Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication configuration method applied to business WIFI system

A configuration method and commercial technology, applied in the fields of safety devices, electrical components, wireless communication, etc., can solve the problems of immeasurable maintenance work, confusing authentication configuration methods, and very complicated settings, so as to achieve easy selection and use, and efficient and convenient operation. , the effect of flexible assignment

Active Publication Date: 2017-01-18
浙江新舍网络科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of commercial WIFI operation, the server needs to do many things, such as configuring the Internet access parameters of multiple access points (AccessPoint, AP) or hotspots (gateway) connected to the server, the authentication method of the end user, and the Pushed portal pages, etc. These settings are very complicated according to different operating scenarios
However, multiple scenarios lead to the need for multiple role operations. If a merchant needs to configure multiple devices, it will be more complicated. If a group merchant needs to perform related configuration operations on hundreds or thousands of access points or hotspots, Then this maintenance work is already immeasurable
[0004] Some existing commercial WIFI cloud platforms are only suitable for operating individual merchants. It is impossible to predict the types of wireless network devices that exist in group merchants or large shopping malls with a large number of complex types. Authentication configuration and unified user interface (User Interface, UI). When there are many access points or hotspots, various configurations are relatively scattered, and the authentication configuration method is relatively chaotic and cumbersome. Business-level use requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication configuration method applied to business WIFI system
  • Authentication configuration method applied to business WIFI system
  • Authentication configuration method applied to business WIFI system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] It should be noted that, in the case of no conflict, the following technical solutions and technical features can be combined with each other.

[0050] The specific embodiment of the present invention will be further described below in conjunction with accompanying drawing:

[0051] Such as figure 1 as shown,

[0052] An authentication configuration method applied to a commercial WIFI system, the above-mentioned commercial WIFI system includes a cloud server and at least one wireless network connection device, each of the above-mentioned wireless network connection devices is respectively connected to the above-mentioned cloud server, and the above-mentioned cloud server is preset with a first authentication policy and a second authentication policy;

[0053] For each of the above wireless network connection devices, the above authentication configuration method includes:

[0054] Step S1, the above-mentioned cloud server judges whether there is a standard business t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication configuration method applied to a business WIFI system. The method comprises steps that S1, whether a pair of standard business templates corresponding to the businessmen information are preset is determined by a cloud server end; if yes, forced authentication strategies formed under the standard business templates are transmitted by the cloud service end to wireless network connection equipment, terminal authentication is carried out by the wireless network connection equipment according to the force authentication strategies, and withdrawal is then carried out; S2, a type of the wireless network connection equipment is determined by the cloud service end, if the wireless network connection equipment is in a wireless access accessing point type, the process is turned to a S3, if the wireless network connection equipment is in a hot spot type, the process is turned to a S4; and S3, the first authentication strategy is transmitted by the cloud service end to the wireless network connection equipment so as to enable the wireless network connection equipment to employ the first authentication strategy to carry out terminal authentication. The method is advantaged in that operation is more efficient and convenient, bidirectional selection between configuration and the equipment is realized, a designation mode is flexible, multi-role designation can be realized, and the method is applicable to multi-scene operation.

Description

technical field [0001] The invention relates to the field of e-commerce information technology, in particular to an authentication configuration method applied to a commercial WIFI system. Background technique [0002] Commercial WIFI is a set of intelligent WIFI marketing system. With the GWIFI series of intelligent commercial gateways, it can realize a series of commercial promotion activities such as intelligent Portal push, enhanced advertisement browsing, intelligent merchant homepage display, and precise secondary marketing, so as to improve the online exposure of merchants. , enhance brand awareness. [0003] In the process of commercial WIFI operation, the server needs to do many things, such as configuring the Internet access parameters of multiple access points (AccessPoint, AP) or hotspots (gateway) connected to the server, the authentication method of the end user, and the Pushed portal pages, etc. These settings are very complicated according to different opera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W24/02
CPCH04W12/06H04W24/02
Inventor 段雄文戴泽来
Owner 浙江新舍网络科技有限公司