Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless connection authentication method and device

A wireless connection and verification code technology, applied in the computer field, can solve the problems of inflexible use, inflexible and convenient password management of wireless connection devices, etc., and achieve the effect of improving the flexibility of use and increasing the difficulty.

Active Publication Date: 2016-07-06
VIVO MOBILE COMM CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. Not flexible enough to use
Therefore, for owner B, the password management of his wireless connection device is not flexible and convenient enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless connection authentication method and device
  • Wireless connection authentication method and device
  • Wireless connection authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] refer to figure 1 , which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0090] Step 110, within the current time period, judge the authority information sent by any terminal according to the login password and the authority verification code used by the wireless connection device within the current time period.

[0091] In the embodiment of the present invention, for each time period, the wireless connection device will obtain a login password for logging into the wireless connection device within the current time period, and an authority verification code for confirming the resident user's authority.

[0092] The user can send permission information to the wireless connection device in any time period, and the wireless connection device judges the received permission information according to the login password and the permission verification code.

[009...

Embodiment 2

[0150] On the basis of Embodiment 1, the embodiment of the present invention adopts the temporary user table in the wireless connection device to grant the temporary login authority to the terminal of the temporary user, and adopts the resident user table to grant the login authority of the resident user to the terminal of the resident user .

[0151] refer to figure 2 , which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0152] Step 210, within the current time period, judge the authority information sent by any terminal according to the login password and the authority verification code used by the wireless connection device within the current time period.

[0153] Step 220, if the received authority information includes a login password but not an authority verification code, allow the terminal to log in, and write the identity information of the terminal in...

Embodiment 3

[0166] On the basis of Embodiment 1, this embodiment of the present invention adopts a user table with a preset authority field. In the user table, the terminal of a temporary user is given a temporary login authority in the form of a temporary mark, and the terminal of a resident user is given a temporary login authority in the form of a permanent user. The form of the resident token grants the login authority of its resident users.

[0167] refer to image 3 , which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0168] Step 310, within the current time period, judge the authority information sent by any terminal according to the login password and the authority verification code used by the wireless connection device within the current time period.

[0169] Step 320, if the received authority information includes a login password but not an authority verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless connection authentication method and device and belongs to the computer technical field. According to one embodiment of the invention, the wireless connection authentication method comprises the steps that: in a current time period, if received authority information of a terminal contains a login password and does not contain an authority authentication code, the terminal is allowed to perform login and is bestowed with a temporary login authority; if the received authority information of the terminal contains the login password and the authority authentication code, the terminal is allowed to perform login and is bestowed with a resident login authority; a new login password and an authority authentication code are generated so as to be used in a next time period; and after a wireless connection device uses the new login password, the terminal with the temporary login authority is removed from a login state, and the login state of the terminal with the resident login authority is maintained. With the wireless connection authentication method and device of the invention adopted, the security of the wireless connection device is high, the wireless connection device has little possibility of being cracked down by violent forces, wireless signals have little possibility of being squatted, operation is simple, and use is flexible.

Description

technical field [0001] The embodiment of the present invention relates to the field of computer technology, and in particular to a wireless connection authentication method and device. Background technique [0002] With the development of technology, many terminal devices can connect to a certain wireless connection device through wireless connection for networking and other operations. Computers, handheld devices and other terminals are connected to each other wirelessly) to routers and other wireless connection devices to connect to the Internet; of course, many terminal devices can also connect to other wireless connection devices through other wireless connection methods, such as mobile phones through Bluetooth and other wireless methods are connected to other terminals to transfer files and other operations. [0003] Moreover, for the safety of the wireless network or the wireless connection device, a login password is generally set on the side of the wireless connecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08
CPCH04W74/00
Inventor 齐好鑫
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products