Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for NFC wireless router private authentication mode

A wireless router and authentication mode technology, applied in the communication field, can solve the problems such as hard to remember the key, cumbersome configuration process, and insufficient security, so as to achieve the effect of ensuring safe login, improving user experience, and preventing malicious network spoofing

Inactive Publication Date: 2018-04-06
PHICOMM (SHANGHAI) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for wireless routers in the prior art, most of the authentication methods for connecting to the router are to log in to the router configuration interface to configure a string of keys, and then find the SSID of the router on the mobile terminal and enter the corresponding keys. This authentication method exists Many disadvantages, the configuration process is cumbersome, and the key is not easy to remember, etc. There are also NFC wireless routers, which use the NFC mobile terminal to approach the NFC wireless router authentication method. Although this method is fast and convenient for authentication, it is not safe enough and is mostly suitable for public places. , so it is particularly important to provide a method of private authentication mode for NFC wireless routers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for NFC wireless router private authentication mode
  • A method and system for NFC wireless router private authentication mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings of the embodiments of the present invention. Obviously, the described embodiments It is only a part of the embodiments of the present invention, but not all of them.

[0023] figure 1 It is a block diagram of a system in an NFC wireless router private authentication mode according to an embodiment of the present invention.

[0024] Such as figure 1 As shown, the system of the NFC wireless router private authentication mode of the embodiment of the present invention includes: a system 100, and the system 100 includes: an NFC wireless router 110, an NFC mobile terminal 120 bound with a private key, and an NFC mobile terminal 120. Terminal 130. Wherein, said one NFC wireless router 110 comprises...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for a private authentication mode of an NFC wireless router. The method includes: judging whether the NFC wireless router enters the private authentication mode; when the NFC wireless router enters the private authentication mode, detecting whether there is an NFC mobile terminal Authentication request; when there is an authentication request from the NFC mobile terminal, send a set of SSID and public key information to the NFC mobile terminal; send a prompt message to scan the QR code private key to the NFC mobile terminal; the NFC mobile terminal sends a set of The SSID and public key information are decrypted, and the private key of the QR code scanned according to the prompt information is decrypted to obtain the authentication password information of the NFC wireless router for login. The present invention makes use of the combination of NFC and two-dimensional codes to ensure safe login, and the two-dimensional codes are stored in NFC mobile terminals bound with private keys, which are suitable for non-public places, enable users to effectively manage wireless networks, and prevent malicious network fraud. The authentication process does not require users to memorize cumbersome passwords, which improves user experience.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for a private authentication mode of an NFC wireless router. Background technique [0002] With the continuous development of communication technology, more and more people use mobile terminals to access the Internet wirelessly. At this time, there are more and more requirements for personalized functions of wireless routers. [0003] However, for wireless routers in the prior art, most of the authentication methods for connecting to the router are to log in to the router configuration interface to configure a string of keys, and then find the SSID of the router on the mobile terminal and enter the corresponding keys. This authentication method exists Many disadvantages, the configuration process is cumbersome, and the key is not easy to remember, etc. There are also NFC wireless routers, which use NFC mobile terminals to approach NFC wireless routers. Although this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/771H04L45/60
Inventor 段坤
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products