Authentication configuration method applied to business WIFI system
A configuration method and commercial technology, applied in the fields of safety devices, electrical components, wireless communication, etc., can solve the problems of immeasurable maintenance work, confusing authentication configuration methods, and very complicated settings, so as to achieve easy selection and use, and efficient and convenient operation. , the effect of flexible assignment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] It should be noted that, in the case of no conflict, the following technical solutions and technical features can be combined with each other.
[0050] The specific embodiment of the present invention will be further described below in conjunction with accompanying drawing:
[0051] Such as figure 1 as shown,
[0052] An authentication configuration method applied to a commercial WIFI system, the above-mentioned commercial WIFI system includes a cloud server and at least one wireless network connection device, each of the above-mentioned wireless network connection devices is respectively connected to the above-mentioned cloud server, and the above-mentioned cloud server is preset with a first authentication policy and a second authentication policy;
[0053] For each of the above wireless network connection devices, the above authentication configuration method includes:
[0054] Step S1, the above-mentioned cloud server judges whether there is a standard business t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


