CN113301432B - Display device, terminal device and communication connection method - Google Patents

Display device, terminal device and communication connection method Download PDF

Info

Publication number
CN113301432B
CN113301432B CN202110527064.7A CN202110527064A CN113301432B CN 113301432 B CN113301432 B CN 113301432B CN 202110527064 A CN202110527064 A CN 202110527064A CN 113301432 B CN113301432 B CN 113301432B
Authority
CN
China
Prior art keywords
timestamp
display device
equipment
display
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110527064.7A
Other languages
Chinese (zh)
Other versions
CN113301432A (en
Inventor
武支友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vidaa Netherlands International Holdings BV
Original Assignee
Vidaa Netherlands International Holdings BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vidaa Netherlands International Holdings BV filed Critical Vidaa Netherlands International Holdings BV
Priority to CN202110527064.7A priority Critical patent/CN113301432B/en
Publication of CN113301432A publication Critical patent/CN113301432A/en
Application granted granted Critical
Publication of CN113301432B publication Critical patent/CN113301432B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a display device, a terminal device and a communication connection method. The display device may receive a communication connection request carrying a timestamp of the terminal device, which is sent by the terminal device, and send the timestamp of the display device to the terminal device. The terminal device may obtain the first timestamp according to the timestamp of the terminal device and the timestamp of the display device, and send the first timestamp to the display device. And the display equipment checks the first timestamp and sends a checking result to the terminal equipment. And when the verification result is correct, the terminal equipment acquires the first pre-shared secret key according to the first time stamp and sends the first pre-shared secret key to the display equipment. The display device verifies the first pre-shared key, so that the identity of the terminal device is verified. Because the pre-shared key PSK is obtained by utilizing the timestamp, the PSK can be dynamically changed, the dynamic PSK cannot be reused when being leaked, and the safety during identity authentication can be improved.

Description

Display device, terminal device and communication connection method
Technical Field
The present application relates to the field of display device technologies, and in particular, to a display device, a terminal device, and a communication connection method.
Background
With the rapid development of artificial intelligence technology and the continuous improvement of living standard of people, people have higher and higher intelligent demand on the intelligent television, and the intelligent television can integrate functions such as audio and video, games and the like through the internet technology. The user can also use the terminal device to be in communication connection with the intelligent television, so that interaction between the terminal device and the intelligent television is realized.
Before the terminal equipment and the intelligent television are in communication connection, authentication is needed, and when the authentication passes, the display equipment can allow the terminal equipment to be in communication connection. The display device may authenticate the terminal device by using a PSK (Pre-shared Key). When the terminal equipment sends a communication connection request to the display equipment, the PSK can be sent to the display equipment together, the display equipment can verify the PSK, and when the PSK passes the verification, the display equipment allows the communication connection request, so that communication interaction is realized.
However, the inventor of the present application finds that, when the smart television performs the authentication on the terminal device, the PSK is generally preset, and meanwhile, in the authentication process, the PSK is fixed and unchanged, and different terminal devices can perform the authentication by using the PSK. When PSK is revealed, the PSK is easy to be used by an illegal attacker and is connected with the intelligent television, so that serious risk hidden danger is caused, and the safety is low.
Disclosure of Invention
The application provides a display device, a terminal device and a communication connection method. The problem of lower security when carrying out identity authentication to terminal equipment in current display device is solved.
In a first aspect, the present application provides a display device comprising a display, a communicator, and a controller. Wherein the communicator is configured to receive information input by the terminal device; the controller is configured to perform the steps of:
when a communication connection request which is sent by terminal equipment and carries a timestamp of the terminal equipment is received, the timestamp of display equipment is sent to the terminal equipment, so that the terminal equipment can obtain a first timestamp according to the timestamp of the terminal equipment and the timestamp of the display equipment; receiving the first time stamp sent by the terminal equipment, and verifying the first time stamp; sending the verification result to the terminal equipment so that the terminal equipment obtains a first pre-shared secret key according to the first time stamp when the verification result is correct; receiving the first pre-shared secret key sent by the terminal equipment, and verifying the first pre-shared secret key; if the verification result is correct, allowing the communication connection request; and if the verification result is wrong, rejecting the communication connection request.
In some implementations, in performing the step of verifying the first timestamp, the controller is further configured to: processing the timestamp of the terminal equipment and the timestamp of the display equipment based on a preset first algorithm to obtain a second timestamp; judging whether the first timestamp and the second timestamp are the same; and if the first time stamp is the same as the second time stamp, the verification result is correct.
In some implementations, in performing the step of verifying the first pre-shared key, the controller is further configured to: acquiring equipment information and network information of display equipment; acquiring an initial pre-shared secret key according to the equipment information, the network information and the first time stamp; encrypting the initial pre-shared secret key to obtain a second pre-shared secret key of the display equipment; determining whether the second pre-shared key is the same as the first pre-shared key; if the second pre-shared key is the same as the first pre-shared key, the verification result is correct.
In some implementations, in performing the step of obtaining an initial pre-shared key from the device information, the network information, and the first timestamp, the server is further configured to: converting the equipment information into a first integer of a preset type, converting the network information into a second integer of the preset type, and converting the first timestamp into a third integer of the preset type; subjecting the first integer to OR processing in sequence by using the second integer and the third integer to obtain an OR result; and intercepting a preset digit in the secret key or the result, and converting the preset digit into a preset type of result to obtain an initial pre-shared secret key.
In some implementations, prior to performing the step of obtaining the device information and the network information of the display device, the controller is further configured to: detecting whether the first pre-shared key is 0; rejecting the communication connection request when the first pre-shared key is 0; and when the first pre-shared key is not 0, executing the step of acquiring the equipment information and the network information of the display equipment.
In some implementations, prior to performing the step of verifying the first pre-shared key, the server is further configured to: acquiring first network information of the terminal equipment sending the first timestamp; acquiring second network information of the terminal equipment which sends the first pre-shared secret key; judging whether the first network information and the second network information are the same; performing a step of verifying the first pre-shared key when the first network information and the second network information are the same.
In a second aspect, the present application provides a terminal device configured to perform the following steps:
sending a communication connection request to a display device, wherein the communication connection request carries a timestamp of a terminal device; receiving a time stamp of the display device sent by the display device; acquiring a first timestamp according to the timestamp of the terminal device and the timestamp of the display device, and sending the first timestamp to the display device so that the display device verifies the first timestamp; receiving a verification result sent by display equipment; when the verification result is correct, acquiring a first pre-shared secret key according to the first time stamp; and sending the first pre-shared key to the display device so that the display device verifies the first pre-shared key.
In some implementations, in performing the step of obtaining the first timestamp from the timestamp of the terminal device and the timestamp of the display device, the terminal device is further configured to: and processing the time stamp of the terminal equipment and the time stamp of the display equipment based on a preset first algorithm to obtain a first time stamp.
In some implementations, in performing the step of obtaining the first pre-shared key from the first timestamp, the terminal device is further configured to: acquiring equipment information and network information of display equipment; acquiring an initial pre-shared secret key according to the equipment information, the network information and the first time stamp; and encrypting the initial pre-shared secret key to obtain a first pre-shared secret key.
In a third aspect, the present application provides a communication connection method applied to a display device, where the method includes:
when a communication connection request which is sent by a terminal device and carries a timestamp of the terminal device is received, the timestamp of a display device is sent to the terminal device, so that the terminal device can obtain a first timestamp according to the timestamp of the terminal device and the timestamp of the display device; receiving the first time stamp sent by the terminal equipment, and verifying the first time stamp; sending the verification result to the terminal equipment so that the terminal equipment obtains a first pre-shared secret key according to the first time stamp when the verification result is correct; receiving the first pre-shared secret key sent by the terminal equipment, and verifying the first pre-shared secret key; if the verification result is correct, allowing the communication connection request; and if the verification result is wrong, rejecting the communication connection request.
According to the technical scheme, the display device can receive the communication connection request which is sent by the terminal device and carries the timestamp of the terminal device, and the timestamp of the display device is sent to the terminal device. The terminal device can obtain the first timestamp according to the timestamp of the terminal device and the timestamp of the display device, and send the first timestamp to the display device. And the display equipment checks the first timestamp and sends a checking result to the terminal equipment. And when the verification result is correct, the terminal equipment acquires the first pre-shared secret key according to the first time stamp and sends the first pre-shared secret key to the display equipment. The display device verifies the first pre-shared secret key, and accordingly identity verification is conducted on the terminal device. Since the pre-shared key PSK is obtained using the time stamp, the PSK may be dynamically changed. Meanwhile, the time stamps when the PSK and the terminal equipment send the communication connection request are matched, even if the PSK is leaked, if the time stamps are not matched with the PSK, the PSK cannot be reused, and therefore safety during identity authentication is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
In order to more clearly describe the technical solution of the present application, the drawings required to be used in the embodiments will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive labor.
FIG. 1 illustrates a usage scenario of a display device according to some embodiments;
fig. 2 illustrates a hardware configuration block diagram of the control apparatus 100 according to some embodiments;
fig. 3 illustrates a hardware configuration block diagram of the display apparatus 200 according to some embodiments;
FIG. 4 illustrates a software configuration diagram in the display device 200 according to some embodiments;
FIG. 5 illustrates an icon control interface display of an application in the display device 200, in accordance with some embodiments;
FIG. 6 is a schematic diagram of a user interface in one possible embodiment;
FIG. 7 is a flowchart illustrating an embodiment of a method for generating a reply message according to the present application;
fig. 8 is a schematic flowchart of another embodiment of a method for generating a reply sentence according to the present application;
fig. 9 is a flowchart illustrating a method for generating a response word according to another embodiment of the present application.
Detailed Description
To make the objects, embodiments and advantages of the present application clearer, the following is a clear and complete description of exemplary embodiments of the present application with reference to the attached drawings in exemplary embodiments of the present application, and it is apparent that the exemplary embodiments described are only a part of the embodiments of the present application, and not all of the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the exemplary embodiments described herein without making any inventive step, are intended to be within the scope of the claims appended hereto. In addition, while the disclosure herein has been presented in terms of one or more exemplary examples, it should be appreciated that aspects of the disclosure may be implemented solely as a complete embodiment.
It should be noted that the brief descriptions of the terms in the present application are only for convenience of understanding of the embodiments described below, and are not intended to limit the embodiments of the present application. These terms should be understood in their ordinary and customary meaning unless otherwise indicated.
The terms "first," "second," "third," and the like in the description and claims of this application and in the foregoing drawings are used for distinguishing between similar or analogous objects or entities and are not necessarily intended to limit the order or sequence Unless otherwise indicated. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein.
Furthermore, the terms "comprises" and "comprising," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a product or device that comprises a list of elements is not necessarily limited to those elements explicitly listed, but may include other elements not expressly listed or inherent to such product or device.
The term "module," as used herein, refers to any known or later developed hardware, software, firmware, artificial intelligence, fuzzy logic, or combination of hardware and/or software code that is capable of performing the functionality associated with that element.
The term "remote control" as used in this application refers to a component of an electronic device (such as the display device disclosed in this application) that is typically wirelessly controllable over a relatively short range of distances. Typically using infrared and/or Radio Frequency (RF) signals and/or bluetooth to connect with the electronic device, and may also include WiFi, wireless USB, bluetooth, motion sensor, etc. For example: the hand-held touch remote controller replaces most of the physical built-in hard keys in the common remote control device with the user interface in the touch screen.
The term "gesture" as used in this application refers to a user's behavior through a change in hand shape or an action such as hand motion to convey a desired idea, action, purpose, and/or result.
Fig. 1 is a schematic diagram of a usage scenario of a display device according to an embodiment. As shown in fig. 1, the display apparatus 200 is also in data communication with a server 400, and a user can operate the display apparatus 200 through the smart device 300 or the control device 100.
In some embodiments, the control apparatus 100 may be a remote controller, and the communication between the remote controller and the display device includes at least one of an infrared protocol communication or a bluetooth protocol communication, and other short-distance communication methods, and the display device 200 is controlled by a wireless or wired method. The user may control the display apparatus 200 by inputting a user instruction through at least one of a key on a remote controller, a voice input, a control panel input, and the like.
In some embodiments, the smart device 300 may include any of a mobile terminal, a tablet, a computer, a laptop, an AR/VR device, and the like.
In some embodiments, the smart device 300 may also be used to control the display device 200. For example, the display device 200 is controlled using an application program running on the smart device.
In some embodiments, the smart device 300 and the display device may also be used for communication of data.
In some embodiments, the display device 200 may also be controlled in a manner other than the control apparatus 100 and the smart device 300, for example, the voice instruction control of the user may be directly received by a module configured inside the display device 200 to obtain a voice instruction, or may be received by a voice control apparatus provided outside the display device 200.
In some embodiments, the display device 200 is also in data communication with a server 400. The display device 200 may be allowed to be communicatively connected through a Local Area Network (LAN), a Wireless Local Area Network (WLAN), and other networks. The server 400 may provide various contents and interactions to the display apparatus 200. The server 400 may be a cluster or a plurality of clusters, and may include one or more types of servers.
In some embodiments, software steps executed by one step execution agent may be migrated on demand to another step execution agent in data communication therewith for execution. Illustratively, software steps performed by the server may be migrated to be performed on a display device in data communication therewith, and vice versa, as desired.
Fig. 2 exemplarily shows a block diagram of a configuration of the control apparatus 100 according to an exemplary embodiment. As shown in fig. 2, the control device 100 includes a controller 110, a communication interface 130, a user input/output interface 140, a memory, and a power supply. The control apparatus 100 may receive an input operation instruction from a user and convert the operation instruction into an instruction recognizable and responsive by the display device 200, serving as an interaction intermediary between the user and the display device 200.
In some embodiments, the communication interface 130 is used for external communication, and includes at least one of a WIFI chip, a bluetooth module, NFC, or an alternative module.
In some embodiments, the user input/output interface 140 includes at least one of a microphone, a touchpad, a sensor, a key, or an alternative module.
Fig. 3 shows a hardware configuration block diagram of the display apparatus 200 according to an exemplary embodiment.
In some embodiments, the display apparatus 200 includes at least one of a tuner demodulator 210, a communicator 220, a detector 230, an external device interface 240, a controller 250, a display 260, an audio output interface 270, a memory, a power supply, a user interface.
In some embodiments the controller comprises a central processor, a video processor, an audio processor, a graphics processor, a RAM, a ROM, a first interface to an nth interface for input/output.
In some embodiments, the display 260 includes a display screen component for displaying pictures, and a driving component for driving image display, a component for receiving image signals from the controller output, displaying video content, image content, and menu manipulation interface, and a user manipulation UI interface, etc.
In some embodiments, the display 260 may be at least one of a liquid crystal display, an OLED display, and a projection display, and may also be a projection device and a projection screen.
In some embodiments, the tuner demodulator 210 receives broadcast television signals via wired or wireless reception, and demodulates audio/video signals, such as EPG data signals, from a plurality of wireless or wired broadcast television signals.
In some embodiments, communicator 220 is a component for communicating with external devices or servers according to various communication protocol types. For example: the communicator may include at least one of a Wifi module, a bluetooth module, a wired ethernet module, and other network communication protocol chips or near field communication protocol chips, and an infrared receiver. The display apparatus 200 may establish transmission and reception of control signals and data signals with the control device 100 or the server 400 through the communicator 220.
In some embodiments, the detector 230 is used to collect signals of the external environment or interaction with the outside. For example, detector 230 includes a light receiver, a sensor for collecting ambient light intensity; alternatively, the detector 230 includes an image collector, such as a camera, which may be used to collect external environment scenes, attributes of the user, or user interaction gestures, or the detector 230 includes a sound collector, such as a microphone, which is used to receive external sounds.
In some embodiments, the external device interface 240 may include, but is not limited to, the following: high Definition Multimedia Interface (HDMI), analog or data high definition component input interface (component), composite video input interface (CVBS), USB input interface (USB), RGB port, and the like. The interface may be a composite input/output interface formed by the plurality of interfaces.
In some embodiments, the controller 250 and the modem 210 may be located in different separate devices, that is, the modem 210 may also be located in an external device of the main device where the controller 250 is located, such as an external set-top box.
In some embodiments, the controller 250 controls the operation of the display device and responds to user operations through various software control programs stored in memory. The controller 250 controls the overall operation of the display apparatus 200. For example: in response to receiving a user command for selecting a UI object to be displayed on the display 260, the controller 250 may perform an operation related to the object selected by the user command.
In some embodiments, the object may be any one of selectable objects, such as a hyperlink, an icon, or other actionable control. The operations related to the selected object are: displaying an operation connected to a hyperlink page, document, image, or the like, or performing an operation of a program corresponding to the icon.
In some embodiments the controller comprises at least one of a Central Processing Unit (CPU), a video processor, an audio processor, a Graphics Processing Unit (GPU), a RAM Random Access Memory (RAM), a ROM (Read-Only Memory), a first to nth interface for input/output, a communication Bus (Bus), and the like.
A CPU processor. For executing operating system and application program instructions stored in the memory, and executing various application programs, data and contents according to various interactive instructions receiving external input, so as to finally display and play various audio-video contents. The CPU processor may include a plurality of processors. E.g. comprising a main processor and one or more sub-processors.
In some embodiments, a graphics processor for generating various graphics objects, such as: at least one of an icon, an operation menu, and a user input instruction display figure. The graphic processor comprises an arithmetic unit which carries out operation by receiving various interactive instructions input by a user and displays various objects according to display attributes; the system also comprises a renderer for rendering various objects obtained based on the arithmetic unit, wherein the rendered objects are used for being displayed on a display.
In some embodiments, the video processor is configured to receive an external video signal, and perform at least one of video processing such as decompression, decoding, scaling, noise reduction, frame rate conversion, resolution conversion, and image synthesis according to a standard codec protocol of the input signal, so as to obtain a signal displayed or played on the direct display device 200.
In some embodiments, the video processor includes at least one of a demultiplexing module, a video decoding module, an image compositing module, a frame rate conversion module, a display formatting module, and the like. The demultiplexing module is used for demultiplexing the input audio and video data stream. And the video decoding module is used for processing the demultiplexed video signal, including decoding, scaling and the like. And the image synthesis module, such as an image synthesizer, is used for performing superposition mixing processing on the GUI signal input by the user or generated by the user and the video image after the zooming processing by the graphics generator so as to generate an image signal for display. And the frame rate conversion module is used for converting the frame rate of the input video. And the display formatting module is used for converting the received video output signal after the frame rate conversion, and changing the signal to be in accordance with the signal of the display format, such as an output RGB data signal.
In some embodiments, the audio processor is configured to receive an external audio signal, perform at least one of decompression and decoding, and denoising, digital-to-analog conversion, and amplification processing according to a standard codec protocol of the input signal, and obtain a sound signal that can be played in the speaker.
In some embodiments, a user may enter user commands on a Graphical User Interface (GUI) displayed on display 260, and the user input interface receives the user input commands through the Graphical User Interface (GUI). Alternatively, the user may input the user command by inputting a specific sound or gesture, and the user input interface receives the user input command by recognizing the sound or gesture through the sensor.
In some embodiments, a "user interface" is a media interface for interaction and information exchange between an application or operating system and a user that enables conversion between an internal form of information and a form that is acceptable to the user. A commonly used presentation form of the User Interface is a Graphical User Interface (GUI), which refers to a User Interface related to computer operations and displayed in a graphical manner. It may be an interface element such as an icon, a window, a control, etc. displayed in the display screen of the electronic device, where the control may include at least one of an icon, a button, a menu, a tab, a text box, a dialog box, a status bar, a navigation bar, a Widget, etc. visual interface elements.
In some embodiments, user interface 280 is an interface that may be used to receive control inputs (e.g., physical keys on the body of the display device, or the like).
In some embodiments, the system of the display device may include a Kernel (Kernel), a command parser (shell), a file system, and an application. The kernel, shell, and file system together make up the basic operating system structure that allows users to manage files, run programs, and use the system. After power-on, the kernel is started, kernel space is activated, hardware is abstracted, hardware parameters are initialized, and virtual memory, a scheduler, signals and interprocess communication (IPC) are operated and maintained. And after the kernel is started, loading the Shell and the user application program. The application program is compiled into machine code after being started, and a process is formed.
Referring to fig. 4, in some embodiments, the system is divided into four layers, which are an Application (Applications) layer (abbreviated as "Application layer"), an Application Framework (Application Framework) layer (abbreviated as "Framework layer"), an Android runtime (Android runtime) and system library layer (abbreviated as "system runtime library layer"), and a kernel layer from top to bottom.
In some embodiments, at least one application program runs in the application program layer, and the application programs may be windows (windows) programs carried by an operating system, system setting programs, clock programs or the like; or an application developed by a third party developer. In particular implementations, the application packages in the application layer are not limited to the above examples.
The framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions. The application framework layer acts as a processing center that decides to let the applications in the application layer act. The application program can access the resources in the system and obtain the services of the system in execution through the API interface.
As shown in fig. 4, in the embodiment of the present application, the application framework layer includes a manager (Managers), a Content Provider (Content Provider), and the like, where the manager includes at least one of the following modules: an Activity Manager (Activity Manager) is used for interacting with all activities running in the system; a Location Manager (Location Manager) for providing access to the system Location service to the system service or application; a Package Manager (Package Manager) for retrieving various information related to an application Package currently installed on the device; a Notification Manager (Notification Manager) for controlling display and clearing of Notification messages; a Window Manager (Window Manager) is used to manage the icons, windows, toolbars, wallpapers, and desktop components on a user interface.
In some embodiments, the activity manager is used to manage the lifecycle of the various applications and the usual navigation fallback functions, such as controlling exit, opening, fallback, etc. of the applications. The window manager is used for managing all window programs, such as obtaining the size of a display screen, judging whether a status bar exists, locking the screen, intercepting the screen, controlling the change of the display window (for example, reducing the display window, displaying a shake, displaying a distortion deformation, and the like), and the like.
In some embodiments, the system runtime layer provides support for the upper layer, i.e., the framework layer, and when the framework layer is used, the android operating system runs the C/C + + library included in the system runtime layer to implement the functions to be implemented by the framework layer.
In some embodiments, the kernel layer is a layer between hardware and software. As shown in fig. 4, the core layer includes at least one of the following drivers: audio drive, display driver, bluetooth drive, camera drive, WIFI drive, USB drive, HDMI drive, sensor drive (like fingerprint sensor, temperature sensor, pressure sensor etc.) and power drive etc..
In some embodiments, the display device may directly enter the interface of the preset vod program after being activated, and the interface of the vod program may include at least a navigation bar 510 and a content display area located below the navigation bar 510, as shown in fig. 5, where the content displayed in the content display area may change according to the change of the selected control in the navigation bar. The programs in the application program layer can be integrated in the video-on-demand program and displayed through one control of the navigation bar, and can also be further displayed after the application control in the navigation bar is selected.
In some embodiments, the display device may directly enter a display interface of a signal source selected last time after being started, or a signal source selection interface, where the signal source may be a preset video-on-demand program, or may be at least one of an HDMI interface, a live tv interface, and the like, and after a user selects different signal sources, the display may display contents obtained from different signal sources.
The terminal equipment and the intelligent television are required to be subjected to identity verification before being in communication connection, and when the identity verification is passed, the display equipment can allow the terminal equipment to be subjected to communication connection. However, when the smart television authenticates the identity of the terminal device, the PSK is generally preset, and meanwhile, in the authentication process, the PSK is fixed, and different terminal devices can use the PSK to perform identity authentication. When PSK is revealed, the PSK is easy to be used by an illegal attacker and is connected with the intelligent television, so that serious risk hidden danger is caused, and the safety is low.
In order to solve the above technical problem, an embodiment of the present application provides a display device, which includes a display, a communicator and a controller. Wherein the display is configured to display a user interface; the communicator is configured to receive information input by the terminal device. The terminal device may be a mobile terminal, a notebook computer or a tablet computer.
In some embodiments, the display device may be provided with a communication mode. Before the terminal device performs communication connection with the display device, it needs to send a communication connection request to the display device.
When the communication mode is closed, the display device does not receive the communication connection request transmitted by the terminal device. At the moment, the display device does not allow the terminal device to carry out communication connection, and at the moment, the display device does not carry out information interaction with any terminal device.
When the communication mode is started, the display device receives a communication connection request sent by the terminal device. At this time, the display device may allow the terminal device and the display device to perform communication connection, thereby implementing information interaction. The user may input a communication mode on command to the display device, and when the controller receives the communication mode on command, the display device may be controlled to enter a communication mode.
In some embodiments, the user may transmit a communication mode on instruction to the display device by operating a designated key of the remote controller. And in the process of actual application, the corresponding relation between the communication mode starting command and the remote controller key is bound in advance. For example, a communication mode key is provided on the remote controller, and when the user touches the communication mode key, the remote controller may send a communication mode start instruction to the controller, and at this time, the controller controls the display device to enter a communication mode. When the user touches the key again, the controller may control the display device to exit the communication mode.
In some embodiments, the correspondence between the communication mode opening instruction and the plurality of remote controller keys may also be pre-bound, and when the user touches the plurality of keys bound to the communication mode opening instruction, the remote controller sends the communication mode opening instruction. In a feasible embodiment, the keys bound by the communication mode enabling command are direction keys (left, down, left, down) in sequence, that is, when the user continuously touches the keys (left, down, left, down) within a preset time, the remote controller sends the communication mode enabling command to the controller. By adopting the binding method, the communication mode starting instruction can be prevented from being sent out due to misoperation of a user.
The embodiment of the application is only an exemplary binding relationship between the communication mode opening instruction and the key, and the binding relationship between the communication mode opening instruction and the key can be set according to the habit of the user in the actual application process, which is not limited herein.
In some embodiments, when the user controls the display device using the smart device, for example, using a cell phone, a communication mode on instruction may also be sent to the display device. In the process of practical application, a communication mode control can be set in the mobile phone, and a user can select whether to enter a communication mode or not through the communication mode control. When the user selects to enter the communication mode, the mobile phone can send a communication mode starting instruction to the controller, and the controller controls the display device to enter the communication mode.
In some embodiments, when the user uses the mobile phone to control the display device, a continuous click command may be issued to the mobile phone. The continuous click command refers to: in a preset period, the number of times that a user clicks the same area of the mobile phone touch screen exceeds a preset threshold value. For example: when the user clicks a certain area of the mobile phone touch screen for 3 times in 1s, the user is regarded as a continuous clicking instruction. After receiving the continuous click command, the mobile phone can send a communication mode starting command to the display device, so that the controller controls the display device to enter a communication mode.
In some embodiments, when the user uses the mobile phone to control the display device, the following may be set: when detecting that a touch pressure value of a certain area of the mobile phone touch screen by a user exceeds a preset pressure threshold, the mobile phone can send a communication mode starting instruction to the display device.
A communication mode option may also be set in the UI interface of the display device, and when the user clicks on the option, the display device may be controlled to enter or exit the communication mode.
In some embodiments, when the display device is in the communication mode, an authentication mode may be further set in consideration of security. When the identity authentication mode is closed, the display device does not perform identity authentication on the terminal device, and at the moment, the terminal device can be directly in communication connection with the display device. That is, when the terminal device transmits a communication connection request to the display device, the display device may not authenticate the communication connection request, thereby directly performing communication connection with the terminal device.
When the identity authentication mode is started, the display equipment can carry out identity authentication on the terminal equipment. Namely, when the display device receives the communication connection request sent by the terminal device, the communication connection request is verified, and when the verification is passed, the communication connection request is allowed, so that the communication connection is carried out with the terminal device.
FIG. 6 shows a schematic diagram of a user interface in a possible embodiment. When the user selects to turn on the communication mode, the user can further select to turn on the identity authentication mode or turn off the identity authentication mode.
The user can use the terminal device and the display device to make a communication connection. The communication connection request is sent to the display device, so as to interact with the display device, for example, some media resources are downloaded from the display device, or media resources in the terminal device are uploaded to the display device for playing.
In some embodiments, the terminal device may send a communication connection request to the display device. Meanwhile, the communication connection request also carries a timestamp Tm1 of the terminal device, which can represent a time element for the terminal device to send the communication connection request.
When the display device receives the communication connection request, the controller may record and save the time stamp Tm1 of the terminal device. And meanwhile, the controller can obtain the timestamp Tt1 of the display device and send the timestamp Tt1 to the terminal device, and the timestamp Tt1 of the display device can represent the time element for the display device to reply the communication connection request. I.e. the display device may exchange timestamps with the terminal device.
After the display device and the terminal device exchange the time stamps, the terminal device may acquire the first time stamp T1 from the time stamp Tt1 of the display device and the time stamp Tm1 of the terminal device.
In some embodiments, the terminal device may process the timestamp Tm1 of the terminal device and the timestamp Tt1 of the display device based on a preset first algorithm, resulting in the first timestamp T1.
In some embodiments, the preset first algorithm may be averaging. That is, the first time stamp T1 is an average value of the time stamp Tt1 of the display device and the time stamp Tm1 of the terminal device. T1= (Tt 1+ Tm 1)/2
In some embodiments, the preset first algorithm may also be a weight calculation method. By giving different weights to the time stamp Tt1 of the display device and the time stamp Tm1 of the terminal device, for example, the weight of the time stamp Tt1 of the display device is a and the weight of the time stamp Tm1 of the terminal device is b. Then T1= a Tt1+ b Tm1
The embodiments of the present application are merely exemplary to provide several preset first algorithms, and the preset first algorithms may be set by a user in a practical application process, which is not limited herein.
The first timestamp T1 is obtained from the timestamp Tt1 of the display device and the timestamp Tm1 of the terminal device, and may represent both timestamps and may also represent a timestamp exchange process between the display device and the terminal device. Therefore, other terminal devices cannot acquire the first timestamp of the current terminal device, and the safety of identity authentication can be improved.
In some embodiments, after the mobile terminal acquires the first timestamp T1, the first timestamp T1 may be sent to the display device.
The display device may check the first timestamp T1 after receiving the first timestamp T1.
In some embodiments, when the display device verifies the first timestamp T1, the second timestamp T2 may be obtained according to the timestamp Tt1 of the display device and the timestamp Tm1 of the terminal device.
In some embodiments, the controller may process the timestamp Tm1 of the terminal device and the timestamp Tt1 of the display device based on a preset first algorithm to obtain a second timestamp T2. At this time, the controller may determine whether the first time stamp T1 and the second time stamp T2 are the same. If the first time stamp is the same as the second time stamp, the verification result is correct; and if the first time stamp T1 and the second time stamp T2 are not the same, the verification result is an error.
It should be noted that, since the method adopted by the controller when acquiring the second timestamp T2 is the same as the method adopted by the terminal device when acquiring the first timestamp T1. The first time stamp T1 and the second time stamp T2 are therefore theoretically identical.
When the first timestamp T1 is the same as the second timestamp T2, it is indicated that the terminal device and the display device adopt the same first algorithm, and the same timestamp is processed, which can prove that the terminal device exchanging the timestamp with the display device and the terminal device sending the first timestamp are the same terminal device, and can improve the security of the authentication. Meanwhile, the first timestamp T1 is the same as the second timestamp T2, which also indicates that no error occurs when the terminal device transmits data to the display device, and the accuracy of the identity authentication can be improved.
In some embodiments, after the display device verifies the first timestamp T1, the verification result may be sent to the terminal device.
And when the verification result is correct, the controller can send ACK confirmation information to the terminal equipment, so that the identity authentication of the terminal equipment is continued. When the check result is an error, the controller may transmit NG information to the terminal device to notify the terminal device that the first timestamp is erroneous, at which time the display device rejects the communication connection request of the terminal device. If the terminal device wants to continue the communication connection with the display device, the communication connection request and the time stamp need to be sent to the display device again, and the above process is repeated until the controller confirms that the first time stamp is correct.
In some embodiments, the terminal device may continue to perform the authentication when the verification result is received and the verification result is correct.
In some embodiments, the terminal device may obtain device information and network information of the display device.
The device information may be Mac addresses of the display devices, and each display device may have a fixed Mac address. The network information may be an IP address of the display device, and when the display device is connected to a network, an IP address may be generated, and when the display device is connected to a different network, the IP address may be changed. When sending a communication connection request to the display device, the terminal device is connected to the same network as the display device. The terminal device may obtain the IP address of the display device through the currently connected network.
In some embodiments, after acquiring the device information and the network information of the display device, the terminal device may acquire the initial pre-shared key according to the device information, the network information, and the first timestamp T1.
The terminal device may convert the device information into a first integer of a preset type. For example, the Mac address can be converted into the first integer of the long type, which is denoted as LLm.
In some embodiments, the device information is a Mac address of the display device, and the terminal device may convert the Mac address into a long type. For example, the Mac address is 10E7C62832FC, represented by 12 bits 16. The address may be converted to 2, denoted 100001110011111000110001010000011001011111100, with 48 bits total.
The long type of number occupies 64 bits, and when the number of bits of the converted address is insufficient, the high bits may be filled with 1. For example, the address is converted into 48 bits and then 16 bits, and the 16 bits are complemented by 1, and the data after complementing 1 is 1111111111111100001110011111000110001000011001011111111100. Then converting the data into a 10-system data to obtain: 16596724075780, i.e. the first integer. A negative number indicates that the most significant bit of the longlong type is 1.
In some embodiments, the terminal device may further convert the network information into a second integer of the preset type, and convert the first timestamp into a third integer of the preset type. For example, an IP address is converted into a second integer of long type in a 10-system manner, which is denoted as LLi; and converting the first timestamp T1 into a third integer of the long type in a 10-system manner, and recording the third integer as LLt.
For example, the network information is an IP address, specifically 192.168.1.132. It is converted into 2-system, which is expressed as 11000000101010000000000110000100, and has 32 bits. Then, the data is converted into a long type with 64 bits, and the rest of the high 32 bits can be complemented with 0. Finally, the value is converted into a 10-ary value, which is represented by 3232235908, namely a second integer.
The time stamp itself is 32 bits of data, so that the time stamp is converted into a long type with 64 bits, and 0 can be complemented for the remaining upper 32 bits. And then the third integer is obtained by converting the value into a 10-system value.
In some embodiments, the terminal device may perform an exclusive nor process on the first integer LLm in sequence by using the second integer LLi and the third integer LLt to obtain an exclusive nor result LLr. Or the algorithm processed may be expressed as:
LLr=LLm xor Lli xor LLt
wherein: xor is the OR operator and LLr is the OR result.
After obtaining the or result LLr, the terminal device may intercept a predetermined number of bits in the or result LLr.
In some embodiments, the terminal device may intercept the lower N bits of either the result LLr. N can be set by the user, and the value range can be 8 to 32. For example, it may be either truncated or the lower 8 bits of the result LLr. The specific interception method may also be set by the user, and is not limited herein.
After the predetermined number of bits in the result LLr or the intercepted result is captured, the captured result may be converted in 16-ary to obtain the initial pre-shared key. The initial pre-shared key is now unencrypted.
In some embodiments, the terminal device may encrypt the initial pre-shared key in view of security for authentication.
In some embodiments, the initial pre-shared key may be encrypted using salt encryption. When the parameter is set, the salt value may be set to the first timestamp T1, so as to perform salt encryption on the initial pre-shared key, and obtain an encrypted initial pre-shared key, that is, the first pre-shared key of the terminal device.
The first pre-shared key is obtained by combining the timestamp Tm1 of the terminal device, the timestamp Tt1 of the display device, the device information, and the network information. When any one of the timestamp, the device information, and the network information changes, the obtained first pre-shared key is different. Therefore, dynamic change of the pre-shared key PSK can be realized instead of being fixed, and the safety during identity authentication is improved.
In some embodiments, the terminal device may send the first pre-shared key to the display device for authentication.
In some embodiments, when the display device receives the first pre-shared key, a detection may be performed on the terminal device that transmitted the first pre-shared key to determine whether the terminal device and the terminal device that transmitted the first timestamp T1 are the same device. Considering that the first timestamp T1 is dangerous to be revealed, if the other terminal device Q obtains the first timestamp T1, the first pre-shared key may also be obtained and sent to the display device. At this time, the terminal device Q may not send the communication connection request to the display device, and therefore, there is a possibility of an illegal communication connection, and therefore, the display device needs to detect whether the terminal devices sending information twice are the same, so as to improve the security of the identity authentication.
The display device may acquire the first network information of the terminal device P that transmits the first timestamp T1. And then acquiring second network information of the terminal device Q which sends the first pre-shared secret key. Because the terminal device and the display device are connected in the same network, the display device can acquire the network information of the terminal device through the currently connected network.
The display apparatus may determine whether the first network information and the second network information are the same. When the first network information is the same as the second network information, it indicates that the terminal devices sending information twice are the same, and at this time, the terminal devices can be continuously authenticated. When the first network information and the second network information are different, the terminal device which sends information twice is not the same, and the display device can reject the communication connection request.
In some embodiments, the display device may detect whether the first pre-shared key is 0 when verifying the first pre-shared key. When the first pre-shared key 0 is used, it may be that an error occurs in the terminal device during data transmission, which may result in a failure of the terminal device to send information. It is also possible that the terminal device does not obtain the first pre-shared key but sends 0 directly to the display device, i.e. there is a malicious connection.
The display device may therefore reject the communication connection request when detecting that the first pre-shared key is 0. When the first pre-shared key is not 0, the display device may continue to verify the first pre-shared key.
In some embodiments, the display device may obtain the second pre-shared key when verifying the first pre-shared key.
The method for the display device to obtain the second pre-shared key may be the same as the method for the terminal device to obtain the first pre-shared key. The method specifically comprises the following steps: the controller acquires device information and network information of the display device. And acquiring an initial pre-shared secret key according to the equipment information, the network information and the first time stamp. The above steps may be referred to for obtaining the initial pre-shared key, and are not described herein again. The controller encrypts the initial pre-shared key to obtain a second pre-shared key of the display device. The encryption method may be salt encryption.
In some embodiments, when the display device obtains the second pre-shared key, it may be determined whether the second pre-shared key and the first pre-shared key are the same.
It should be noted that, since the method adopted by the controller when acquiring the second pre-shared key is the same as the method adopted by the terminal device when acquiring the first pre-shared key. Thus, in theory, the first pre-shared key and the second pre-shared key are also the same.
In some embodiments, the controller may determine whether the second pre-shared key and the first pre-shared key are the same by using the following method.
The controller may invert all bits of the first pre-shared key and then phase-wise-with the second pre-shared key. If the final result is 0, it indicates whether the second pre-shared key and the first pre-shared key are the same.
When the second pre-shared key is the same as the first pre-shared key, the result is verified to be correct. The terminal equipment acquires the pre-shared key PSK by adopting a correct step, so that the display equipment can allow the communication connection request, and the terminal equipment and the display equipment are in communication connection.
When the second pre-shared key is different from the first pre-shared key, the verification result is an error. The terminal device does not acquire the pre-shared key PSK in a correct step, and the display device rejects the communication connection request.
When the display device provided in the embodiment of the present application acquires the pre-shared key PSK, the timestamp Tm1 of the terminal device, the timestamp Tt1 of the display device, the device information, and the network information need to be used at the same time. When any one of the pieces of information is changed, the PSK is also changed, and thus even if the PSK is leaked, the display device is not illegally connected.
For example, since different television apparatuses have different apparatus information, when the PSK of the television a leaks, it is also impossible to connect the television B with the leaked PSK.
Because different devices in the same network have different IPs, the same device in different networks also has different IPs. Therefore, different devices in the same network and the same device in different networks cannot share the same PSK.
At the same time, PSK uses the timestamp, which is always in a refreshed state. Different time stamps can correspond to different PSKs, so the obtained PSKs also dynamically change, and even if the dynamic PSKs are leaked, the dynamic PSKs cannot be reused, so that the safety during identity authentication is greatly improved.
Referring to fig. 7, a schematic flow chart of a communication connection method provided in the embodiment of the present application is applied to a display device, and specifically, the method includes:
step 701, when a communication connection request carrying a timestamp of a terminal device and sent by the terminal device is received, sending the timestamp of a display device to the terminal device, so that the terminal device obtains a first timestamp according to the timestamp of the terminal device and the timestamp of the display device;
step 702, receiving the first timestamp sent by the terminal device, and verifying the first timestamp;
step 703, sending the verification result to the terminal device, so that the terminal device obtains a first pre-shared key according to the first timestamp when the verification result is correct;
step 704, receiving the first pre-shared key sent by the terminal device, and verifying the first pre-shared key;
step 705, if the verification result is correct, allowing the communication connection request; and if the verification result is wrong, rejecting the communication connection request.
Referring to fig. 8, a schematic flowchart of a communication connection method provided in an embodiment of the present application is applied to a terminal device, and the method includes:
step 801, sending a communication connection request to a display device, wherein the communication connection request carries a timestamp of a terminal device;
step 802, receiving a timestamp of the display device sent by the display device;
step 803, acquiring a first timestamp according to the timestamp of the terminal device and the timestamp of the display device, and sending the first timestamp to the display device, so that the display device verifies the first timestamp;
step 804, receiving a verification result sent by the display equipment;
step 805, when the verification result is correct, obtaining a first pre-shared key according to the first timestamp;
step 806, sending the first pre-shared key to the display device, so that the display device verifies the first pre-shared key.
An embodiment of the present application further provides a communication connection method, as shown in fig. 9, the method includes:
the terminal equipment sends a communication connection request to the display equipment, and the communication connection request carries a timestamp of the terminal equipment;
when the display equipment receives the communication connection request, the timestamp of the display equipment is sent to the terminal equipment;
the terminal equipment acquires a first timestamp according to the timestamp of the terminal equipment and the timestamp of the display equipment and sends the first timestamp to the display equipment;
the display equipment checks the first timestamp and sends a checking result to the terminal equipment;
when the verification result is correct, the terminal equipment acquires a first pre-shared secret key according to the first time stamp and sends the first pre-shared secret key to the display equipment;
the display equipment verifies the first pre-shared secret key; if the verification result is correct, allowing the communication connection request; and if the verification result is wrong, rejecting the communication connection request.
The same and similar parts in the embodiments in this specification are referred to each other, and are not described herein again.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be substantially or partially embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the method of the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.
The foregoing description, for purposes of explanation, has been presented in conjunction with specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the embodiments to the precise forms disclosed above. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles and the practical application, to thereby enable others skilled in the art to best utilize the embodiments and various embodiments with various modifications as are suited to the particular use contemplated.

Claims (8)

1. A display device, comprising:
a display;
a communicator configured to receive information input by a terminal device;
a controller configured to:
when a communication connection request which is sent by a terminal device and carries a timestamp of the terminal device is received, the timestamp of a display device is sent to the terminal device, so that the terminal device processes the timestamp of the terminal device and the timestamp of the display device based on an averaging method or a weight calculation method to obtain a first timestamp;
receiving the first timestamp sent by the terminal equipment, and processing the timestamp of the terminal equipment and the timestamp of the display equipment based on an averaging method or a weight calculation method to obtain a second timestamp; judging whether the first timestamp and the second timestamp are the same; if the first timestamp is the same as the second timestamp, the verification result is correct; if the first timestamp is different from the second timestamp, the verification result is an error;
sending the verification result to the terminal equipment so that the terminal equipment obtains a first pre-shared secret key according to the first time stamp when the verification result is correct; the first pre-shared key is generated according to device information of a display device, network information and the first timestamp;
receiving the first pre-shared secret key sent by the terminal equipment, and verifying the first pre-shared secret key;
if the verification result is correct, allowing the communication connection request; and if the verification result is wrong, rejecting the communication connection request.
2. The display device of claim 1, wherein in performing the step of verifying the first pre-shared key, the controller is further configured to:
acquiring equipment information and network information of display equipment;
acquiring an initial pre-shared secret key according to the equipment information, the network information and the first time stamp;
encrypting the initial pre-shared secret key to obtain a second pre-shared secret key of the display equipment;
determining whether the second pre-shared key is the same as the first pre-shared key;
if the second pre-shared key is the same as the first pre-shared key, the verification result is correct.
3. The display device of claim 2, wherein in performing the step of obtaining an initial pre-shared key from the device information, the network information, and the first timestamp, the controller is further configured to:
converting the equipment information into a first integer of a preset type, converting the network information into a second integer of the preset type, and converting the first timestamp into a third integer of the preset type;
subjecting the first integer to OR processing in sequence by using the second integer and the third integer to obtain an OR result;
and intercepting a preset digit in the secret key or the result, and converting the preset digit into a preset type of result to obtain an initial pre-shared secret key.
4. The display device of claim 2, wherein prior to performing the step of obtaining device information and network information for the display device, the controller is further configured to:
detecting whether the first pre-shared key is 0;
rejecting the communication connection request when the first pre-shared key is 0;
and when the first pre-shared secret key is not 0, executing the step of acquiring the equipment information and the network information of the display equipment.
5. The display device of claim 1, wherein prior to performing the step of verifying the first pre-shared key, the controller is further configured to:
acquiring first network information of the terminal equipment sending the first timestamp;
acquiring second network information of the terminal equipment which sends the first pre-shared secret key;
judging whether the first network information and the second network information are the same;
performing a step of verifying the first pre-shared key when the first network information and the second network information are the same.
6. A terminal device, characterized in that the terminal device is configured to:
sending a communication connection request to a display device, wherein the communication connection request carries a timestamp of a terminal device;
receiving a time stamp of the display device sent by the display device;
processing the timestamp of the terminal equipment and the timestamp of the display equipment based on an averaging method or a weight calculation method to obtain a first timestamp, and sending the first timestamp to the display equipment, so that the display equipment processes the timestamp of the terminal equipment and the timestamp of the display equipment based on the averaging method or the weight calculation method to obtain a second timestamp, and the display equipment judges whether the first timestamp and the second timestamp are the same, if so, the check result is correct, and if not, the check result is wrong;
receiving a verification result sent by display equipment;
when the verification result is correct, acquiring a first pre-shared secret key according to the first time stamp; the first pre-shared key is generated according to device information of a display device, network information and the first timestamp;
and sending the first pre-shared key to the display equipment so that the display equipment verifies the first pre-shared key, allowing the communication connection request by the display equipment when the verification result is correct, and rejecting the communication connection request when the verification result is wrong.
7. The terminal device of claim 6, wherein in performing the step of obtaining the first pre-shared key from the first timestamp, the terminal device is further configured to:
acquiring equipment information and network information of display equipment;
acquiring an initial pre-shared secret key according to the equipment information, the network information and the first time stamp;
and encrypting the initial pre-shared secret key to obtain a first pre-shared secret key.
8. A communication connection method is applied to a display device, and is characterized by comprising the following steps:
when a communication connection request which is sent by a terminal device and carries a timestamp of the terminal device is received, the timestamp of a display device is sent to the terminal device, so that the terminal device processes the timestamp of the terminal device and the timestamp of the display device based on an averaging method or a weight calculation method to obtain a first timestamp;
receiving the first timestamp sent by the terminal equipment, and processing the timestamp of the terminal equipment and the timestamp of the display equipment based on an averaging method or a weight calculation method to obtain a second timestamp; judging whether the first timestamp and the second timestamp are the same; if the first timestamp is the same as the second timestamp, the verification result is correct; if the first timestamp is different from the second timestamp, the verification result is an error;
sending the verification result to the terminal equipment so that the terminal equipment obtains a first pre-shared secret key according to the first time stamp when the verification result is correct; the first pre-shared key is generated according to device information of a display device, network information and the first timestamp;
receiving the first pre-shared secret key sent by the terminal equipment, and verifying the first pre-shared secret key;
if the verification result is correct, allowing the communication connection request; and if the verification result is wrong, rejecting the communication connection request.
CN202110527064.7A 2021-05-14 2021-05-14 Display device, terminal device and communication connection method Active CN113301432B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110527064.7A CN113301432B (en) 2021-05-14 2021-05-14 Display device, terminal device and communication connection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110527064.7A CN113301432B (en) 2021-05-14 2021-05-14 Display device, terminal device and communication connection method

Publications (2)

Publication Number Publication Date
CN113301432A CN113301432A (en) 2021-08-24
CN113301432B true CN113301432B (en) 2023-01-06

Family

ID=77322097

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110527064.7A Active CN113301432B (en) 2021-05-14 2021-05-14 Display device, terminal device and communication connection method

Country Status (1)

Country Link
CN (1) CN113301432B (en)

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719910B (en) * 2009-11-16 2015-02-11 北京数字太和科技有限责任公司 Terminal equipment for realizing content protection and transmission method thereof
US8762715B2 (en) * 2009-11-24 2014-06-24 Sony Corporation Event triggered pairing of wireless communication devices based on time measurements
CN103259768B (en) * 2012-02-17 2018-06-19 中兴通讯股份有限公司 A kind of message authentication method, system and device
US9077693B2 (en) * 2013-09-23 2015-07-07 Netflix, Inc. Securely connecting control device to target device
CN103634109B (en) * 2013-10-31 2017-02-08 小米科技有限责任公司 Operation right authentication method and device
CN104468607B (en) * 2014-12-24 2017-09-22 四川金网通电子科技有限公司 multi-server authentication method
CN105553951B (en) * 2015-12-08 2019-11-08 腾讯科技(深圳)有限公司 Data transmission method and device
US10491382B2 (en) * 2016-08-16 2019-11-26 iDevices, LLC Secure authentication of devices without server assistance or pre-shared credentials
CN106169955B (en) * 2016-09-29 2019-04-19 广州供电局有限公司 The safety certifying method and system of distribution network terminal wireless maintenance
KR101936080B1 (en) * 2017-10-26 2019-04-03 순천향대학교 산학협력단 Ksi-based authentication and communication method for secure smart home environment and system therefor
US10797868B2 (en) * 2018-05-31 2020-10-06 Irdeto B.V. Shared secret establishment
CN108900306A (en) * 2018-07-02 2018-11-27 四川斐讯信息技术有限公司 A kind of production method and system of wireless router digital certificate
CN109617669B (en) * 2018-11-30 2022-02-22 广州高清视信数码科技股份有限公司 Authentication method of set top box remote controller based on hash algorithm and terminal equipment
CN110224999B (en) * 2019-05-20 2022-02-18 深圳壹账通智能科技有限公司 Information interaction method and device and storage medium
CN110730071A (en) * 2019-10-29 2020-01-24 南方电网科学研究院有限责任公司 Power distribution communication equipment safety access authentication method, device and equipment
CN111818074B (en) * 2020-07-17 2022-08-05 上海朝夕网络技术有限公司 Distributed network node authentication method based on chip
CN112149100A (en) * 2020-09-01 2020-12-29 长沙市到家悠享网络科技有限公司 Verification method, verification device, electronic equipment and storage medium
CN112788033B (en) * 2021-01-13 2022-09-20 京东方科技集团股份有限公司 Authentication method and authentication system

Also Published As

Publication number Publication date
CN113301432A (en) 2021-08-24

Similar Documents

Publication Publication Date Title
US9846783B2 (en) Multiscreen secure content access
KR101707462B1 (en) Mobile computing device technology and systems and methods utilizing the same
KR102285850B1 (en) User terminal apparatus, communication system and control method thereof
CN114286143B (en) Display device and automatic switching method of transmission protocol
CN111787377B (en) Display device and screen projection method
WO2016026532A1 (en) User authentication using a randomized keypad over a drm secured video path
CN114286165B (en) Display equipment, mobile terminal, and screen-throwing data transmission method and system
CN113821184A (en) Pairing method of control device and display equipment
CN112486934B (en) File synchronization method and display device
CN114286137A (en) Mirror image screen projection method, display device and terminal
CN113301432B (en) Display device, terminal device and communication connection method
KR20120022156A (en) Image display apparatus for conducting wireless communicatoin among devices and image displaying method thereof
CN112134855B (en) Cookie encryption method and display device
CN112256449B (en) Interface calling method of webpage application program, display equipment and server
CN112965677B (en) Display device and information prompting method
CN111818368B (en) Method for managing display device authority, mobile terminal and server
CN112583578B (en) Display equipment and safety upgrading method thereof
CN114286320A (en) Display device, mobile terminal and Bluetooth connection method
CN111787117A (en) Data transmission method and display device
CN113569220A (en) CAM card automatic identification method, identification device and display equipment
CN117411651A (en) Display device, server and service credential writing method
CN113347501B (en) Video playing method and device
CN116956248A (en) Display equipment and method for login verification of display equipment system
CN114915835A (en) Display device and audio data transmission method thereof
CN114449325A (en) Display device, mobile terminal and data interaction method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20221018

Address after: 83 Intekte Street, Devon, Netherlands

Applicant after: VIDAA (Netherlands) International Holdings Ltd.

Address before: 266555, No. 218, Bay Road, Qingdao economic and Technological Development Zone, Shandong

Applicant before: Hisense Visual Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant