Wireless connection authentication method and device

A wireless connection and verification code technology, applied in the computer field, can solve the problems of inflexible use, inflexible and convenient password management of wireless connection devices, etc., and achieve the effect of improving the flexibility of use and increasing the difficulty.

Active Publication Date: 2016-07-06
VIVO MOBILE COMM CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. Not flexible enough to use
Therefore, for owner B, the password manag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless connection authentication method and device
  • Wireless connection authentication method and device
  • Wireless connection authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0088] Example one

[0089] Reference figure 1 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0090] Step 110: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.

[0091] In the embodiment of the present invention, for each time period, the wireless connection device obtains a login password used to log in to the wireless connection device in the current time period, and a permission verification code used to confirm the permission of the resident user.

[0092] The user can send authority information to the wireless connection device in any period of time, and the wireless connection device judges the received authority information according to the login password and the authority verification code. ...

Example Embodiment

[0149] Example two

[0150] On the basis of the first embodiment, the embodiment of the present invention uses a temporary user table in the wireless connection device to grant temporary login authority to the terminal of the temporary user, and uses the resident user table to grant the login authority of the resident user to the terminal of the resident user .

[0151] Reference figure 2 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0152] Step 210: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.

[0153] Step 220: If the received authorization information includes the login password but not the authorization verification code, the terminal is allowed to log in, and the terminal's identity info...

Example Embodiment

[0165] Example three

[0166] On the basis of the first embodiment, the embodiment of the present invention adopts a user table with a preset permission field. In the user table, temporary users’ terminals are given temporary login permissions in the form of temporary marks, and permanent users’ terminals are given permanent The form of resident mark gives its resident user the login authority.

[0167] Reference image 3 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0168] Step 310: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.

[0169] Step 320: If the received authorization information includes the login password but not the authorization verification code, allow the terminal to log in, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless connection authentication method and device and belongs to the computer technical field. According to one embodiment of the invention, the wireless connection authentication method comprises the steps that: in a current time period, if received authority information of a terminal contains a login password and does not contain an authority authentication code, the terminal is allowed to perform login and is bestowed with a temporary login authority; if the received authority information of the terminal contains the login password and the authority authentication code, the terminal is allowed to perform login and is bestowed with a resident login authority; a new login password and an authority authentication code are generated so as to be used in a next time period; and after a wireless connection device uses the new login password, the terminal with the temporary login authority is removed from a login state, and the login state of the terminal with the resident login authority is maintained. With the wireless connection authentication method and device of the invention adopted, the security of the wireless connection device is high, the wireless connection device has little possibility of being cracked down by violent forces, wireless signals have little possibility of being squatted, operation is simple, and use is flexible.

Description

technical field [0001] The embodiment of the present invention relates to the field of computer technology, and in particular to a wireless connection authentication method and device. Background technique [0002] With the development of technology, many terminal devices can connect to a certain wireless connection device through wireless connection for networking and other operations. Computers, handheld devices and other terminals are connected to each other wirelessly) to routers and other wireless connection devices to connect to the Internet; of course, many terminal devices can also connect to other wireless connection devices through other wireless connection methods, such as mobile phones through Bluetooth and other wireless methods are connected to other terminals to transfer files and other operations. [0003] Moreover, for the safety of the wireless network or the wireless connection device, a login password is generally set on the side of the wireless connecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08
CPCH04W74/00
Inventor 齐好鑫
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products