Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for authorized access to wireless network

A wireless network and authorized access technology, applied in wireless communications, security devices, electrical components, etc., can solve the problems of inability to take into account user security, controllability and simplicity, inconvenience in user management, and low security. To achieve the effect of simple and fast Internet operation, effective control and management, and ensuring information security

Active Publication Date: 2019-04-12
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Direct connection without a password; in this way, any mobile device can access, and the security of user information in the LAN cannot be guaranteed, and the management of access users cannot be realized
[0005] The user enters the wireless password to access the wireless network; this method belongs to the password sharing method, the password is easy to spread, the security is not high, and it is not convenient to manage the access users
[0006] Use the WEB authentication method to access the wireless network; this method uses a unified portal service platform, the user needs to enter the password of the wireless network first, and then the user needs to enter the account number and password in the pop-up login page, or SMS verification code and other information, every time Every time an Internet user needs to perform multiple operations with the browser, the steps are cumbersome, which reduces the perfection of the user experience
[0007] Therefore, the applications installed on mobile devices in the prior art cannot take into account the user's security, controllability and simplicity and convenience when accessing the wireless network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for authorized access to wireless network
  • Method, device and system for authorized access to wireless network
  • Method, device and system for authorized access to wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059]In order to effectively ensure the security of a wireless network, facilitate user access, and realize effective control and management of connected mobile devices, embodiments of the present invention provide a method, device and system for authorized access to a wireless network.

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0061] First, the system architecture of the wireless network authorized access system in the embodiment of the present invention is described, as Figure 1A As shown, the system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, device and system for authorized access to a wireless network, which are used to ensure the security of the wireless network, facilitate user access, and realize effective control of accessed mobile devices. In the method, when the network device receives the network connection request sent by the mobile device, it verifies the mobile device according to the saved blacklist, and allows the mobile device to connect to the wireless network when the verification is passed. Embodiments of the present invention also provide corresponding systems and devices. In the embodiment of the present invention, the user does not need to enter a password, and does not need to interact with the browser for many times, and the Internet operation is realized simply and quickly. In addition, in the embodiment of the present invention, the mobile device is controlled through the device blacklist, which can effectively It guarantees the information security of users connected to the wireless network, and realizes the effective control and management of mobile devices.

Description

technical field [0001] The present invention relates to the technical field of wireless networks, in particular to a method, device and system for authorized access to wireless networks. Background technique [0002] With the development of wireless network technology, the coverage of WIFI is more and more extensive. There are wireless interfaces in areas such as hotels, residential areas, entertainment venues, and airports, and it has almost become the standard network access method for all mobile devices. No matter the user is at home, on a business trip, or traveling, he can use mobile devices to surf the Internet to his heart's content in these areas. [0003] When the user downloads an application and needs to connect to the network and there is currently a connection hotspot of the wireless network, the user can operate the application through the wireless network. Specifically, when the user searches for a connection hotspot of the wireless network, common ways to co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08
CPCH04W12/08
Inventor 许国军
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD