Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reduction method and device for Android terminal full-disk enciphered data

A full-disk encryption and data technology, which is applied in computer security devices, digital data protection, electronic digital data processing, etc., can solve problems such as difficult cracking by brute force, long time-consuming, etc., and achieve fast loading, simple operation, and high decryption efficiency Effect

Active Publication Date: 2017-04-26
XIAMEN MEIYA PICO INFORMATION
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the Android encryption algorithm after many improvements has been difficult to crack through brute force.
Even if the full-disk encryption password is known, it is necessary to build a decryption process program and take a long time to decrypt the full-disk encrypted image file, especially as the storage space of mobile phones becomes larger and larger, it is necessary to decrypt the full-disk encrypted image file. takes longer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reduction method and device for Android terminal full-disk enciphered data
  • Reduction method and device for Android terminal full-disk enciphered data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] A recovery device for full-disk encrypted data of an Android terminal, comprising: an Android virtual machine program, an Android kernel, an Android root file system image file, and a partition image file to be decrypted;

[0065] The Android virtual machine program is that the host starts the Android virtual machine entry, and provides rich parameters to control the Android virtual machine to start and run. Since the present embodiment is mainly aimed at the partition to be decrypted, the virtual machine is started by optimizing a series of parameters, such as: "- no-boot-anim", "-no-audio", "-no-skin" and "-no-window"; where "-no-window" will make the Android virtual machine not start the Android system application layer related services and programs , to speed up the inventive solution decryption partition loading process; this embodiment relates to other image files and also specifies specific files for the Android virtual machine through the parameter form, specific...

Embodiment 2

[0075] A method corresponding to the recovery system of the Android terminal full-disk encrypted data of the above-mentioned embodiment 1, comprising:

[0076] Build an Android virtual machine program for starting the Android kernel;

[0077] Start the Android virtual machine program; set the relevant parameters of the Android virtual machine program to optimize the Android virtual machine, and specify specific files for the Android virtual machine, such as: "-no-boot-anim", "-no-audio", "-no -skin" and "-no-window"; wherein "-no-window" will make the Android virtual machine not start the Android system application layer related services and programs to speed up the decryption partition loading process of the inventive scheme; "-kernel" specifies Android Kernel image file, "-ramdisk" specifies the Android root file system image file, and "-data" specifies the full-disk image file to be decrypted;

[0078] The Android virtual machine program initializes the Android kernel; spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a reduction method and device for Android terminal full-disk enciphered data. The method comprises the following steps of: constructing an Android virtual machine program used for starting an Android kernel; starting the Android virtual machine program; initializing the Android kernel by the Android virtual machine program; loading an Android root file system mirror image file; operating a program in the Android root file system mirror image file; on the basis of a configuration script in the Android root file system mirror image file, loading a partitioning mirror image file to be decrypted; starting corresponding system basic service; on the basis of the system basic service, reading the partitioning mirror image file to be decrypted; on the basis of a user encryption secret key corresponding to the partitioning mirror image file to be decrypted, generating a middle secret key by the Android kernel; and on the basis of the middle secret key, decrypting the read partitioning mirror image file to be decrypted.

Description

technical field [0001] The invention relates to the technical field of data restoration, in particular to a method and device for restoring full-disk encrypted data of an Android terminal. Background technique [0002] With the development of electronic forensics technology, mobile phone forensics product forms are becoming more and more diversified. Among them, mobile phone chip forensics products have developed rapidly recently, mainly because they can often solve problems that cannot be solved by other mobile phone forensics products, for example, mobile phones with hardware damage due to being dropped, soaked, burned, etc., or mobile phones that cannot be turned on due to system problems etc. In these cases, chip forensics is one of the important feasible solutions. At the same time, with the rapid development of Android system security technology, the problem of terminal forensics such as Android mobile phones is that it is more and more difficult to bypass the securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2107
Inventor 黄加红申强陈明辉孙奕张辉极
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products