Unlock instant, AI-driven research and patent intelligence for your innovation.

Android system based encryption storage method

A technology of encrypted storage and encrypted processing, applied in the protection of internal/peripheral computer components, etc., can solve problems such as insecure network transmission data, incompatibility with encryption chips and encryption algorithms, and inability to guarantee security.

Inactive Publication Date: 2016-05-11
SHANGHAI E SHION TECH
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some of these products need to steal user data because they implement a free-to-use business model. Another part adopts a network anti-virus technical solution, which may cause users to have to connect to an unsafe network to transmit data. Some are original PCs. The extension of antivirus vendors' products on smartphones
Because these products are designed for a wide variety of Android terminals with huge differences, in order to be able to be used universally on multiple terminals, the design scheme cannot guarantee the security of each type of user in actual use, including the security of business information and customer information. up
[0004] In the existing technology, application developers need to know what kind of encryption chip is at the bottom layer and whether there is an independent operating system storage space, resulting in inflexible development and incompatibility with different encryption chips and encryption algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android system based encryption storage method
  • Android system based encryption storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0022] An encrypted storage method based on an Android system, comprising the steps of:

[0023] Such as figure 1 Shown:

[0024] In step 101, an application at the application layer initiates a first encrypted storage request and sends it to the framework layer, and the application layer sends a storage request at the same time when sending it to the framework layer. In a specific embodiment, the first encrypted storage request initiated by the application is operated by other applications such as APP or application software.

[0025] Step 102, the framework layer receives the first encrypted storage request and implements an allocation API (Application Programming Interface) interface. After receiving the first encrypted storage request, the framework layer judges whether the first encrypted storage request needs to be encrypted. If en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an Android system based encryption storage method. The method comprises the following steps: an application of an application layer initiates a first encryption storage request and sends the first encryption storage request to a frame layer; the frame layer receives the first encryption storage request and distributes an API; a runtime library converts the first encryption storage request into a second encryption storage request suitable for running a driver layer, and transmits the second encryption storage request to the driver layer; the driver layer performs encryption driving according to the second encryption storage request; and a hardware layer processes the second encryption storage request according to the API distributed by the frame layer. How to finish different encryption functions does not need to be concerned by applying existing encryption chips and encryption algorithms through three optional modes of a direct storage mode, a direct encryption mode and an encryption and independent storage space mode, so that an application developer can flexibly select an independent security storage region or a system storage region, and various encryption and storage methods can be compatible, namely, various encryption chips and encryption algorithms can be compatible.

Description

technical field [0001] The invention relates to an encrypted storage method, in particular to an Android system-based encrypted storage method. Background technique [0002] In the field of industrial applications, because the data involved in the application is related to corporate business secrets and customer privacy, there are naturally higher requirements for data security. In actual use, the potential safety hazards of industrial applications are more diverse. In addition to malicious software, there are also deliberate stealers, users who lack security awareness, and unsafe network connections. As applications grow in size, the consequences of these threats become more severe. [0003] In the field of smart phones, some mobile phone security products have appeared, such as Tencent's mobile housekeeper, 360's mobile guard, Mcafee mobile antivirus, LBE security master, etc. Some of these products need to steal user data because they implement a free-to-use business mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/72
CPCG06F21/72G06F21/78
Inventor 陆歆胥璐
Owner SHANGHAI E SHION TECH