Wireless network login verification method and system

A wireless network, login verification technology, applied in the field of wireless network login verification methods and systems, can solve the problems of cumbersome and inconvenient wireless network operations, and achieve the effects of enhancing security and privacy, simple and convenient operation, and saving time.

Inactive Publication Date: 2015-11-11
SHENZHEN JIUZHOU ELECTRIC
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, it is necessary to provide a wireless network login verification method and system for the above-mentioned problems of cumbersome and inconvenient operations for other people to connect to the wireless network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network login verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0022] figure 1 is a flowchart of a wireless network login verification method in an embodiment, such as figure 1 As shown, the method includes the following steps:

[0023] S10: Bind the wireless network with the user's social tool account, and obtain and store the contact list in the user's social tool account by the wireless network.

[0024] At present, with the application of various social tools (such as QQ, WeChat, SMS, etc.), more and more users establish contacts and communicate through social tools, and users add relatives, colleagues, friends, etc. to social tools through social tools ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a wireless network login verification method and system. The wireless network login verification method comprises the steps of binding the social tool of a user, storing the contact list of the social tool of the user, and when another user requests to log in, verifying whether the requesting user is in the contact list of the social tool of the user; a wireless network is managed by use of the contact list of the social tool of the user and the user does not need to tell the requesting user the password; the method is simple and convenient to operate, time-saving, and greatly convenient for the users. Meanwhile, as the user does not need to tell the requesting user the password, the leakage of the password of the wireless network can be effectively prevented, and the security and privacy of the wireless network are enhanced.

Description

technical field [0001] The invention relates to the communication field, in particular to a wireless network login verification method and system. Background technique [0002] With the development of wireless technology, the demand of mobile phone users for wireless communication is also increasing day by day. As the most cost-effective short-distance wireless transmission technology, wireless network (such as WIFI) is covering every corner of society in a state of rapid growth. [0003] At present, in order to ensure the security and privacy of the wireless network, the wireless network in the home is usually encrypted using an encryption method such as WPA, and the user usually enters a relatively complicated password (for safety) in such an authentication method. However, there are usually other people (friends or relatives) visiting in the family, and other people often need to connect to the wireless network in the home, so it is necessary to inform other people of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06
CPCH04L63/08H04L63/101H04W12/06
Inventor 林白鹭
Owner SHENZHEN JIUZHOU ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products