Configuring wireless accessory devices
First Claim
1. A method for configuring a second wireless device by a first wireless device, the method comprising:
- by the first wireless device;
receiving first information, including a beacon message, from the second wireless device via a first wireless network, wherein the beacon message includes a first identifier of the second wireless device and a configuration state of the second wireless device;
determining that the second wireless device is in a configurable state based on the beacon message;
receiving from the second wireless device a first configuration counter value via the first wireless network;
communicating configuration information to the second wireless device via the first wireless network, the configuration information including credentials for connecting to a second wireless network;
connecting, subsequent to communicating the configuration information, to the second wireless network using the credentials;
transmitting a service discovery message;
receiving, in response to the service discovery message, second information from the second wireless device via the second wireless network, wherein the second information comprises a second configuration counter value; and
verifying whether configuration of the second wireless device is configured successfully based on the second information by at least comparing the first configuration counter value to the second configuration counter value, wherein configuration counter values of the second wireless device change when the configuration of the second wireless device changes.
1 Assignment
0 Petitions
Accused Products
Abstract
This document describes, inter alia, techniques for configuring or setting up a wireless device. As an example of the features described herein, a first wireless device may be used to configure a second wireless device as follows: the first wireless device may detect that the second wireless device is available and is configurable; the first wireless device may connect to the second wireless device and transmit configuration information to the second wireless device, where the configuration information includes credentials that may be used to access a wireless network (e.g., a password to access a Wi-Fi network); the first wireless device and the second wireless device may then both connect to the wireless network, using the credentials; once both devices are connected to the wireless network, the first wireless device may verify that the second wireless device has been correctly configured.
34 Citations
18 Claims
-
1. A method for configuring a second wireless device by a first wireless device, the method comprising:
by the first wireless device; receiving first information, including a beacon message, from the second wireless device via a first wireless network, wherein the beacon message includes a first identifier of the second wireless device and a configuration state of the second wireless device; determining that the second wireless device is in a configurable state based on the beacon message; receiving from the second wireless device a first configuration counter value via the first wireless network; communicating configuration information to the second wireless device via the first wireless network, the configuration information including credentials for connecting to a second wireless network; connecting, subsequent to communicating the configuration information, to the second wireless network using the credentials; transmitting a service discovery message; receiving, in response to the service discovery message, second information from the second wireless device via the second wireless network, wherein the second information comprises a second configuration counter value; and verifying whether configuration of the second wireless device is configured successfully based on the second information by at least comparing the first configuration counter value to the second configuration counter value, wherein configuration counter values of the second wireless device change when the configuration of the second wireless device changes. - View Dependent Claims (2, 13, 14, 15, 16, 17, 18)
-
3. A wireless device comprising:
-
a wireless interface; a data storage device; and a processor, coupled to the wireless interface and the data storage device and configured to execute instructions stored in the data storage device that cause the wireless device to; receive from an accessory device a beacon message including a first identifier of the accessory device and a configuration state of the accessory device via a first wireless network; determine that the accessory device is in a configurable state based on first information included in the beacon message; receive from the accessory device a first configuration counter value via the first wireless network; communicate configuration information to the accessory device, the configuration information including credentials for connection to a second wireless network; join, subsequent to the communication of the configuration information to the accessory device, the second wireless network using the credentials; transmit a service discovery message; receive, in response to the service discovery message, second information from the accessory device via the second wireless network, wherein the second information comprises a second configuration counter value; and verify whether configuration of the accessory wireless device is configured successfully based on the second information by at least comparing the first configuration counter value to the second configuration counter value, wherein configuration counter values of the accessory device change when the configuration of the accessory device changes. - View Dependent Claims (4, 5)
-
-
6. A controller device comprising:
-
a wireless interface; a memory; and one or more processors, wherein the memory includes instructions that, when executed by a processor of the one or more processors, cause the controller device to perform operations comprising; receiving, via the wireless interface, (i) a beacon message from an accessory device, wherein the beacon message comprises a medium access control (MAC) address identifying the accessory device, and (ii) a first configuration counter value, determining that the accessory device is in a configurable state; sending, via the wireless interface, a credential to the accessory device in a configuration message, wherein the credential includes an access point password for a wireless local area network access point (AP), connecting with the AP using the credential, subsequent to sending the credential to the accessory device; transmitting a service discovery message, and verifying, based on information received in response to the service discovery message, whether the accessory device has been configured successfully by at least comparing the first configuration counter value to a second configuration counter value included in the information, wherein configuration counter values of the accessory device change when the configuration of the accessory device changes. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
Specification