WIFI connection method, terminal and router
A connection method and router technology, applied in the field of communications, can solve problems affecting users' normal network use, WIFI stealing, loss of network bandwidth resources, etc., and achieve the effects of avoiding WIFI stealing, ensuring network use, and protecting network bandwidth resources.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0027] Example one
[0028] figure 1 This is a method flow chart of an embodiment of the WIFI connection method provided by the present invention. The execution body of the method can be various terminal devices with administrator authority, such as smart digital products such as laptops, mobile phones, and Pads, or integrated The devices or chips on these terminal devices. Such as figure 1 As shown, the WIFI connection method is applied to the first terminal and includes the following steps:
[0029] S110: Receive the identification code of the second terminal to be accessed sent by the router.
[0030] When the new user's terminal (the second terminal to be accessed) wants to join a WIFI network, it sends a connection request to the router of the network, and the connection request includes the identification code of the second terminal. The first terminal with administrator authority receives the identification code sent by the router. In the embodiment of the present invention...
Example Embodiment
[0036] Example two
[0037] figure 2 This is a method flowchart of another embodiment of the WIFI connection method provided by the present invention. Such as figure 2 As shown, on the basis of the foregoing embodiment, the WIFI connection method provided in this embodiment may further include the following steps:
[0038] S210: Perform initial settings on the router, perform a binding operation with the router, and determine the administrator authority of the first terminal.
[0039] During the initial setup of the router, you can select a terminal to bind with the router to determine the administrator authority of the terminal.
[0040] S220: Receive the identification code of the second terminal to be accessed sent by the router.
[0041] S230: Display the identification code on the display screen.
[0042] After the first terminal receives the identification code of the second terminal to be accessed, it can trigger an administrator authentication interface, and the administrator ...
Example Embodiment
[0049] Example three
[0050] image 3 This is a method flowchart of another embodiment of the WIFI connection method provided by the present invention. The execution subject of the method may be a terminal with administrator authority, or a device or chip integrated on a terminal with administrator authority. Such as image 3 As shown, the WIFI connection method is applied to the first terminal and includes the following steps:
[0051] Step 310: Receive the identification code of the second terminal to be accessed from the router.
[0052] When the new user's terminal (second terminal) wants to join a certain WIFI network, it sends a connection request to the router of the network, and the connection request includes the identification code of the second terminal. The first terminal with administrator authority receives the identification code sent by the router. In the embodiment of the present invention, the identification code of the second terminal may be the MAC address or m...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap