Real-name system-based wifi one-key logging method
A login method and real-name system technology, applied in electrical components, wireless communications, transmission systems, etc., can solve problems such as troublesome WiFi login, and achieve the effect of simplifying WiFi login
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0048] Based on the real-name one-key login method of wifi, the login method uses two network segments for authentication, and the two network segments are the service request network segment and the identity authentication network segment respectively. The specific operation steps are as follows:
[0049] First time use:
[0050] Out-of-band operation (identity authentication network segment):
[0051] 1.1 Trust the device to download the APP in the Apple store or application market;
[0052] 1.2 Install the APP on the trusted device;
[0053] 1.3 Open the APP;
[0054] 1.4 Scan QR codes or other barcodes containing customer information provided by third parties (such as anti-counterfeiting QR codes on train tickets);
[0055] 1.5 The customer sets the password for logging in to the APP;
[0056] 1.6 Trusted devices use the agreed format to form registration information;
[0057] 1.7 The trusted device sends the registration information to the identity authentication sys...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More