Access method and device for wireless network

A wireless network and access method technology, applied in wireless communication, security devices, electrical components, etc., can solve the problems of wireless network login password leakage, troublesome operation, unsuitable for ordinary users, etc., and achieve convenient login and high security Effect

Active Publication Date: 2014-02-26
SHENZHEN TCL NEW-TECH CO LTD
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the era of mobile Internet, there are more and more wireless network-based devices, and wireless routers have penetrated into the homes of ordinary people, but users still need to go through very cumbersome operations to configure the wireless router, set the wireless network name and login password, and log in to the wireless router to achieve Unfortunately, these cumbersome operations require people with a certain technical foundation to use them, and they are not suitable for ordinary users.
Especially some new wireless network terminals (for example, wireless speaker, wireless smoke detector, wireless air detector, etc.) To access the network, it is obvious that complex input operations are required to access the home wireless router to access the network. How to use a simple method to allow these wireless network terminals to join the home wireless local area network has become an urgent problem to be solved
[0003] The existing technology proposes a wireless network login method for a wireless network terminal (neither keyboard nor display screen). First, a smart wireless network terminal is paired with a wireless network terminal. The login password is sent to the wireless network terminal for the wireless network terminal to log in, but if the input device of the smart wireless network terminal does not use encryption technology, it is easy to cause the leakage of the wireless network login password, and the user needs to enter the wireless network login password, which is troublesome to operate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method and device for wireless network
  • Access method and device for wireless network
  • Access method and device for wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] The following solutions take the wireless network router as the main body of execution:

[0042] refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the wireless network access method of the present invention.

[0043] This embodiment proposes a method for accessing a wireless network, including:

[0044] Step S10, when detecting a wireless network access request sent by a wireless network terminal, sending the wireless network access request to a preset communication terminal;

[0045] When the wireless network terminal is turned on or when the user triggers a wireless network login request, it sends a wireless network access ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an access method and device for a wireless network. When a wireless network access request sent by a terminal is received, the wireless network access request is forwarded to a preset communication terminal for confirmation by a user of the communication terminal. When determination instructions sent by the communication are received, the terminal is permitted to access the wireless network or a login password is sent to the terminal, so that the terminal can access the wireless network according to the received login password. The user does not need to input the login password, so that login is convenient. The method and device are suitable for a terminal without an input device to log in the wireless network, are high in login safety, and cannot cause leakage of passwords due to password inputting by the user.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a method and device for accessing a wireless network. Background technique [0002] In the era of mobile Internet, there are more and more wireless network-based devices, and wireless routers have penetrated into the homes of ordinary people, but users still need to go through very cumbersome operations to configure the wireless router, set the wireless network name and login password, and log in to the wireless router to achieve Regrettably, these cumbersome operations require people with a certain technical foundation to use wireless network devices to access the network, and are not suitable for ordinary users. Especially some new wireless network terminals (for example, wireless speaker, wireless smoke detector, wireless air detector, etc.) Accessing the network obviously requires complex input operations to access the home wireless router to access th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/0431
Inventor 鲍舰
Owner SHENZHEN TCL NEW-TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products