WIFI password transmission method through NFC connection

A password and password information technology, applied in connection management, wireless communication, wireless communication services, etc., can solve the problems of uncontrolled number of access terminals, no password protection, and inability to request interference from the Internet.

Active Publication Date: 2017-06-13
环玺信息科技(上海)有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are problems with the two current methods. The first method has a simple networking process and does not require the owner of the hotspot to participate in the networking process. However, without password protection, one is insecure. The other problem is that the number of access terminals is uncontrolled and cons...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0011] Step 1: When the user consumes at the merchant, establish a communication connection with the NFC module of the cash register through the NFC module of the smartphone, and the NFC module of the smartphone sends the payment account information preset by the user to the cash register;

[0012] Step 2: The cash register debits the payment account by connecting with the server. After receiving the notification message of successful deduction from the server, the cash register saves the NFC logo in the WIFI permission list;

[0013] Step 3: When the user wishes to log in to the WIFI network, the NFC module of the smart phone establishes a communication connection with the NFC module of the cash register, and sends a request message requesting access to WIFI, which includes the identification of the NFC module of the smart phone;

[0014] Step 4: After receiving the request message, the NFC module of the cash register checks whether the logo exists in the permission list. If i...

Embodiment 2

[0018] Step 1: When the user consumes at the merchant, establish a communication connection with the NFC module of the cash register through the NFC module of the smartphone, and the NFC module of the smartphone sends the payment account information preset by the user to the cash register;

[0019] Step 2: The cash register debits the payment account by connecting to the server. When the notification message of successful deduction is obtained from the server, the cash register saves the NFC logo in the WIFI permission list, and registers for the payment account. Identifies the record entry time;

[0020] Step 3: When the user wishes to log in to the WIFI network, the NFC module of the smart phone establishes a communication connection with the NFC module of the cash register, and sends a request message requesting access to WIFI, which includes the identification of the NFC module of the smart phone;

[0021] Step 4: After receiving the request message, the NFC module of the ...

Embodiment 3

[0026] Step 1: When the user consumes at the merchant, establish a communication connection with the NFC module of the cash register through the NFC module of the smartphone, and the NFC module of the smartphone sends the payment account information preset by the user to the cash register;

[0027] Step 2: The cash register debits the payment account by connecting to the server. When the notification message of successful deduction is obtained from the server, the cash register saves the NFC logo in the WIFI permission list, and registers for the payment account. Identify the record entry time, and give the corresponding allowed time to use WIFI according to the amount of the message;

[0028] Step 3: When the user wishes to log in to the WIFI network, the NFC module of the smart phone establishes a communication connection with the NFC module of the cash register, and sends a request message requesting access to WIFI, which includes the identification of the NFC module of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a WIFI password transmission method through a NFC connection. The method comprises the steps that in step 1, a user establishes a communications connection at the time of consumption by a business customer through a NFC module of a smartphone phone and through the NFC module of a cash register machine, a user preset payment account information is sent to the cash register machine through the NFC module of the intelligent phone; in step 2, the payment account is deducted by the payment amount through the connection of the cash register machine and a server end, after a notification message of success payment deduction is obtained from the server end, the NFC identification is saved to a WIFI permission list by the cash register machine; in step 3, when the user wishes to log in a WIFI network, the NFC module of the smartphone and the NFC module of the register machine establish a communication connection, a request is sent to access the request message in the WIFI, the request message includes the identification of the NFC module for the smartphone.

Description

technical field [0001] The invention relates to a method for transferring WIFI password through NFC connection. Background technique [0002] In the prior art, the WIFI network either does not have a password and can be used by anyone, or has a password and only users who have obtained the password can use it, and after obtaining the password, it can be used without restriction. [0003] Through the analysis of the existing technology, there are defects in the existing technology: [0004] There are problems with the two current methods. The first method has a simple networking process and does not require the owner of the hotspot to participate in the networking process. However, without password protection, one is insecure. The other problem is that the number of access terminals is uncontrolled and consumes Too much bandwidth. [0005] The second method requires the owner of the hotspot to inform the user of the password, which is cumbersome to operate, and once the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07G1/14H04W4/00
CPCG06Q20/206G06Q20/3278G07G1/14G07G1/145H04W4/80H04W76/11H04W76/14
Inventor 程桂平
Owner 环玺信息科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products