WO2018149118A1 - Procédé et dispositif d'autorisation d'accès à internet sans fil - Google Patents
Procédé et dispositif d'autorisation d'accès à internet sans fil Download PDFInfo
- Publication number
- WO2018149118A1 WO2018149118A1 PCT/CN2017/100920 CN2017100920W WO2018149118A1 WO 2018149118 A1 WO2018149118 A1 WO 2018149118A1 CN 2017100920 W CN2017100920 W CN 2017100920W WO 2018149118 A1 WO2018149118 A1 WO 2018149118A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- client
- router
- preset
- engraving
- access
- Prior art date
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 55
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000008859 change Effects 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 5
- 108010001267 Protein Subunits Proteins 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 claims description 4
- 230000003213 activating effect Effects 0.000 claims description 2
- 230000004913 activation Effects 0.000 claims description 2
- 230000006870 function Effects 0.000 description 24
- 230000008569 process Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 2
- 230000001131 transforming effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the solution belongs to the technical field of communications, and in particular, to a wireless access authorization method and device.
- Wireless Internet access has become an indispensable communication method in people's daily lives, so the use of wireless routers is also very popular.
- a traditional wireless router requires a user to enter a password to authorize the client.
- the embodiment of the present invention provides a wireless access authorization method and device, so as to solve the problem that the existing wireless router can perform online authorization by requiring a user to input a password, resulting in low security and poor convenience.
- a wireless Internet access authorization method including: detecting whether an object is in contact in a preset area on a router; if an object is in contact in a preset area on the router, the wireless network is started and recorded. If the difference between the current engraving and the engraving is less than or equal to the preset inter-time threshold, receiving an access request sent by the client; detecting a distance from the client; The distance from the client is less than or equal to a preset threshold, and the client is allowed to access the wireless network.
- a wireless access authorization device including: a contact detection sub-unit, configured to detect whether an object is in contact in a preset area on a router; and activating a sub-unit, configured to be preset on the router If there is an object contact in the area, the wireless network is activated and the recording is started; the receiving subunit is configured to: if the difference between the current engraving and the engraving is less than or equal to the preset inter-turn threshold, Receiving an access request sent by the client; a distance detecting subunit, configured to detect a distance from the client; And, if the distance from the client is less than or equal to a preset threshold, allowing the client to access the wireless network.
- the customer by detecting whether there is an object contact in a preset area on the router, when there is an object in the preset area on the router, the customer is allowed to be within the preset time and within a preset range.
- the way the terminal enters the wireless network allows the user to connect the client to the wireless network without entering a password, thereby reducing the complexity of the client accessing the wireless network and ensuring the security of the home wireless network.
- FIG. 1 is a flowchart of implementing a wireless access authorization method according to an embodiment of the present disclosure
- FIG. 2 is a flowchart of a specific implementation of a wireless access authorization method S102 provided by an embodiment of the present disclosure
- FIG. 3 is a flowchart of implementing a wireless access authorization method according to another embodiment of the present disclosure.
- FIG. 4 is a structural block diagram of a wireless internet access authorization apparatus provided by an embodiment of the present solution.
- the embodiment of the present solution detects whether there is an object contact in a preset area on the router; if there is an object contact in the preset area on the router, the wireless network is opened and the engraving is recorded; Receiving an access request sent by the client, if the difference between the time intervals is less than or equal to the preset time threshold; Measuring the distance from the client; if the distance from the client is less than or equal to a preset threshold, allowing the client to access the wireless network.
- FIG. 1 is a flowchart showing an implementation of a wireless Internet access authorization provided by an embodiment of the present solution, which is described in detail as follows:
- the software system environment of the router is linux, eCos system, and supports the 802.11 system protocol.
- the level change in the preset area on the router is detected by the current sensing technology to determine whether there is an object contact in the preset area on the router.
- the current sensor there is a current sensor on the router, and the current sensor has a voltage comparator.
- the voltage comparator When no object touches the specific range of the router, no current flows through the current sensor, and the output voltage of the current sensor is smaller than the reference voltage.
- the voltage comparator outputs a low level.
- the current sensor has a current flowing through it. If the current exceeds the threshold current, the voltage comparator outputs a high level.
- the router can convert this level of change into a signal and process the signals through the router's CPU to determine if there is any object contact in the preset area on the router.
- the software operation in this step is: the router initializes the signal reflecting the level change generated by the current sensor by calling the initialization key detection function (initGpio) by running the main function, and calling the rali n k_gpio_ n0 tify_ USer uploaded by transforming into a varying level signal to the CPU. Finally, the gpiojrqj andler function is called to analyze the change of the signal to determine whether there is any object contact in the preset area on the router.
- FIG. 2 shows a specific implementation process of the wireless access authorization method S102 provided by the embodiment of the present solution, which is described in detail as follows:
- the wireless access authorization is initiated by calling a wireless access point function.
- the mlink_ when an object in the preset area on the router is detected to be contacted, the mlink_ is called.
- Gpio_notify_user uploads a signal converted from a change in level to the CPU.
- the router will invoke the ConfigAP function to activate the wireless access authorization, and the router can accept the access request of other terminals.
- the wireless network is recorded to be compared with the current engraving in subsequent calculations.
- the wireless network authorization is activated, but the access request of the client is received only in a short time.
- the continuous access period of wireless Internet access if a client does not issue an access request, it cannot access the wireless network.
- the user must search for the router he touches through the client 5 seconds after the user touches the specific location of the router, and try to access the corresponding router. Wireless access point, so that it is possible to obtain Internet access authorization.
- the Internet access authorization function of the router is closed, and the client cannot obtain the online authorization. In this case, if the user wants to gain access to the Internet, they must re-touch the router-specific location and send an access request through the router within 5 seconds.
- the advantage of this is to ensure the security of the home wireless network, receive the client's access request within a short time after the wireless Internet access authorization, and ensure that the client that sends the access network request is the touch router.
- the client used by the client, or the client who touches the router, allows access to the wireless network.
- the config function is called to stop the wireless access authorization.
- the router will only authorize the online client within 5 seconds after being touched. There is a counting device in the router. Once the current time between the engraving and the engraving is 5 seconds, the router will call a config function, which will stop the router's wireless access authorization, and the router will no longer receive it. Any client connection Into the request.
- the router has a difference of 5 seconds between the current engraving and the network access authorization, and only turns off the wireless access authorization function, and does not turn off the wireless Internet access function, that is, missed. Clients entering the wireless network cannot rely on the touch router to access the wireless network, but clients that have previously accessed the wireless network can still access the Internet.
- the router after the router receives the access request sent by the client, the distance between the client and the client is detected. Only when the distance between the client and the router meets certain conditions will the router allow the client to access the wireless network.
- the router after the router detects that there is a touch or friction on the preset location to activate the wireless network authorization, there are two conditions for determining whether a client can be allowed to access the network.
- the client must issue a request to access the network within the specified time after the router initiates the wireless access authorization.
- the other is that the client mentioned in S105 must be less than a distance threshold from the router.
- the router saves the encrypted information of the client and saves the basic information of the client.
- the encrypted information of the client here includes an encryption method and an encrypted password of the WIFI encryption, and the basic information of the client includes the SSID name information of the client WIFI and the encrypted log.
- the router may simultaneously receive the access request sent by multiple clients, or simultaneously verify whether multiple clients meet the conditions for allowing access to the wireless network, and finally allow multiple clients. Access and use the wireless network.
- the software system environment of the router is a linux, eCos system, and supports the 802.11 system protocol.
- the level change in the preset area on the router is detected by the current sensing technology to determine whether there is an object contact in the preset area on the router.
- the router has a current sensor, and the current sensor has a voltage comparator.
- the current sensor has a voltage comparator.
- the voltage comparator outputs a low level.
- the current sensor has a current flowing through it. If the current exceeds the threshold current, the voltage comparator outputs a high level.
- the router can convert this level of change into a signal and process the signals through the router's CPU to determine if there is any object contact in the preset area on the router.
- router by running the main function calls the initialization key detection function (initGpio) reflecting the level variation signal current produced by the sensor is initialized, and invoking rali n k_gpio_ n0 tify_ USer uploaded by transforming into a varying level signal to the CPU.
- the gpiojrqj andler function is called to analyze the change of the signal to determine whether there is any object contact in the preset area on the router.
- the mlink_gpio_notify_user is called to upload a signal converted into a change from the level to the CPU.
- the router will call the ConfigAP function to activate the wireless network authorization, and the router can accept the access request of other terminals.
- the wireless network is recorded to be compared with the current engraving in subsequent calculations.
- the wireless network authorization is activated, but the access request of the client is received only in a shorter time.
- the continuous access period of wireless Internet access if a client does not issue an access request, it cannot access the wireless network.
- the preset inter-turn threshold is 10 seconds, after the user touches the specific location of the router. In 10 seconds, the user must search the router he touches through the client and try to access the wireless access point corresponding to the router, so that it is possible to obtain the authorization for the Internet.
- client A sends an access request in the first second
- client B sends an access request in the 5th second
- client C sends an access request in the 8th second
- the client End D sends an access request in the 12th second.
- the access request of the client A, the client B, and the client C can be received by the router, and the access request of the client D cannot be received by the router, so the connection is lost. The opportunity to enter the network.
- the advantage of this is that the security of the home wireless network is ensured, and the client's access request is received within a short time after the wireless Internet access authorization, ensuring that the client that sends the access network request is the touch router.
- the client used by the client, or the client who touches the router, allows access to the wireless network.
- the config function is called to stop the wireless access authorization.
- the router will only authorize the online client to meet the requirements within 5 seconds after being touched. There is a counting device in the router. Once the current time between the engraving and the engraving is 10 seconds, the router will call a config function, which will stop the router's wireless access authorization, and the router will no longer receive it. Any client access request.
- the difference between the current engraving and the network access authorization is 10 seconds, but the wireless Internet access authorization function is disabled, and the wireless Internet access function is not turned off. Clients entering the wireless network cannot rely on the touch router to access the wireless network, but clients that have previously accessed the wireless network can still access the Internet. For example, if a client E has already accessed the wireless network before, then when the router turns off the wireless access authorization function, the client E can still access the Internet normally.
- the client that sends the access request is searched for in the default client blacklist. If the client exists in the default client blacklist, the client is prohibited from accessing the wireless network.
- the router receives the access request from the client 8, the client B, and the client C.
- the router directly prohibits client C from accessing the wireless network, and client A and client B can proceed to the next calculation to determine whether the wireless network can be accessed.
- the router after the router receives the access request sent by the client, and after verifying that the client that sends the access request is not in the blacklist, the router detects the distance from the client. Only when the distance between the client and the router meets certain conditions will the router allow the client to access the wireless network.
- the router after the router detects that there is a touch or friction on the preset location to activate the wireless network authorization, there are two conditions for determining whether a client can be allowed to access the network.
- the client must issue a request to access the network within the specified time after the router initiates the wireless access authorization.
- the other is that the client must be at a distance from the router that is less than a distance threshold.
- the preset distance threshold is 15 meters, so the router may allow the client A to access the network and prohibit the client B from accessing the network.
- the client A, the client B, the client C, and the client D that issued the access request finally only the client A is allowed to access the wireless network.
- the router saves the encrypted information of the client and saves the basic information of the client.
- the encrypted information of the client here includes an encryption method and an encrypted password of the WIFI encryption, and the basic information of the client includes the SSID name information of the client WIFI and the encrypted log.
- the router can display the physical addresses of all clients that are using the network through the router and the device model. Users can use this information to determine whether there are any unauthorized clients accessing the network. If so, users who are not allowed to use the network can be blacklisted.
- FIG. 4 is a structural block diagram of a wireless network authorization device according to an embodiment of the present disclosure, including:
- a contact detecting sub-unit 401 configured to detect whether an object is in contact in a preset area on the router
- the activation subunit 402 is configured to: if there is an object contact in the preset area on the router, activate the wireless network authorization and record the engraving;
- the receiving sub-unit 403 is configured to receive an access request sent by the client if the current difference between the current engraving and the engraving is less than or equal to a preset inter-time threshold;
- a distance detecting subunit 404 configured to detect a distance from the client
- the admission sub-unit 405 is configured to allow the client to access the wireless network if the distance from the client is less than or equal to a preset threshold.
- the contact detecting unit includes:
- a level detecting subunit configured to detect a level change in a preset area on the router by using a current sensing technology
- the startup unit includes:
- a reporting subunit configured to report a contact detection result
- a sub-unit configured to: if there is an object contact in the preset area on the router, invoke the wireless access point function to activate the wireless network authorization;
- a recording subunit is used to record the engraving.
- the device further includes:
- the authorization termination subunit is configured to call the config function to stop the wireless access authorization if the current difference between the current engraving and the engraving is up to a preset threshold.
- the device further includes:
- a first encryption subunit configured to save client encryption information
- the second encryption subunit is configured to save client basic information.
- each functional unit and module described above is exemplified. In practical applications, the above work may be performed as needed.
- the allocation can be done by different functional units and modules, that is, the internal structure of the device is divided into different functional units or modules to complete all or part of the functions described above.
- Each functional unit and module in the embodiment may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit, and the integrated unit may be implemented by hardware.
- Formal implementation can also be implemented in the form of software functional units.
- the disclosed apparatus and method can be implemented in other ways.
- the system embodiment described above is merely illustrative.
- the division of the module or unit is only a logical function division, and the actual implementation may have another division manner, for example, multiple units or components may be used. Combined or can be integrated into another system, or some features can be ignored, or not executed.
- the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in electrical, mechanical or other form.
- the unit described as a separate component may or may not be physically distributed, and the component displayed as a unit may or may not be a physical unit, that is, may be located in one place, or may be distributed to multiple On the network unit. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present solution may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiment of the present invention may be embodied in the form of a software product in the form of a software product in essence or in the form of a contribution to the prior art, and the computer software product is stored in a storage.
- the medium includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods described in the various embodiments of the present embodiments.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (R 0M, Read-Only Memory), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes. medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention s'applique au domaine technique des clients mobiles et concerne un procédé et un dispositif qui permettent d'ajuster la taille d'un objet d'affichage d'écran et qui consistent : à détecter si un objet est en contact dans une zone préétablie d'un routeur; s'il y a un objet en contact dans une zone préétablie du routeur, à démarrer l'autorisation Internet sans fil et à enregistrer le moment du démarrage; si une différence temporelle entre un moment actuel et le moment de démarrage est inférieure ou égale à un seuil temporel préétabli, à recevoir une demande d'accès envoyée par un client; à détecter une distance jusqu'au client; si la distance jusqu'au client est inférieure ou égale à un seuil de distance préétabli, à permettre au client d'avoir accès à un réseau sans fil. Selon la solution, un utilisateur peut connecter un client à un réseau sans fil sans entrer de mot de passe, ce qui permet de réduire la complexité d'accès au réseau sans fil par le client et d'assurer la sécurité d'un réseau sans fil domestique.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710083140.3 | 2017-02-16 | ||
CN201710083140.3A CN106851642A (zh) | 2017-02-16 | 2017-02-16 | 无线上网授权方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018149118A1 true WO2018149118A1 (fr) | 2018-08-23 |
Family
ID=59128354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/100920 WO2018149118A1 (fr) | 2017-02-16 | 2017-09-07 | Procédé et dispositif d'autorisation d'accès à internet sans fil |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106851642A (fr) |
WO (1) | WO2018149118A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109246854A (zh) * | 2018-09-12 | 2019-01-18 | 苏州汇恒网络科技有限公司 | 一种自动更换网络设备信息的方法、装置和网络设备 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106851642A (zh) * | 2017-02-16 | 2017-06-13 | 深圳市欣博跃电子有限公司 | 无线上网授权方法及装置 |
WO2019047022A1 (fr) * | 2017-09-05 | 2019-03-14 | 深圳传音通讯有限公司 | Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur |
CN111770094B (zh) * | 2020-06-29 | 2022-12-13 | Oppo广东移动通信有限公司 | 无线网络的接入控制方法及相关装置 |
CN112367699B (zh) * | 2020-12-08 | 2024-06-28 | 北京必创科技股份有限公司 | 无线传感器系统 |
CN113329404B (zh) * | 2021-05-27 | 2022-11-22 | 中国联合网络通信集团有限公司 | 网络接入方法和装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103781074A (zh) * | 2014-02-08 | 2014-05-07 | 北京极科极客科技有限公司 | 无线局域网安全接入方法及设备 |
CN103916855A (zh) * | 2014-04-28 | 2014-07-09 | 太仓市同维电子有限公司 | 手机连接无线宽带WiFi网络的方法 |
CN105992390A (zh) * | 2015-02-13 | 2016-10-05 | Tcl集团股份有限公司 | 一种移动终端连接wifi路由器的方法及系统 |
US20160323689A1 (en) * | 2015-04-30 | 2016-11-03 | Lantronix, Inc. | Zero-touch wi-fi |
CN106851642A (zh) * | 2017-02-16 | 2017-06-13 | 深圳市欣博跃电子有限公司 | 无线上网授权方法及装置 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217805B (zh) * | 2008-01-21 | 2011-08-10 | 中兴通讯股份有限公司 | 一种无线局域网的接入控制方法 |
CN101621804B (zh) * | 2009-08-04 | 2013-05-08 | 中兴通讯股份有限公司 | 安全无线接入方法和装置 |
CN102448065A (zh) * | 2010-10-13 | 2012-05-09 | 中兴通讯股份有限公司 | 一种自动配置无线访问控制列表的方法及装置 |
CN105992208A (zh) * | 2015-05-15 | 2016-10-05 | 乐视致新电子科技(天津)有限公司 | 一种无线连接的认证方法及装置 |
-
2017
- 2017-02-16 CN CN201710083140.3A patent/CN106851642A/zh active Pending
- 2017-09-07 WO PCT/CN2017/100920 patent/WO2018149118A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103781074A (zh) * | 2014-02-08 | 2014-05-07 | 北京极科极客科技有限公司 | 无线局域网安全接入方法及设备 |
CN103916855A (zh) * | 2014-04-28 | 2014-07-09 | 太仓市同维电子有限公司 | 手机连接无线宽带WiFi网络的方法 |
CN105992390A (zh) * | 2015-02-13 | 2016-10-05 | Tcl集团股份有限公司 | 一种移动终端连接wifi路由器的方法及系统 |
US20160323689A1 (en) * | 2015-04-30 | 2016-11-03 | Lantronix, Inc. | Zero-touch wi-fi |
CN106851642A (zh) * | 2017-02-16 | 2017-06-13 | 深圳市欣博跃电子有限公司 | 无线上网授权方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109246854A (zh) * | 2018-09-12 | 2019-01-18 | 苏州汇恒网络科技有限公司 | 一种自动更换网络设备信息的方法、装置和网络设备 |
Also Published As
Publication number | Publication date |
---|---|
CN106851642A (zh) | 2017-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018149118A1 (fr) | Procédé et dispositif d'autorisation d'accès à internet sans fil | |
US9979497B2 (en) | Audio playing method and apparatus based on Bluetooth connection | |
CN105323757B (zh) | 防蹭网的无线路由设备和方法 | |
CN106412909B (zh) | 一种设备连接的方法及装置 | |
KR101451870B1 (ko) | 인증 공유에 의한 애플리케이션 로그인 시스템, 방법 및 컴퓨터 판독 가능한 기록 매체 | |
WO2016000589A1 (fr) | Procédé, système, et appareil de connexion automatique à un wlan | |
US9894630B2 (en) | ADSS enabled global roaming system | |
US10713657B2 (en) | Systems and methods for estimating authenticity of local network of device initiating remote transaction | |
CN109088875A (zh) | 一种访问权限校验方法及装置 | |
US12081544B2 (en) | Systems and methods for preventing unauthorized network access | |
CN106792704B (zh) | 一种检测钓鱼接入点的方法及装置 | |
US8689308B2 (en) | Portable authentication device | |
US8910261B2 (en) | Radius policy multiple authenticator support | |
CN106487767A (zh) | 验证信息的更新方法及装置 | |
RU2628483C2 (ru) | Способ и устройство для управления доступом | |
US11356478B2 (en) | Phishing protection using cloning detection | |
CN104426835B (zh) | 一种登录检测的方法、服务器、登录检测装置及其系统 | |
CN104902479A (zh) | 一种网络安全管理设备、方法和移动终端 | |
CN104902526A (zh) | 切换网络的方法、装置及移动终端 | |
CN104836777B (zh) | 身份验证方法和系统 | |
CN106209918A (zh) | 一种网络安全性管理的方法及终端 | |
CN106302519A (zh) | 一种网络安全性管理的方法及终端 | |
WO2016045347A1 (fr) | Procédé de détection d'attaques malveillantes, terminal et support de stockage informatique | |
WO2015055013A1 (fr) | Système de connexion basé sur serveur, serveur de connexion, et procédé de vérification associé | |
CN114531279A (zh) | 专网接入方法、服务器及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17896388 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: OTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11.12.2019) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17896388 Country of ref document: EP Kind code of ref document: A1 |