Method and system for logging in wireless network conveniently
A wireless network, convenient technology, applied in the direction of wireless communication, access restrictions, electrical components, etc., can solve the problems of low wireless network security, users cannot log in freely, etc., and achieve the effect of safe use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] This embodiment provides a convenient method for logging into a wireless network, such as figure 1 shown, including steps:
[0046] S11: Obtain the usage state information of the service set identifier of the router;
[0047] S12: Determine whether there is an unused service set identifier, if so, randomly generate a service set identifier and password through the service set identifier / password generator; otherwise, end the login;
[0048] S13: Log in to the wireless network according to the randomly generated service set ID and password.
[0049] A wireless network is a network implemented using wireless communication technology.
[0050] Wireless network refers to "wireless compatibility certification" in the category of wireless local area network, which is essentially a commercial certification and also a wireless networking technology. In the past, computers were connected through network cables, while Wi-Fi was connected through radio waves. The common one is ...
Embodiment 2
[0100] This embodiment provides a convenient method for logging into a wireless network, such as image 3 shown, including steps:
[0101] S31: Obtain the use state information of the service set identifier of the router;
[0102] S32: Determine whether there is an unused service set identifier, if so, randomly generate a service set identifier and password through the service set identifier / password generator; otherwise, end the login;
[0103] S33: Determine whether the randomly generated service set ID has the same name, if yes, regenerate the service set ID and password; if not, complete the random generation;
[0104] S34: Log in to the wireless network according to the randomly generated service set ID and password.
[0105] The difference from Example 1 is:
[0106] In this embodiment, step S33 is to judge whether the randomly generated service set ID has the same name, and if so, regenerate the service set ID; otherwise, complete the random generation.
[0107] Bef...
Embodiment 3
[0124] This embodiment provides a convenient method for logging into a wireless network, such as Figure 4 shown, including steps:
[0125] S41: Obtain the usage state information of the service set identifier of the router;
[0126] S42: Determine whether there is an unconfigured service set ID, and if so, randomly generate a service set ID and a password;
[0127] S43: If there is no unconfigured service set ID, determine whether there is a service set ID that has been configured but not used at the preset time, if yes, randomly generate a service set ID and a password; otherwise, end the login;
[0128] S44: Determine whether the randomly generated service set identifier has the same name, if yes, regenerate the service set identifier and password; if not, complete the random generation;
[0129] S45: Log in to the wireless network according to the randomly generated service set ID and password.
[0130] The difference between this embodiment and the second embodiment is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


