Network access method, device and system
A technology of network access and network access equipment, which is applied in the field of network access and can solve problems such as low information security performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] According to an embodiment of the present invention, an embodiment of a network access method is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0032] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 1 It shows a hardware structure block diagram of a computer terminal (or mobile device) for implementing a method for network access. Such as figure 1 As shown, the computer terminal 10 (or mobile device 10) may include one or more (shown by 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 may include but not limite...
Embodiment 2
[0084] According to an embodiment of the present invention, an embodiment of a network access method is also provided, Figure 4 It is a flow chart of a network access method according to Embodiment 2 of the present application, combined with Figure 4 As shown, the method includes the following steps:
[0085] Step S41 , detecting actions to be performed by the terminal, wherein the actions to be performed are generated by the terminal according to network access information of the target wireless network.
[0086] In an optional embodiment, the execution subject of the above steps may be a device to be connected to the network, such as a smart home device, etc., especially a device without a human-computer interaction interface.
[0087] In the above step S41, the terminal transmits the network access information to the device to be network access through the action to be executed. The specific solution for the terminal to generate the action to be executed according to th...
Embodiment 3
[0098] According to an embodiment of the present invention, an embodiment of a network access method is also provided, Figure 5 It is a flow chart of a network access method according to Embodiment 3 of the present application, combined with Figure 5 As shown, the method includes the following steps:
[0099] In step S51, the terminal receives network access information of a target wireless network.
[0100] In the above step S51, the network access information received by the terminal may be input by the user.
[0101] Step S53, generating a corresponding Morse code according to the network access information.
[0102] In the above step S53, the terminal locally encodes the network access information input by the user into a corresponding Morse code. In an optional embodiment, the above network access information includes: the name of the target wireless network, the password and Encryption. The terminal generates a character string in a corresponding format according t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com