Terminal access method and related device

A terminal access and terminal technology, applied in the direction of access restriction, electrical components, wireless communication, etc., can solve problems such as affecting performance, increasing air interface occupation, affecting system performance, etc., to achieve the effect of meeting application requirements

Active Publication Date: 2016-04-27
HUAWEI TECH CO LTD
3 Cites 19 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, in many scenarios, the deployment of APs is limited by the actual environment, and deploying too many APs will also bring more system interference and affect system performance.
The second is to limit the number of access users of each AP
However, ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The embodiment of the invention discloses a terminal access method, comprising that a wireless access point receives a detection request frame sent by a terminal, at least a first virtual access point and a second virtual access point are configured, the quantity of the online terminals of the first virtual access point is obtained, whether the quantity of the online terminals of the first virtual access point is less than a first threshold value or not is judged, if so, the terminal is related to the first virtual access point, or the terminal is related to the second virtual access point, the service quality level of the first virtual access point is higher than that of the second virtual access point. Users are respectively processed through setting the service quality levels of the virtual access points, the network interference problem resulted from continuous sending of a large number of messages for access again by the users who are directly rejected is avoided; and the application demands of the users are satisfied.

Application Domain

Technology Topic

Quality of serviceWireless access point +2

Image

  • Terminal access method and related device
  • Terminal access method and related device
  • Terminal access method and related device

Examples

  • Experimental program(1)

Example Embodiment

[0052] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the drawings in the embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0053] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects, but not necessarily Describe a specific order or sequence.
[0054] Please refer to figure 1 An embodiment of the terminal access method in the embodiment of the present invention is as follows:
[0055] A terminal access method, the method includes:
[0056] 101. The wireless access point is configured as at least two virtual access points, and the at least two virtual access points include a first virtual access point and a second virtual access point.
[0057] The physical wireless access points are configured as at least two virtual access points, and the virtual access points are called virtual access points (English: virtual accesspoint, VAP for short). Different VAPs are distinguished by different basic service set identifiers (English: basicservicesetidentifier, abbreviation: BSSID).
[0058] In this way, multiple different basic service sets (English: basicserviceset, abbreviation: BSS) can be formed by only one access point device. Without changing the original wireless access point hardware, the configuration of multiple virtual access points is realized through software design. Taking two virtual access points as an example, the two virtual access points respectively correspond to different service quality levels, so that the services provided for the terminal will be different due to the different virtual access points associated with the terminal.
[0059] 102. The wireless access point acquires the number of online terminals of the first virtual access point.
[0060] The wireless access point obtains the number of online terminals of the first virtual access point, and determines the current number of online terminals of the first virtual access point. The online terminals in this article may be associated terminals associated with the first virtual access point. A virtual access point requires authentication to be associated, and the online terminal can pass the authenticated authentication terminal.
[0061] 103. The wireless access point receives the detection request frame sent by the terminal.
[0062] The terminal mentioned in this embodiment is a type of equipment with wireless local area network function, such as mobile phone (English: cellphone), smart phone (English: smartphone), computer (English: computer), tablet computer (English: tabletcomputer), personal Digital assistant (English: personaldigitalassistant, abbreviation: PDA), mobile Internet device (English: MobileInternetDevice, abbreviation: MID) and e-book reader (English: e-bookreader), etc. The terminal may send a detection request frame to the wireless access point, and the wireless access point receives the detection request frame.
[0063] 104. The wireless access point determines whether the number of online terminals of the first virtual access point is less than a first threshold, and if the number of online terminals of the first virtual access point is less than the first threshold, execute 105. If the number of online terminals of the first virtual access point is greater than or equal to the first threshold, execute 106.
[0064] A first threshold value preset in the wireless access point, where the first threshold value is the maximum number of terminals that the wireless access point can provide high-quality services.
[0065] 105. The wireless access point associates the terminal with the first virtual access point.
[0066] 106. The wireless access point associates the terminal with the second virtual access point.
[0067] Wherein, the service set identifiers (English: servicesetidentifier, abbreviation: SSID) of the first virtual access point and the second virtual access point are the same, and the service quality level of the first virtual access point is higher than that of the The quality of service level of the second virtual access point.
[0068] In this embodiment, the wireless access point configures the physical wireless access point as at least two virtual access points, the first virtual access point and the second virtual access point, according to the number of online terminals of the first virtual access point Determine whether the first virtual access point receives the new terminal by determining whether it is less than the first threshold. The number of online terminals is less than the first threshold to associate the terminal with the first virtual access point. The number of online terminals is not less than the first threshold. The threshold value controls the terminal to associate with the second virtual access point. By setting the service quality level of the virtual access point, the users are processed separately, which not only allows new users to access the wireless access point, but also avoids direct Rejection causes the user to continuously send a large number of messages to try to reconnect to the network interference problem, meet the user's application needs, and flexibly ensure the user experience.
[0069] In the foregoing embodiment, the wireless access point may further include the following steps after receiving the probe request frame:
[0070] 1. If the number of online terminals of the first virtual access point is less than the threshold:
[0071] At this time, the first virtual access point can accept the access of the new terminal, the wireless access point sends a first probe response to the terminal and associates the terminal with the first virtual access point. The sender address of a probe response is the basic service set identifier BSSID of the first virtual access point. The wireless access point controls the first virtual access point to return a probe response, and performs detection request frames sent by the terminal. Responds, and the second virtual access point does not respond to the probe request frame, the wireless access point associates the terminal with the first virtual access point.
[0072] Optionally, in order to enable the terminal to only receive the service set identifier of the first virtual access point, the wireless access point sets the beacon of the first virtual access point (English: Beacon, Chinese: beacon) The service set identifier field in the frame is configured as a service set identifier, and the service set identifier field in the Beacon frame of the second virtual access point is configured as a wildcard service set identifier (English: wildcardSSID). That is to say, the sender address (English: transmitteraddress, abbreviation: TA) sent by the wireless access point is the BSSID of the first virtual access point. The service set identification field in the Beacon frame is configured as the SSID of the first virtual access point ( Same as the SSID of the second virtual access point), the service set identifier field in the beacon frame with TA sent by the wireless access point being the BSSID of the second virtual access point is configured as a wildcard service set identifier. At this time, the service set identifier of the second virtual access point is hidden, and the wireless access point controls the first virtual access point to return a probe response and associates the terminal with the first virtual access point.
[0073] The Beacon frame is sent by regular broadcast and is mainly used to notify the existence of wireless access points. The terminal can learn the existence of the wireless access point by scanning the Beacon frame.
[0074] 2. If the number of online terminals of the first virtual access point is greater than or equal to the first threshold:
[0075] At this time, the first virtual access point cannot receive new terminal access, and the second virtual access point can accept new terminal access. The wireless access point sends a second probe response to the terminal and sends the The terminal associates with the second virtual access point, the sender address of the second probe response is the BSSID of the second virtual access point, and the wireless access point controls the second virtual access point to return to the probe In response, it responds to the probe request frame sent by the terminal, and the first virtual access point does not respond to the probe request frame, and the wireless access point associates the terminal with the second virtual access point. The wireless access point controls the second virtual access point to return a probe response, and associates the terminal with the second virtual access point.
[0076] In the same principle, in order to make the terminal scan only the second virtual access point when scanning the wireless local area network, the wireless access point configures the service set identification field in the beacon frame of the second virtual access point Is the service set identifier, and the service set identifier field in the beacon frame of the first virtual access point is configured as a wildcard service set identifier, that is, the sender address (English: transmitteraddress, Abbreviation: TA) The service set identification field in the Beacon frame of the BSSID of the second virtual access point is configured as the SSID of the second virtual access point, and the TA sent by the wireless access point is the BSSID of the first virtual access point The service set identifier field in the Beacon frame is configured as a wildcard service set identifier. At this time, the service set identifier of the first virtual access point is hidden, the wireless access point controls the second virtual access point to return a probe response, and associates the terminal with the second virtual access point.
[0077] Optionally, since the second virtual access point provides a network service with a low quality of service, the terminal is notified of the shortage of network resources before the terminal accesses the second virtual access point, thereby reducing the user's expectation of the network.
[0078] You can use WEB authentication to notify the terminal that network resources are tight, and the terminal will pop up the identity verification interface. When the user enters the account information, the user is prompted that the network state is tight. Of course, there are other types of reminders, which are not limited here. .
[0079] In this embodiment, the wireless access point configures the physical wireless access point as at least two virtual access points, the first virtual access point and the second virtual access point, according to the number of online terminals of the first virtual access point Determine whether it is less than the first threshold value to determine the reception of the new terminal by the first virtual access point. The number of online terminals is less than the first threshold value to connect the terminal to the first virtual access point. The number of online terminals is not less than the first virtual access point. A threshold value controls the terminal to access the second virtual access point. By setting the service quality level of the virtual access point, the users are processed separately, and then the user is reminded of the shortage of network resources before connecting the terminal to the second virtual access point. This allows users to lower their expectations of network resources, not only allows new users to access the wireless access point, but also avoids direct rejection that causes users to continuously send a large number of messages to try to reconnect to the network interference problem, more humane It can meet the user's application requirements and flexibly ensure the user experience.
[0080] The above introduces the method for new users to access the wireless access point. The following describes how to switch the wireless access point for users who have already entered the wireless access point. Please refer to image 3 An embodiment of the network switching method in the embodiment of the present invention is as follows:
[0081] A terminal access method, the method includes:
[0082] 201. The wireless access point acquires the number of online terminals of the first virtual access point.
[0083] 202. The wireless access point is configured at least as a first virtual access point and a second virtual access point.
[0084] Step 202 is the same as step 102 in the previous embodiment, and will not be repeated here. The service quality level of the first virtual access point is higher than the service quality level of the second virtual access point.
[0085] 203. The wireless access point judges whether the number of online terminals is less than a first threshold, if it is less, execute 204, and if it is not less than execute 208.
[0086] The first threshold refers to the maximum number of online terminals that the first virtual access point can withstand to provide network services with a high level of service quality. The relationship between the number of online terminals and the maximum number of online terminals is judged to determine the switching mode.
[0087] 204. The wireless access point subtracts the first threshold value from the number of online terminals to obtain a difference as the number of transferable terminals.
[0088] The judgment result is that the number of online terminals is less than the threshold, and the number of online terminals of the first virtual access point has not reached the maximum number of online terminals, indicating that the first virtual access point can also receive user terminal access, and the The difference between the number of online terminals of a virtual access point and the first threshold value obtains the number of terminals that can be accessed, which is the number of transferable terminals.
[0089] 205. The wireless access point arranges the user activity levels of the online terminals of the second virtual access point in descending order;
[0090] User activity is defined as the amount of data flow generated by the terminal within a set time. If the data flow generated by the terminal is large, the user activity is high. For the terminal with high user activity, you can enjoy network services with high service quality. Second, the user activity of the online terminals of the virtual access point, and then arrange these online terminals according to the level of user activity.
[0091] 206. The wireless access point sequentially acquires the online terminals with the same number of transferable terminals as the terminals that meet the transfer condition with the highest user activity.
[0092] According to the order of user activity of the second virtual access point, select the same number of online terminals as the number of transferable terminals in descending order. Of course, the number selected can also be less than the number of transferable terminals. The selected terminal is the terminal that meets the transfer conditions.
[0093] 207. The wireless access point switches online terminals meeting the transfer condition to the first virtual access point in descending order of the second user activity, and switches to the first virtual access point that meets the transfer condition. The number of online terminals is not greater than the number of transferable terminals.
[0094] The online terminal that meets the transfer condition mentioned in this article can be understood as an online terminal that can be switched to the first virtual access point determined after comparison with the first threshold value and the second threshold value.
[0095] One way to implement handover between different virtual access points mentioned in this article is as follows:
[0096] For example, a BSS switching request frame (English: TransitionRequestframe) can be used to allow the user terminal to switch between different virtual access points. When the terminal switches from the first virtual access point to the second virtual access point, the first virtual access point sends a BSSTransitionRequest message, which carries the identifier of the second virtual access point. The identifier includes but is not limited to the second virtual access point. The BSSID of the entry point may also include a neighbor report element (English: NeighborReportelement) to notify the terminal to associate with the second virtual access point; when the terminal switches from the second virtual access point to the first virtual access point, the first The second virtual access point sends a BSSTransitionRequest frame, which carries the identifier of the first virtual access point, to notify the terminal to associate with the first virtual access point. Of course, there are other ways to implement handover, which is not limited.
[0097] 208. The wireless access point obtains user activity of the online terminal of the first virtual access point.
[0098] 209. The wireless access point judges whether there is a user whose user activity is less than a second threshold in the online terminal of the first virtual access point, if there is a user, execute 210, if not, execute 211.
[0099] 210. The wireless access point switches to the second virtual access point online terminals whose user activity is less than a second threshold in the first virtual access point.
[0100] 211. The wireless access point does not process the online terminal of the first virtual access point.
[0101] 212. The wireless access point determines the number of acceptable users of the first virtual access point, where the number of acceptable users is equal to the number of transferable terminals.
[0102] 213. The wireless access point judges whether the user activity of the second virtual access point is greater than the second threshold value, if it exists, execute 214, and if it does not exist, execute 215.
[0103] 214. The wireless access point switches the online terminals that meet the transfer condition to the first virtual access point in descending order of the second user activity, and switches to the first virtual access point that meets the transfer condition. The number of online terminals is not greater than the number of acceptable users.
[0104] The online terminal meeting the transfer condition may be an online terminal in the second virtual access point whose user activity is greater than the second threshold.
[0105] 215. The wireless access point does not process the online terminal of the second virtual access point.
[0106] In this embodiment, the wireless access point configures the physical wireless access point as at least two virtual access points, the first virtual access point and the second virtual access point, according to the number of online terminals of the first virtual access point Determine whether it is less than the first threshold value to determine the reception status of the first virtual access point to the new terminal. You can also allow users to switch between different virtual access points according to the current number of users and user activity. The service quality level of the entry point is processed separately from the user activity level. The first virtual access point with high service quality level is assigned to the terminal with high user activity, and the terminal with low user activity is switched to the service quality level. The low second virtual access point optimizes resource configuration, meets the needs of different terminals, and flexibly guarantees user experience.
[0107] The terminal access method is introduced above, and the execution device corresponding to the method is specifically introduced below.
[0108] A wireless access point, including:
[0109] A first configuration unit, configured to configure the wireless access point as at least a first virtual access point and a second virtual access point;
[0110] The first acquiring unit is configured to acquire the number of online terminals of the first virtual entry point;
[0111] The first receiving unit is configured to receive a detection request frame sent by the terminal;
[0112] The first access unit is configured to associate the terminal with the first virtual access point when the number of online terminals at the first virtual access point is less than a threshold value,
[0113] The second access unit is configured to associate the terminal with the second virtual access point when the number of online terminals of the first virtual access point is greater than or equal to the first threshold value,
[0114] Wherein, the service set identifiers of the first virtual access point and the second virtual access point are the same, and the service quality level of the first virtual access point is higher than that of the second virtual access point level.
[0115] Preferably, the first access unit is further configured to, if the number of online terminals of the first virtual access point is less than a threshold, control the first virtual access point to return a detection response and associate the terminals The first virtual access point and the second access unit are further configured to control the second virtual access point if the number of online terminals of the first virtual access point is greater than or equal to the first threshold value. The access point returns a probe response and associates the terminal with the second virtual access point.
[0116] Preferably, the first access unit is further configured to: if the number of online terminals of the first virtual access point is less than a threshold, the wireless access point will beacon of the first virtual access point The service set identifier field in the Beacon frame is configured as a service set identifier, and the service set identifier field in the beacon Beacon frame of the second virtual access point is configured as a wildcard service set identifier to control the first virtual access The point returns a detection response and associates the terminal with the first virtual access point, and the second access unit is further configured to: if the number of online terminals of the first virtual access point is greater than or equal to the first door Limit, the wireless access point configures the service set identifier field in the beacon Beacon frame of the second virtual access point as a service set identifier, and sets the beacon Beacon frame of the first virtual access point The service set identifier field in is configured as a wildcard service set identifier to control the second virtual access point to return a probe response and associate the terminal with the second virtual access point.
[0117] Preferably, the wireless access point further includes: a first reminding unit, configured to prompt the terminal that network resources are insufficient after the second response unit returns a probe response.
[0118] Preferably, the first obtaining unit is configured to obtain the number of online terminals of the first virtual access point;
[0119] The first determining unit is configured to determine the number of transferable terminals according to the first threshold value minus the number of online terminals to obtain a difference when the number of online terminals is less than the first threshold;
[0120] The first switching unit is configured to switch to the first virtual access point from the online terminals of the second virtual access point according to the number of transferable terminals.
[0121] Preferably, the wireless access point further includes:
[0122] The second determining unit is configured to arrange the user activity levels of the online terminals of the second virtual access point in descending order, and determine that the number of the transferable terminals is the same as that of the transferable terminals. The online terminal serves as a terminal that meets the transfer conditions.
[0123] Preferably, the wireless access point further includes:
[0124] The second acquiring unit is configured to acquire the user activity of the online terminal of the first virtual access point when the number of online terminals is greater than or equal to the first threshold;
[0125] The second switching unit is configured to reduce the user activity in the first virtual access point to be less than the second threshold when there are users whose user activity is less than the second threshold in the online terminal of the first virtual access point The online terminal of is switched to the second virtual access point.
[0126] Preferably, the wireless access point further includes:
[0127] A third determining unit, configured to determine the number of acceptable users of the first virtual access point, where the number of acceptable users is equal to the number of transferable terminals;
[0128] The third switching unit is configured to switch the online terminal that meets the transfer condition to the first virtual access point in descending order of the second user activity, wherein the switching to the first virtual access point meets the transfer condition The number of online terminals is not greater than the number of acceptable users.
[0129] In this embodiment, the wireless access point configures the physical wireless access point as at least two virtual access points, the first virtual access point and the second virtual access point, according to the number of online terminals of the first virtual access point Determine whether it is less than the first threshold value to determine the reception status of the first virtual access point to the new terminal. You can also allow users to switch between different virtual access points according to the current number of users and user activity. The service quality level of the entry point is processed separately from the user activity level. The first virtual access point with high service quality level is assigned to the terminal with high user activity, and the terminal with low user activity is switched to the service quality level. The low second virtual access point optimizes resource configuration, meets the needs of different terminals, and flexibly guarantees user experience.
[0130] Please refer to image 3 , The embodiment of the present invention provides a wireless access point. The wireless access point may specifically be a wireless access point or a non-AP access point, such as a mobile phone, various computers, tablet computers, PDAs, MIDs, or e-book readers.
[0131] The wireless access point includes a wireless local area network adapter 303, a processor 301 and a memory 302. The wireless LAN adapter 303 is a wireless network interface controller (English: wireless network interface controller, abbreviation: WNIC) that provides a wireless LAN interface. The processor 301 may be a central processing unit (English: central processing unit, abbreviated: CPU), or a combination of a CPU and a hardware chip. The above hardware chip can be one or a combination of the following: application-specific integrated circuit (English: application-specific integrated circuit, abbreviation: ASIC), field programmable logic gate array (English: field-programmable gate array, abbreviation: FPGA), complex programmable Logic device (English: complexprogrammablelogicdevice, abbreviation: CPLD) and network processor (English: networkprocessor, abbreviation: NP). The memory 302 may be a volatile memory (English: volatile memory), such as a random access memory (English: random-access memory, abbreviation: RAM), or a non-volatile memory (English: non-volatile memory), such as a flash memory ( English: flashmemory), hard disk (English: harddiskdrive, abbreviation: HDD) or solid state disk (English: solid-statedrive, abbreviation: SSD), wireless LAN adapter 303 and storage 302 are connected to processor 301.
[0132] The memory 302 stores program codes, stores preset first threshold values ​​and second threshold values, and transmits the stored program codes to the processor 301.
[0133] The processor 301 executes the above-mentioned instructions according to the program instructions stored in the memory 302 figure 1 or figure 2 The operation steps in the illustrated embodiment, image 3 The middle thick line is the bus.
[0134] The processor 301 receives the detection request frame sent by the terminal through the wireless local area network adapter 303;
[0135] The processor 301 configures the wireless access point as at least a first virtual access point and a second virtual access point;
[0136] The processor 301 obtains the number of online terminals of the first virtual access point;
[0137] The processor 301 compares the acquired number of online terminals of the first virtual access point with the first threshold value stored in the memory 302302, and when the first threshold value is online at the first virtual access point If the number of terminals is less than the first threshold, the processor 301 controls the first virtual access point to carry the service set identifier, and controls the second virtual access point to hide the service set identifier and associate the terminal with the The first virtual access point,
[0138] When the number of online terminals of the first virtual access point is greater than or equal to the first threshold, the processor 301 controls the first virtual access point to hide the service set identifier, and controls the second virtual access point The access point carries a service set identifier, and the terminal is associated with the second virtual access point,
[0139] Wherein, the service set identifiers of the first virtual access point and the second virtual access point are the same, and the service quality level of the first virtual access point is higher than that of the second virtual access point level.
[0140] Preferably, the processor 301 controls the first virtual access point to return a probe response when the probe request frame is sent by unicast, and controls the first virtual access point to return a probe response and control when the judgment result is no The second virtual access point ignores the probe request frame.
[0141] Preferably, the processor 301 controls the second virtual access point to return a probe response when the probe request frame is sent by unicast, and controls the second virtual access point to return a probe response and control when the judgment result is no The first virtual access point ignores the probe request frame.
[0142] Preferably, the processor 301 is configured to notify the terminal that network resources are in short supply after the second response unit returns a detection response.
[0143] Preferably, the processor 301 obtains the number of online terminals of the first virtual access point;
[0144] The processor 301 compares the acquired number of online terminals of the first virtual access point with a first threshold value stored in the memory 302302, and when the number of online terminals is less than the first threshold value, the processor 301 determines The first threshold value is subtracted from the number of online terminals to obtain a difference to determine the number of transferable terminals;
[0145] The processor 301 selects a terminal satisfying the transfer condition from the online terminals of the second virtual access point to switch to the first virtual access point according to the number of transferable terminals.
[0146] Preferably, the processor 301 arranges the user activity levels of the online terminals of the second virtual access point in descending order, and determines that the user activity level is the highest in order to obtain the same number of transferable terminals. The online terminal is the terminal that meets the transfer conditions.
[0147] Preferably, the processor 301 obtains the user activity of the online terminal of the first virtual access point when the number of online terminals is greater than or equal to the first threshold;
[0148] When the processor 301 determines that there are users whose user activity is less than the second threshold value among the online terminals of the first virtual access point, the processor 301 determines the user activity of the first virtual access point whose user activity is less than the second threshold value. The online terminal switches to the second virtual access point.
[0149] Preferably, the processor 301 determines the number of acceptable users of the first virtual access point, where the number of acceptable users is equal to the number of transferable terminals;
[0150] The processor 301 switches the online terminals that meet the transfer condition to the first virtual access point in descending order of the second user activity, wherein the online terminals that meet the transfer condition are switched to the first virtual access point. The number of terminals is not greater than the number of acceptable users.
[0151] In this embodiment, the wireless LAN adapter 303 receives the detection request frame sent by the terminal, the wireless LAN adapter 303 transmits the detection request frame to the processor 301, and the memory 302302 stores the preset first threshold value and second threshold value, The program instructions are also stored in the memory 302302. The processor 301 configures the wireless access point as at least two virtual access points, including a first virtual access point and a second virtual access point. The processor 301 configures the wireless access point according to the first virtual access point. The number of online terminals of the entry point determines whether the number of online terminals is less than the first threshold to determine the reception of the new terminal by the first virtual access point. The processor 301 can also allow users to access different virtual terminals according to the current number of users and user activity. Switch between points, by setting the service quality level of the virtual access point and using user activity to process users separately, the processor 301 allocates the first virtual access point with a high service quality level to the terminal with high user activity. Switch the terminal with low user activity to the second virtual access point with low service quality level, optimize resource configuration, meet the needs of different terminals, and flexibly ensure user experience. Those skilled in the art can clearly understand that for the convenience and conciseness of description, the specific working process of the above-described device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here. .
[0152] In the several embodiments provided in this application, it should be understood that the disclosed system, device, and method may be implemented in other ways. For example, the device embodiments described above are merely illustrative. For example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical or other forms.
[0153] A component displayed as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
[0154] In addition, the functional units in the various embodiments of the present invention may be integrated into one processing unit, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be realized in the form of hardware or software functional unit.
[0155] If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. All or part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium and includes several instructions to enable a computer device (which can be a personal computer, a server, or a network device, etc.) Perform all or part of the steps of the method described in each embodiment of the present invention. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory 302 (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes.
[0156] In summary, the above embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: The technical solutions recorded in the foregoing embodiments are modified, or some of the technical features are equivalently replaced; these modifications or replacements do not cause the essence of the corresponding technical solutions to deviate from the scope of the technical solutions of the embodiments of the present invention.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Reconfigurable four-section Gamma-shaped winding multi-fingered electromagnetic band gap structure

ActiveCN105977638AGood adjustabilityMeet application needsAntenna couplingsFrequency bandElectromagnetic band gap
Owner:BEIHANG UNIV

Scanning method and device and scanning task distribution system

Owner:INFORMATION COMM COMPANY STATE GRID SHANDONG ELECTRIC POWER +1

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products