[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106162627B - Method for triggering data communication service application by adjacent router in wireless environment - Google Patents

Method for triggering data communication service application by adjacent router in wireless environment Download PDF

Info

Publication number
CN106162627B
CN106162627B CN201510194489.5A CN201510194489A CN106162627B CN 106162627 B CN106162627 B CN 106162627B CN 201510194489 A CN201510194489 A CN 201510194489A CN 106162627 B CN106162627 B CN 106162627B
Authority
CN
China
Prior art keywords
wireless router
information
mobile device
user
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510194489.5A
Other languages
Chinese (zh)
Other versions
CN106162627A (en
Inventor
张兆龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Nanbao Technology Co ltd
Original Assignee
Beijing Nanbao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Nanbao Technology Co ltd filed Critical Beijing Nanbao Technology Co ltd
Priority to CN201510194489.5A priority Critical patent/CN106162627B/en
Publication of CN106162627A publication Critical patent/CN106162627A/en
Application granted granted Critical
Publication of CN106162627B publication Critical patent/CN106162627B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for triggering data communication service application by a proximity router in a wireless environment, wherein the proximity identity authentication method between a mobile device and the wireless router comprises the following steps: bringing the mobile device into proximity with the wireless router to establish a connection between the wireless router and the mobile device; the wireless router uses the device information to look up a match through its encrypted database: if the matching is unsuccessful, the wireless router adds the equipment information into a database and encrypts the equipment information, and meanwhile, necessary network configuration is carried out on the mobile equipment; and if the matching is successful, the wireless router receives and processes the networking request sent by the mobile equipment, so that the mobile equipment can conveniently surf the internet. Further, the wireless router uses the mobile device information item to perform a secondary match within the database: if the matching is unsuccessful, the current mobile equipment information item is added or covered to a database of the wireless router; and if the matching is successful, comparing the read user information with the received user information, and registering if the comparison is successful.

Description

Method for triggering data communication service application by adjacent router in wireless environment
Technical Field
The invention relates to the technical field of wireless communication and application of a mobile communication operating system, in particular to a method for installing a mobile device operating system in a wireless environment and triggering the action and the event of the application through the proximity of a mobile device to a wireless router so as to provide a data communication service.
Background
As more and more mobile portable communication systems and intelligent mobile terminals are added to consumer lives, the requirements of consumers on safety and convenience for using wireless data communication services are higher and higher. The traditional data communication service needs the user to actively participate in authentication and login to meet the security requirement, but the convenience degree is inevitably influenced. In recent years, many successful products have proposed various authentication methods with higher technical content from different aspects, such as methods for comprehensively recognizing fingerprints, lip prints, irises, heart rates, and the like, and have proposed higher requirements on software hardware and equipment complexity while avoiding the complicated security authentication by inputting a multi-level password key by a user. Meanwhile, in a specific wireless environment, a consumer only needs to open a mobile phone or an ipad and click certain programs to realize some functions, but the series of actions are still complicated, and more or less uncomfortable experiences are brought to the user.
Disclosure of Invention
In view of the above unsatisfactory aspects of the prior art, the present invention provides a method for triggering a data communication service application by an adjacent router in a wireless environment, and in particular, a method for proximity authentication between a mobile device and a wireless router, and a method for automatically receiving, by a wireless router, user information sent by a mobile device based on the authentication.
The technical scheme of the invention is realized as follows:
a method of proximity authentication between a mobile device and a wireless router, comprising:
properly configuring the mobile equipment, opening the software and hardware functions related to wireless communication on the mobile equipment, enabling the mobile equipment to approach the wireless router, and establishing the connection between the wireless router and the mobile equipment after the wireless router senses the approach of the mobile equipment;
the wireless router receives the equipment information of the mobile equipment, and the wireless router uses the equipment information to search for matching through an encryption database of the wireless router;
if the matching is unsuccessful, the wireless router adds the equipment information into a database and encrypts the equipment information, and meanwhile, necessary network configuration is carried out on the mobile equipment;
if the matching is successful, the wireless router receives and processes the networking request sent by the mobile device so that the mobile device is connected to the network. In some embodiments, the wireless router and the mobile device may match or locate the relevant account information supported by the pre-encrypted store via an identifier (e.g., a "kiss ID") and send the relevant account information to the mobile device and store it on the mobile device. The related account information may include account information, and a data structure and an association relation related to the account information.
The invention also provides a method for automatically receiving the user information sent by the mobile equipment by the wireless router, which comprises the following steps:
the wireless router establishes communication with the mobile equipment after passing the identity authentication of the mobile equipment, and receives user information of the mobile equipment from the mobile equipment stored in the mobile equipment in advance;
the wireless router carries out deep matching in a database by using the mobile equipment information;
if the deep matching is unsuccessful, the wireless router prompts a user to confirm the mobile equipment information corresponding to the current user information, after the confirmation is obtained, the current mobile equipment information item is added or covered to a database of the wireless router, and the deep matching is carried out again until the matching is successful;
the wireless router reads the user information and compares the user information with the user information received by the wireless router; after the comparison is passed, the wireless router uses the information therein to register and open up application-specific services provided by the merchant. Wherein the comparing further comprises and performs a manual comparison of the key information.
Proximity, as referred to herein, generally includes actions that are close to a router, but is not limited to other proximity-related actions, such as the anti-word "away" that is close, or combined actions of close and other events (e.g., key press time). For example, an auxiliary key may be added to a mobile device, implemented in hardware or software, to provide one or more uses. Further, a key event may be used in conjunction with a proximity router activity (i.e., a "kiss" function), so that the time difference between the time of activation of the key and the time of proximity ("kiss") may be used to determine proximity.
Generally, the proximity indicates that the current mobile device is in a known accurate geographical location and a better network communication environment, and under a condition of convenient power supply reserve or stable power supply, the communication service application with pre-buffering is suitable for data buffering and updating in the background, such as updating weather information, social network application, news application and other update information, triggering software to automatically upgrade and update, triggering file automatic backup and the like for the geographical location.
The invention is also suitable for automatically triggering corresponding events for special application occasions. For example, when a hotel, an airport, a consumption settlement place and other places carry out transaction and settlement procedures such as registration, check-in, settlement and the like, or public transport payment bills, and employees of enterprises and public institutions carry out proximity identity verification on merchant equipment through a holder, various holder information stored in advance on the mobile equipment is automatically triggered and sent to the merchant through short-distance high-speed encrypted data transmission, so that the merchant can conveniently carry out secondary verification on the identity of the holder through the information, the safety is greatly improved, the time for manually additionally inquiring related information can be greatly reduced, the handling of related procedures is greatly simplified, and smooth and convenient experience is provided.
The method can also trigger the applications such as configuration, application, document, picture, audio and video and the like of the mobile equipment, and carry out automatic backup, including cloud backup.
Drawings
FIG. 1 is a schematic flow chart of the present invention relating to proximity authentication between a mobile device and a wireless router and surfing the Internet;
FIG. 2 illustrates the corresponding pattern of the present invention on data structures with respect to mobile device information, networking configuration (MAC address and IP address, etc.), and associated data communication service class application account information;
fig. 3 is a flow diagram of the present invention with respect to the transmission of necessary subscriber information from a mobile device to a wireless router.
Detailed Description
In order to more clearly illustrate the technical solution and several embodiments of the present invention, it is obvious for those skilled in the relevant art to derive other similar embodiments and corresponding drawings based on the description without inventive labor.
In the following embodiment of the invention, the wireless router has been configured and interfaced to the internet. For an application environment of a personal wireless network (e.g., a home local area wireless network, a personal private wireless network, etc.), a mobile device of a user needs to establish a network connection through authentication first, and based on a principle that a wireless router and a software program installed in the mobile device (e.g., a wifi mobile terminal) can communicate, when the mobile device approaches the wireless router, a sensor in the wireless router may sense the approach of the mobile device and trigger the communication of the mobile device, e.g., trigger some behavior or some behavior of the program installed on the mobile device, including logging in some applications, leaving a message, uploading a photo, etc.
The method for proximity identity verification between the mobile equipment and the wireless router comprises the following steps: bringing the mobile device into proximity with the wireless router to establish a connection between the wireless router and the mobile device; the wireless router uses the equipment information to search for matching through the encryption database of the wireless router, if the matching is unsuccessful, the wireless router adds the equipment information into the database and encrypts the equipment information, and meanwhile, necessary network configuration is carried out on the mobile equipment; and if the matching is successful, the wireless router receives and processes the networking request sent by the mobile equipment, so that the mobile equipment can conveniently surf the internet.
In another embodiment of the present invention, after the identity authentication based on the mobile device is completed, the wireless router performs deep matching (or called secondary matching or extended matching) in the database using the mobile device user information item, and if the matching is unsuccessful, the wireless router appends or covers the current mobile device user information item to the database of the wireless router, and repeats the deep matching until the matching is successful; the wireless router compares the read user information with the received user information, and after the comparison is successful, the wireless router uses the information to register and opens the specific application service provided by the merchant.
The technical solutions and embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
Fig. 1 is an example of the present invention relating to proximity authentication between a mobile device and a wireless router in a personal wireless network environment, and thereby triggering an automatic data communication service class application on the mobile device.
S11, when the holder has the need to use the network data service, configures the mobile device appropriately, opens the software and hardware functions related to wireless communication on the mobile device, and brings the mobile device close to the wireless router, the proximity sensor on the wireless router senses the information and triggers the automatic communication between the wireless router and the mobile device.
S12, the mobile device establishes connection with the wireless router, and the traditional method is that the user is automatically prompted to input a user name and a password on the mobile device so as to further use the wireless data communication service and resources; in the present invention, when establishing connection, the wireless router receives the device information sent by the mobile device (see fig. 2 for description of module 21), and the wireless router uses the mobile device information (as described in fig. 2 for module 21) to perform matching on the encryption database of the wireless router according to a predetermined rule, considering that the device and the mobile device holder approaching the wireless router within the distance have safe and reliable identities.
S13, if the matching is not successful, it indicates that the mobile device is using the network for the first time. The wireless router adds the mobile equipment information into a database and encrypts the mobile equipment information, and meanwhile, necessary network configuration is carried out on the mobile equipment, so that the mobile equipment can normally use network data communication service through the wireless router; the mobile equipment sends a networking request to the wireless router, and the wireless router receives the networking request, so that the aims of quickly realizing identity authentication and smoothly surfing the internet through the proximity of the mobile equipment and the wireless router are fulfilled.
S14, if the device information (refer to the description about module 21 in fig. 2) of the mobile device is successfully matched on the encrypted database of the wireless router, on one hand, the wireless router will configure it the same as S13 so that it can conveniently surf the internet; on the other hand, according to fig. 2, the wireless router may further locate the relevant subscriber information supported in the pre-encrypted storage, constituting the data structure and association as in module 23 of fig. 2. This information will be sent by the wireless router to the mobile device and securely stored on the mobile device, with software support.
S15, the automatic login service of the user in the mobile communication application:
the user then sees the wireless network connection on the mobile device and can use it and launch the data communication service class related application installed on the mobile device.
When the application starts, it will log in using the username and password obtained from the wireless router.
At present, more and more mature mobile device mobile communication applications have a convenient function of caching user names and passwords used for the previous time. At this time, the mobile device merges the cached user information with the information sent by the wireless router, and prompts to perform selective login or login by using a new user name and password. If only one group of user information is cached and the information from the wireless router is the same, the user information is used for automatic login;
if the user selects a new user information login, or selects a user information login different from that provided by the wireless router (which means that the user information is also new user information for the wireless router), S16 is entered;
when the user logs in with new user information, this information will be communicated to the wireless router by user input, through the application software on the mobile device S16. The wireless router updates the version number and updates and maintains the corresponding username and password and login information for the application (such as WeChat, QQ, microblog, facebook, gmail, etc.) used by the current user through the corresponding information described by the module 23 in FIG. 2.
Through the embodiment, the safe and convenient automatic login triggered by the proximity identity authentication is realized, the redundancy trouble of secondary login is avoided, and the safety requirement is not lost.
Finally, after the login information of the user is maintained and successfully logged in, the mobile device is in a better environment with high network speed, stable network connection, safe user identity authentication and convenient mobile device charging, so that the cloud backup of the applications of mobile device configuration, application, documents, pictures and audio/video is very suitable to be triggered. Preferably, considering that the user also has a demand close to using the network at this time and has a high demand on the network bandwidth, it may be considered that the backup information or its copy (high resolution) is stored in the storage medium at the wireless router end, and when the user leaves the network environment or when the user has no demand for using the network at night, the backup is automatically performed.
Fig. 3 is another embodiment of the present invention, which describes a method for a wireless router to automatically receive the necessary user information sent by a mobile device triggered by proximity authentication between the mobile device and the wireless router in a personal wireless network environment.
First, S31, S32 and S33 are completely consistent with S11, S12 and S13, respectively, described in fig. 1, and implement a convenient internet access function triggered by proximity contact.
S34, proximity triggering the relevant software on the mobile device, and automatically sending the pre-stored user information, for example, in the data structure of module 23 in fig. 2, to the wireless router for matching and automatic deep user identity verification; the wireless router, upon receiving this data, performs a deep match (or second match) in the database using, for example, the mobile device information item in block 21 of fig. 2.
S35, if the wireless router cannot match the mobile device in the database, but obtains the identifiable user information from the mobile device, such as the module 23 described in fig. 2, the wireless router will prompt the user for the mobile device information corresponding to the current user information, and after the user manually confirms, add or overlay the current mobile device into the database of the wireless router. At this time, under the premise of user permission, the service is continuously extended in two cases:
(1) the user information is registered, but now the new mobile device is used for the first time, and the information (such as the module 21 in fig. 2) of the new mobile device is added or covered under the confirmation of the user;
(2) for the new user, the mobile equipment still provides legal and complete user information for the wireless router end, and under the confirmation of the user, the user information is used for carrying out data addition with the new user and the new mobile equipment.
S36, if the wireless router successfully matches the mobile device in the database, the user information as described in module 23 in fig. 2 is read, and the user information is automatically compared with the received user information, and the key information, such as the user' S photo, is manually compared according to the current holder of the mobile device.
After the matching is successful, the information in the information is used for registration under the confirmation of the user, the payment information in the information is used for completing the payment, and the related information is allowed to be changed and updated under the requirement of the user in the process; of course, the same update operation needs to be performed on the mobile device and the wireless router simultaneously during updating.
Through the description of the embodiment, after the mobile device automatically accesses the internet through proximity, the automatic exchange and deep matching verification (secondary verification) of the user information are further realized.
Figure 2 gives the corresponding pattern in the data structure for the mobile device information, the networking configuration (MAC address and IP address), and the associated data communication service class application account information. Wherein:
a mobile device information table entry 21, under the proximity trigger, the mobile device provides its mobile device information to the wireless router, and the wireless router performs fast query matching under this table entry 21; the table entry has a one-to-one correspondence, uniquely determined, unalterable characteristic to the mobile device.
Networking configuration table entry 22: the networking configuration information table entry for the mobile device, which is automatically allocated by the wireless router or is performed when the mobile device has a special setting request, includes information such as the MAC address of the mobile device, the allocated IP address, configuration information (config), channel measurement (channel measure), power (power), and battery information (batt info).
The user information items 23 stored by the mobile device on this wireless router include both application and user account information. Among the information items about an application are: application name, version number; applying login information; application login history information; information about the user account includes, but is not limited to: user account number, user identity information, user photos, user payment information, user account balance, user account history, etc.
For the embodiment of fig. 1, the user information may include: the application name, the application version number, the user name, the password, the time of successful login and logout by using the user name password group last time and the like.
For the embodiment of fig. 3, the user information may include: user account number, user identity information (which may include a user identity photo), user payment information (default payment method such as credit card number, etc.), user account balance, time and place of last consumption using the user account, etc.
Obviously, for those skilled in the relevant art, on the premise of no creative work, the data structure and the corresponding relationship described in fig. 2 may be modified or added as appropriate according to the special requirements of the actual software and hardware application environment, so as to obtain the data structure and the corresponding mode similar to the content described in fig. 2; or make content similar to that described in figure 2 an integral part of a more complex database; however, the methods of querying, modifying, appending using the modules 21, 22, 23 as described in S13, S16 of fig. 1 and/or S33, S34, S35, S36 of fig. 3 are not changed.
The disclosure of the present application is directed to exemplary embodiments, and various changes and modifications may be made in the various embodiments of the present application without departing from the scope of the invention as defined in the appended claims. Accordingly, the described embodiments are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, unless the context indicates otherwise, words that appear in the singular include the plural and vice versa. Additionally, all or a portion of any embodiment may be utilized with all or a portion of any other embodiment, unless stated otherwise. Additionally, the order in which the steps are performed can be changed or replaced with equivalent steps. Several steps may be combined into one step or one step may be divided into several steps.
Embodiments of the invention may be implemented in computer software, hardware, firmware, or any combination thereof, or using logic circuitry (e.g., ASIC), or any combination thereof. In some embodiments, part of the functions of the wireless router or the mobile device may be implemented by the cloud server, and part of the data, such as the user information data, may also be stored or backed up on the cloud server.

Claims (12)

1. A method of proximity authentication between a mobile device and a wireless router, comprising:
appropriately configuring the mobile equipment, opening the software and hardware functions related to wireless communication on the mobile equipment, and automatically triggering and establishing the connection between the wireless router and the mobile equipment after the wireless router senses the approach of the mobile equipment;
the wireless router receives the equipment information of the mobile equipment, and the wireless router automatically uses the equipment information to search for matching through an encryption database of the wireless router;
if the matching is unsuccessful, the wireless router automatically adds the equipment information into a database and encrypts the equipment information, and meanwhile, necessary network configuration is carried out on the mobile equipment;
if the matching is successful, the wireless router receives and processes the networking request sent by the mobile device so that the mobile device is connected to the network.
2. The method for proximity authentication between a mobile device and a wireless router according to claim 1, wherein the wireless router receives device information of the mobile device, further comprising: and the wireless router automatically judges that the mobile equipment and the mobile equipment holder which are close to the wireless router in the distance have safe and reliable identities according to a set rule, and then uses the mobile equipment information to search and match on a wireless router encryption database.
3. The method of proximity authentication between a mobile device and a wireless router as claimed in claim 1, wherein said performing necessary network configuration on the mobile device includes performing automatic allocation by the wireless router or performing networking configuration information table entry for the mobile device under the requirement of special setting of the mobile device, including but not limited to MAC address, IP address, configuration, channel measurement, power, battery information of the mobile device.
4. The method of proximity authentication between a mobile device and a wireless router of claim 1, further comprising the wireless router and the mobile device matching or locating to the pre-encrypted stored associated account information by an identifier and sending the associated account information to the mobile device and storing it on the mobile device.
5. The method for proximity authentication between a mobile device and a wireless router according to any of claims 1-4, further comprising: when the automatic login service in the mobile communication type application is started, login is carried out by using a user name and a password obtained from the wireless router.
6. The method for proximity authentication between a mobile device and a wireless router of claim 5, further comprising:
when a user logs in by using new user information, the wireless router updates the version number aiming at the application used by the current user and updates and maintains the corresponding user name and password and the login information;
the user information includes, but is not limited to, an application name, an application version number, a user name, a password, a time when a successful login and logout was last performed using the user name and password, or other user information.
7. A method for a wireless router to automatically receive user information sent by a mobile device, comprising:
after sensing the approach of the mobile equipment, the wireless router establishes communication with the mobile equipment after passing the identity authentication of the mobile equipment and receives user information of the mobile equipment from the mobile equipment stored in the mobile equipment in advance;
the wireless router carries out deep matching in the encryption database by using the mobile equipment information;
if the deep matching is unsuccessful, the wireless router prompts a user to confirm the mobile equipment information corresponding to the current user information, after the confirmation is obtained, the current mobile equipment information is added or covered to a database of the wireless router for encryption, and the deep matching is carried out again until the matching is successful;
the wireless router compares the read user information with the user information received by the wireless router, and after the comparison is passed, the wireless router uses the information in the user information to register and opens the specific application service provided by the merchant.
8. The method of claim 7, wherein the receiving of the user information from the mobile device pre-stored in the mobile device has a one-to-one correspondence, uniquely determined, and unchangeable characteristic with respect to the mobile device.
9. The method for a wireless router to automatically receive subscriber information sent by a mobile device of claim 7, wherein said appending or overwriting current mobile device information to a database of the wireless router further comprises:
for the new mobile equipment which is registered with the user information and used for the first time, the information of the new mobile equipment is added or covered under the confirmation of the user; or
For the new user, based on the user information received from the mobile device by the wireless router, data is added to the new user and the new mobile device by using the user information under user confirmation.
10. The method for the wireless router to automatically receive the user information sent by the mobile device according to any of claims 7-9, wherein the wireless router compares the read user information with the user information received by the wireless router, and further comprises manually comparing the user photos.
11. The method for the wireless router to automatically receive the user information sent by the mobile device according to any of claims 7-9, wherein the user information includes but is not limited to: user account number, user identity, photo information, user payment information, user account balance, time and place of last consumption using the user account.
12. The method of claim 11, further comprising triggering an application to the mobile device that includes documents, pictures, audio and video and performing an automatic backup.
CN201510194489.5A 2015-04-22 2015-04-22 Method for triggering data communication service application by adjacent router in wireless environment Active CN106162627B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510194489.5A CN106162627B (en) 2015-04-22 2015-04-22 Method for triggering data communication service application by adjacent router in wireless environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510194489.5A CN106162627B (en) 2015-04-22 2015-04-22 Method for triggering data communication service application by adjacent router in wireless environment

Publications (2)

Publication Number Publication Date
CN106162627A CN106162627A (en) 2016-11-23
CN106162627B true CN106162627B (en) 2020-09-29

Family

ID=57347813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510194489.5A Active CN106162627B (en) 2015-04-22 2015-04-22 Method for triggering data communication service application by adjacent router in wireless environment

Country Status (1)

Country Link
CN (1) CN106162627B (en)

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW565783B (en) * 2001-09-14 2003-12-11 Inventec Tomorrow Studio Corp Log-on method and system applied to portable electronic device
CN101123536B (en) * 2007-09-19 2010-12-15 北京交通大学 Method for managing integrated network locations
CN101667916B (en) * 2009-09-28 2011-11-23 北京交通大学 Method of identifying user identity by digital certificate based on separating mapping network
CN102647291B (en) * 2011-02-17 2014-08-13 三星电子(中国)研发中心 Intelligent multidevice management method based on account group
CN102711110A (en) * 2012-05-24 2012-10-03 中兴通讯股份有限公司 Wi-Fi (wireless fidelity) network management method and wireless router
CN103581029B (en) * 2012-08-03 2018-05-29 上海果壳电子有限公司 The method for automatically turning on the router of navigation page and automatically turning on navigation page
JP6273903B2 (en) * 2013-03-15 2018-02-07 株式会社リコー Information processing system, information processing method, and program
CN203332053U (en) * 2013-06-04 2013-12-11 北京汽车股份有限公司 Automobile
CN104254070B (en) * 2013-06-25 2019-11-08 南京中兴新软件有限责任公司 WiFi cut-in method, intelligent terminal and routing device
CN103532697B (en) * 2013-10-22 2017-08-25 北京深思数盾科技股份有限公司 A kind of realization method and system of wireless messages safety means
CN103596177A (en) * 2013-11-19 2014-02-19 上海众人网络安全技术有限公司 Method for making mobile terminal get access to public WiFi in one-key mode
EP3869766B1 (en) * 2014-05-31 2022-09-28 Huawei Technologies Co., Ltd. Network connection method, hotspot terminal and management terminal
CN104093007B (en) * 2014-08-01 2018-05-29 北京奇虎科技有限公司 Mobile communication equipment, video monitoring system and video frequency monitoring method
CN104219038A (en) * 2014-08-27 2014-12-17 小米科技有限责任公司 Method and device for synchronizing data
CN104270405A (en) * 2014-08-29 2015-01-07 小米科技有限责任公司 Networking control method and device based on router
CN104320863B (en) * 2014-11-07 2017-10-31 广东欧珀移动通信有限公司 Wireless network access method and mobile terminal applied to mobile terminal
CN104320780A (en) * 2014-11-17 2015-01-28 上海斐讯数据通信技术有限公司 Authentication sharing method and module for wireless routers inside local area network

Also Published As

Publication number Publication date
CN106162627A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
US9936390B2 (en) Method and apparatus of triggering applications in a wireless environment
US11743728B2 (en) Cross access login controller
US9842446B2 (en) Systems and methods for lock access management using wireless signals
US9178915B1 (en) Cookie preservation when switching devices
CN102088691B (en) Mobile phone mobile Internet user application certification recognition system and method
WO2016015509A1 (en) Method and device for terminal authentication for use in mobile communication system
US8689303B1 (en) Cookie-handling gateway
CN105050086A (en) Method for terminal to log in Wifi hotspot
CN105790945B (en) A kind of authentication method, device and system realizing user's unique identities and authenticating
CN102685090B (en) System login method
CN101594615B (en) Method, system and equipment for network management of terminal triple information security
US20180115896A1 (en) Seamless unique user identification and management
CN110337087B (en) Air WiFi access method and system
US10542569B2 (en) Community-based communication network services
CN106162627B (en) Method for triggering data communication service application by adjacent router in wireless environment
CN103516683A (en) Remote server system with offline terminals
CN111814130B (en) Single sign-on method and system
CN101925065A (en) Authentication method, device, system and wireless access point
US11849326B2 (en) Authentication of a user of a software application
KR102303754B1 (en) Method, system and non-transitory computer-readable recording medium for assisting authentication of a user
US20240121608A1 (en) Apparatuses and methods for facilitating dynamic badges and identities
CN114513348A (en) Terminal authentication method, cloud platform and cloud AP
CN103516747A (en) Method for transmitting data by offline terminal in remote server system
CN101754202A (en) Method, system and device for terminal information security networking management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant