Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network-based intelligent authority management method, system, terminal and storage medium

An authority management and terminal technology, applied in the field of network management, can solve problems such as affecting the user experience and cumbersome networking process, and achieve the effect of improving the user experience, simplifying the networking process, and reducing process problems

Active Publication Date: 2022-01-25
新奥阳光易采科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the related technologies mentioned above, the inventor believes that when someone has changed the password, the user needs to find the person who changed the password and ask for the password to connect to wifi, or find the router gateway password to log in to the router setting page and reset the password to reset the password. Connection, which leads to cumbersome networking process and affects the user's experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-based intelligent authority management method, system, terminal and storage medium
  • Network-based intelligent authority management method, system, terminal and storage medium
  • Network-based intelligent authority management method, system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Embodiment 1: The embodiment of this application discloses a network-based intelligent authority management system. refer to figure 1 , the system includes a verification module, a registration authority acquisition module, a whitelist entry module and a networking module, and the verification module, the registration authority acquisition module, the whitelist entry module and the networking module all use a processor.

[0067] The embodiment of the present application discloses a network-based intelligent authority management method. refer to figure 2 , the network-based intelligent rights management method includes a first entry operation and a network operation, wherein the first entry operation includes the following steps:

[0068] S100: The verification module performs the first verification, the routing terminal obtains the input code sent by the user terminal, and determines whether to open the network channel with the user terminal based on the input code a...

Embodiment 2

[0099] Embodiment two: refer to Image 6 , the difference from Embodiment 1 is that the temporary networking operation includes,

[0100] A1. The user terminal entered into the white list obtains the networking request information and terminal information of other user terminals;

[0101] A2. The user terminal sends the terminal information of other user terminals to the routing terminal;

[0102] Specifically, the routing terminal and the user terminal entered in the white list will receive the networking request information at the same time, and the user terminal entered in the white list can collect terminal information of other user terminals in a targeted manner, and the collection method can be Bluetooth or wifi. The user terminal sends the terminal information of other user terminals to the routing terminal, and the routing terminal records the terminal information.

[0103] A3. The routing terminal obtains temporary networking permission based on the terminal informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a network-based intelligent rights management method, which includes the first entry operation and network operation. The first entry operation includes the routing terminal obtaining the input code sent by the user terminal, and based on the input code and the preset verification password to determine whether to open and the The network channel of the user terminal, if the input code is consistent with the verification password, the network channel is opened; based on the opening and closing status of the network channel of the routing terminal and the user terminal, it is determined whether to open the registration authority, and if the network channel of the routing terminal and the user terminal is in the open state, it is opened Registration authority; the routing terminal obtains the terminal information of the user terminal based on the registration authority, and enters the terminal information into the white list; performs networking operations, and the networking operation includes the routing terminal obtaining the terminal information sent by the user terminal, and if the terminal information is included in the white list, routing The terminal opens a network channel with the user terminal. The application has the effect of simplifying the networking process to improve user experience.

Description

technical field [0001] The present application relates to the field of network management, in particular to a network-based intelligent authority management method, system, terminal and storage medium. Background technique [0002] Today, the network is one of the indispensable and important resources for enterprises and families. It can provide convenience for people's work, entertainment, and life. The broadband network generally refers to the network with a bandwidth of more than 155kbps, and the router is connected to the broadband network. Finally, wireless wifi can be formed through the wifi antenna, which is convenient for mobile phones, computers and other devices to access the Internet wirelessly. [0003] When connecting the mobile phone and the router for the first time, the user generally needs to enter a password for verification. When the password is consistent with the original WiFi password, the user can connect to the Internet, download and upload Internet r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W48/08H04W84/12H04L9/40
CPCH04W48/08H04W84/12H04L63/101H04L63/083
Inventor 刘鹏程
Owner 新奥阳光易采科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products