Safe wireless access method and safe wireless access device

A wireless access and wireless access point technology, applied in security devices, wireless communications, electrical components, etc., can solve problems such as loss, cracking, and password leakage, and achieve the effect of facilitating the access process

Inactive Publication Date: 2010-01-06
ZTE CORP
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But even if the encryption method is used, the password may be leaked or cracked by others, causing unnecessary losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe wireless access method and safe wireless access device
  • Safe wireless access method and safe wireless access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0020] The wireless access point AP (Access Point) detects whether the hardware button is pressed at any time. Once the user presses the hardware button, after the software detects the action, the wireless access point AP (Access Point) starts immediately and starts for a fixed time. Countdown (for example, within two minutes after pressing the button), before the countdown ends, the wireless access point AP (AccessPoint) allows the wireless station STA (Station) to access, after the fixed time ends, the software rejects the wireless station STA (Station) Access, even if you have the corre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In order to solve the problem that a network is attacked or is free used because a wireless code is leaked or decoded, the invention provides a safe wireless access method. The method comprises the following steps: a wireless access point detects an access order in real time; and the wireless access point permits an access request from a wireless access workstation in a predetermined time period when detecting the access order. Besides, the invention also provides a safe wireless access device. The invention has the advantages of effectively controlling the unnecessary loss caused in such a way that the wireless code is leaked or decoded.

Description

technical field [0001] The present invention relates to the field of wireless access, and more particularly, to a method and device for secure wireless access, in particular to the secure access of wireless workstations (Station, STA for short, referring to devices such as notebooks, PDAs, and desktop computers with wireless functions) The application technology to the wireless access point (Access Point, AP for short, refers to the wireless gateway or wireless bridge and other devices). Background technique [0002] At present, wireless technology is widely used. Enterprises and home users use a large number of wireless access points (Access Points) to achieve LAN access, which eliminates the trouble of traditional wired wiring and connection, and is very convenient to use. And at present, notebooks with Centrino wireless functions are widely used, and have entered thousands of households, becoming an indispensable electronic device for work, study and leisure. [0003] Wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/084H04W12/71
Inventor 缪建成李迎新季圣华侯书朋
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products