A method and device for performing wireless connection pre-authorization on user equipment

A user equipment, wireless connection technology, applied in the field of communication, to achieve the effect of simple and effective connection process, improve user experience, and save cumbersome operations

Active Publication Date: 2022-02-01
SHANGHAI ZHANGMEN TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authentication method of traditional routers is passive. Users who request to connect often need to provide an authentication password, and the wireless connection can only be made after the authentication is passed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for performing wireless connection pre-authorization on user equipment
  • A method and device for performing wireless connection pre-authorization on user equipment
  • A method and device for performing wireless connection pre-authorization on user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The application will be described in further detail below in conjunction with the accompanying drawings.

[0038] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0039] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0040] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The purpose of this application is to provide a method for performing wireless connection pre-authorization on user equipment, wherein the method includes: obtaining the MAC address information of the user equipment; if the user equipment has not obtained the pre-authorization of the wireless routing device, Before the user equipment sends a wireless connection request to the wireless access point corresponding to the wireless routing device, it performs a wireless connection pre-authorization operation on the MAC address information. In this application, before the user equipment initiates authentication to the wireless access point, the wireless routing device pre-authorizes the wireless connection of the MAC address information of the user equipment, which saves the user's cumbersome operations during the wireless connection process and makes the connection process more concise. It is effective and improves the user experience.

Description

technical field [0001] The present application relates to the communication field, and in particular to a technology for performing wireless connection pre-authorization on user equipment. Background technique [0002] With the popularity of mobile devices and the development of the Internet, people rely more and more on wireless networks in their daily lives. The security of public wireless networks is low, and people usually choose to perform connection authentication on wireless networks to restrict illegal users from accessing wireless networks, so as to ensure its security. [0003] When a mobile device connects to a wireless network, it often requires the cooperation of a routing device. However, the authentication method of the traditional router is passive, and the user who requests the connection often needs to provide the authentication password, and the wireless connection can only be performed after the authentication is passed. Contents of the invention [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/062H04W8/22H04W8/24H04W4/80H04W76/14
CPCH04W4/80H04W8/22H04W8/24H04W12/06H04W76/14
Inventor 程翰
Owner SHANGHAI ZHANGMEN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products