CN116016766A - Fingerprint verification management method based on container judgment - Google Patents

Fingerprint verification management method based on container judgment Download PDF

Info

Publication number
CN116016766A
CN116016766A CN202211704851.5A CN202211704851A CN116016766A CN 116016766 A CN116016766 A CN 116016766A CN 202211704851 A CN202211704851 A CN 202211704851A CN 116016766 A CN116016766 A CN 116016766A
Authority
CN
China
Prior art keywords
container
fingerprint
mobile phone
current
container system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211704851.5A
Other languages
Chinese (zh)
Inventor
李海强
李�杰
梁崟柏
刘昭宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Telecom Terminals Co Ltd
Original Assignee
Tianyi Telecom Terminals Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Telecom Terminals Co Ltd filed Critical Tianyi Telecom Terminals Co Ltd
Priority to CN202211704851.5A priority Critical patent/CN116016766A/en
Publication of CN116016766A publication Critical patent/CN116016766A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Lock And Its Accessories (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a fingerprint verification management method based on container judgment, which comprises the following steps: establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the two container systems share a fingerprint drive; establishing a fingerprint touch event onfinger touch on the host; judging a current container system at a host machine; the fingerprint verification information is sent to the current container system through the fingerprint touch event onfinger touch; the current container system compares the fingerprint authentication information with stored fingerprint data. The invention ensures the fingerprint drive isolation verification of two containers through the first-step container judgment, and is beneficial to the safety and reliability of the dual-system mobile phone.

Description

Fingerprint verification management method based on container judgment
Technical Field
The invention belongs to the technical field of dual-system mobile phones, and particularly relates to a fingerprint verification management method based on container judgment.
Background
With the rapid development of cloud technology and mobile terminal technology, more and more users need internal and external isolated terminal application scenes, such as mobile terminal equipment users applied to public inspection, users separating mobile terminal equipment used for work and life, and the like, in view of information security or data confidentiality, the users usually adopt a two-handset strategy, one handset is used for life, and the other handset is used for security office. However, the two mobile phones are inconvenient to carry and bring operation trouble.
Based on the above-mentioned needs of users, dual system handsets have grown. The dual-system mobile phone can use two systems in parallel by means of a container technology, one is a living system, the other is a safety system, the other is used in the foreground, and the other is hidden in the background. The user normally uses the foreground system, and can wake up the background system according to the use requirement of the user, so that the real-time switching of the two systems is realized.
Although the dual-system mobile phone meets the demands of user information security or data confidentiality and the like to a certain extent, new problems also appear in the existence of the dual-system mobile phone, and particularly in the management of fingerprint verification, if a reasonable management method is not available, the problems of mixed use and the like appear in the unlocking of the fingerprint, the security of the dual-system can be influenced, and the normal use of the dual-system by a user can be directly influenced.
Disclosure of Invention
The invention provides a fingerprint verification management method based on container judgment, which solves the problem of fingerprint verification management of a dual-system cloud security mobile phone, ensures the security and reliability and ensures the normal use of users.
In order to achieve the above purpose, the technical scheme of the invention is realized as follows:
a fingerprint verification management method based on container judgment comprises the following steps:
s1, establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the first container system is a living system and is used as a default system to be arranged on the mobile phone body, and the second container system is a safety system and is stored in a cloud server in a cloud mirror image mode;
s2, sharing a fingerprint identification hardware by the two container systems; establishing a fingerprint touch event onfinger touch on the host;
the fingerprint touch event onfinger touch settings are: when a user makes a fingerprint touch screen, a fingerprint touch event onfinger touch hent will be generated.
S3, judging the current container system in the host machine; the fingerprint verification information is sent to the current container system through the fingerprint touch event onfinger touch;
s4, comparing and checking the fingerprint verification information with stored fingerprint data by the current container system.
Further, in step S2, fingerprint data of the two container systems are stored in the two container systems respectively in a file isolation manner.
Further, the method for determining the current container in the host in step S3 includes:
s301, setting global variable pid in a dual-system cloud security mobile phone, wherein each container system corresponds to a different pid;
s302, in the host machine, judging which container system is currently the container system through the current pid and userid.
Further, the step S4 specifically includes:
s401, the current container system acquires a device fingerprint manager through a finger-print manager;
s402, judging whether fingerprints are stored or not through hasEnrolledFingerpoints;
s403, comparing and checking the fingerprint verification information with the stored fingerprint data through fingerprint.
Compared with the prior art, the invention has the following beneficial effects:
the invention solves the fingerprint verification management problem of the dual-system cloud security mobile phone, ensures the fingerprint drive isolation verification of two containers through the first-step container judgment, and is beneficial to the security and reliability of the dual-system mobile phone.
Drawings
FIG. 1 is a schematic diagram of a dual-system cloud mobile phone structure according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of an embodiment of the invention.
Detailed Description
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
As shown in fig. 1, the basic architecture of the dual-system cloud security mobile phone is based on a Linux operating system, and LXC is deployed in a kernel layer kernel of the Linux system, and creates a virtual environment, i.e., a container, with own processes and network space; a container management program for managing LXC containers is provided when the LXC is deployed in the present invention.
Based on the above architecture, the fingerprint verification management method provided by the invention is shown in fig. 2, and includes:
s1, establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the first container system is a living system and is used as a default system to be arranged on the mobile phone body, and the second container system is a safety system and is stored in a cloud server in a cloud mirror image mode;
the Linux mobile phone is used as a host system, and only init and basic services and a lxc _loader container management program are reserved; setting global variable pid for two container systems, wherein each container system corresponds to a different pid value and is used as an identity of the container system; once the container system is running, the container system's pid value is assigned to the global variable pid.
S2, fingerprint data of the two container systems are respectively stored in the two container systems in a file isolation mode, and the two container systems share one fingerprint identification hardware; establishing a fingerprint touch event onfinger touch on the host; each container system establishes a virtual fingerprint identification driver;
the driver of the shared fingerprinting hardware is set in the host, i.e. deployed in the Linux kernel, which is associated with the newly established fingerprint touch event onfinger touch.
The fingerprint touch event onfinger touch event includes:
(1) The interception module is used for intercepting the fingerprint touch message;
(2) And the forwarding module is used for forwarding the fingerprint touch message to the appointed container system.
When a user touches the screen with a fingerprint, the fingerprint recognition hardware receives the fingerprint touch event and sends a message, and in general, the two container systems are online at the same time, so that the message is received; however, the fingerprint touch event onfinger touch device is newly built by the invention, firstly intercepts the message through the interception module, and then sends the message to the appointed container system through the forwarding module.
S3, judging a current container system; the judging method comprises the following steps:
judging in the host according to the current value of the global variable pid, and judging which container system is currently through the current pid and the userid because the userid of the two containers is not the same in isolation of the systems;
after judging the current container system, transmitting fingerprint verification information to the current container system through the forwarding module of the fingerprint touch event onfinger touch;
s4, comparing and checking the fingerprint verification information with stored fingerprint data by the current container.
The current container system is driven by self virtual fingerprint identification, and the comparison and verification process is as follows:
s401, the current container system acquires a device fingerprint manager through a finger-print manager;
s402, judging whether fingerprints are stored or not through hasEnrolledFingerpoints;
s403, comparing and checking the fingerprint verification information with the stored fingerprint data through fingerprint.
By the method, fingerprint driving isolation verification of two containers can be achieved.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (4)

1. The fingerprint verification management method based on container judgment is characterized by comprising the following steps of:
s1, establishing a dual-system cloud security mobile phone; an LXC container is deployed in a Linux kernel of the mobile phone, and a double-container system is established based on the LXC container; the first container system is a living system and is used as a default system to be arranged on the mobile phone body, and the second container system is a safety system and is stored in a cloud server in a cloud mirror image mode;
s2, sharing a fingerprint identification hardware by the two container systems; establishing a fingerprint touch event onfinger touch on the host;
s3, judging the current container system in the host machine; the fingerprint verification information is sent to the current container system through the fingerprint touch event onfinger touch;
s4, comparing and checking the fingerprint verification information with stored fingerprint data by the current container system.
2. The fingerprint verification management method based on container judgment according to claim 1, wherein in step S2, fingerprint data of two container systems are stored in the two container systems respectively in a file isolation form.
3. The fingerprint authentication management method based on container judgment according to claim 1 wherein the method for performing the current container judgment at the host machine in step S3 comprises:
s301, setting global variable pid in a dual-system cloud security mobile phone, wherein each container system corresponds to a different pid;
s302, in the host machine, judging which container system is currently the container system through the current pid and userid.
4. The fingerprint authentication management method based on container judgment according to claim 1 wherein step S4 specifically comprises:
s401, the current container system acquires a device fingerprint manager through a finger-print manager;
s402, judging whether fingerprints are stored or not through hasEnrolledFingerpoints;
s403, comparing and checking the fingerprint verification information with the stored fingerprint data through fingerprint.
CN202211704851.5A 2022-12-29 2022-12-29 Fingerprint verification management method based on container judgment Pending CN116016766A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211704851.5A CN116016766A (en) 2022-12-29 2022-12-29 Fingerprint verification management method based on container judgment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211704851.5A CN116016766A (en) 2022-12-29 2022-12-29 Fingerprint verification management method based on container judgment

Publications (1)

Publication Number Publication Date
CN116016766A true CN116016766A (en) 2023-04-25

Family

ID=86031260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211704851.5A Pending CN116016766A (en) 2022-12-29 2022-12-29 Fingerprint verification management method based on container judgment

Country Status (1)

Country Link
CN (1) CN116016766A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016106989A1 (en) * 2014-12-31 2016-07-07 宇龙计算机通信科技(深圳)有限公司 Multi-system security authentication method, multi-system security authentication apparatus and terminal
WO2016192499A1 (en) * 2015-05-29 2016-12-08 宇龙计算机通信科技(深圳)有限公司 Terminal management method and terminal
WO2017020387A1 (en) * 2015-07-31 2017-02-09 宇龙计算机通信科技(深圳)有限公司 Method and terminal equipment for entering different system through fingerprint identification
CN107480501A (en) * 2017-08-21 2017-12-15 北京珠穆朗玛移动通信有限公司 Unlocking method, mobile terminal and storage medium based on dual system
CN108322307A (en) * 2017-01-16 2018-07-24 中标软件有限公司 Communication system and method between container based on kernel memory sharing
CN108446159A (en) * 2017-02-16 2018-08-24 中标软件有限公司 Mobile terminal dual system based on Docker containers realizes system and method
WO2019018998A1 (en) * 2017-07-25 2019-01-31 深圳市汇顶科技股份有限公司 Fingerprint recognition method and apparatus
CN112347444A (en) * 2019-08-09 2021-02-09 中兴通讯股份有限公司 Dual-system unlocking method and device, terminal equipment and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016106989A1 (en) * 2014-12-31 2016-07-07 宇龙计算机通信科技(深圳)有限公司 Multi-system security authentication method, multi-system security authentication apparatus and terminal
WO2016192499A1 (en) * 2015-05-29 2016-12-08 宇龙计算机通信科技(深圳)有限公司 Terminal management method and terminal
WO2017020387A1 (en) * 2015-07-31 2017-02-09 宇龙计算机通信科技(深圳)有限公司 Method and terminal equipment for entering different system through fingerprint identification
CN108322307A (en) * 2017-01-16 2018-07-24 中标软件有限公司 Communication system and method between container based on kernel memory sharing
CN108446159A (en) * 2017-02-16 2018-08-24 中标软件有限公司 Mobile terminal dual system based on Docker containers realizes system and method
WO2019018998A1 (en) * 2017-07-25 2019-01-31 深圳市汇顶科技股份有限公司 Fingerprint recognition method and apparatus
CN107480501A (en) * 2017-08-21 2017-12-15 北京珠穆朗玛移动通信有限公司 Unlocking method, mobile terminal and storage medium based on dual system
CN112347444A (en) * 2019-08-09 2021-02-09 中兴通讯股份有限公司 Dual-system unlocking method and device, terminal equipment and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梁富伟;: "基于Docker的Linux系统实验操作环境设计", 电脑与信息技术, no. 05, 15 October 2020 (2020-10-15) *

Similar Documents

Publication Publication Date Title
US11934505B2 (en) Information content viewing method and terminal
US10096951B1 (en) Contraband detection through smart power components
CN106506433B (en) Login authentication method, authentication server, authentication client and login client
CN108536783B (en) Data processing method and device, terminal and computer readable storage medium
CN108702602B (en) Image sharing method, electronic device and system
JP2022529032A (en) Bluetooth scan method and electronic device
CN109416800B (en) Authentication method of mobile terminal and mobile terminal
KR101672725B1 (en) Method and apparatus for access to a computer unit
US20220182937A1 (en) Cross-network wake-up method and related device
US20240095329A1 (en) Cross-Device Authentication Method and Electronic Device
US10579411B2 (en) Loading and running virtual working environments in a mobile device management system
WO2019184631A1 (en) Information processing method and apparatus, computer-readable storage medium, and terminal
US20230073017A1 (en) Screen Locking Method and Apparatus
US11947640B2 (en) Adaptive, multi-channel, embedded application programming interface (API)
CN108574780A (en) Management method, device, storage medium and the intelligent terminal of network function
CN111988314A (en) System architecture and method for dynamically deploying network security service
CN116016766A (en) Fingerprint verification management method based on container judgment
US7212108B2 (en) Remote control system
WO2022165939A1 (en) Cross-device authentication method and electronic devices
CN111050323B (en) Terminal switching method, device and system
CN110798444B (en) Data synchronization method and device based on Internet of things
US7328257B2 (en) System for automatically assigning a telephone number to an existing telephone after detecting a network connection of a portable computer
CN113691515A (en) Method for safe and rapid access of Internet of things equipment to management platform
EP4404156A1 (en) Control method and display device
CN116828588B (en) Communication method, readable medium, and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination