WIFI connection method, terminal and router

A connection method and router technology, applied in the field of communications, can solve problems affecting users' normal network use, WIFI stealing, loss of network bandwidth resources, etc., and achieve the effects of avoiding WIFI stealing, ensuring network use, and protecting network bandwidth resources.

Inactive Publication Date: 2016-08-10
LETV HLDG BEIJING CO LTD +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of implementing the present invention, the inventor found that the prior art has at least the following problems: if the WIFI password is maliciously spread

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WIFI connection method, terminal and router
  • WIFI connection method, terminal and router
  • WIFI connection method, terminal and router

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] Example one

[0028] figure 1 This is a method flow chart of an embodiment of the WIFI connection method provided by the present invention. The execution body of the method can be various terminal devices with administrator authority, such as smart digital products such as laptops, mobile phones, and Pads, or integrated The devices or chips on these terminal devices. Such as figure 1 As shown, the WIFI connection method is applied to the first terminal and includes the following steps:

[0029] S110: Receive the identification code of the second terminal to be accessed sent by the router.

[0030] When the new user's terminal (the second terminal to be accessed) wants to join a WIFI network, it sends a connection request to the router of the network, and the connection request includes the identification code of the second terminal. The first terminal with administrator authority receives the identification code sent by the router. In the embodiment of the present invention...

Example Embodiment

[0036] Example two

[0037] figure 2 This is a method flowchart of another embodiment of the WIFI connection method provided by the present invention. Such as figure 2 As shown, on the basis of the foregoing embodiment, the WIFI connection method provided in this embodiment may further include the following steps:

[0038] S210: Perform initial settings on the router, perform a binding operation with the router, and determine the administrator authority of the first terminal.

[0039] During the initial setup of the router, you can select a terminal to bind with the router to determine the administrator authority of the terminal.

[0040] S220: Receive the identification code of the second terminal to be accessed sent by the router.

[0041] S230: Display the identification code on the display screen.

[0042] After the first terminal receives the identification code of the second terminal to be accessed, it can trigger an administrator authentication interface, and the administrator ...

Example Embodiment

[0049] Example three

[0050] image 3 This is a method flowchart of another embodiment of the WIFI connection method provided by the present invention. The execution subject of the method may be a terminal with administrator authority, or a device or chip integrated on a terminal with administrator authority. Such as image 3 As shown, the WIFI connection method is applied to the first terminal and includes the following steps:

[0051] Step 310: Receive the identification code of the second terminal to be accessed from the router.

[0052] When the new user's terminal (second terminal) wants to join a certain WIFI network, it sends a connection request to the router of the network, and the connection request includes the identification code of the second terminal. The first terminal with administrator authority receives the identification code sent by the router. In the embodiment of the present invention, the identification code of the second terminal may be the MAC address or m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a WIFI connection method, a terminal and a router and relates to the field of communication technology. The method is applied to a first terminal and includes receiving an identification code of a to-be-accessed second terminal sent by the router; performing authentication operation according to the identification code and generating authentication result information; sending the authentication result information to the router. According to the embodiment of the invention, a new user authentication process is transferred to the terminal having administrator authority from the router, so that illegal WIFI connection caused by password divulgence can be avoided, network bandwidth resources can be protected, normal network use is ensured and user experience is improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communication, and in particular, to a WIFI connection method, a terminal and a router. Background technique [0002] With the popularization of terminals such as notebook computers, tablet computers, and smart phones, more and more terminals use a wireless fidelity technology (WIreless FIdelity; hereinafter referred to as WIFI) to connect to a network. The traditional WIFI connection requires the user to search for the wireless network on the terminal, and then enter the password, which is authenticated by the router. As long as the password is correct, the terminal can successfully connect. [0003] In the process of implementing the present invention, the inventor found that the prior art has at least the following problems: if the WIFI password is maliciously spread or cracked, the WIFI will be easily stolen and connected, resulting in the loss of network bandwidth resources....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08H04W76/02H04W84/12H04W12/126
CPCH04W12/06H04W12/08H04W76/10H04W84/12
Inventor 孙孝文黄长江
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products