WIFI proxy authentication method and system

An authentication method and authentication request technology, applied in transmission systems, safety devices, electrical components, etc., can solve problems such as inability to manage

Inactive Publication Date: 2017-06-23
PHICOMM (SHANGHAI) CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The existing system can only supervise the use of wireless networks by students through mobile electronic devices through monitoring and other means, and cannot achieve real and effective management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WIFI proxy authentication method and system
  • WIFI proxy authentication method and system
  • WIFI proxy authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Such as figure 1 Shown is a flow chart of a WIFI proxy authentication method in this embodiment. The method is used to control the access authority of at least one member device through a parent device in a home network. The method specifically includes:

[0051] S1. When receiving an association request sent by a member device, determine whether the parent device has been associated;

[0052] In this step, when the member device is associated with the wireless access device, access to the external network is prohibited by default.

[0053] At this time, after the wireless access device accepts the association request of the member device, it checks and determines whether the parent device is also associated with the wireless access device.

[0054] S2. If the parent device has been associated, send an authentication request corresponding to the member device to the parent device;

[0055]In this step, if the AP checks and judges that the parent device is also associa...

Embodiment 2

[0079] The difference between this embodiment and the previous embodiments is that this embodiment also includes the situation that the parent device fails to process the access request of the member device in time.

[0080] Such as Figure 4 Shown is a flow chart of a WIFI proxy authentication method in this embodiment. The method is used to control the Internet access authority of at least one member device through a parent device in a home network. The method includes:

[0081] S1. When receiving an association request sent by a member device, determine whether the parent device has been associated;

[0082] S2. If the parent device has been associated, send an authentication request corresponding to the member device to the parent device;

[0083] In this embodiment, after the step S2, it further includes: monitoring the feedback information of the parent device within a predetermined time, and if no feedback information is received from the parent device within the prede...

Embodiment 3

[0095] The difference between this embodiment and the previous embodiments is that this embodiment also includes: the administrator can cancel the access permission of the member device through the parent device.

[0096] A kind of WIFI agent authentication method comprises in the present embodiment:

[0097] S1. When receiving an association request sent by a member device, determine whether the parent device has been associated;

[0098] S2. If the parent device has been associated, send an authentication request corresponding to the member device to the parent device;

[0099] S3. When receiving the online verification information sent by the parent device according to the authentication request, verifying the online verification information;

[0100] S4. When the verification of the Internet access verification information is passed, activate the Internet access permission of the corresponding member device.

[0101] In this embodiment, after the step S4, it further incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a WIFI proxy authentication method and a system, wherein the method and the system are applied in a home network. According to the technical scheme of the invention, in the home network, the internet authority of at least one member device is controlled by a parent device. The method comprises the steps of S1, upon receiving an association request sent by the member device, judging whether the parent device has been associated or not; S2, if the parent device has already been associated, sending the authentication request of the corresponding member device to the parent device; S3, upon receiving the internet authentication information sent by the parent device according to the authentication request, authenticating the internet authentication information; S4, if the internet authentication information passes the authentication, granting the internet authority of the corresponding member device. According to the technical scheme of the invention, the wireless authentication of the member device is managed by the parent device. Therefore, the internet surfing time and the internet surfing time limit of the member device are effectively managed. Moreover, the member device is managed to use the wireless network more effectively.

Description

technical field [0001] The invention relates to the field of wireless networks, in particular to a WIFI proxy authentication method and system. Background technique [0002] With the popularization of the Internet, more and more people enjoy the convenience brought by mobile electronic devices and networks. However, mobile electronic devices have the characteristics of openness, sharing, and speed of the Internet, making it easy for children to obtain information or knowledge related to learning and life through the Internet. With the popularity of WIFI networks, mobile Internet has become a trend. Due to the convenience of carrying mobile electronic devices or other mobile Internet devices, the main position for children to surf the Internet is also likely to shift from traditional Internet to mobile Internet. [0003] The survey found that with the rapid development of mobile Internet today, almost 100% of children have mobile electronic devices. Mobile electronic devices...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W84/12H04L29/06
CPCH04W12/06H04L63/0876H04L63/10H04W84/12
Inventor 王斌
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products