A wireless connection authentication method and device

A wireless connection and verification code technology, applied in the computer field, can solve the problems of inflexible use, inflexible and convenient password management of wireless connection devices, etc., and achieve the effect of improving the flexibility of use and increasing the difficulty

Active Publication Date: 2019-01-29
VIVO MOBILE COMM CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. Not flexible enough to use
Therefore, for owner B, the password management of his wireless connection device is not flexible and convenient enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless connection authentication method and device
  • A wireless connection authentication method and device
  • A wireless connection authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] Reference figure 1 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0090] Step 110: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.

[0091] In the embodiment of the present invention, for each time period, the wireless connection device obtains the login password used to log in to the wireless connection device in the current time period, and the authorization verification code used to confirm the authority of the resident user.

[0092] The user can send permission information to the wireless connection device in any time period, and the wireless connection device judges the received permission information according to the login password and the permission verification code.

[0093] In pra...

Embodiment 2

[0150] On the basis of the first embodiment, the embodiment of the present invention uses a temporary user table in the wireless connection device to grant temporary login authority to the terminal of the temporary user, and uses the resident user table to grant the login authority of the resident user to the terminal of the resident user .

[0151] Reference figure 2 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0152] Step 210: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.

[0153] Step 220: If the received authorization information includes the login password but not the authorization verification code, the terminal is allowed to log in, and the terminal's identity information is written i...

Embodiment 3

[0166] On the basis of the first embodiment, the embodiment of the present invention adopts a user table with a preset permission field. In the user table, temporary users’ terminals are given temporary login permissions in the form of temporary marks, and permanent users’ terminals are given permanent The form of resident mark gives its resident user the login authority.

[0167] Reference image 3 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:

[0168] Step 310: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.

[0169] Step 320: If the received authority information includes the login password but not the authority verification code, allow the terminal to log in, and write the terminal's identity ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless connection authentication method and device, and relates to the technical field of computers. In this embodiment of the present invention, within the current time period, if the terminal permission information received includes the login password but does not include the permission verification code, the terminal is allowed to log in, and the terminal is given temporary login permission; if the terminal permission information is received If the information includes a login password and a permission verification code, the terminal is allowed to log in, and the terminal is given resident login permission; a new login password and a new permission verification code are generated for use in the next time period; After the device uses the new login password, the terminal with temporary login authority is removed from the login state, and the terminal with resident login authority is maintained in the login state. The wireless connection device of the present invention has high security, the difficulty of being cracked by violence is increased, the wireless signal is not easy to be rubbed, and the operation is simple and the use is flexible.

Description

Technical field [0001] The embodiment of the present invention relates to the field of computer technology, in particular to a wireless connection authentication method and device. Background technique [0002] With the development of technology, many terminal devices can access a certain wireless connection device for networking and other operations through wireless connections. For example, mobile terminals can use wifi (Wireless Fidelity, wireless fidelity, also known as the 802.11b standard, which is a A technology in which personal computers, handheld devices and other terminals are connected to each other in a wireless manner) connect to wireless connection devices such as routers, thereby connecting to the Internet; of course, many terminal devices can also be connected to other wireless connection devices through other wireless connections, such as mobile phones Connect to other terminals through wireless means such as Bluetooth to transfer files and other operations. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W74/00
Inventor 齐好鑫
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products