WLAN association method and system based on block chain
A blockchain and associated device technology, applied in the Internet field, can solve problems such as insufficient intelligence and efficiency in the authentication process, decline in user happiness, and unfavorable city-wide interconnection, and achieve the effects of improving convenience, ensuring security, and simplifying verification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0036] Example 1:
[0037] WLAN association method based on the block chain, including
[0038] Get the device code for the device that is successfully associated;
[0039] Get successfully correlated fingerprint data;
[0040] The device code and fingerprint data are encrypted uploaded to the block chain;
[0041] The device code is on the branched branches located in the fingerprint data;
[0042] Get the fingerprint data of the operator of the device to be associated;
[0043] Fingerprint data encrypted after the encrypted fingerprint data on the block chain;
[0044] Get the device code to be associated;
[0045] The device code encrypts and matches the encrypted device code on the branched branches of the fingerprint data;
[0046] A device that should be applied to the device code is associated after the match is successful.
[0047] After the fingerprint data encryption is successfully completed with the encrypted fingerprint data on the block chain, the device code to be a...
Example Embodiment
[0053] Example 2:
[0054] WLAN related system based on the block chain, including
[0055] WLAN module 1 for providing wireless network connection ports;
[0056] Fingerprint module 2 for acquiring fingerprint data of the device operator;
[0057] Encryption module 3 for encryption device code and fingerprint data;
[0058] Communication module 4, used to spread fingerprint data to the zone chain, and upload the encryption of the device code to the part fork branches of the block chain of the corresponding encrypted fingerprint data;
[0059] Matching module 5, is used to match the encrypted fingerprint data of the device to the WLAN module 1 to match the encrypted fingerprint data on the block chain, and the encrypted device code of the corresponding device and the block chain of the encrypted fingerprint data. Fork branches on the branches;
[0060] Association module 6 is configured to match the matching module 5 to the successful device with the WLAN module 1.
[0061] After ...
Example Embodiment
[0065] Example 3 ,:
[0066] Based on the second embodiment, an access reminder module 7 is further included for obtaining the number of access points and loads under the current WLAN, and the number of access points and loads are the same as those of the two sets of different colors and size. The integrated form is shown to display data, and the numbers of the two groups correspond to the number of access points and the load, and all of which are displayed by a plurality of square blocks; the display data includes quantity groups, loads Group, overlapping group, the number group is a block group graphic data composed of blocks corresponding to the number of access points, the load quantity group as a block group graphic data composed of square blocks, and two sets of block group diagrams. The width of shape data is the same, the overlapping group is a superimposed display group of block group graphics data of the load assembly and the number of groups, and the overlapping portion...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap