Wireless network access method

A wireless network access, wireless network technology, applied in the direction of access restriction, wireless communication, electrical components, etc., can solve problems affecting network experience and security, technical insufficiency, troublesome use, etc., to prevent network security problems, The effect of improving user experience

Inactive Publication Date: 2016-10-26
SHENZHEN PCTX TECH DEV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, what follows is the occurrence of situations that affect one's own network experience and security, such as hacking the Internet.
[0003] At present, there is no way to determine and authenticate the distance. During the user's use, there are often users who want to use it conveniently and quickly, but also consider security and use control issues, but the current technology cannot meet the needs of users.
For example: a network cable is installed at home, and a wireless device is installed for the convenience of other devices to access, but the network speed is often found to be slow; later, it is found that someone else is connecting to your own wireless device, and then set up the wireless device, only allowing the set MAC address Visiting; after a few days of normal use, friends and relatives come to the house and need to use the wireless network, so they have to change the settings of the wireless devices at home; when relatives and friends leave, they change again, which is too troublesome to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network access method
  • Wireless network access method
  • Wireless network access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] The steps for changing the network authentication method include:

[0028] The auxiliary device searches for the SSID name of the wireless device, and enters the authentication to connect.

[0029] The wireless device determines the distance between the access point and the auxiliary device, and obtains the distance between the two. In the process of distance determination, the wireless device transmits data packets to the auxiliary device and starts the timer. After the auxiliary device receives the data packet, it returns the data packet. After the wireless device receives the data packet, the timer stops. The distance between the transmission time and the transmission speed of the data packet is calculated.

[0030] The obtained distance is compared with the set distance stored in the wireless device to determine which way to access. It is concluded that the distance between the auxiliary device and the wireless device is within the set distance, then the authentication m...

Embodiment 2

[0036] The steps for changing the network authentication method include:

[0037] The auxiliary device searches for the SSID name of the wireless device, and enters the authentication to connect.

[0038] The wireless device determines the distance between the access point and the auxiliary device, and obtains the distance between the two. In the process of distance determination, the distance between the auxiliary device and the wireless device is calculated by the signal attenuation of the RSSI propagating in the air and the transmission medium.

[0039] The obtained distance is compared with the set distance stored in the wireless device to determine which way to access. It is concluded that the distance between the auxiliary device and the wireless device is within the set distance, then the authentication method matching judgment is performed to determine whether the connection and the authentication one match, if they match, the authentication succeeds, and if they do not matc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless network access method. Auxiliary equipment and wireless equipment to be connected with a wireless network are provided, wherein network authentication mode changing between the auxiliary equipment and the wireless equipment is carried out by means of the distance, after the distance is calculated, the wireless equipment carries out early stage setting, and the access of auxiliary equipment according to the corresponding authentication mode is allowed after authentication mode determination. According to the invention, a user is enabled to conveniently and rapidly use the wireless network and is enabled to control the network safety and usage.

Description

Technical field [0001] The present invention relates to the field of wireless communication technology, in particular, to an access method for changing the encryption authentication mode through the distance between the wireless device and the access device. Background technique [0002] With the development of wireless technology, data terminals, household appliances, etc. are all participating in the network. People hope that the coverage of wireless networks becomes more and more extensive, so that wireless networks can be used more conveniently. But what comes with it is the occurrence of situations that affect your own network experience and security, such as Rub. [0003] At present, there is no way to determine and authenticate the distance. In the process of user use, there are often users who want to be convenient and fast to use, but also need to consider security and controllability of use, but the current technology cannot meet the demands of users. For example: instal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W48/16H04W48/20
CPCH04W12/06H04W48/16H04W48/20
Inventor 许伟姜天亮杜林
Owner SHENZHEN PCTX TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products