not feel the abnormality.
The above-mentioned embodiments only express the specific embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for those skilled in the art, without departing from the technical idea of the present application, several changes and modifications can be made, which are all within the protection scope of the present application.

Claims (1)

1. An improved method for android device encryption process user experience, comprising the steps of:
step S1, obtaining pre-encryption equipment context information;
step S2, closing main type service;
step S3, unloading the data partition and mounting a tmpfs file system;
step S4, when the minimum framework service is started, judging whether the system attribute Vold.decrypt value is equal to trigger _ restart _ min _ frame, if yes, executing step S5, otherwise executing step S4;
step S5, loading an encryption prompting animation through a bootanimation thread;
step S6, when the minimum frame service is started, if a CryptKeeper interface appears, executing step S7, otherwise, executing step S5;
step S7, the animation exits;
step S8, performing data encryption, restarting the system when the create is trigger _ restart _ frame, and ending the encryption;
when the encrypted device is restarted, the attribute value of ro.
CN201811456737.9A 2018-11-30 2018-11-30 Improved method for android device encryption process user experience Active CN109543436B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811456737.9A CN109543436B (en) 2018-11-30 2018-11-30 Improved method for android device encryption process user experience

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811456737.9A CN109543436B (en) 2018-11-30 2018-11-30 Improved method for android device encryption process user experience

Publications (2)

Publication Number Publication Date
CN109543436A CN109543436A (en) 2019-03-29
CN109543436B true CN109543436B (en) 2022-09-16

Family

ID=65852219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811456737.9A Active CN109543436B (en) 2018-11-30 2018-11-30 Improved method for android device encryption process user experience

Country Status (1)

Country Link
CN (1) CN109543436B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388054A (en) * 2008-09-22 2009-03-18 浪潮电子信息产业股份有限公司 Method for saving Linux startup scripts and configuration file by NVRAM to implement system encrypt
CN103150516A (en) * 2013-03-01 2013-06-12 中科创达软件股份有限公司 Method and device for enabling Android system equipment to enter temporary mode
CN108196898A (en) * 2016-12-08 2018-06-22 中兴通讯股份有限公司 System remapping method, device and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388054A (en) * 2008-09-22 2009-03-18 浪潮电子信息产业股份有限公司 Method for saving Linux startup scripts and configuration file by NVRAM to implement system encrypt
CN103150516A (en) * 2013-03-01 2013-06-12 中科创达软件股份有限公司 Method and device for enabling Android system equipment to enter temporary mode
CN108196898A (en) * 2016-12-08 2018-06-22 中兴通讯股份有限公司 System remapping method, device and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
物联网下的信息安全;喻伟 等;《中国高新科技》;20180630;第7-8页 *

Also Published As

Publication number Publication date
CN109543436A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
US11120130B2 (en) Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation
EP2681689B1 (en) Protecting operating system configuration values
US9703635B2 (en) Method, computer program, and computer for restoring set of variables
WO2015196982A1 (en) Android malicious program detecting and processing methods and apparatuses, and device
CN101578609A (en) Secure booting a computing device
EP2051181A1 (en) Information terminal, security device, data protection method, and data protection program
US11055414B2 (en) Method for a secured start-up of a computer system, and configuration comprising a computer system and an external storage medium connected to the computer system
CN107241298B (en) Application control method, terminal and system
CN110598384B (en) Information protection method, information protection device and mobile terminal
JP2020004390A (en) Automatic verification method and system
CN109154903B (en) Recovery environment for virtual machines
CN112148314A (en) Mirror image verification method, device, equipment and storage medium of embedded system
CN114978605A (en) Page access method and device, electronic equipment and storage medium
CN109543436B (en) Improved method for android device encryption process user experience
KR20080071576A (en) Method and apparatus for securing digital content
US8924306B2 (en) Remote computer rebooting tool
CN110674525A (en) Electronic equipment and file processing method thereof
CN115640589A (en) Security protection equipment, service execution method, device and storage medium
CN110516468B (en) Method and device for encrypting memory snapshot of virtual machine
CN108228219B (en) Method and device for verifying BIOS validity during in-band refreshing of BIOS
CN106776087B (en) Terminal equipment and starting method thereof
US11222096B2 (en) Protecting an item of software
CN110990840A (en) Method and device for starting equipment
JP2014021715A (en) Information processing device, and control method therefor
US20230409339A1 (en) Muscle/memory wire lock of device component(s)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant