Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method and device based on Ubifs system and medium

An encryption method and system-oriented technology, applied in the fields of encryption, equipment and media, and decryption methods based on Ubifs system, can solve problems such as damage to user interests, damage to user experience, and impact on the interests of system package manufacturers, and achieve a balance between encryption and performance , to protect the security of the machine, without affecting the effect of reading and writing performance

Pending Publication Date: 2021-02-02
GUANGDONG XIAOTIANCAI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Since the Android system is an open source system, there are a large number of Android system versions in the market, and some system packages are easy to be copied and modified, resulting in the content of the original system being replaced at will.
And this kind of system package is easy to carry paid software or other paid applications, which damages the interests of users
And after the system package is repackaged, the stability of the system itself will decrease, which will damage the user experience and also affect the user's evaluation of the system package manufacturer, which will seriously affect the interests of the system package manufacturer
[0003] At the same time, because the system itself is stored in plain text, it is easy to be mirrored and decompiled, which affects the protection of the trade secrets of system package manufacturers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device based on Ubifs system and medium
  • Encryption and decryption method and device based on Ubifs system and medium
  • Encryption and decryption method and device based on Ubifs system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066]Such asfigure 1 ,5As shown, this embodiment provides an encryption method based on the Ubifs system, including:

[0067]S1: Obtain the logical write path and pre-written data;

[0068]S2: Determine whether the logical write path points to the system partition, if so, enter S3-1;

[0069]S3-1: Fragment processing is performed on the pre-written data according to the preset fragment size to obtain multiple written data fragments;

[0070]S3-2: Encrypt the specified N bytes of data in each written data segment;

[0071]S4: Write pre-written data into the area pointed to by the logical write path.

[0072]In this embodiment, when applied to the Ubifs system, the logical write path and pre-written data are first obtained, and then it is judged whether the area pointed to by the logical write path is a system partition. If it is not a system partition, no operation is performed. Just write, but if it is a system partition, you need to slice the target data first and divide it into slices. The size of...

Embodiment 2

[0075]Such asfigure 2 ,5As shown, this embodiment provides an encryption method based on the Ubifs system, including:

[0076]S1: Obtain the logical write path and pre-written data;

[0077]S2: Determine whether the logical write path points to the system partition, if so, enter S3;

[0078]S3-1: Perform fragment processing on the pre-written data according to the preset fragment size to obtain multiple written data fragments; specify N bytes of data as the first N bytes of data in each write data fragment; The fragment size is 4KB; relatively speaking, the size of 4KB can achieve good security effects without affecting performance.

[0079]S3-2: Encrypt the specified N bytes of data in each write data segment; N is one of 16, 32, and 64;

[0080]S4-1: The disordered block mirroring management system layer initiates a data write request to the disordered block mirroring layer according to the logical write path;

[0081]S4-2: The disordered block mirroring layer converts the logical write path into t...

Embodiment 3

[0088]Such asFigure 5As shown, this embodiment provides an encryption method based on the Ubifs system, including:

[0089]S1: Obtain the logical write path and pre-written data; the logical write path points to the logical erase block;

[0090]S2: Determine whether the logical write path points to the system partition, if so, enter S3;

[0091]S3-1: Fragment processing is performed on the pre-written data according to the preset fragment size to obtain multiple written data fragments; the fragment size is 4KB;

[0092]S3-2: Encrypt the specified N bytes of data in each write data segment; N is one of 16, 32, and 64; specify N bytes of data for each write data segment The first N bytes of data;

[0093]S4-1: The disordered block mirroring management system layer initiates a data write request to the disordered block mirroring layer according to the logical write path;

[0094]S4-2: The disordered block mirror layer converts the logical write path into a physical write path according to the erase bloc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method and device based on a Ubifs system and a medium, and specifically discloses an encryption method based on the Ubifs system comprises the steps of obtaining a logic write-in path and pre-write-in data; judging whether the logic writing path points to a system partition, and if yes, encrypting the pre-written data; writing the pre-written data into an area pointed by the logic writing path; wherein the step of encrypting the pre-written data specifically comprises the sub-steps of performing fragmentation processing on the pre-written data according to a preset fragmentation size to obtain a plurality of written data fragments; and performing encryption processing on specified N byte data in each write-in data fragment. The invention further discloses a decryption method based on the Ubifs system, encryption and decryption equipment based on the Ubifs system and a storage medium. The method has the technical effects that the content of the system partition is subjected to fragmentation encryption, so that the mirror image of the system partition is effectively prevented from being obtained from the outside or flash is effectively prevented.

Description

Technical field[0001]The invention relates to the field of system security, in particular to an encryption and decryption method, equipment and medium based on the Ubifs system.Background technique[0002]Since the Android system is an open source system, there are a large number of Android system versions in the market. Some of the system packages are easily copied and modified, resulting in the content of the original system being replaced at will. However, such system packages are easy to carry paid software or other paid applications, which damages the interests of users. Moreover, after the system package is repackaged, the stability of the system itself will decrease, which will damage the user experience, and will also affect the user's evaluation of the system package manufacturer, which will seriously affect the interests of the system package manufacturer.[0003]At the same time, because the system itself is stored in plain text, it is easy to be mirrored and decompiled, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/06G06F12/14
CPCG06F3/062G06F3/0635G06F3/0644G06F3/0652G06F12/1408
Inventor 吴宪福
Owner GUANGDONG XIAOTIANCAI TECH CO LTD