Check patentability & draft patents in minutes with Patsnap Eureka AI!

Connection authentication in wireless communication network system

A wireless communication network and communication connection technology, which is applied in the field of connection authentication and can solve the problems of protecting personal privacy, disadvantage, and inability to receive services normally.

Inactive Publication Date: 2005-11-23
SEIKO EPSON CORP
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in (1) method, the user must identify the BT address with as many as 48 bits and input it correctly
In addition, in method (2), as in (1), the user must identify the BT address and select his own BT terminal
If you enter or select wrongly, of course you cannot receive the service normally
In addition, if wrongly entered or selected, other people's BT terminals may also be able to access, which is not conducive to the protection of personal privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Connection authentication in wireless communication network system
  • Connection authentication in wireless communication network system
  • Connection authentication in wireless communication network system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment

[0066] A.1. Structure of print service providing system

[0067] A.2. Connection authentication processing

[0068] A.2.1. Principles of connection authentication

[0069] A.2.2. Problems

[0070] A.2.3. Connection authentication of the embodiment

[0071] A.3. Effect

no. 2 Embodiment

[0073] B.1. Structure of print service providing system

[0074] B.2. Connection authentication processing when connection is established

[0075] B.2.1. Problems

[0076] B.2.2. Connection authentication of an embodiment

[0077] B.3. Connection authentication processing after the connection is established

[0078] B.3.1. Problems

[0079] B.3.2. Connection authentication of an embodiment

[0080] B.4. Effect

[0081] C.Modification

[0082] A. The first embodiment

[0083] A.1. Structure of print service providing system

[0084] figure 1 A schematic configuration diagram showing a print service providing system as a configuration example of a communication network system to which the present invention is applied. This print service providing system includes a server PSV that provides a print service, and a printer PR connected thereto.

[0085] The server PSV has a communication function of BT and functions as a BT access point (wireless station). On the server P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a wireless communication network system of the invention, in response to a request for connection authentication sent from each of multiple wireless communication terminals to a base station to establish a communication link, a link management module receives authentication information of each wireless communication terminal, which is generated corresponding to a piece of identification information allocated by an identification information management module and registered in the wireless communication terminal, from the wireless communication terminal via a wireless network. The link management module compares the authentication information received from the wireless communication terminal with multiple possible options of authentication information generated corresponding to multiple different pieces of identification information allocated by the identification information management module, and authenticates the wireless communication terminal that has sent the authentication information matching with one of the multiple possible options of authentication information. The identification information management module manages a mapping of each specific piece of identification information, which corresponds to a specific option of authentication information matching with the authentication information of the authenticated wireless communication terminal, to the authenticated wireless communication terminal. This arrangement of the invention assures simple, convenient, and safe authentication of multiple wireless communication terminals, while unequivocally identifying a process utilized by each user and the user's wireless communication terminal.

Description

technical field [0001] The present invention relates to a wireless communication terminal (hereinafter also referred to as "access point") having a control function as a wireless station in a wireless communication network system capable of transmitting data using a wireless communication standard such as Bluetooth. ") and a wireless communication terminal controlled by a wireless station (hereinafter, simply referred to as "terminal") is a connection authentication technology for performing wireless communication. Background technique [0002] Electronic devices (wireless communication terminals) equipped with a wireless communication function by Bluetooth (hereinafter, sometimes abbreviated as "BT") are being developed. An electronic device equipped with such a function (hereinafter referred to as "BT terminal"), for one BT terminal (hereinafter referred to as "BT access point" or simply "access point") called the host, Up to seven BT terminals called slaves (hereinafter,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F15/00G06F21/00G06F21/44G09C1/00H04L9/32H04L12/28H04L12/56H04L29/06H04M11/00H04W12/06H04W84/18
CPCH04L9/3271H04W12/06H04L63/0869H04L2209/80H04L63/08H04W84/18H04L9/3226H04W12/50
Inventor 荻原丰隆
Owner SEIKO EPSON CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More