Access method and access device

An access method and technology for access devices, which are applied in security devices, connection management, network topology, etc., can solve problems such as threshold setting restrictions, inconvenience for users, and inability to perform network security configuration work, and achieve the effect of secure connection.

Inactive Publication Date: 2009-12-16
ZTE CORP
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) All Wi-Fi devices in the network must pass WPS certification or be compatible with WPS, otherwise WPS cannot be used to simplify network security configuration;
[0007] 2) WPS certification is a non-mandatory certification project, not all manufacturers support WPS;
[0008] 3) By p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method and access device
  • Access method and access device
  • Access method and access device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0064] image 3 is a flowchart of processing after system startup on the access point side according to the first embodiment of the present invention. Such as image 3 As shown, in the access point test, the workflow after the system starts is:

[0065] The access point detects whether Easy_Net_Work has successfully established a connection with the configured SSID of the access point: Easy_Connecting, wherein, if successful, perform the following operations, and end this detection if unsuccessful;

[0066] After Easy_Net_Work is successfully connected to Easy_Connecting, the access point detects whether the identification code sent by Easy_Net_Work to the access point is consistent with the identification code of the access point itself. If it is consistent, perform the following operations. If not, end this detection;

[0067] After the identification code is successfully matched, the access point obtains the security configuration information of the user SSID, such as the...

no. 2 example

[0070] Figure 4 is a flowchart of processing after computer-side system startup according to the second embodiment of the present invention. Such as Figure 4 As shown, the workflow on the computer side is:

[0071] The user runs the software Easy_Net_Work;

[0072] Easy_Net_Work connects the configuration SSID of the access point through the wireless workstation: Easy_Connecting, wherein, if the connection is successful, perform the following operations, and if not, end the connection operation;

[0073] After the connection is successful, Easy_Net_Work sends the identification code to the access point;

[0074] If the identification code is correct, obtain the security configuration information of the user SSID from the access point, and perform the following operations, if the identification code is incorrect, end this operation;

[0075] Use the obtained security configuration information to configure the wireless workstation. After the configuration, the wireless wor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access method and an access device, which is used for accessing a computer to an encrypted wireless access point through a wireless workstation, wherein the wireless access point is provided with a user SSID and a configuration SSID. The access method comprises: step 1, installing dedicated software in the computer and running the software; step 2, through the wireless workstation, building connection between the dedicated software and the configuration SSID, and transmitting an ID code of the dedicated software to the wireless access point; step 3, when the ID code is matched with an access point ID code of the wireless access point, transmitting the safety configuration information to the computer through the wireless access point; step 4, using the safety configuration information for the computer to access to the wireless access point. Through the invention, even if a user has nothing about wireless expertise, safe wireless network can also be quickly and conveniently built.

Description

technical field [0001] The invention relates to the field of wireless local area networks, in particular to an access method and an access device for enabling a wireless workstation to access a wireless access point conveniently and safely. Background technique [0002] At present, wireless local area network technology is widely used in home networks. Users connect computers to access points in home networks through wireless workstations, thereby replacing traditional wired connections, saving the trouble of wiring, and it is very convenient to use. [0003] Due to the openness of the wireless network, any access point can connect to the wireless network when the wireless network is not encrypted, which brings great security risks to users. However, setting an encryption method for the wireless network has brought a certain threshold to ordinary users who do not have wireless professional knowledge. In the traditional way, when creating a secure wireless network, the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W24/06H04W76/02H04W84/12H04W12/0431
CPCH04W8/245H04W12/08
Inventor 侯书朋李迎新缪建成
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products