Touch penetration method suitable for dual-system cloud security mobile phone
The invention provides a Touch penetration method suitable for a dual-system cloud security mobile phone, which comprises the following steps: deploying an LXC container in a Linux kernel of the mobile phone, and establishing a dual-container system based on the LXC container; the Touch driver and t...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention provides a Touch penetration method suitable for a dual-system cloud security mobile phone, which comprises the following steps: deploying an LXC container in a Linux kernel of the mobile phone, and establishing a dual-container system based on the LXC container; the Touch driver and the evdev driver are deployed in a Linux kernel, and the ioctl function is deployed in an LXC container; the Touch driver of the Linux kernel receives the touch event and converts the touch event into different messages; the evdev driver receives a touch event message and reflects the touch event message to the LXC container; and when the LXC container obtains a touch event message by using an ioctl function, firstly intercepting the touch event message, then judging a foreground container system, and allowing the foreground container system to read the touch event message. According to the method, the information of the Touch event is intercepted by modifying the ioctl function, and only the foreground container sy |
---|