Intelligent security Wi-Fi management method and system

A management method and security technology, applied in the information field, can solve the problems of lack of authority management, reducing the difficulty of network passwords being cracked, and the configuration process being cumbersome.

Active Publication Date: 2018-12-11
QUANXUN HUIJU NETWORK TECH BEIJING CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. At present, the AP (Wireless Access Point, wireless access point) on the market uses a single Wi-Fi password, but because the Wi-Fi password sharing software greatly reduces the difficulty of cracking the network password, hackers crack, employees leak and other reasons, so that enterprises or Individuals plagued by security risks
[0004] 2. Large-scale enterprises use 802.1x solutions to improve Wi-Fi security, but certificate cooperation is required, the configuration process is cumbersome, the user connection operation process is complicated, and it is difficult to implement in enterprises
[0005] 3. The enterprise administrator lacks a management plan for the enterprise's internal wireless Wi-Fi, causing confusion in the enterprise's internal management of wireless Wi-Fi, and cannot perform functions such as viewing status, configuring authentication, deleting users, and adding users
[0006] 4. The enterprise administrator sets the Wi-Fi name and password for the visitor separately, but lacks effective rights management, so the administrator must constantly change the internal Wi-Fi password to ensure the smooth and stable guest network
[0007] 5. The administrator cannot monitor the details of the Wi-Fi network in real time, and can only gradually investigate after the network is notified of the fault, which is inefficient and lags behind in control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security Wi-Fi management method and system
  • Intelligent security Wi-Fi management method and system
  • Intelligent security Wi-Fi management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In the following, only some exemplary embodiments are briefly described. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature and not restrictive.

[0040] figure 1 It is a flow chart of an intelligent secure Wi-Fi management method provided by an embodiment of the present invention. Such as figure 1 As shown, the intelligent and secure Wi-Fi management method of the embodiment of the present invention can be applied to a Wi-Fi management device, including: step S110, receiving a networking request from a terminal; step S120, generating at least one network connection corresponding to the networking request password; step S130, obtaining the service set identification information of the wireless local area network to which the terminal belongs; step S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intelligent security Wi-Fi management method and system. The method comprises the following steps: receiving a networking request from a terminal; Generating at least one password corresponding to the networking request; Acquiring service set identification information of a wireless local area network to which the terminal belongs; The service set identification information and at least one password corresponding to the networking request are sent to the terminal and the routing device so that the terminal connects the routing device using the password and the serviceset identification information. The embodiment of the invention realizes that a single service set identifier is used to support multiple terminals to connect with multiple passwords to a wireless local area network, and the original connection protocol and the use mode are not changed, and the one-key networking function is supported, so that the terminal can be conveniently and quickly networked. On this basis, Wi-Fi to carry out unified management, reduce the operating costs of Wi-Fi management, to ensure the safety, stability and efficient operation of the network.

Description

technical field [0001] The invention relates to the field of information technology, in particular to an intelligent and safe Wi-Fi management method and system. Background technique [0002] With the development of smart devices and the Internet, Wi-Fi is an indispensable function for every smart device. With a large number of devices connected to the Wi-Fi network, Wi-Fi passwords are shared, hacked, and corporate employees lose their passwords. It brings unpredictable security risks to the enterprise and personal information, and at the same time, enterprise administrators lack a fully functional management platform. To sum up, the common technical deficiencies of existing Wi-Fi networks are summarized as follows: [0003] 1. At present, the AP (Wireless Access Point, wireless access point) on the market uses a single Wi-Fi password, but because the Wi-Fi password sharing software greatly reduces the difficulty of cracking the network password, hackers crack, employees l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W48/08H04L9/08H04L9/32H04W12/041
CPCH04L9/0816H04L9/0869H04L9/088H04L9/3226H04W12/06H04W48/08
Inventor 王紧紧
Owner QUANXUN HUIJU NETWORK TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products