Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of auto-configuration and auto-prioritizing for wireless security network

A wireless security and automatic setting technology, applied in security devices, wireless communication, security communication devices, etc., can solve the problems of inconvenience, traffic congestion, complicated input data and settings of wireless local area network, etc. Effect

Inactive Publication Date: 2006-06-07
ARCADYAN
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Moreover, with the widespread use of wireless local area networks in the enterprise world, for example, users usually use notebook computers (clients) to wirelessly transmit data with the receiver in the company building, and the type of data transmitted is not valid. Separation, the data type includes data (Data) type, voice (Voice) type, video (Video) and so on, so that there is often traffic congestion when different types of data are transmitted between the receivers
[0006] Continuing from the above, the setting of multiple sets of input data disclosed above will easily lead to the need for a lot of complicated input data and settings when the user uses the wireless local area network.
[0007] It can be seen that the above-mentioned existing input data setting method obviously still has inconvenience and defects in terms of method and use, and needs to be further improved urgently.
In order to solve the problems existing in the setting method of input data, relevant manufacturers have tried their best to find a solution, but no suitable design has been developed for a long time, and the general method has no suitable method to solve the above problems , this is obviously a problem that relevant industry players are eager to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of auto-configuration and auto-prioritizing for wireless security network
  • Method of auto-configuration and auto-prioritizing for wireless security network
  • Method of auto-configuration and auto-prioritizing for wireless security network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to further explain the technical means and effects that the present invention adopts to achieve the intended purpose of the invention, below in conjunction with the drawings and preferred embodiments, a kind of automatic setting and automatic sorting for wireless security networks proposed according to the present invention The specific implementation, method, steps, features and effects of the method are described in detail below.

[0040] The environment setting method of the wireless local area network according to the preferred embodiment of the present invention will be described below with reference to related drawings, wherein the same components will be described with the same reference symbols.

[0041] The present invention discloses a method and means for providing a secure wireless network transmission method, especially the present invention discloses auto-configuration and auto-prioritizing to facilitate secure network transmission . In addition,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for automatic setting and automatic ordering of a wireless security network, which includes: a user terminal obtains a MAC address by scanning the service identification code (SSID) of the wireless device, and transmission priority . Wherein the transmission priority is separated by different service identification codes. Designate channels with different transmission priorities according to different transmission formats in the corresponding above-mentioned transmission formats, obtain a wireless security key according to the MAC address and service identification code, encrypt the wireless security key; use the wireless device to authenticate the key Connect to a network. When the authentication key is authenticated, a security key is generated. Continue to communicate with this security key. The client will automatically select the type of service identification code it wants to use according to different applications, so as to generate priority access to the access device, and can effectively separate the types of data transmitted between the access devices, so that different types of data can be shared The traffic transmitted between each access device can be effectively controlled, which is very suitable for practical use.

Description

technical field [0001] The present invention relates to a transmission method of a wireless area network, in particular to a method for automatically setting and automatically sorting a wireless security network (Method of auto- configuration and auto-prioritizing for wireless security network). Background technique [0002] With the gradual popularization of wireless network technology and computer technology, the relationship between information and daily life is becoming more and more closely integrated, and the boundary between the physical world and the virtual world is gradually blurring. Users often use mobile phones, wireless communication devices and wireless networks to conduct data, share, disseminate, and even wireless business data transmission is becoming more and more common. [0003] The scope covered by the so-called "wireless network" includes common mobile phones (GSM, GPRS), Bluetooth (Bluetooth) or 802.15 (WPAN) wireless networks designed as short-dista...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L41/0886H04L63/06H04L63/08H04W12/04H04W12/06H04L2463/061H04W12/73H04W12/71
Inventor 李霁芳
Owner ARCADYAN