Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless local area network security access method and equipment

A wireless local area network and secure access technology, applied in the field of wireless local area network secure access, can solve problems such as high design cost and difficulty in research and development, limited improvement of user experience, and restrictions on user use, so as to achieve superior user experience and reduce the difficulty of design and development Effect

Inactive Publication Date: 2017-01-04
BEIJING GEEK GEEK TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the above methods require equipment manufacturers to design and develop the equipment accordingly, and have certain restrictions on the use of users. The design cost and research and development are difficult, and the improvement of user experience is limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless local area network security access method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Certain terms are used, for example, in the description and claims to refer to particular components. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. The specification and claims do not use the difference in name as the way to distinguish components, but use the difference in function of the components as the criterion for distinguishing. In addition, the term "coupled" herein includes any direct and indirect electrical coupling means. Therefore, if it is described that a first device is coupled to a second device, it means that the first device may be directly electrically coupled to the second device, or indirectly electrically coupled through other devices or coupling means. connected to the second device. The following descriptions in the specification are preferred implementation modes for implementing the present invention, but the descriptions are for the purpose of illustrating the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of wireless communication, and discloses a wireless local area network security access method and equipment. The method includes the steps of: receiving a probe request frame from a client, detecting whether the signal strength of the probe request frame meets the requirements, judging whether the client that meets the requirements supports secure access based on signal strength detection, and if so, enabling WPS support and performing WPS Negotiation, providing the configuration of the current wireless local area network to the client through the WPS negotiation process, and accepting the client using the configuration to access the wireless local area network. The present invention uses the attenuation degree of the wireless signal as the premise of secure access, and does not need to make clear restrictions on the use of wireless clients and users, reduces the difficulty of design and development, and provides wireless clients with access for the first time without increasing costs. Wireless LAN provides more convenience and superior user experience.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method and equipment for secure access to a wireless local area network. Background technique [0002] When users create a new wireless network, they usually set the wireless network name (SSID, service setidentifier) ​​and wireless encryption method. In order to ensure the security of the wireless network, the hidden SSID and a lengthy wireless security key are usually set. After these settings are completed, when the wireless client connects to the wireless network for the first time, it needs to manually add the network name (SSID) and enter the lengthy wireless security key, which is a cumbersome process for many users. After the wireless client connects successfully, it will generally remember the network, and the second connection does not need to enter the password to automatically connect. After a long time, many users cannot remember the key. When a new ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W84/12
Inventor 郑星固
Owner BEIJING GEEK GEEK TECH