CN112073428B - Application terminal identity authentication method and display equipment - Google Patents

Application terminal identity authentication method and display equipment Download PDF

Info

Publication number
CN112073428B
CN112073428B CN202010981258.XA CN202010981258A CN112073428B CN 112073428 B CN112073428 B CN 112073428B CN 202010981258 A CN202010981258 A CN 202010981258A CN 112073428 B CN112073428 B CN 112073428B
Authority
CN
China
Prior art keywords
authentication
request
application terminal
identity
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010981258.XA
Other languages
Chinese (zh)
Other versions
CN112073428A (en
Inventor
欧阳顺生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vidaa Netherlands International Holdings BV
Original Assignee
Vidaa Netherlands International Holdings BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vidaa Netherlands International Holdings BV filed Critical Vidaa Netherlands International Holdings BV
Priority to CN202010981258.XA priority Critical patent/CN112073428B/en
Publication of CN112073428A publication Critical patent/CN112073428A/en
Application granted granted Critical
Publication of CN112073428B publication Critical patent/CN112073428B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an application terminal identity authentication method and display equipment, which are used for verifying the identity of an application terminal after receiving a request message for establishing WebSocket connection by the application terminal. The method comprises the following steps: when receiving a WebSocket handshake request, returning a response message to an application terminal sending the WebSocket handshake request, where the response message carries a first authentication identifier used to indicate authentication of an identity of the application terminal, where the first authentication identifier is used to trigger the application terminal to initiate an identity authentication request, and the first authentication identifier at least includes: a first authentication and verification algorithm and a first random number; the first authentication and verification algorithm is used for enabling the application terminal to generate a first authentication parameter based on the first random number and the identification of the application terminal; when an identity authentication request initiated by the application terminal is received, authenticating a first authentication parameter carried by the identity authentication request, and performing data interaction with the application terminal when the authentication is passed.

Description

Application terminal identity authentication method and display equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to an application identity authentication method and a display device.
Background
Under the ATSC 3.0 (Advanced Television Systems Committee 3.0, 3.0 version of the national standard for digital televisions in the united states), the application terminal and the display device are connected through a WebSocket, and data interaction is performed based on the WebSocket connection. Websocket is a long connection protocol based on TCP, and can realize full-duplex communication between an application terminal and display equipment.
When the WebSocket connection is established between the application end and the display equipment, the illegal application end can also establish malicious connection with the display equipment. Since the malicious connection occupies resources of the display device and also causes leakage of user information stored in the display device, it is necessary to prevent an illegal application end from establishing malicious connection with the display device.
Disclosure of Invention
The application discloses an application terminal identity authentication method and display equipment, which are used for preventing illegal application terminals from establishing malicious connection with a television platform.
According to a first aspect of embodiments of the present application, there is provided a display apparatus including:
when receiving a WebSocket handshake request, returning a first response message to an application terminal sending the WebSocket handshake request, where the first response message carries a first authentication identifier used to indicate that an identity of the application terminal is authenticated, and the first authentication identifier is used to trigger the application terminal to initiate an identity authentication request, where the first authentication identifier at least includes: a first authentication and verification algorithm and a first random number; the first authentication and verification algorithm is used for enabling the application terminal to generate a first authentication parameter based on the first random number and the identification of the application terminal;
and when receiving an identity authentication request initiated by the application terminal, authenticating a first authentication parameter carried by the identity authentication request, and performing data interaction with the application terminal when the authentication is passed.
According to a second aspect of the embodiments of the present application, there is provided a method for authenticating an identity of an application, the method including:
when receiving a WebSocket handshake request, returning a response message to an application terminal sending the WebSocket handshake request, where the response message carries a first authentication identifier used to indicate authentication of an identity of the application terminal, where the first authentication identifier is used to trigger the application terminal to initiate an identity authentication request, and the first authentication identifier at least includes: a first authentication and verification algorithm and a first random number; the first authentication and verification algorithm is used for enabling the application terminal to generate a first authentication parameter based on the first random number and the identification of the application terminal;
when an identity authentication request initiated by the application terminal is received, authenticating a first authentication parameter carried by the identity authentication request, and performing data interaction with the application terminal when the authentication is passed.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
according to the technical scheme, after the request message for establishing the WebSocket connection with the application terminal is received, the identity of the application terminal is verified, if the identity authentication of the application terminal is not passed after verification, the identity of the application terminal is illegal, the WebSocket connection with the application terminal can be disconnected, and malicious connection with the illegal application terminal is prevented.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments consistent with the present application and together with the application, serve to explain the principles of the application.
Fig. 1A is a schematic diagram illustrating an operation scenario between the display device 200 and the control apparatus 100;
fig. 1B is a block diagram schematically illustrating a configuration of the control apparatus 100 in fig. 1A;
fig. 1C is a block diagram schematically illustrating a configuration of the display device 200 in fig. 1A;
FIG. 1D is a block diagram illustrating an architectural configuration of an operating system in the memory of the display device 200;
FIG. 2 is a flow chart of a method provided herein;
FIG. 3 is a flow chart of data interaction with an application provided herein;
fig. 4 is a diagram illustrating an interaction between a display device and an application provided in the present application.
Detailed Description
To make the objects, embodiments and advantages of the present application clearer, the following description of exemplary embodiments of the present application will clearly and completely describe the exemplary embodiments of the present application with reference to the accompanying drawings in the exemplary embodiments of the present application, and it is to be understood that the described exemplary embodiments are only a part of the embodiments of the present application, and not all of the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the exemplary embodiments described herein without making any inventive step, are within the scope of protection of the present application. In addition, while the disclosure herein has been presented in terms of exemplary embodiment or embodiments, it should be appreciated that individual aspects of the disclosure can be utilized in a variety of forms and embodiments.
It should be noted that the brief descriptions of the terms in the present application are only for the convenience of understanding the embodiments described below, and are not intended to limit the embodiments of the present application. These terms should be understood in their ordinary and customary meaning unless otherwise indicated.
The terms "first," "second," "third," and the like in this application are used to distinguish similar or analogous objects or entities, and are not necessarily meant to define a particular order or sequence Unless otherwise noted (Unless thermal indication). It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein.
Furthermore, the terms "comprises" and "comprising," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a product or device that comprises a list of elements is not necessarily limited to those elements explicitly listed, but may include other elements not expressly listed or inherent to such product or device.
In order to facilitate understanding of the embodiments provided in the present application, the following first describes the structure of the display device and the interaction process between the display device and the control device:
fig. 1A is a schematic diagram illustrating an operation scenario between the display device 200 and the control apparatus 100. As shown in fig. 1A, the control apparatus 100 and the display device 200 may communicate with each other in a wired or wireless manner.
Among them, the control apparatus 100 is configured to control the display device 200, which may receive an operation instruction input by a user and convert the operation instruction into an instruction recognizable and responsive by the display device 200, serving as an intermediary for interaction between the user and the display device 200. Such as: the user operates the channel up/down key on the control device 100, and the display device 200 responds to the channel up/down operation.
The control device 100 may be a remote controller 100A, which includes infrared protocol communication or bluetooth protocol communication, and other short-distance communication methods, etc. to control the display apparatus 200 in a wireless or other wired manner. The user may input a user command through a key on a remote controller, a voice input, a control panel input, etc. to control the display apparatus 200. Such as: the user can input a corresponding control command through a volume up/down key, a channel control key, up/down/left/right moving keys, a voice input key, a menu key, a power on/off key, etc. on the remote controller, to implement the function of controlling the display device 200.
The control device 100 may also be an intelligent device, such as a mobile terminal 100B, a tablet computer, a notebook computer, and the like. For example, the display device 200 is controlled using an application program running on the smart device. The application program may provide various controls to a user through an intuitive User Interface (UI) on a screen associated with the smart device through configuration.
For example, the mobile terminal 100B may install a software application with the display device 200 to implement connection communication through a network communication protocol for the purpose of one-to-one control operation and data communication. Such as: the mobile terminal 100B may be caused to establish a control instruction protocol with the display device 200 to implement the functions of the physical keys as arranged in the remote control 100A by operating various function keys or virtual buttons of the user interface provided on the mobile terminal 100B. The audio and video content displayed on the mobile terminal 100B may also be transmitted to the display device 200, so as to implement a synchronous display function.
The display apparatus 200 may be implemented as a television, and may provide an intelligent network television function of a broadcast receiving television function as well as a computer support function. Examples of the display device include a digital television, a web television, a smart television, an Internet Protocol Television (IPTV), and the like.
The display device 200 may be a liquid crystal display, an organic light emitting display, a projection display device. The specific display device type, size, resolution, etc. are not limited.
The display apparatus 200 also performs data communication with the server 300 through various communication means. Here, the display apparatus 200 may be allowed to be communicatively connected through a Local Area Network (LAN), a Wireless Local Area Network (WLAN), and other networks. The server 300 may provide various contents and interactions to the display apparatus 200. By way of example, the display device 200 may send and receive information such as: receiving Electronic Program Guide (EPG) data, receiving software program updates, or accessing a remotely stored digital media library. The servers 300 may be a group or groups of servers, and may be one or more types of servers. Other web service contents such as a video on demand and an advertisement service are provided through the server 300.
Fig. 1B is a block diagram illustrating the configuration of the control device 100. As shown in fig. 1B, the control device 100 includes a controller 110, a memory 120, a communicator 130, a user input interface 140, an output interface 150, and a power supply 160.
The controller 110 includes a Random Access Memory (RAM) 111, a Read Only Memory (ROM) 112, a processor 113, a communication interface, and a communication bus. The controller 110 is used to control the operation of the control device 100, as well as the internal components and the cooperation of communications, external and internal data processing functions.
Illustratively, when an interaction of a user pressing a key disposed on the remote controller 100A or an interaction of touching a touch panel disposed on the remote controller 100A is detected, the controller 110 may control to generate a signal corresponding to the detected interaction and transmit the signal to the display apparatus 200.
And a memory 120 for storing various operation programs, data and applications for driving and controlling the control apparatus 100 under the control of the controller 110. The memory 120 may store various control signal commands input by a user.
The communicator 130 enables communication of control signals and data signals with the display apparatus 200 under the control of the controller 110. Such as: the control apparatus 100 transmits a control signal (e.g., a touch signal or a button signal) to the display device 200 via the communicator 130, and the control apparatus 100 may receive the signal transmitted by the display device 200 via the communicator 130. The communicator 130 may include an infrared signal interface 131 and a radio frequency signal interface 132. For example: when the infrared signal interface is used, the user input instruction needs to be converted into an infrared control signal according to an infrared control protocol, and the infrared control signal is sent to the display device 200 through the infrared sending module. And the following steps: when the rf signal interface is used, a user input command needs to be converted into a digital signal, and then the digital signal is modulated according to the rf control signal modulation protocol and then transmitted to the display device 200 through the rf transmitting terminal.
The user input interface 140 may include at least one of a microphone 141, a touch pad 142, a sensor 143, a key 144, and the like, so that a user can input a user instruction regarding control of the display apparatus 200 to the control device 100 through voice, touch, gesture, pressing, and the like.
The output interface 150 outputs a user instruction received by the user input interface 140 to the display apparatus 200, or outputs an image or voice signal received by the display apparatus 200. Here, the output interface 150 may include an LED interface 151, a vibration interface 152 generating vibration, a sound output interface 153 outputting sound, a display 154 outputting images, and the like. For example, the remote controller 100A may receive an output signal such as audio, video, or data from the output interface 150 and display the output signal in the form of an image on the display 154, in the form of audio at the sound output interface 153, or in the form of vibration at the vibration interface 152.
And a power supply 160 for providing operation power support for the elements of the control device 100 under the control of the controller 110. In the form of a battery and associated control circuitry.
A hardware configuration block diagram of the display device 200 is exemplarily illustrated in fig. 1C. As shown in fig. 1C, the display apparatus 200 may further include a tuner demodulator 210, a communicator 220, a detector 230, an external device interface 240, a controller 250, a memory 260, a user interface 265, a video processor 270, a display 275, an audio processor 280, an audio input interface 285, and a power supply 290.
The tuner demodulator 210 receives the broadcast television signal in a wired or wireless manner, may perform modulation and demodulation processing such as amplification, mixing, and resonance, and is configured to demodulate, from a plurality of wireless or wired broadcast television signals, an audio/video signal carried in a frequency of a television channel selected by a user, and additional information (e.g., EPG data).
The tuner demodulator 210 is responsive to the user selected frequency of the television channel and the television signal carried by the frequency, as selected by the user and as controlled by the controller 250.
The tuner demodulator 210 may receive a television signal in various ways according to the broadcasting system of the television signal, such as: terrestrial broadcasting, cable broadcasting, satellite broadcasting, internet broadcasting, or the like; and according to different modulation types, a digital modulation mode or an analog modulation mode can be adopted; and can demodulate the analog signal and the digital signal according to different types of the received television signals.
In other exemplary embodiments, the tuning demodulator 210 may also be in an external device, such as an external set-top box. In this way, the set-top box outputs television signals through modulation and demodulation, and inputs the television signals into the display apparatus 200 through the external device interface 240.
The communicator 220 is a component for communicating with an external device or an external server according to various communication protocol types. For example, the display apparatus 200 may transmit content data to an external apparatus connected via the communicator 220, or browse and download content data from an external apparatus connected via the communicator 220. The communicator 220 may include a network communication protocol module or a near field communication protocol module, such as a WIFI module 221, a bluetooth communication protocol module 222, and a wired ethernet communication protocol module 223, so that the communicator 220 may receive a control signal of the control device 100 according to the control of the controller 250, and implement the control signal as a WIFI signal, a bluetooth signal, a radio frequency signal, and the like.
The detector 230 is a component of the display apparatus 200 for collecting signals of an external environment or interaction with the outside. The detector 230 may include an image collector 231, such as a camera, a video camera, etc., which may be used to collect external environment scenes to adaptively change the display parameters of the display device 200; and the function of acquiring the attribute of the user or interacting gestures with the user so as to realize the interaction between the display equipment and the user. A light receiver 232 may also be included to collect ambient light intensity to adapt to changes in display parameters of the display device 200, etc.
In other exemplary embodiments, the detector 230 may further include a temperature sensor, such as by sensing an ambient temperature, and the display device 200 may adaptively adjust a display color temperature of the image. For example, when the temperature is higher, the display device 200 may be adjusted to display a color temperature of the image that is colder; when the temperature is lower, the display device 200 may be adjusted to display a warmer color temperature of the image.
In some other exemplary embodiments, the detector 230, which may further include a sound collector, such as a microphone, may be configured to receive a sound of a user, such as a voice signal of a control instruction of the user to control the display device 200; alternatively, ambient sounds may be collected that identify the type of ambient scene, enabling the display device 200 to adapt to ambient noise.
The external device interface 240 is a component for providing the controller 210 with control of data transmission between the display apparatus 200 and an external apparatus. The external device interface 240 may be connected to an external apparatus such as a set-top box, a game device, a notebook computer, etc. in a wired/wireless manner, and may receive data such as a video signal (e.g., moving image), an audio signal (e.g., music), additional information (e.g., EPG), etc. of the external apparatus.
The external device interface 240 may include: a High Definition Multimedia Interface (HDMI) terminal 241, a Composite Video Blanking Sync (CVBS) terminal 242, an analog or digital Component terminal 243, a Universal Serial Bus (USB) terminal 244, a Component terminal (not shown), a red, green, blue (RGB) terminal (not shown), and the like.
The controller 250 controls the operation of the display device 200 and responds to the operation of the user by running various software control programs (such as an operating system and various application programs) stored on the memory 260.
As shown in fig. 1C, the controller 250 includes a Random Access Memory (RAM) 251, a Read Only Memory (ROM) 252, a graphics processor 253, a CPU processor 254, a communication interface 255, and a communication bus 256. The RAM251, the ROM252, the graphic processor 253, and the CPU processor 254 are connected to each other through a communication bus 256.
The ROM252 stores various system startup instructions. If the display apparatus 200 starts power-up upon receiving the power-on signal, the CPU processor 254 executes a system start-up instruction in the ROM252, and copies the operating system stored in the memory 260 to the RAM251 to start running the start-up operating system. After the start of the operating system is completed, the CPU processor 254 copies the various application programs in the memory 260 to the RAM251 and then starts running the various application programs.
A graphic processor 253 for generating screen images of various graphic objects such as icons, images, and operation menus. The graphic processor 253 may include an operator for performing an operation by receiving various interactive instructions input by a user, and further displaying various objects according to display attributes; and a renderer for generating various objects based on the operator and displaying the rendered result on the display 275.
A CPU processor 254 for executing operating system and application program instructions stored in memory 260. And executing processing of various applications, data and contents according to the received user input instruction so as to finally display and play various audio and video contents.
In some exemplary embodiments, the CPU processor 254 may comprise a plurality of processors. The plurality of processors may include one main processor and a plurality of or one sub-processor. A main processor for performing some initialization operations of the display apparatus 200 in the display apparatus preloading mode, and/or operations of displaying a screen in the normal mode. A plurality of or one sub-processor for performing an operation in a state of a standby mode or the like of the display apparatus.
The communication interface 255 may include a first interface to an nth interface. These interfaces may be network interfaces that are connected to external devices via a network.
The controller 250 may control the overall operation of the display apparatus 200. For example: in response to receiving a user input command for selecting a GUI object displayed on the display 275, the controller 250 may perform an operation related to the object selected by the user input command.
Where the object may be any one of the selectable objects, such as a hyperlink or an icon. The operation related to the selected object is, for example, an operation of displaying a link to a hyperlink page, document, image, or the like, or an operation of executing a program corresponding to an icon. The user input command for selecting the GUI object may be a command input through various input means (e.g., a mouse, a keyboard, a touch panel, etc.) connected to the display apparatus 200 or a voice command corresponding to a user uttering voice.
A memory 260 for storing various types of data, software programs, or applications for driving and controlling the operation of the display device 200. The memory 260 may include volatile and/or non-volatile memory. And the term "memory" includes the memory 260, the RAM251 and the ROM252 of the controller 250, or a memory card in the display device 200.
In some embodiments, the memory 260 is specifically used for storing an operating program for driving the controller 250 of the display device 200; storing various application programs built in the display apparatus 200 and downloaded by a user from an external apparatus; data such as visual effect images for configuring various GUIs provided by the display 275, various objects related to the GUIs, and selectors for selecting the GUI objects are stored.
In some embodiments, the memory 260 is specifically configured to store drivers and related data for the tuner demodulator 210, the communicator 220, the detector 230, the external device interface 240, the video processor 270, the display 275, the audio processor 280, and the like, external data (e.g., audio-visual data) received from the external device interface, or user data (e.g., key information, voice information, touch information, and the like) received from the user interface.
In some embodiments, memory 260 specifically stores software and/or programs representing an Operating System (OS), which may include, for example: a kernel, middleware, an Application Programming Interface (API), and/or an application program. Illustratively, the kernel may control or manage system resources, as well as functions performed by other programs (e.g., the middleware, APIs, or applications); at the same time, the kernel may provide an interface to allow middleware, APIs, or applications to access the controller to enable control or management of system resources.
A block diagram of the architectural configuration of the operating system in the memory of the display device 200 is illustrated in fig. 1D. The operating system architecture comprises an application layer, a middleware layer and a kernel layer from top to bottom.
The application layer, the application programs built in the system and the non-system-level application programs belong to the application layer and are responsible for direct interaction with users. The application layer may include a plurality of applications such as NETFLIX applications, setup applications, media center applications, and the like. These applications may be implemented as Web applications that execute based on a WebKit engine, and in particular may be developed and executed based on HTML, cascading Style Sheets (CSS), and JavaScript.
Here, HTML, which is called HyperText Markup Language (HyperText Markup Language), is a standard Markup Language for creating web pages, and describes the web pages by Markup tags, where the HTML tags are used to describe characters, graphics, animation, sound, tables, links, etc., and a browser reads an HTML document, interprets the content of the tags in the document, and displays the content in the form of web pages.
CSS, known as Cascading Style Sheets (Cascading Style Sheets), is a computer language used to represent the Style of HTML documents, and may be used to define Style structures, such as fonts, colors, locations, etc. The CSS style can be directly stored in the HTML webpage or a separate style file, so that the style in the webpage can be controlled.
JavaScript, a language applied to Web page programming, can be inserted into an HTML page and interpreted and executed by a browser. The interaction logic of the Web application is realized by JavaScript. The JavaScript can package a JavaScript extension interface through a browser, realize the communication with the kernel layer,
the middleware layer may provide some standardized interfaces to support the operation of various environments and systems. For example, the middleware layer may be implemented as multimedia and hypermedia information coding experts group (MHEG) middleware related to data broadcasting, DLNA middleware of middleware related to communication with an external device, middleware providing a browser environment in which each application program in the display device operates, and the like.
The kernel layer provides core system services such as: file management, memory management, process management, network management, system security authority management and the like. The kernel layer may be implemented as a kernel based on various operating systems, for example, a kernel based on the Linux operating system.
The kernel layer also provides communication between system software and hardware, and provides device driver services for various hardware, such as: the method comprises the steps of providing a display driver for a display, providing a camera driver for a camera, providing a key driver for a remote controller, providing a WiFi driver for a WIFI module, providing an audio driver for an audio output interface, providing a power management driver for a Power Management (PM) module and the like.
A user interface 265 receives various user interactions. Specifically, it is used to transmit an input signal of a user to the controller 250 or transmit an output signal from the controller 250 to the user. For example, the remote controller 100A may transmit an input signal, such as a power switch signal, a channel selection signal, a volume adjustment signal, etc., input by the user to the user interface 265, and then the input signal is transferred to the controller 250 through the user interface 265; alternatively, the remote controller 100A may receive an output signal such as audio, video, or data output from the user interface 265 via the controller 250, and display the received output signal or output the received output signal in audio or vibration form.
In some embodiments, a user may enter user commands on a Graphical User Interface (GUI) displayed on the display 275, and the user interface 265 receives the user input commands through the GUI. Specifically, the user interface 265 may receive user input commands for controlling the position of a selector in the GUI to select different objects or items.
Alternatively, the user may input a user command by inputting a specific sound or gesture, and the user interface 265 receives the user input command by recognizing the sound or gesture through the sensor.
The video processor 270 is configured to receive an external video signal, and perform video data processing such as decompression, decoding, scaling, noise reduction, frame rate conversion, resolution conversion, and image synthesis according to a standard codec protocol of the input signal, so as to obtain a video signal that is directly displayed or played on the display 275.
Illustratively, the video processor 270 includes a demultiplexing module, a video decoding module, an image synthesizing module, a frame rate conversion module, a display formatting module, and the like.
The demultiplexing module is configured to demultiplex an input audio/video data stream, where, for example, an input MPEG-2 stream (based on a compression standard of a digital storage media moving image and voice), the demultiplexing module demultiplexes the input audio/video data stream into a video signal and an audio signal.
And the video decoding module is used for processing the demultiplexed video signal, including decoding, scaling and the like.
And the image synthesis module, such as an image synthesizer, is used for performing superposition mixing processing on the GUI signal input by the user or generated by the user and the video image after the zooming processing by the graphics generator so as to generate an image signal for display.
The frame rate conversion module is configured to convert a frame rate of an input video, for example, convert a frame rate of an input 60Hz video into a frame rate of 120Hz or 240Hz, where a common format is implemented by using, for example, an interpolation frame method.
And a display formatting module for converting the signal output by the frame rate conversion module into a signal conforming to a display format of a display, such as converting the format of the signal output by the frame rate conversion module to output an RGB data signal.
And a display 275 for receiving the image signal from the output of the video processor 270 and displaying video, images and menu manipulation interfaces. For example, the display may display video from a broadcast signal received by the tuner demodulator 210, may display video input from the communicator 220 or the external device interface 240, and may display an image stored in the memory 260. The display 275 and also displays a user manipulation interface UI generated in the display apparatus 200 and used to control the display apparatus 200.
And, the display 275 may include a display screen assembly for presenting a picture and a driving assembly for driving the display of an image. Alternatively, a projection device and projection screen may be included, provided display 275 is a projection display.
The audio processor 280 is configured to receive an external audio signal, decompress and decode the received audio signal according to a standard codec protocol of the input signal, and perform audio data processing such as noise reduction, digital-to-analog conversion, and amplification processing to obtain an audio signal that can be played by the speaker 286.
Illustratively, audio processor 280 may support various audio formats. Such as MPEG-2, MPEG-4, advanced Audio Coding (AAC), high efficiency AAC (HE-AAC), and the like.
An audio output interface 285 for receiving audio signals from the output of audio processor 280. For example, the audio output interface may output audio in a broadcast signal received via the tuner demodulator 210, may output audio input via the communicator 220 or the external device interface 240, and may output audio stored in the memory 260. The audio output interface 285 may include a speaker 286, or an external audio output terminal 287, such as an earphone output terminal, that outputs to a generating device of an external device.
In other exemplary embodiments, video processor 270 may comprise one or more chips. Audio processor 280 may also comprise one or more chips.
And, in other exemplary embodiments, the video processor 270 and the audio processor 280 may be separate chips or may be integrated with the controller 250 in one or more chips.
And a power supply 290 for supplying power supply support to the display apparatus 200 from the power input from the external power source under the control of the controller 250. The power supply 290 may be a built-in power supply circuit installed inside the display apparatus 200 or may be a power supply installed outside the display apparatus 200.
For the purpose of understanding the embodiments provided in the present application, the following description first describes an application environment related to the present application:
in this application, in order to prevent an illegal application from establishing a malicious connection with a television platform, the application provides a method as shown in fig. 2:
referring to fig. 2, fig. 2 is a flow chart of a method provided by the present application. The flow shown in fig. 2 is applied to a controller 250 of a display device, and the controller 250 is configured to perform the flow shown in fig. 2. As an example, if there is a tv platform module in the display device, the flow shown in fig. 2 may be applied to the tv platform module. The television platform module is used for responding to the request from the application terminal, executing specific action according to the request of the application terminal, and sending a notice to the application terminal.
Optionally, the interaction between the tv platform module and the application is based on ATSC 3.0 communication protocol, in which WebSocket is introduced as a connection for communication between the tv platform module and the application.
Optionally, the application end may be disposed on a display device configured with the process shown in fig. 2; the application terminal may also be set in another display device in the same area network as the display device configured with the flow shown in fig. 2.
Next, examples of the present application will be described in detail.
As shown in fig. 2, the process may include the following steps:
step 201, when receiving a WebSocket handshake request, returning a first response packet to an application terminal that sends the WebSocket handshake request, where the first response packet carries a first authentication identifier used for indicating authentication of an identity of the application terminal, where the first authentication identifier is used for triggering the application terminal to initiate an identity authentication request, and the first authentication identifier at least includes: a first authentication and verification algorithm and a first random number; the first authentication verification algorithm is used for enabling the application terminal to generate a first authentication parameter based on the first random number and the identification of the application terminal.
Here, the WebSocket in step 201 is a long connection protocol based on TCP, and can implement full-duplex communication between the application terminal and the television platform.
As an embodiment in specific implementation, in step 201, the WebSocket handshake request sent by the application end initiates a handshake request according to a standard WebSocket specification, where a first authentication check algorithm in the first authentication identifier carried in the first response message is an algorithm configured in the display device.
As another embodiment, in step 201, the WebSocket handshake request sent by the application end is a message obtained by adding a field of an authentication check algorithm to a request message generated according to a standard WebSocket specification, where the request message carries an authentication check algorithm supported by the application end itself, and at this time, the first authentication check algorithm in the first authentication identifier carried in the first response message is the authentication check algorithm in the WebSocket handshake request.
As an example, the first authentication check algorithm may be a known encryption algorithm, such as the md5 algorithm; or common authentication verification methods, such as verification by a verification code; other self-defined authentication and verification methods are also possible.
As an embodiment, the identifier of the application in step 201 may be a user name and a password set by the user in the application; the verification code displayed on the application terminal; the authentication information and the like that have been integrated when the application end is present are only for facilitating understanding of the identifier of the application end, and are not particularly limited.
In specific implementation, the first response packet in step 201 carries a first authentication identifier for indicating authentication of the identity of the application, which may be implemented by adding a field of the first authentication identifier after a standard WebSocket specification responds to a packet of a handshake request, for example, adding an algorithmic field and a nonce field after responding to a packet of a handshake request, where the algorithmic field is used to indicate a first authentication check algorithm, and the nonce field is used to indicate a first random number.
As an embodiment, after receiving a first response message for initiating an identity authentication request, an application terminal may obtain a first authentication identifier in the first response message, and the first authentication identifier may trigger the application terminal to initiate the identity authentication request.
Step 202, when receiving an identity authentication request initiated by the application terminal, authenticating a first authentication parameter carried in the identity authentication request, and performing data interaction with the application terminal when the authentication is passed.
As an embodiment, in step 202, authenticating the first authentication parameter carried in the identity authentication request is to generate a first verification parameter based on the obtained identifier of the application terminal and the first random number according to a first authentication verification algorithm; comparing whether the first authentication parameter is matched with the first verification parameter, and if so, passing the authentication of the identity of the application end; and if not, the identity authentication of the application end is not passed.
The display device locally stores the identifier of the application terminal, and how the display device specifically obtains the identifier of the application terminal in the embodiment may be implemented in the following manner: storing user name and password information of a user during user registration; operator authentication and authorization information recorded when leaving a factory; the authentication information obtained from the code stream according to the requirement of the operator is only for convenience of understanding, and is not particularly limited.
As an embodiment, if the identity of the application end is authenticated, maintaining a WebSocket connection with the application end, and performing data interaction with the application end through the connection; and if the identity of the application end is not authenticated, disconnecting the WebSocket connection with the application end.
In this step 202, in the process of performing identity authentication on the application terminal, except for the authentication request of the application terminal, no other request sent by the application terminal is received.
The flow of the method shown in fig. 2 ends up so far.
According to the method flowchart illustrated in fig. 2, in a specific embodiment, after a request message for establishing a WebSocket connection with an application terminal is received, the identity of the application terminal is verified, and if the identity authentication of the application terminal is not passed after verification, the identity of the application terminal is illegal, and the WebSocket connection with the application terminal can be disconnected, so that malicious connection with the illegal application terminal is prevented.
Further, before implementing the method shown in fig. 2, the following steps (denoted as step a) need to be performed in advance:
a, step a: configuring an API related to the authentication process shown in fig. 2 in a controller of the display device, where the API is configured to receive an authentication request sent by an application terminal; meanwhile, an API related to the authentication flow shown in fig. 2 is configured in the application terminal, and the newly added API in the application terminal corresponds to the API related to the authentication flow newly configured in the controller of the display device.
In step a, an API configured in a controller of the display device is used to receive an identity authentication request initiated by the application terminal; an API configured in the application is used to send an identity authentication request.
In concrete implementation, the API related to the newly added authentication flow conforms to the JSON-RPC 2.0 specification as the API defined based on ATSC 3.0 between the previous application end and the display device, and the JSON format message is used between the interfaces to carry out data interaction in the previously established WebSocket connection.
The above-described embodiments are to be considered in all respects as illustrative and not restrictive.
In the present application, after the identity of the application passes the authentication, the application performs data interaction with the application, and as an embodiment, how to perform data interaction with the application is described in detail below:
referring to fig. 3, fig. 3 is a flowchart of data interaction with an application side according to the present application. As shown in fig. 3, the process may include the following steps:
step 301, after the identity of the application end is authenticated, returning a second response message of the identity authentication request to the application end, where the second response message carries a second authentication identifier used to indicate to authenticate the received interaction request, and the second authentication identifier at least includes: a second random number, an effective time of the second random number; the second random number is used for enabling the application terminal to generate a second authentication parameter based on the first authentication algorithm, the identifier of the application terminal and the second random number; and the valid time of the second random number is used for indicating the valid time of the second random number, and the application terminal needs to reinitiate the identity authentication request after the timeout.
As an embodiment, the second response message in step 301 is used to transmit a message that the identity authentication is successful to the application end, the second authentication identifier in the second response message is used to authorize the application end to perform data interaction, and the application end can send a request for data interaction only after receiving the second authentication identifier in the second response message.
Here, the second authentication parameter in step 301 is used to authenticate the request for data interaction.
As an embodiment, the adding of the valid time of the second random number in the second response message in step 301 is a more optimized scheme, so as to make the data interaction with the application side more secure.
Step 302, when data interaction is performed with the application terminal, authenticating the second authentication parameter carried in the interaction request, and when the authentication is passed, returning a processing result of the interaction request to the application terminal.
As an embodiment, in the step 302, the authenticating the second authentication parameter carried in the interaction request is to generate a second verification parameter based on the obtained identifier of the application terminal and the second random number according to the first authentication verification algorithm; comparing whether the second authentication parameter is matched with the second verification parameter, if so, passing the authentication of the identity of the interactive request; if not, the authentication of the identity of the interactive request is not passed.
Further, if the second authentication parameter carried in the interactive request passes the authentication, the processing result of the interactive request is returned after corresponding operation is carried out according to the interactive request; and if the second authentication parameter carried in the interactive request is not authenticated, the interactive request is not processed.
Through the process shown in fig. 3, the identity of the received request for data interaction can be verified, and the illegal request is prevented from occupying the WebSocket connection established with the application terminal.
The method in the present application is described above, and one embodiment of the interaction between the display device and the application terminal in the present application is described below:
referring to fig. 4, fig. 4 is a diagram illustrating an interaction between a display device and an application provided in the present application. As shown in fig. 4, the following steps may be included:
step 401, the application end sends a WebSocket handshake request to the display device.
In this step 401, the WebSocket handshake request sent by the application end may be a request message generated according to a standard WebSocket specification; and a field of the authentication check algorithm can be added after the request message is generated according to the standard WebSocket specification, so that the WebSocket request can carry the authentication check algorithm supported by the application terminal through the added field.
Step 402, the display device returns a first response message for responding to the WebSocket handshake request to the application terminal.
In this step 402, the first response message carries a first authentication identifier for indicating authentication of the identity of the application, which is implemented by adding an algorithmic field and a nonce field after the standard WebSocket specification responds to the handshake request message. The format of the first packet is as follows:
HTTP/1.1 101Switching Protocols
Upgrade:websocket
Connection:Upgrade
Sec-WebSocket-Accept:HSmrc0sMlYUkAGmm5OPpG2HaGWk=Sec-WebSocket-Protocol:chat
algorithm:md5
nonce:88C4EF58DA7CB956BD04233FBB64E0A4
in this embodiment, the first authentication check algorithm indicated in the first response message is an md5 encryption algorithm, and the first random number is a string of random characters with a length of 32.
Step 403, the application terminal sends an identity authentication request to the display device.
In this step 403, the identity authentication request carries a first authentication parameter, the identity authentication request is sent through an API added in the application for authentication, and the format of the identity authentication request is a JSON format.
In this step 403, the first authentication parameter is generated by the first authentication identifier and the identifier of the application terminal in step 402, in this embodiment, the identifier of the application terminal may be a user name usename and a password set in the application terminal, and the first authentication parameter is calculated by using the method MD5 (username: nonce: password).
Step 404, the display device returns a second response message to the application terminal.
In this step 404, the second response message includes the result that the identity authentication of the application end passes and a second random number, where the second random number is also a string of random characters with a length of 32, but is different from the first random number, and is used to generate a second authentication parameter. In this embodiment, the second authentication parameter is used to authenticate the identity of the request for data interaction sent by the application terminal.
Step 405, the application end sends a data interaction request to the display device.
In this step 405, data interaction is performed between the application and the display device based on the API defined by ATSC 3.0. In step 405, the data interaction request sent by the application end is obtained by adding a token field to the data interaction request sent by the application end, where the token field indicates a second authentication parameter, and the following is a data interaction request sent by the application end:
{
"jsonrpc":"2.0",
"method":"org.atsc.acquire.service",
"token":"21CF3E5F78EE5CF5A9D4137E15363AC9",
"id":37
}
and step 406, after the identity authentication of the request for data interaction sent by the application end is passed, the display device returns a processing result of the data interaction to the application end.
In this step 406, after the identity authentication of the request for data interaction sent by the application end passes, a second verification parameter is generated based on the obtained identifier of the application end and the second random number according to the first authentication verification algorithm; comparing whether the second authentication parameter is matched with the second check parameter, if so, passing the authentication of the identity of the interactive request, and returning the processing result of the interactive request after performing corresponding operation according to the interactive request; if not, the authentication of the identity of the interactive request is not passed, and the interactive request is not processed.
Through the process shown in fig. 4, after receiving a request message for establishing the WebSocket connection with an application end, the identity of the application end is verified, and if the identity authentication of the application end is not passed after verification, the identity of the application end is illegal, so that the WebSocket connection with the application end can be disconnected, and malicious connection with the illegal application end is prevented; after establishing the Websocket with a legal application end, the identity of the received data interaction request is checked to prevent the illegal request from occupying the Websocket connection established with the application end
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (8)

1. A display device, comprising:
a display;
a controller coupled with the display configured to:
when receiving a WebSocket handshake request, returning a first response message to an application terminal sending the WebSocket handshake request, where the first response message carries a first authentication identifier used to indicate that an identity of the application terminal is authenticated, and the first authentication identifier is used to trigger the application terminal to initiate an identity authentication request, where the first authentication identifier at least includes: a first authentication and verification algorithm and a first random number; the first authentication and verification algorithm is used for enabling the application terminal to generate a first authentication parameter based on the first random number and the identification of the application terminal;
when an identity authentication request initiated by the application terminal is received, authenticating a first authentication parameter carried by the identity authentication request, and performing data interaction with the application terminal when the authentication is passed;
after the identity of the application end is authenticated, returning a second response message of the identity authentication request to the application end, where the second response message carries a second authentication identifier for indicating to authenticate the received interaction request, and the second authentication identifier at least includes: a second random number, a validity time of the second random number; the second random number is used for enabling the application terminal to generate a second authentication parameter based on the first authentication verification algorithm, the identifier of the application terminal and the second random number;
the valid time of the second random number is used for indicating the valid time of the second random number, and after the second random number is overtime, the application terminal needs to initiate an identity authentication request again;
and when the data interaction is carried out with the application terminal, authenticating the second authentication parameter carried in the interaction request, and when the authentication is passed, returning the processing result of the interaction request to the application terminal.
2. The display device of claim 1, wherein the first authentication verification algorithm is a configured algorithm within the display device; or,
the first authentication and verification algorithm is an algorithm carried by the WebSocket handshake request.
3. The display device according to claim 1, wherein the controller authenticating the authentication parameter carried by the identity authentication request comprises:
generating a first verification parameter according to a first authentication verification algorithm and based on the obtained identifier of the application terminal and the first random number;
comparing whether the first authentication parameter is matched with the first verification parameter, if so, passing the authentication of the identity of the application end, and maintaining the WebSocket connection with the application end; if not, the identity of the application end is not authenticated, and the WebSocket connection with the application end is disconnected.
4. The display device according to claim 1, wherein the authenticating, by the controller, the second authentication parameter carried in the interaction request sent by the application end includes:
generating a second check parameter according to the first authentication check algorithm and based on the obtained identifier of the application terminal and the second random number;
comparing whether the second authentication parameter is matched with the second check parameter, if so, passing the authentication of the identity of the interactive request, and returning the processing result of the interactive request after performing corresponding operation according to the interactive request; if not, the authentication of the identity of the interactive request is not passed, and the interactive request is not processed.
5. An application-side identity authentication method is characterized by comprising the following steps:
when receiving a WebSocket handshake request, returning a response message to an application terminal sending the WebSocket handshake request, where the response message carries a first authentication identifier used to indicate that an identity of the application terminal is authenticated, and the first authentication identifier is used to trigger the application terminal to initiate an identity authentication request, and the first authentication identifier at least includes: a first authentication and verification algorithm and a first random number; the first authentication and verification algorithm is used for enabling the application terminal to generate a first authentication parameter based on the first random number and the identification of the application terminal;
when an identity authentication request initiated by the application terminal is received, authenticating a first authentication parameter carried by the identity authentication request, and performing data interaction with the application terminal when the authentication is passed;
after the identity of the application end is authenticated, returning a second response message of the identity authentication request to the application end, where the second response message carries a second authentication identifier for indicating to authenticate the received interaction request, and the second authentication identifier at least includes: a second random number, a validity time of the second random number; the second random number is used for enabling the application terminal to generate a second authentication parameter based on the first authentication verification algorithm, the identifier of the application terminal and the second random number;
the valid time of the second random number is used for indicating the valid time of the second random number, and after the second random number is overtime, the application terminal needs to initiate an identity authentication request again;
and when the data interaction is carried out with the application terminal, authenticating a second authentication parameter carried in the interaction request, and returning a processing result of the interaction request to the application terminal when the authentication is passed.
6. The method of claim 5, wherein the first authentication verification algorithm is a configured algorithm within a display device; or,
the first authentication and verification algorithm is an algorithm carried by the WebSocket handshake request.
7. The method according to claim 5, wherein the authenticating the authentication parameters carried by the identity authentication request comprises:
generating a first verification parameter according to a first authentication verification algorithm and based on the obtained identifier of the application terminal and the first random number;
comparing whether the first authentication parameter is matched with the first verification parameter, if so, passing the authentication of the identity of the application end, and maintaining the WebSocket connection with the application end; if not, the identity of the application end is not authenticated, and the WebSocket connection with the application end is disconnected.
8. The method according to claim 5, wherein the authenticating the second authentication parameter carried in the interactive request includes:
generating a second check parameter according to a first authentication check algorithm and based on the obtained identifier of the application terminal and the second random number;
comparing whether the second authentication parameter is matched with the second check parameter, if so, passing the authentication of the identity of the interactive request, and returning the processing result of the interactive request after performing corresponding operation according to the interactive request; if not, the authentication of the identity of the interactive request is not passed, and the interactive request is not processed.
CN202010981258.XA 2020-09-17 2020-09-17 Application terminal identity authentication method and display equipment Active CN112073428B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010981258.XA CN112073428B (en) 2020-09-17 2020-09-17 Application terminal identity authentication method and display equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010981258.XA CN112073428B (en) 2020-09-17 2020-09-17 Application terminal identity authentication method and display equipment

Publications (2)

Publication Number Publication Date
CN112073428A CN112073428A (en) 2020-12-11
CN112073428B true CN112073428B (en) 2022-11-29

Family

ID=73681002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010981258.XA Active CN112073428B (en) 2020-09-17 2020-09-17 Application terminal identity authentication method and display equipment

Country Status (1)

Country Link
CN (1) CN112073428B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937499A (en) * 2006-10-13 2007-03-28 清华大学 Domainname-based unified identification mark and authentication method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060259766A1 (en) * 2005-05-16 2006-11-16 Rasti Mehran R System and method to protect personal identity identifiers
CN101242323B (en) * 2007-02-06 2010-12-08 华为技术有限公司 Establishment method and home network system for pipes between devices
US9699161B2 (en) * 2014-04-29 2017-07-04 Twitter, Inc. Authentication mechanism
CN107995185A (en) * 2017-11-28 2018-05-04 北京信安世纪科技有限公司 A kind of authentication method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937499A (en) * 2006-10-13 2007-03-28 清华大学 Domainname-based unified identification mark and authentication method

Also Published As

Publication number Publication date
CN112073428A (en) 2020-12-11

Similar Documents

Publication Publication Date Title
CN111629259A (en) Image quality adjusting method and display device
CN111601142B (en) Subtitle display method and display equipment
CN111901653B (en) Configuration method of external sound equipment of display equipment and display equipment
CN112272373B (en) Bluetooth device type switching method and display device
KR101698856B1 (en) Image display apparatus for conducting wireless communicatoin among devices and image displaying method thereof
CN111654729B (en) Account login state updating method and display device
CN111726674B (en) HbbTV application starting method and display equipment
CN112004125A (en) Media resource playing method and display equipment
CN111857363A (en) Input method interaction method and display equipment
CN112073428B (en) Application terminal identity authentication method and display equipment
CN111885415B (en) Audio data rapid output method and display device
CN111901677B (en) Method for uniformly controlling process starting and display equipment
CN110708605B (en) Parent lock control method for display equipment and display equipment
CN111405329B (en) Display device and control method for EPG user interface display
CN113010074A (en) Webpage Video control bar display method and display equipment
CN111601147A (en) Content display method and display equipment
CN113438296B (en) Upgrade package downloading method and display device
CN111246282B (en) Program information acquisition method in display equipment and display equipment
CN113094140B (en) System update display method and display equipment
CN111757176B (en) Streaming media file safe playing method and display equipment
CN111901686B (en) Method for keeping normal display of user interface stack and display equipment
CN111756413B (en) Method for adjusting Bluetooth mode on display device and display device
CN111405332B (en) Display device and control method for EPG user interface display
CN112040317B (en) Event response method and display device
CN111601401B (en) Network connection control method and display device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20221020

Address after: 83 Intekte Street, Devon, Netherlands

Applicant after: VIDAA (Netherlands) International Holdings Ltd.

Address before: 9 / F, Hisense south building, 1777 Chuangye Road, Yuehai street, Nanshan District, Shenzhen, Guangdong 518054

Applicant before: HISENSE ELECTRONIC TECHNOLOGY (SHENZHEN) Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant