CN116016766A - Fingerprint verification management method based on container judgment - Google Patents
Fingerprint verification management method based on container judgment Download PDFInfo
- Publication number
- CN116016766A CN116016766A CN202211704851.5A CN202211704851A CN116016766A CN 116016766 A CN116016766 A CN 116016766A CN 202211704851 A CN202211704851 A CN 202211704851A CN 116016766 A CN116016766 A CN 116016766A
- Authority
- CN
- China
- Prior art keywords
- container
- fingerprint
- mobile phone
- current
- container system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 26
- 238000007726 management method Methods 0.000 title claims abstract description 15
- 238000002955 isolation Methods 0.000 claims abstract description 7
- 238000000034 method Methods 0.000 claims description 6
- 230000009286 beneficial effect Effects 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Lock And Its Accessories (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides a fingerprint verification management method based on container judgment, which comprises the following steps: establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the two container systems share a fingerprint drive; establishing a fingerprint touch event onfinger touch on the host; judging a current container system at a host machine; the fingerprint verification information is sent to the current container system through the fingerprint touch event onfinger touch; the current container system compares the fingerprint authentication information with stored fingerprint data. The invention ensures the fingerprint drive isolation verification of two containers through the first-step container judgment, and is beneficial to the safety and reliability of the dual-system mobile phone.
Description
Technical Field
The invention belongs to the technical field of dual-system mobile phones, and particularly relates to a fingerprint verification management method based on container judgment.
Background
With the rapid development of cloud technology and mobile terminal technology, more and more users need internal and external isolated terminal application scenes, such as mobile terminal equipment users applied to public inspection, users separating mobile terminal equipment used for work and life, and the like, in view of information security or data confidentiality, the users usually adopt a two-handset strategy, one handset is used for life, and the other handset is used for security office. However, the two mobile phones are inconvenient to carry and bring operation trouble.
Based on the above-mentioned needs of users, dual system handsets have grown. The dual-system mobile phone can use two systems in parallel by means of a container technology, one is a living system, the other is a safety system, the other is used in the foreground, and the other is hidden in the background. The user normally uses the foreground system, and can wake up the background system according to the use requirement of the user, so that the real-time switching of the two systems is realized.
Although the dual-system mobile phone meets the demands of user information security or data confidentiality and the like to a certain extent, new problems also appear in the existence of the dual-system mobile phone, and particularly in the management of fingerprint verification, if a reasonable management method is not available, the problems of mixed use and the like appear in the unlocking of the fingerprint, the security of the dual-system can be influenced, and the normal use of the dual-system by a user can be directly influenced.
Disclosure of Invention
The invention provides a fingerprint verification management method based on container judgment, which solves the problem of fingerprint verification management of a dual-system cloud security mobile phone, ensures the security and reliability and ensures the normal use of users.
In order to achieve the above purpose, the technical scheme of the invention is realized as follows:
a fingerprint verification management method based on container judgment comprises the following steps:
s1, establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the first container system is a living system and is used as a default system to be arranged on the mobile phone body, and the second container system is a safety system and is stored in a cloud server in a cloud mirror image mode;
s2, sharing a fingerprint identification hardware by the two container systems; establishing a fingerprint touch event onfinger touch on the host;
the fingerprint touch event onfinger touch settings are: when a user makes a fingerprint touch screen, a fingerprint touch event onfinger touch hent will be generated.
S3, judging the current container system in the host machine; the fingerprint verification information is sent to the current container system through the fingerprint touch event onfinger touch;
s4, comparing and checking the fingerprint verification information with stored fingerprint data by the current container system.
Further, in step S2, fingerprint data of the two container systems are stored in the two container systems respectively in a file isolation manner.
Further, the method for determining the current container in the host in step S3 includes:
s301, setting global variable pid in a dual-system cloud security mobile phone, wherein each container system corresponds to a different pid;
s302, in the host machine, judging which container system is currently the container system through the current pid and userid.
Further, the step S4 specifically includes:
s401, the current container system acquires a device fingerprint manager through a finger-print manager;
s402, judging whether fingerprints are stored or not through hasEnrolledFingerpoints;
s403, comparing and checking the fingerprint verification information with the stored fingerprint data through fingerprint.
Compared with the prior art, the invention has the following beneficial effects:
the invention solves the fingerprint verification management problem of the dual-system cloud security mobile phone, ensures the fingerprint drive isolation verification of two containers through the first-step container judgment, and is beneficial to the security and reliability of the dual-system mobile phone.
Drawings
FIG. 1 is a schematic diagram of a dual-system cloud mobile phone structure according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of an embodiment of the invention.
Detailed Description
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
As shown in fig. 1, the basic architecture of the dual-system cloud security mobile phone is based on a Linux operating system, and LXC is deployed in a kernel layer kernel of the Linux system, and creates a virtual environment, i.e., a container, with own processes and network space; a container management program for managing LXC containers is provided when the LXC is deployed in the present invention.
Based on the above architecture, the fingerprint verification management method provided by the invention is shown in fig. 2, and includes:
s1, establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the first container system is a living system and is used as a default system to be arranged on the mobile phone body, and the second container system is a safety system and is stored in a cloud server in a cloud mirror image mode;
the Linux mobile phone is used as a host system, and only init and basic services and a lxc _loader container management program are reserved; setting global variable pid for two container systems, wherein each container system corresponds to a different pid value and is used as an identity of the container system; once the container system is running, the container system's pid value is assigned to the global variable pid.
S2, fingerprint data of the two container systems are respectively stored in the two container systems in a file isolation mode, and the two container systems share one fingerprint identification hardware; establishing a fingerprint touch event onfinger touch on the host; each container system establishes a virtual fingerprint identification driver;
the driver of the shared fingerprinting hardware is set in the host, i.e. deployed in the Linux kernel, which is associated with the newly established fingerprint touch event onfinger touch.
The fingerprint touch event onfinger touch event includes:
(1) The interception module is used for intercepting the fingerprint touch message;
(2) And the forwarding module is used for forwarding the fingerprint touch message to the appointed container system.
When a user touches the screen with a fingerprint, the fingerprint recognition hardware receives the fingerprint touch event and sends a message, and in general, the two container systems are online at the same time, so that the message is received; however, the fingerprint touch event onfinger touch device is newly built by the invention, firstly intercepts the message through the interception module, and then sends the message to the appointed container system through the forwarding module.
S3, judging a current container system; the judging method comprises the following steps:
judging in the host according to the current value of the global variable pid, and judging which container system is currently through the current pid and the userid because the userid of the two containers is not the same in isolation of the systems;
after judging the current container system, transmitting fingerprint verification information to the current container system through the forwarding module of the fingerprint touch event onfinger touch;
s4, comparing and checking the fingerprint verification information with stored fingerprint data by the current container.
The current container system is driven by self virtual fingerprint identification, and the comparison and verification process is as follows:
s401, the current container system acquires a device fingerprint manager through a finger-print manager;
s402, judging whether fingerprints are stored or not through hasEnrolledFingerpoints;
s403, comparing and checking the fingerprint verification information with the stored fingerprint data through fingerprint.
By the method, fingerprint driving isolation verification of two containers can be achieved.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (4)
1. The fingerprint verification management method based on container judgment is characterized by comprising the following steps of:
s1, establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the first container system is a living system and is used as a default system to be arranged on the mobile phone body, and the second container system is a safety system and is stored in a cloud server in a cloud mirror image mode;
s2, sharing a fingerprint identification hardware by the two container systems; establishing a fingerprint touch event onfinger touch on the host;
s3, judging the current container system in the host machine; the fingerprint verification information is sent to the current container system through the fingerprint touch event onfinger touch;
s4, comparing and checking the fingerprint verification information with stored fingerprint data by the current container system.
2. The fingerprint verification management method based on container judgment according to claim 1, wherein in step S2, fingerprint data of two container systems are stored in the two container systems respectively in a file isolation form.
3. The fingerprint authentication management method based on container judgment according to claim 1 wherein the method for performing the current container judgment at the host machine in step S3 comprises:
s301, setting global variable pid in a dual-system cloud security mobile phone, wherein each container system corresponds to a different pid;
s302, in the host machine, judging which container system is currently the container system through the current pid and userid.
4. The fingerprint authentication management method based on container judgment according to claim 1 wherein step S4 specifically comprises:
s401, the current container system acquires a device fingerprint manager through a finger-print manager;
s402, judging whether fingerprints are stored or not through hasEnrolledFingerpoints;
s403, comparing and checking the fingerprint verification information with the stored fingerprint data through fingerprint.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211704851.5A CN116016766A (en) | 2022-12-29 | 2022-12-29 | Fingerprint verification management method based on container judgment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211704851.5A CN116016766A (en) | 2022-12-29 | 2022-12-29 | Fingerprint verification management method based on container judgment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116016766A true CN116016766A (en) | 2023-04-25 |
Family
ID=86031260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211704851.5A Pending CN116016766A (en) | 2022-12-29 | 2022-12-29 | Fingerprint verification management method based on container judgment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116016766A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016106989A1 (en) * | 2014-12-31 | 2016-07-07 | 宇龙计算机通信科技(深圳)有限公司 | Multi-system security authentication method, multi-system security authentication apparatus and terminal |
WO2016192499A1 (en) * | 2015-05-29 | 2016-12-08 | 宇龙计算机通信科技(深圳)有限公司 | Terminal management method and terminal |
WO2017020387A1 (en) * | 2015-07-31 | 2017-02-09 | 宇龙计算机通信科技(深圳)有限公司 | Method and terminal equipment for entering different system through fingerprint identification |
CN107480501A (en) * | 2017-08-21 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Unlocking method, mobile terminal and storage medium based on dual system |
CN108322307A (en) * | 2017-01-16 | 2018-07-24 | 中标软件有限公司 | Communication system and method between container based on kernel memory sharing |
CN108446159A (en) * | 2017-02-16 | 2018-08-24 | 中标软件有限公司 | Mobile terminal dual system based on Docker containers realizes system and method |
WO2019018998A1 (en) * | 2017-07-25 | 2019-01-31 | 深圳市汇顶科技股份有限公司 | Fingerprint recognition method and apparatus |
CN112347444A (en) * | 2019-08-09 | 2021-02-09 | 中兴通讯股份有限公司 | Dual-system unlocking method and device, terminal equipment and computer readable storage medium |
-
2022
- 2022-12-29 CN CN202211704851.5A patent/CN116016766A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016106989A1 (en) * | 2014-12-31 | 2016-07-07 | 宇龙计算机通信科技(深圳)有限公司 | Multi-system security authentication method, multi-system security authentication apparatus and terminal |
WO2016192499A1 (en) * | 2015-05-29 | 2016-12-08 | 宇龙计算机通信科技(深圳)有限公司 | Terminal management method and terminal |
WO2017020387A1 (en) * | 2015-07-31 | 2017-02-09 | 宇龙计算机通信科技(深圳)有限公司 | Method and terminal equipment for entering different system through fingerprint identification |
CN108322307A (en) * | 2017-01-16 | 2018-07-24 | 中标软件有限公司 | Communication system and method between container based on kernel memory sharing |
CN108446159A (en) * | 2017-02-16 | 2018-08-24 | 中标软件有限公司 | Mobile terminal dual system based on Docker containers realizes system and method |
WO2019018998A1 (en) * | 2017-07-25 | 2019-01-31 | 深圳市汇顶科技股份有限公司 | Fingerprint recognition method and apparatus |
CN107480501A (en) * | 2017-08-21 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Unlocking method, mobile terminal and storage medium based on dual system |
CN112347444A (en) * | 2019-08-09 | 2021-02-09 | 中兴通讯股份有限公司 | Dual-system unlocking method and device, terminal equipment and computer readable storage medium |
Non-Patent Citations (1)
Title |
---|
梁富伟;: "基于Docker的Linux系统实验操作环境设计", 电脑与信息技术, no. 05, 15 October 2020 (2020-10-15) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11934505B2 (en) | Information content viewing method and terminal | |
US10096951B1 (en) | Contraband detection through smart power components | |
CN106506433B (en) | Login authentication method, authentication server, authentication client and login client | |
CN108536783B (en) | Data processing method and device, terminal and computer readable storage medium | |
CN108702602B (en) | Image sharing method, electronic device and system | |
JP2022529032A (en) | Bluetooth scan method and electronic device | |
CN109416800B (en) | Authentication method of mobile terminal and mobile terminal | |
KR101672725B1 (en) | Method and apparatus for access to a computer unit | |
US20220182937A1 (en) | Cross-network wake-up method and related device | |
US20240095329A1 (en) | Cross-Device Authentication Method and Electronic Device | |
US10579411B2 (en) | Loading and running virtual working environments in a mobile device management system | |
WO2019184631A1 (en) | Information processing method and apparatus, computer-readable storage medium, and terminal | |
US20230073017A1 (en) | Screen Locking Method and Apparatus | |
US11947640B2 (en) | Adaptive, multi-channel, embedded application programming interface (API) | |
CN108574780A (en) | Management method, device, storage medium and the intelligent terminal of network function | |
CN111988314A (en) | System architecture and method for dynamically deploying network security service | |
CN116016766A (en) | Fingerprint verification management method based on container judgment | |
US7212108B2 (en) | Remote control system | |
WO2022165939A1 (en) | Cross-device authentication method and electronic devices | |
CN111050323B (en) | Terminal switching method, device and system | |
CN110798444B (en) | Data synchronization method and device based on Internet of things | |
US7328257B2 (en) | System for automatically assigning a telephone number to an existing telephone after detecting a network connection of a portable computer | |
CN113691515A (en) | Method for safe and rapid access of Internet of things equipment to management platform | |
EP4404156A1 (en) | Control method and display device | |
CN116828588B (en) | Communication method, readable medium, and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |