Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A yes-no-operations approach based on hotspot lookup

An operation method and hotspot technology, applied in the field of information interaction between devices based on hotspot, to achieve the effect of simple information interaction

Active Publication Date: 2017-12-29
张忠义
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] That is, the existing technology: "Open the doors one by one until the door that the user is currently facing is opened, and the user (master) device searches for the door (slave) device." For long-distance yes and no operations, the master device searches for the slave device It is obviously not suitable to let the slave device verify the user name and password of the master device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A yes-no-operations approach based on hotspot lookup

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The above-mentioned technical solution of the present invention has provided the method for generating the electronic key after registration.

[0033] For a user with a temporary access requirement, the user may require the registered user to give him an additional identification. This additional identification can be accepted by the server and be distinguished from registered users. The additional identifier may be a time limit for temporary access or a limit for the number of temporary access.

[0034] Therefore, for adding an additional identification method, the non-operational object described in the present invention may have a corresponding change, this change is not essential, and also falls within the scope of the infringement applicant's claim.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The access control operation is to determine whether to open the access control to allow it to pass by judging the legality of the identity of the passing object. The right and wrong operation mentioned in the present invention is not limited to the access control operation, but is a wider operation than the access control operation. By judging whether the object is legal or not, if it is yes, perform the operation related to yes, and if it is not, perform the operation related to non-existence . The present invention has noticed that the prior art is applied to right and wrong operations. When the user (master) device faces multiple door (slave) devices that have the right to enter, the method of finding the door (slave) device through the user (master) device is not suitable of. The solution proposed by the present invention is to change the gate device as a slave device in the prior art into a master device, that is, as a search device, and change the user device as a master device in the prior art into a slave device, that is, as a searched device . In this way, when the user faces several (n) doors, it is the door (master) device that is looking for the user (slave) device.

Description

technical field [0001] The invention relates to hotspots, in particular to information interaction between devices based on hotspots. Background technique [0002] At present, the information interaction methods between devices based on hotspots or similar hotspots are mainly: Bluetooth and WIFI. Bluetooth and WIFI essentially build a long-distance communication connection. Authentication is required when connecting. Identity generally includes user name and password, whether it is Bluetooth or WIFI, user name and password can be reset by program, or dynamically generated. [0003] Alternatives to this include traditional forms of cards and NFC. In the case of cards and NFC, the user name (and password) is fixed, that is, static, and needs to be read by a special card reader (equivalent to a search) device, and the reading method is contact or near field. [0004] For Bluetooth and WIFI, which are long-distance and can dynamically reset the user name and password, the de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04M11/00
Inventor 张忠义
Owner 张忠义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products