Wireless connection authentication method and device
A wireless connection and verification code technology, applied in the computer field, can solve the problems of inflexible use, inflexible and convenient password management of wireless connection devices, etc., and achieve the effect of improving the flexibility of use and increasing the difficulty.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] refer to figure 1 , which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:
[0090] Step 110, within the current time period, judge the authority information sent by any terminal according to the login password and the authority verification code used by the wireless connection device within the current time period.
[0091] In the embodiment of the present invention, for each time period, the wireless connection device will obtain a login password for logging into the wireless connection device within the current time period, and an authority verification code for confirming the resident user's authority.
[0092] The user can send permission information to the wireless connection device in any time period, and the wireless connection device judges the received permission information according to the login password and the permission verification code.
[009...
Embodiment 2
[0150] On the basis of Embodiment 1, the embodiment of the present invention adopts the temporary user table in the wireless connection device to grant the temporary login authority to the terminal of the temporary user, and adopts the resident user table to grant the login authority of the resident user to the terminal of the resident user .
[0151] refer to figure 2 , which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:
[0152] Step 210, within the current time period, judge the authority information sent by any terminal according to the login password and the authority verification code used by the wireless connection device within the current time period.
[0153] Step 220, if the received authority information includes a login password but not an authority verification code, allow the terminal to log in, and write the identity information of the terminal in...
Embodiment 3
[0166] On the basis of Embodiment 1, this embodiment of the present invention adopts a user table with a preset authority field. In the user table, the terminal of a temporary user is given a temporary login authority in the form of a temporary mark, and the terminal of a resident user is given a temporary login authority in the form of a permanent user. The form of the resident token grants the login authority of its resident users.
[0167] refer to image 3 , which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:
[0168] Step 310, within the current time period, judge the authority information sent by any terminal according to the login password and the authority verification code used by the wireless connection device within the current time period.
[0169] Step 320, if the received authority information includes a login password but not an authority verificati...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com