CN106851787B - Method and system for conveniently logging in wireless network - Google Patents

Method and system for conveniently logging in wireless network Download PDF

Info

Publication number
CN106851787B
CN106851787B CN201710211338.5A CN201710211338A CN106851787B CN 106851787 B CN106851787 B CN 106851787B CN 201710211338 A CN201710211338 A CN 201710211338A CN 106851787 B CN106851787 B CN 106851787B
Authority
CN
China
Prior art keywords
service set
set identifier
password
login
wireless network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710211338.5A
Other languages
Chinese (zh)
Other versions
CN106851787A (en
Inventor
陈晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Jiji Intellectual Property Operation Co., Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201710211338.5A priority Critical patent/CN106851787B/en
Publication of CN106851787A publication Critical patent/CN106851787A/en
Application granted granted Critical
Publication of CN106851787B publication Critical patent/CN106851787B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for conveniently logging in a wireless network, which are used for solving the problems that a user cannot freely log in the wireless network and the safety is low in a commercial environment in the prior art. The method comprises the following steps: s1, obtaining the service set identifier use state information of the router; s2, judging whether an unused service set identifier exists or not, and if so, acquiring a configured service set identifier and a password; otherwise, ending the login; and S3, logging in the wireless network according to the acquired configured service set identifier and the password. By adopting the invention, users can log in the wireless network more conveniently and safely, and each user has a dedicated service set identifier and password, so that the use of the wireless network terminal cannot influence other users.

Description

Method and system for conveniently logging in wireless network
Technical Field
The invention relates to the field of wireless communication, in particular to a method and a system for conveniently logging in a wireless network.
Background
Wi-Fi is a technology that allows an electronic device to connect to a wireless local area network, typically using the 2.4G UHF or 5G SHF ISM radio frequency bands. Connecting to a wireless local area network is typically password protected; but may be open, allowing any device within range of the wireless lan to connect to it.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The following problems arise:
1. the service set identification and the password are not convenient to obtain, and a user cannot log in a wireless network under any condition;
2. in a commercial environment, the number of people who know the service set identifier and the password is large, and the data security cannot be guaranteed.
The existing method for logging in the wireless network is not only inconvenient in login mode, but also cannot guarantee safety, and users cannot be connected with the commercial wireless network with confidence.
The patent with publication number CN104320408A provides a login method for a Wi-Fi hotspot, in which a client locally stores a hotspot AP login table, and each record contains an SSID, an account, a password, and a mode field, and the method for the client to automatically log in the Wi-Fi hotspot AP includes: the client receives SSID information broadcasted by peripheral APs and selects one SSID; searching an AP login table by using the obtained SSID as a keyword, selecting a record with a mode field value consistent with an AP login mode, and calculating the matching length of the recorded SSID field value and the keyword; if the matching length of the plurality of records and the keyword is not 0, calculating the priority of each matching record, and selecting the record with the maximum priority; and automatically logging in the Wi-Fi hotspot AP by using the account and the password corresponding to the selected record. The hot spot login method provided by the invention supports the same account and password to login different SSIDs
The login method has good compatibility, and can normally run in the existing Wi-Fi equipment and network only by realizing the login method in a hotspot login module of a client. However, the login method of the invention is not convenient and the security is not guaranteed.
Disclosure of Invention
The invention aims to provide a method and a system for conveniently logging in a wireless network, which are used for solving the problems that a user cannot freely log in the wireless network and the safety is low in a commercial environment in the prior art.
In order to achieve the purpose, the invention adopts the technical scheme that:
a method for conveniently logging in a wireless network comprises the following steps:
s1, obtaining the service set identifier use state information of the router;
s2, judging whether an unused service set identifier exists or not, and if so, acquiring a configured service set identifier and a password; otherwise, ending the login;
and S3, logging in the wireless network according to the acquired configured service set identifier and the password.
Further, the method between step S2 and step S3 further comprises the steps of:
judging whether the obtained configured service set identifier has a duplicate name, and if so, prompting a user to reconfigure the service set identifier; if not, the configuration is completed.
Further, step S2 specifically includes:
judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, acquiring the service set identifier and the password which are reconfigured; otherwise, the login is ended.
Further, step S1 is logging in the wireless configuration page through the H5 protocol to acquire the usage status information of the service set identification of the router.
Further, the router simultaneously supports a plurality of service set identification spaces and the service set identification spaces independently configure service set identifications and passwords through a wireless configuration page.
A system for facilitating entry into a wireless network, comprising:
the acquisition module is used for acquiring the use state information of the service set identifier of the router;
the judging module is used for judging whether an unused service set identifier exists or not, and if the unused service set identifier exists, acquiring the configured service set identifier and the configured password; otherwise, ending the login;
and the login module is used for logging in the wireless network according to the acquired configured service set identifier and the password.
Further, still include:
the verification module is used for judging whether the obtained configured service set identifier has a duplicate name or not, and if so, prompting a user to reconfigure the service set identifier; if not, the configuration is completed.
Further, the judging module comprises:
the unconfigured judging unit is used for judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and acquiring a reconfigured service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
Further, the obtaining module comprises:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Further, the judging module comprises:
and the wireless independent configuration unit is used for enabling the router to simultaneously support a plurality of service set identification spaces, and the service set identification spaces independently configure the service set identification and the password through a wireless configuration page.
Compared with the traditional technology, the invention has the following advantages:
1. by adopting the invention, the user can log in the wireless network more conveniently and safely.
2. Each user has exclusive service set identification and password, and the use of the system can not affect other users.
Drawings
FIG. 1 is a flowchart illustrating a method for facilitating entry into a wireless network according to an embodiment;
FIG. 2 is a system diagram of a wireless network for facilitating login according to an embodiment;
fig. 3 is a flowchart of a method for facilitating logging in to a wireless network according to the second embodiment;
fig. 4 is a flowchart of a method for facilitating logging in to a wireless network according to a third embodiment;
FIG. 5 is a system structure diagram of a convenient login wireless network implemented in the second and third embodiments;
fig. 6 is a schematic diagram of a wireless independent configuration method according to an embodiment of the present invention.
Detailed Description
The following are specific embodiments of the present invention and are further described with reference to the drawings, but the present invention is not limited to these embodiments.
Example one
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 1, including the steps of:
s11: acquiring the use state information of the service set identifier of the router;
s12: judging whether an unused service set identifier exists, and if so, acquiring a configured service set identifier and a password; otherwise, ending the login;
s13: and logging in the wireless network according to the acquired configured service set identifier and the password.
A wireless network is a network implemented using wireless communication techniques.
The wireless network is in the category of wireless local area network, which is 'wireless compatibility certification', is essentially a commercial certification, and is also a wireless networking technology, the wireless local area network is connected with a computer through a network cable in the past, and Wi-Fi is networked through radio waves; it is common that a wireless router is used, and the effective range covered by the electric wave of the wireless router can be networked by using Wi-Fi connection, and if the wireless router is connected with an ADSL line or another internet access line, it is also called a hotspot.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The acquisition of Service Set Identifiers (SSIDs) and passwords is troublesome, and many users in a commercial environment can generate potential safety hazards.
SSID is the service set identification. The SSID technology can divide a wireless local area network into a plurality of sub-networks which need different authentication, each sub-network needs independent authentication, and only users who pass the authentication can enter the corresponding sub-network, so that unauthorized users are prevented from entering the network.
The SSID that appears below is an abbreviation for service set identification.
The invention is used for solving the two problems, can set a private SSID and a password for login at any time, does not influence other users using the wireless router in the setting and using processes, and can realize convenient login and the safety of self data communication.
In this embodiment, step S11 is to obtain the use state information of the service set identifier of the router.
Wherein, the step S11 is logging in the wireless configuration page through the H5 protocol to obtain the usage status information of the service set identifier of the router.
H5, HTML5, the fifth major modification of the web to the application hypertext markup language (HTML) in the core language, standard universal markup language. Hypertext markup language, an application under standard universal markup language. "hypertext" refers to pages that may contain pictures, links, and even non-textual elements such as music, programs, etc. The structure of the hypertext markup language includes a "header" section that provides information about the web page, and a "body" section that provides specific content of the web page.
The login via H5 protocol is for the customer to log into the wireless configuration web page of the wireless router easily.
The user firstly uses the H5 protocol to log in a wireless configuration page of the router through the SSID fixed by the router, and checks the conditions of the current SSID of the router, the information of the SSID in use and the like.
In this embodiment, step S12 is to determine whether there is an unused service set identifier, and if so, obtain a configured Service Set Identifier (SSID) and a password; otherwise, the login is ended.
When the SSID is ensured to have an unused state, wireless information, namely the SSID and the password, can be configured through the page.
In this embodiment, the router supports multiple SSID spaces simultaneously, and the multiple SSID spaces configure an SSID and a password independently through a wireless configuration page.
The specific configuration of SSID and password is shown in fig. 6, which includes 2.4G and 5G wireless channels.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-BSSID 16 are used for internet access of general users, the general users can be configured after logging in an H5 page according to SSIDs 2-16, and each SSID can support a plurality of users to access the internet.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused, if yes, the configured SSID and the configured password are obtained, and if not, the login is finished.
Specifically, if all BSSIDs are used, the operation is ended.
If the BSSID is not used, the user inputs a new SSID and password through the H5 page.
In this embodiment, step S13 is to log in to the wireless network according to the obtained configured service set identifier and password.
If the new SSID and password configured by the user are available, the login is successful.
Each SSID does not influence each other, other users using the current wireless network are not influenced after reconfiguration, and user experience is improved. Moreover, each user has an exclusive SSID and password, so that the safety of network use is enhanced.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 2, including:
an obtaining module 21, configured to obtain usage state information of a service set identifier of a router;
the judging module 22 is configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, obtain a configured service set identifier and a password; otherwise, ending the login;
and the login module 23 is configured to log in the wireless network according to the obtained configured service set identifier and the password.
In this embodiment, the obtaining module 21 includes:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Login via H5 protocol is a wireless configuration web page for allowing a customer to conveniently log into a wireless router.
Specifically, the user firstly logs in a wireless configuration page of the router through the fixed SSID of the router by using the H5 protocol, and checks the conditions of the current SSID of the router, the SSID information in use and the like.
In this embodiment, when it is ensured that the SSID has an unused state, the wireless information, that is, the SSID and the password, may be configured through the page.
The judging module 22 includes:
and the wireless independent configuration unit is used for enabling the router to simultaneously support a plurality of SSID spaces and enabling the plurality of SSID spaces to independently configure the SSID and the password through a wireless configuration page.
The specific way to configure SSID and password is shown in fig. 6.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-BSSID 16 are used for internet access of general users, the general users can be configured after logging in an H5 page according to SSIDs 2-16, and each SSID can support a plurality of users to access the internet.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused, if yes, the configured SSID and the configured password are obtained, and if not, the login is finished.
And the login module 23 is configured to log in the wireless network according to the obtained configured service set identifier and the password.
If the new SSID and password configured by the user are available, the login is successful.
Example two
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 3, including the steps of:
s31: acquiring the use state information of the service set identifier of the router;
s32: judging whether an unused service set identifier exists, and if so, acquiring a configured service set identifier and a password; otherwise, ending the login;
s33: judging whether the obtained configured service set identifier has a duplicate name, and if so, prompting a user to reconfigure; otherwise, completing configuration;
s34: and logging in the wireless network according to the acquired configured service set identifier and the password.
The difference from the first embodiment is that:
in this embodiment, step S33 is to determine whether the obtained configured service set identifier has a duplicate name, and if so, prompt the user to reconfigure the service set identifier; otherwise, the configuration is completed.
Before configuration is effective, the system checks whether the configured SSID has a duplicate name phenomenon, and if the SSID is duplicated, the system prompts a user to reconfigure. If no repetition exists, the configuration is effective, the SSID module is restarted, and the use of other SSID modules is not influenced.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, including:
an obtaining module 51, configured to obtain usage state information of a service set identifier of a router;
the judging module 52 is configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, obtain a configured service set identifier and a password; otherwise, ending the login;
the checking module 53 is configured to determine whether the obtained configured service set identifier has a duplicate name, and if so, prompt the user to reconfigure the service set identifier; if not, completing configuration;
and a login module 54, configured to log in to the wireless network according to the obtained configured service set identifier and the password.
The difference from the first embodiment is that a verification module 53 is included.
Specifically, before configuration is effective, the system checks whether the configured SSID has a duplicate name phenomenon, and prompts the user to reconfigure the SSID if the SSID is duplicated. If no repetition exists, the configuration is effective, the SSID module is restarted, and the use of other SSID modules is not influenced.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
After verification, configuration is carried out under the condition that no duplicate name exists, and configuration failure caused by the duplicate name is avoided. The safety is enhanced.
EXAMPLE III
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 4, including the steps of:
s41: acquiring the use state information of the service set identifier of the router;
s42: judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
s43: if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, acquiring the service set identifier and the password which are reconfigured; otherwise, ending the login;
s44: judging whether the obtained configured service set identifier has a duplicate name, and if so, prompting a user to reconfigure; otherwise, completing configuration;
s45: and logging in the wireless network according to the acquired configured service set identifier and the password.
The difference between this embodiment and the second embodiment is that the user inquires whether the BSSID is unused through the system. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Thus, determining whether there is an unused SSID includes determining whether there is an unconfigured SSID and determining whether there is an SSID that has been configured that is not used at a preset time.
In the embodiment, whether an unconfigured SSID exists is judged, and if so, the configured SSID and the password are obtained;
if no SSID which is not configured exists, judging whether an SSID which is configured but is not used in the preset time exists, and if so, acquiring a reconfigured SSID and a password; otherwise, the login is ended.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, which is different from the second embodiment in that:
the judging module 52 includes:
the unconfigured judging unit is used for judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and acquiring a reconfigured service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
The user inquires through the system whether BSSID is unused. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Therefore, the determining module 52 specifically includes an unconfigured determining unit and an unused determining unit, which are respectively used for determining whether there is an unconfigured SSID and determining whether there is an SSID configured and not used in the preset time.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.

Claims (10)

1. A method for facilitating login to a wireless network, comprising the steps of:
s1, obtaining the use state information of a plurality of service set identifiers of a router;
s2, judging whether an unused service set identifier exists, if so, configuring the service set identifier and the password through the page, and acquiring the configured service set identifier and the password; otherwise, ending the login;
and S3, logging in the wireless network according to the acquired configured service set identifier and the password.
2. The method as claimed in claim 1, further comprising between step S2 and step S3:
judging whether the obtained configured service set identifier has a duplicate name, and if so, prompting a user to reconfigure the service set identifier; if not, the configuration is completed.
3. The method according to claim 1, wherein the step S2 specifically includes:
judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, acquiring the service set identifier and the password which are reconfigured; otherwise, the login is ended.
4. The method of claim 1, wherein step S1 is logging in the wireless configuration page via H5 protocol to obtain the service set ID usage status information of the router.
5. The method of claim 1, wherein the router supports multiple service set identification spaces simultaneously and the multiple service set identification spaces configure the service set identification and the password independently via a wireless configuration page.
6. A system for facilitating entry into a wireless network, comprising:
the router comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring the use state information of a plurality of service set identifiers of one router;
the judging module is used for judging whether an unused service set identifier exists or not, and if the unused service set identifier exists, the service set identifier and the password are configured through the page to obtain the configured service set identifier and the password; otherwise, ending the login;
and the login module is used for logging in the wireless network according to the acquired configured service set identifier and the password.
7. The system for facilitating login to a wireless network of claim 6, further comprising:
the verification module is used for judging whether the obtained configured service set identifier has a duplicate name or not, and if so, prompting a user to reconfigure the service set identifier; if not, the configuration is completed.
8. The system of claim 6, wherein the determining module comprises:
the unconfigured judging unit is used for judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and acquiring a reconfigured service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
9. The system for facilitating login to a wireless network of claim 6, wherein the obtaining module comprises:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
10. The system of claim 6, wherein the determining module comprises:
and the wireless independent configuration unit is used for enabling the router to simultaneously support a plurality of service set identification spaces, and the service set identification spaces independently configure the service set identification and the password through a wireless configuration page.
CN201710211338.5A 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network Active CN106851787B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710211338.5A CN106851787B (en) 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710211338.5A CN106851787B (en) 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network

Publications (2)

Publication Number Publication Date
CN106851787A CN106851787A (en) 2017-06-13
CN106851787B true CN106851787B (en) 2020-01-07

Family

ID=59141446

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710211338.5A Active CN106851787B (en) 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network

Country Status (1)

Country Link
CN (1) CN106851787B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399726A (en) * 2018-03-19 2018-08-14 珠海格力电器股份有限公司 Control method for remote controller, device, remote controler and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711215A (en) * 2012-05-23 2012-10-03 海信集团有限公司 Method and system for automatically connecting wireless network and smart television
CN103973501A (en) * 2014-05-28 2014-08-06 深圳市金立通信设备有限公司 Method and device for managing wireless local area network access point
CN104320408A (en) * 2014-11-06 2015-01-28 中山大学 Login method of WiFi access point (AP)
CN105491623A (en) * 2014-09-16 2016-04-13 华为技术有限公司 Ethernet power supply method, device, equipment and system
CN106230676A (en) * 2016-09-27 2016-12-14 美的智慧家居科技有限公司 The method of household electrical appliances access network, device, system and household electrical appliances
CN106231596A (en) * 2016-09-05 2016-12-14 上海斐讯数据通信技术有限公司 A kind of access point apparatus configuration devices and methods therefor, a kind of access point apparatus
CN106412910A (en) * 2016-10-27 2017-02-15 上海斐讯数据通信技术有限公司 Method for intelligently screening SSID access point and wireless terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711215A (en) * 2012-05-23 2012-10-03 海信集团有限公司 Method and system for automatically connecting wireless network and smart television
CN103973501A (en) * 2014-05-28 2014-08-06 深圳市金立通信设备有限公司 Method and device for managing wireless local area network access point
CN105491623A (en) * 2014-09-16 2016-04-13 华为技术有限公司 Ethernet power supply method, device, equipment and system
CN104320408A (en) * 2014-11-06 2015-01-28 中山大学 Login method of WiFi access point (AP)
CN106231596A (en) * 2016-09-05 2016-12-14 上海斐讯数据通信技术有限公司 A kind of access point apparatus configuration devices and methods therefor, a kind of access point apparatus
CN106230676A (en) * 2016-09-27 2016-12-14 美的智慧家居科技有限公司 The method of household electrical appliances access network, device, system and household electrical appliances
CN106412910A (en) * 2016-10-27 2017-02-15 上海斐讯数据通信技术有限公司 Method for intelligently screening SSID access point and wireless terminal

Also Published As

Publication number Publication date
CN106851787A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
US9749289B2 (en) Infrastructure coordinated media access control address assignment
CN102017677B (en) Access through non-3GPP access networks
US9572030B2 (en) Methods and apparatus to discover authentication information in a wireless networking environment
WO2016078301A1 (en) Wireless network access method and access apparatus, client and storage medium
EP2953308A1 (en) Method and device for handling authentication of static user terminal
CN110061993B (en) Log generation method and device containing public network exit address and access equipment
US20070258415A1 (en) Handshake method for wireless client
WO2004105333A1 (en) Safe virtual private network
EP2291017A1 (en) Method for network connection
EP2712141A1 (en) Method, system and device for authenticating ip phone and negotiating voice field
US11924192B2 (en) Systems and methods for secure automated network attachment
WO2017219748A1 (en) Method and device for access permission determination and page access
CN106255106A (en) A kind of wireless network connecting method and device
JP2005522959A (en) Station status determination in the local area
CN107124424A (en) Real name auditing method, equipment and system
CN106954215B (en) Method and system for conveniently logging in wireless network
CN106851787B (en) Method and system for conveniently logging in wireless network
CN104955036A (en) Secure networking method and device in public Wi-Fi (wireless fidelity) environment
KR20200010417A (en) Improved network communication
CN106851637A (en) A kind of method and system of convenient many password login wireless networks
Cisco Internet Browser Interface
CN113746864A (en) Authentication method, device, equipment and storage medium of user terminal
CN108307683A (en) The means of communication, micro-base station, micro-base station controller, terminal and system
CN108834141A (en) A kind of novel things-internet gateway access authentication method and system
KR20040001343A (en) Wireless LAN connection apparatus and method for net connection certification in public wireless LAN system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Applicant after: Shanghai Feixun Data Communication Technology Co., Ltd.

Address before: 201616 Shanghai city Songjiang District Songjiang District Road No. 3666

Applicant before: Shanghai Feixun Data Communication Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201109

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co., Ltd

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right