Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal and wireless control method

A mobile terminal and wireless technology, applied in wireless communication, access restrictions, electrical components, etc., can solve problems such as the inability to limit the range of user activities

Inactive Publication Date: 2013-03-27
KUNDA COMP TECHKUSN +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In some specific places, such as hospitals or government agencies, it is hoped that the mobile terminal will not leave the specific place or area. Usually, the mobile terminal is fixed at a specific location, or the login account and password are used for data access control, but cannot Limit the range of activities of its users 5

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and wireless control method
  • Mobile terminal and wireless control method
  • Mobile terminal and wireless control method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0040] I, the first embodiment (passive detection):

[0041] (1) After the network access device 2 (such as: the capture point) is powered on and connected to the communication network 300 (such as a router or a gateway), it can start to operate and output the beacon data 201 without interruption. The tag data 201 includes SSID information, supported transmission rates, and the MAC address of the wireless network access device 2 .

[0042] (2) The mobile terminal 1 has a built-in table (not shown in the figure), and there are several approved connection data 130 in the built-in table, and when the mobile terminal 1 is turned on, it will receive all network access within the transmittable range The beacon data 201 of the device 2, and then as long as one of the SSID information or the MAC address of the network access device 2 is different from the authorized connection data 130 in the built-in table, it will not be powered on.

[0043] (3) After the mobile terminal 1 is turne...

no. 2 example

[0045] II, the second embodiment (passive detection):

[0046] (1) After the network access device 2 (such as: the capture point) is powered on and connected to the communication network 300 (such as a router or a gateway), it can start to operate and output the beacon data 201 without interruption. The tag data 201 includes SSID information, supported transmission rates, and the MAC address of the wireless network access device 2 .

[0047] (2) The mobile terminal 1 has a built-in table with several approved connection data 130, and when the mobile terminal 1 is turned on, it will receive beacons from all network access devices 2 within the transmission range Data 201, then when only one of the SSID information or MAC address of these network access devices 2 is the same as the approved connection data 130 in the built-in table, it will be turned on.

[0048] (3) The user 5 can see the names of all network access devices 2 within the transmission range in the WIFI network co...

no. 3 example

[0051] III. The third embodiment (active detection):

[0052] (1) The mobile terminal 1 sends a client connection request signal when it is turned on, and receives response signals from all network access devices 2 within the transmission range. Wherein, the response signal is the beacon data 201 , including SSID information, supported transmission rate, and the MAC address of the wireless network access device 2 .

[0053] (2) The mobile terminal 1 has a built-in table with several approved connection data 130. The mobile terminal 1 judges that only one of the SSID messages or MAC addresses of these network access devices 2 matches the built-in table. If the approved connection data 130 in the computer is not the same time, it will not be started.

[0054] (3) After the mobile terminal 1 is turned on, the user 5 can see the names of all network access devices 2 with approved connection data 130 in the WIFI network connection list 401 of the mobile terminal 1, so that the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A mobile terminal receives beacon information transmitted from a network access device in a wireless way. The mobile terminal comprises a wireless communication module, a storage unit and a central processing unit. The wireless communication module is used for receiving the beacon information. The storage unit stores at least one boot program and approval online information. The central processing unit is electrically connected to the wireless communication module, is used for receiving the beacon information when the boot program is executed and determining whether the beacon information is consistent to the approval online information or not, and continues executing the boot program when the beacon information is consistent to the approval online information.

Description

【Technical field】 [0001] The present invention relates to a control method and system of a wireless device, in particular to a mobile terminal and a wireless control method that can only be used within the control range. 【Background technique】 [0002] In some specific places, such as hospitals or government agencies, it is hoped that the mobile terminal will not leave the specific place or area. Usually, the mobile terminal is fixed at a specific location, or the login account and password are used for data access control, but cannot Limit the range of activities of its user 5 . [0003] Take the mobile terminal suitable for wireless LAN (WLAN) as an example, the wireless local area network uses radio waves as the medium for data transmission, and the user 5 uses a mobile terminal, such as a notebook computer, through the access point (Access Point, AP) access to the wireless local area network, its wireless transmission distance is about several meters, widely used in bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/02
Inventor 叶承溱
Owner KUNDA COMP TECHKUSN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products