Safety control method for accessing wireless network and terminal

A wireless network and security control technology, applied in the field of communication, can solve problems such as complex operations and achieve the effect of reducing information interaction

Active Publication Date: 2012-09-26
HONOR DEVICE CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] It can be seen that when using the above PIN mode to realize the configuration of the WPS function, it is necessary to log in to the AP configuration interface on the WIFI terminal and obtain the PIN input by the user to complete the configuration of the WPS function, and the operation is more complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety control method for accessing wireless network and terminal
  • Safety control method for accessing wireless network and terminal
  • Safety control method for accessing wireless network and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] See figure 1 , The flow chart of a security control method for accessing a wireless network provided by this embodiment, the specific implementation process includes the following steps:

[0045] 101: The AP obtains the first instruction, and determines the target WIFI protection setting WPS mode according to the first instruction.

[0046] Optionally, the AP in this embodiment may be a WIFI wireless router.

[0047] 102: If it is determined that the target WPS mode is the AP PIN mode, and then, the AP obtains the second instruction, generates, saves, and outputs the first PIN according to the second instruction, so that the AP receives the first target PIN sent by the WIFI terminal When the request to access the wireless network is requested, and the first target PIN is consistent with the first PIN, the WIFI terminal is allowed to access the wireless network through the AP, otherwise the WIFI terminal is prohibited from accessing the wireless network through the AP.

[0048] ...

Embodiment 2

[0100] See Figure 4 , The flow chart of a security control method for accessing a wireless network provided by this embodiment, the specific implementation process includes the following steps:

[0101] 201: The WIFI terminal obtains the fourth instruction, generates and outputs a personal identification code PIN according to the fourth instruction, so that the user can input the PIN on the wireless access point AP to implement the WIFI protection setting WPS function.

[0102] This embodiment provides a security control method for accessing a wireless network. Through this embodiment, when configuring the WPS function, the WIFI terminal generates and outputs the personal identification code PIN according to the acquired fourth instruction, and the user will generate Enter the PIN to the AP to complete the configuration of the WPS function. Compared with the prior art, in the embodiment of the present invention, the user does not need to log in to the AP configuration interface on...

Embodiment 3

[0114] See Image 6 , The structural diagram of a wireless access point AP provided in this embodiment includes:

[0115] The obtaining module 601 is used to obtain the first instruction;

[0116] The processing module 602 is configured to determine the target WIFI protection setting WPS mode according to the first instruction after the acquiring module 601 acquires the first instruction;

[0117] The above-mentioned obtaining module 601 is further configured to obtain the second instruction after the processing module 602 determines that the target WPS mode is the AP PIN mode;

[0118] The generating module 603 is configured to generate the first personal identification code PIN according to the second instruction after the acquiring module 601 acquires the second instruction;

[0119] The storage module 604 is configured to store the first PIN after the generation module 603 generates the first PIN;

[0120] The output module 605 is configured to output the first PIN after the generati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety control method for accessing a wireless network and a terminal, belonging to the communication field. The safety control method comprises the following steps of: obtaining a first instruction through an AP (Access Point), and determining a target WPS (WiFi Protected Setup) mode according to the first instruction; if determining that the target WPS mode is an AP PIN (Personal Identification Number) mode, obtaining a second instruction through the AP, and generating, storing and outputting a first PIN according to the second instruction; if determining that the target WPS mode is a client identification number PIN mode, obtaining a third instruction through the AP, and outputting information for indicating a user to input a second PIN according to the third instruction; and obtaining the second PIN input by the user through the AP, and storing the second PIN. With the adoption of the safety control method provided by the invention, a WIFI (Wireless Fidelity) terminal does not need to log in an AP configuration interface during WPS function configuration, so that information interaction between the AP and the WIFI terminal can be reduced.

Description

Technical field [0001] The present invention relates to the field of communication, in particular to a security control method and terminal for accessing a wireless network. Background technique [0002] WIFI (wireless fidelity, wireless fidelity) is a technology that converts wired network signals into wireless signals through AP (Access Point), and provides wireless broadband Internet access technology for WIFI terminals. In application scenarios such as homes and offices, the AP is generally a WIFI wireless router. WIFI terminals are personal computers, handheld devices (such as mobile phones, palmtop computers) and other products that support WIFI technology. [0003] Due to the widespread use of WIFI terminals, WIFI security settings are also particularly important. Currently, both AP and WIFI terminals support the WPS (WIFI protected setup) function. The WPS function is used to implement WIFI security settings. [0004] At present, the configuration of WPS function can be rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08
Inventor 张金明朱冲
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products