Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless network accessing method with safety setting and wireless network system

A wireless network, a wireless network technology, applied in the field of wireless network login method and wireless network system, can solve problems such as inconvenient use, inconvenient, and failure to meet actual needs, and achieve the effect of convenient and fast use

Inactive Publication Date: 2007-06-13
ACER INC
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method can only be used when the spatial positions of the two devices are very close. In fact, the communication distance in the construction of wireless communication is relatively far away, so this setting method often cannot meet the actual needs, and the network device must be moved. Very inconvenient to use
In addition, this method is also limited to products using a specific company's chipset, which lacks comprehensive versatility
[0006] This shows that the above-mentioned existing wireless network login method and its system obviously still have inconvenience and defects in the login method, product structure and use, and need to be further improved urgently
In order to solve the problems existing in the wireless network login method and its wireless network system, relevant manufacturers have tried their best to find a solution, but no suitable design has been developed for a long time, and the general wireless network login method and The system does not have a suitable method and structure to solve the above problems, which is obviously a problem that relevant industry players are eager to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network accessing method with safety setting and wireless network system
  • Wireless network accessing method with safety setting and wireless network system
  • Wireless network accessing method with safety setting and wireless network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to further explain the technical means and effects that the present invention adopts to achieve the intended purpose of the invention, in conjunction with the accompanying drawings and preferred embodiments, the wireless network login method and its wireless network with security settings proposed according to the present invention will be described below. The specific implementation, methods, steps, structures, features and effects of the system are described in detail below.

[0039] The aforementioned and other technical contents, features and effects of the present invention will be clearly presented in the following detailed description of preferred embodiments with reference to the accompanying drawings.

[0040] Please refer to FIG. 1 and FIG. 2. FIG. 1 is a schematic diagram of a system architecture of the wireless network system with security settings in the present invention, illustrating a preferred embodiment of the wireless network system with secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Main characters of the method are as follows. Using a remote controller (portable wireless device) possessing bidirectional wireless transmission functions receives and stores a data of security settings. When a new wireless network device is going to log in a wireless local area network, the said remote controller sends out the security settings to the new wireless network device to accomplish security settings in order to log in the wireless local area network. Thus, user does not need to remember digital data in long string. Features are: easy and quick use.

Description

technical field [0001] The invention relates to a wireless network application, in particular to a wireless network login method with security settings and a wireless network system thereof. Background technique [0002] Today's wireless network connection (generally refers to various wireless communication (Wireless Communication) methods, such as WiFi, 802.11a / b / g, etc.), because there is no tangible communication transmission line, its transmission method is mostly unable to prevent the third party Therefore, in order to meet the requirements of information security and confidentiality, various wireless networks require users to have some kind of security key (Security Key, commonly known as a key) when connecting to the wireless network. Protect its communication content, such as: 802.11a / b / g has wired equivalent privacy code WEP (Wired-Equivalent Privacy) and wireless protection access code WPA (Wi-Fi Protected Access), etc. These keys are all A very long string of dig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L12/28
Inventor 赖怡吉尤焙麟
Owner ACER INC