DISPLAY DEVICE, MOBILE DEVICE AND DISPLAY METHOD

20170228528 · 2017-08-10

    Inventors

    Cpc classification

    International classification

    Abstract

    The present disclosure discloses a display device comprising a display control module and a display module connected to the display control module, wherein the display control module comprises a display drive component and a security component connected to each other. The security component is configured to enable the display device to enter a secure and trusty display mode, and encrypt and decrypt displayed information in the secure and trusty display mode. A mobile device comprising the display device and a method for display using the mobile device are disclosed.

    Claims

    1. A display device comprising a display control module and a display module connected to the display control module, wherein the display control module comprises a display drive component and a security component connected to each other, the security component being configured to enable the display device to enter a secure and trusty display mode, and encrypt and decrypt displayed information in the secure and trusty display mode.

    2. The display device according to claim 1, further comprising a touch module connected to the display control module, and the display control module further comprising a touch identification component connected to the display drive component and the security component.

    3. The display device according to claim 1, wherein the display module further comprises near-field communication antennas integrated therein.

    4. The display device according to claim 2, wherein the touch module further comprises near-field communication antennas integrated therein.

    5. The display device according to claim 1, further comprising a trusty mode indicator light configured to indicate that the display device is in a secure and trusty display mode.

    6. The display device according to claim 1, wherein the display device is a liquid crystal display.

    7. A mobile device comprising a host module and a display device, the display device comprising a display control module and a display module connected to the display control module, wherein the display control module comprises a display drive component and a security component connected to each other, the security component being configured to enable the display device to enter a secure and trusty display mode, and encrypt and decrypt displayed information in the secure and trusty display mode.

    8. The mobile device according to claim 7, comprising near-field communication antennas arranged in the display device, wherein the mobile device is configured to communicate with an external transaction platform via the near-field communication antennas.

    9. A display method using a mobile device, the mobile device comprising a host module and a display device, the display device comprising a display control module and a display module connected to the display control module, wherein the display control module comprises a display drive component and a security component connected to each other, the security component being configured to enable the display device to enter a secure and trusty display mode, and encrypt and decrypt displayed information in the secure and trusty display mode, the method comprising: authenticating, via the security component, a password inputted by a user; if the authentication is successful, the display device entering a secure and trusty display mode; in the secure and trusty display mode, the host module receiving a business message from a trusty service system and forwarding it to the display control module; the security component of the display control module authenticating a received business message; if the authentication is successful, decrypting the business message; and the display drive component controlling the display module to display a decrypted business message.

    10. The method according to claim 9, further comprising: the display drive component receiving a user input and forwarding the user input to the security component; the security component encrypting a received user input to generate a trusty business message; and forwarding an encrypted trusty business message to the trusty service system via the display drive component and the host module for processing.

    11. The display device according to claim 2, further comprising a trusty mode indicator light configured to indicate that the display device is in a secure and trusty display mode.

    12. The display device according to claim 3, further comprising a trusty mode indicator light configured to indicate that the display device is in a secure and trusty display mode.

    13. The display device according to claim 4, further comprising a trusty mode indicator light configured to indicate that the display device is in a secure and trusty display mode.

    14. The display device according to claim 2, wherein the display device is a liquid crystal display.

    15. The display device according to claim 3, wherein the display device is a liquid crystal display.

    16. The display device according to claim 4, wherein the display device is a liquid crystal display.

    17. The mobile device according to claim 7, wherein the display device further comprising a touch module connected to the display control module, and the display control module further comprising a touch identification component connected to the display drive component and the security component.

    18. The mobile device according to claim 7, wherein the display module further comprises near-field communication antennas integrated therein.

    19. The mobile device according to claim 17, wherein the touch module further comprises near-field communication antennas integrated therein.

    20. The mobile device according to claim 7, wherein the display device further comprising a trusty mode indicator light configured to indicate that the display device is in a secure and trusty display mode.

    Description

    BRIEF DESCRIPTION OF DRAWINGS

    [0034] These and other aspects of the present disclosure will be described in more detail with reference to the drawings that illustrate the embodiments of the present disclosure. In the drawings,

    [0035] FIG. 1 illustrates a schematic block diagram of a display device according to embodiments of the present disclosure;

    [0036] FIG. 2 illustrates a schematic block diagram of a display device according to embodiments of the present disclosure;

    [0037] FIG. 3 illustrates a schematic block diagram of a display device according to embodiments of the present disclosure; and

    [0038] FIG. 4 illustrates a flow chart of a display method according to embodiments of the present disclosure.

    DETAILED DESCRIPTION

    [0039] The present disclosure will be described below more comprehensively with reference to the drawings in which the currently preferred embodiments of the present disclosure are illustrated. However, the present disclosure may be embodied by many different forms and should not be construed as being limited to the embodiments stated herein. For integrity and thoroughness, these embodiments are provided for conveying the scope of the present disclosure to those skilled in the art comprehensively.

    [0040] As shown in FIG. 1, the display device comprises a display control module M2 and a display module M3 connected to the display control module. The display control module M2 may comprise a display drive component S1 and a security component S2 connected to each other, wherein the security component S2 is configured to enable the display device to enter a secure and trusty display mode and encrypt and decrypt displayed information in the secure and trusty display mode. In this structure, the security component S2 is directly connected to the display drive component S1. The display module M3 can display the content decrypted by the security component S2 only when the display drive module sets the display module M3 in a secure and trusty display mode, thereby ensuring that the content seen by the user is information authenticated by the security component S2.

    [0041] In operation, the security component S2 provides the user with a specific secure and trusty environment, i.e. secure and trusty display mode. In this mode, the security component receives a business message from the service system of the mobile device background which is forwarded by the display drive component S1, and performs authentication and security examination of the business message. When the security authentication of the business message performed by the security component is unsuccessful or the security component determines that the business message is untrusty, the security component rejects performing decryption and outputting a corresponding trusty business message. The display drive component does not receive a trusty business message, and consequently terminates the display or displays risk prompting information according to the indication of the security component and returns the corresponding processing result to the background service system. When the authentication of the business message by the security component is successful, the security component decrypts the business message and returns the decrypted trusty business message to the display drive component. The display drive component converts the trusty business message into display information and displays the decrypted trusty business message to the user by controlling the display module.

    [0042] As shown in FIG. 2, the mobile device comprises a host module M1 and a display device. As compared to the display device shown in FIG. 1, the display device shown in FIG. 2 further comprises a touch module M4 connected to the display control module M2, and the display control module M2 further comprises a touch identification component S3 connected to the display drive component S1 and the security component S2. That is to say, the display device is a display device with touch function. In this case, when the application in the host module of the mobile device requires the display device to enter a secure and trusty display mode, the display drive component M2 may request the user to input information via the touch module. The information may be a user password for the security component S2 to authenticate the identity of the device possessor, and may also be user sensitive information (e.g. bank account, transaction amount, etc) returned as requested by the business message. When the display device switches from the general display state to the secure and trusty display mode, in accordance with a preset security policy, the user is required to submit the user password to the security component. The security component checks the legality of the user password to determine that the one who uses the current device is a legal possessor. When the authentication of the user password is successful, the security component notifies the display drive component and the display device to enter the secure and trusty display mode. In this mode, the display drive component no longer receives and processes general display instruction requests that may contain false, deceptive information which is sent by the host module M1. If the authentication of the user password is unsuccessful, the display drive component rejects entering into the secure and trusty display mode but still receives the general display instruction requests of the host module. Consequently, the risk that the display device is misused or embezzled by other persons than the approved user can be decreased.

    [0043] In addition, the display device may optionally comprise near-field communication (NFC) antennas integrated therein. Specifically, the NFC antennas may be integrated in the display module M3, as shown in FIGS. 1 and 3. Alternatively, the NFC antennas may be integrated in the touch module M4, as shown in FIG. 2.

    [0044] The integration of the NFC antennas in the display device can not only prevent impact of the devices such as display screen on the communication effect of the NFC antennas caused by combination and design of the NFC antennas only at the time of designing the complete machine, but also facilitate simplification of the design of the complete machine of the NFC payment product, thereby improving the NFC communication effect and the transaction success rate of the mobile payment.

    [0045] As shown in FIGS. 1-3, the display device may further optionally comprise a trusty mode indicator light configured to indicate that the display device is in a secure and trusty display mode so as to hint to the user that the display device is in a secure and trusty display mode. Specifically, when the display device is in a secure and trusty display mode, the trusty mode indicator light may emit light or flicker; otherwise, the trusty mode indicator light is extinguished. Alternatively, when the display device is in a secure and trusty display mode, the trusty mode indicator light may have a first color (e.g. green color); otherwise, the trusty mode indicator light has a second color (e.g. red color) so as to provide the user with a hint about the display mode in which the display device is.

    [0046] It is to be noted that although the trusty mode indicator light is shown in the drawings as being located in the display mode M3, the trusty mode indicator light may be located at any position of the display device. In accordance with an example, the trusty mode indicator may be located at the same side with the display screen of the display device such that the user can see the hint of the trusty mode indicator light at any moment. The trusty mode indicator light is also advantageous to improvement of the user's experience of the trusty business and increase in the user's will of using a business such as mobile payment at a high information security level.

    [0047] In embodiments of the present disclosure, a mobile device is provided, which comprises a host module and any display device described above, as well as a trusty service system in communication with the display device. The trusty service system is equivalent to a business background of the mobile device, which is in communication with the display device so as to display the trusty business message on the display device or receive from the display device and process the trusty business message.

    [0048] In an example, the mobile device comprises near-field communication antennas arranged in the display device, wherein the mobile device is configured to communicate with an external transaction platform via the near-field communication antennas. The security component of the display control module enables the mobile device to download an electronic wallet in the secure and trusty display mode. The mobile device communicates with the external transaction platform via the near-field communication antennas and accomplishes the transaction with the external transaction platform using the electronic wallet.

    [0049] By using the above mobile device in the transaction, the security of the transaction payment can be improved, the user's experience can be enhanced, and the user's confidence in use of a mobile payment can be boosted.

    [0050] FIG. 4 shows a flow chart of a secure and trusty display method according to embodiments of the present disclosure. As shown in FIG. 4, in the course of entering the secure and trusty mode, the host module of the mobile device receives from the host application a request for entering a secure and trusty display mode, enables the display drive component to enter the secure and trusty display mode and requests the user to input a password on the display module. When the user inputs a password via the touch module or other input modules of display device, the display drive component receives the user's password and passes the user's password to the security component for authentication. If the authentication is unsuccessful, the security component notifies the display drive component to quit the secure and trusty display mode, and the host module further rejects the secure and trusty display mode. If the authentication is successful, the security component notifies the display module to enter the secure and trusty display mode.

    [0051] Thereafter, during the message display and message processing process, the trusty service system sends a business message to the host module. After receiving the business message, the host module forwards it to the display drive component and the display drive component forwards it to the security component. The security component performs security examination and authentication of the business message. When the authentication of the business message is unsuccessful, the security component notifies the display drive component to reject subsequent procedures. When the authentication of the business message is successful, the security component decrypts the business message and notifies the display drive component to display the decrypted business message.

    [0052] The above method enables authentication of the user by the display device and display of the trusty business message from the trusty service system to the user. On one hand, when the application in the host module of the mobile device requires the display device to enter a secure and trusty display mode, the display drive component can request the user to input a password. The security component authenticates the received user's password. When the authentication is successful, the display drive component enables the display device to enter the secure and trusty mode; otherwise, the display drive component rejects entering the trusty display mode. Consequently, the risk that the display device is misused or embezzled by other persons than the approved user can be decreased. On the other hand, the security component provides the user with a specific secure and trusty environment, i.e. secure and trusty display mode. In this mode, the security component performs authentication and security examination of the business message from the service system of the mobile device background. When the authentication of the business message is unsuccessful or the security component determines that the business message is insecure, the display drive component rejects displaying subsequent procedures of the business message, thereby eliminating the risk of providing insecure information to the user. When the authentication of the business message is successful or the security component determines that the business message is secure, the security component decrypts the business message, and the display drive component controls the display module to display the decrypted business message to the user. In this way, the user, when in the secure and trusty display mode, is always presented with secure information, thus the user's confidence in the security of the mobile device can be boosted.

    [0053] Alternatively, during the process of processing the trusty input business message, the host module requests the user to input trusty information. The user inputs information via the touch module or other input modules. The display module receives the user's input and forwards it to the security component. The security component encrypts the received user's input to produce a trusty business message. Finally, the encrypted trusty business message is forwarded to the trusty service system via the display drive component and the host module for processing.

    [0054] When entering the secure and trusty display mode, a display drive chip takes over the outputs of the touch module or other input modules such that the user's input results are inputted to the security component for encryption and then returned to the host module so as to ensure that the sensitive information inputted by the user is already in an encrypted state and only the approved business background can perform decryption to obtain the information inputted by the user.

    [0055] Those skilled in the art recognize that the present disclosure is by no means limited to the illustrative embodiments described above. On the contrary, many amendments and modifications are possible within the scope of the enclosed claims. For example, the trusty mode indicator light may be a dedicated display area on the display screen, and may also be a display LED lamp independently mounted.

    [0056] The present disclosure may be widely applied to various mobile devices, including intelligent mobile phone, tablet computer, intelligent watch, other mobile devices with display device, and so on.

    [0057] Furthermore, those skilled in the art, when practicing the claimed disclosure, can understand and implement the modifications of the disclosed embodiments by studying the drawings, the text and the enclosed claims. In the claims, the word “comprising” does not exclude other elements or steps. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.