Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for realizing wireless access point connection authentication

一种无线接入点、接入点的技术,应用在计算机领域,能够解决认证过程繁琐、无法满足连接认证多样化、便捷化需求、连接认证方式单一等问题,达到减少手动操作的过程、满足便捷化需求的效果

Active Publication Date: 2016-09-07
SHANGHAI ZHANGMEN TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The connection authentication method is relatively single, and the authentication process is cumbersome, requiring the user to manually participate in the connection authentication process, which cannot meet the diverse and convenient requirements for connection authentication when the user connects to the wireless access point, and is not conducive to improving user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing wireless access point connection authentication
  • Method and device for realizing wireless access point connection authentication
  • Method and device for realizing wireless access point connection authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The application will be described in further detail below in conjunction with the accompanying drawings.

[0020] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0021] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0022] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a method and device for realizing wireless access point connection authentication. The method includes the steps of acquiring the connection authentication request of a user device during the connection with a target wireless access point, and executing the authentication module corresponding to the access point type information to complete the connection authentication of the target wireless access point based on the access point type information corresponding to the target wireless access point. Compared with the prior art, the method and device can meet the diversified demand on the connection authentication when the users access to the wireless access points in actual use and meet the needs of connection authentication of various types of wireless access points. Meanwhile, the authentication module can realize automatic connection authentication and reduces the manual operation of the users, thereby meeting convenient demand on connection authentication when the users access to the wireless access points.

Description

technical field [0001] The present application relates to the field of computers, in particular to a technology for realizing connection authentication of wireless access points. Background technique [0002] In the prior art, when a user equipment needs to access a wireless network, for example, when the user equipment connects to a WiFi (wireless fidelity, wireless fidelity) network, it generally first searches for wireless access points around the device based on the user equipment, and then selects The target wireless access point initiates a network access request, and some wireless access points need to perform corresponding connection authentication during the user connection process. Usually, the user receives the authentication page corresponding to the target wireless access point and performs the authentication. Enter the mobile phone number on the page, and manually click to send the verification code, and then based on the verification code received by the mobil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W48/16H04W84/12H04W12/06
CPCH04W12/08H04W48/16H04W84/12H04L63/20H04W12/06H04W88/08H04W12/73
Inventor 苏勇
Owner SHANGHAI ZHANGMEN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products