Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information authentication method, device, computer equipment and storage medium

An authentication method and device technology, applied in the field of communication, can solve the problems of cumbersome configuration process and low wireless network efficiency, and achieve the effects of ensuring security, reducing configuration steps, and improving efficiency

Active Publication Date: 2021-05-28
SHENZHEN GONGJIN ELECTRONICS CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide an information authentication method, device, computer equipment and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information authentication method, device, computer equipment and storage medium
  • Information authentication method, device, computer equipment and storage medium
  • Information authentication method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be implemented in many other ways different from those described here, and those skilled in the art can make similar improvements without departing from the connotation of the present invention, so the present invention is not limited by the specific implementations disclosed below.

[0057] figure 1 It is an application environment diagram of the information authentication method in one embodiment. Such as figure 1 As shown, the application environment includes a network amplifier 110 and a WIFI device 120, where the network amplifier 110 and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an information authentication method, device, computer equipment and storage medium, comprising: acquiring the same first key as that of the WIFI equipment, receiving a data packet sent by the WIFI equipment, and generating a second key, using the first key Encrypt the second key to obtain the third key, send the third key and the data packet to the WIFI device, and receive the encrypted configuration information sent by the WIFI device. The configuration information is obtained by encrypting the WIFI device with the second key Yes, the second key is obtained by decrypting the third key by the WIFI device, and decrypting the encrypted configuration information to obtain the decrypted configuration information. The decrypted information sent by the WIFI device is successfully matched with the WIFI device by exchanging keys, thereby reducing the configuration steps of the connection relationship between the network amplifier and the WIFI device, thereby improving the efficiency of establishing a connection in the wireless network.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an information authentication method, device, computer equipment and storage medium. Background technique [0002] With the development of science and technology, wireless local area network has been widely used in all walks of life. As living houses are getting bigger and more rooms, and traditional home wireless network routers have low transmission power, when the house is large or the number of times through the wall is large, the wireless network sent by the router will have signal dead spots and signal failures. Weak question. In order to solve these problems, the traditional solution is to use a wireless network amplifier to enhance the signal strength, so that the wireless signal can stably pass through the wall. [0003] Since the use of a wireless network amplifier to enhance signal strength often requires configuration of the device, the user needs to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0822H04L9/0861H04L9/3297H04L63/08
Inventor 王武志卓贵明
Owner SHENZHEN GONGJIN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products