Provisioning wireless device profiles
First Claim
1. A computer-implemented method, comprising:
- sending, to a headless tracking device via a first wireless connection of a first wireless connection type, a request causing the headless tracking device to detect one or more wireless networks of a second wireless connection type that is different than the first wireless connection type, wherein the request comprises a request for the tracking device to detect one or more wireless networks of the second wireless connection type, and wherein the headless tracking device comprisescircuitry that collects data related to location or movement of the headless tracking device;
receiving, from the headless tracking device, wireless network data comprising identifiers of one or more detected wireless networks of the second wireless connection type;
generating a display of the identifiers of the one or more detected wireless networks of the second wireless connection type;
receiving user input provisioning data comprising of, for a particular wireless network of the detected wireless networks, one or more of a wireless network security type and a wireless network key, wherein the provisioning data represents a wireless device profile comprising one or more of a wireless network name, a wireless network security type, and a wireless network key; and
sending, to the headless tracking device, the provisioning data for establishing a second wireless connection with a particular wireless network of the one or more detected wireless networks;
wherein the method is performed by one or more computing devices.
4 Assignments
0 Petitions
Accused Products
Abstract
Approaches, techniques, and mechanisms are disclosed for provisioning wireless device profiles of a wireless computing device. In this context, a wireless device profile generally may comprise one or more network and device settings including network identifiers, network security types, network keys, and other configuration information that enables a computing device to connect to a particular wireless computer network. According one embodiment, a computer-implemented method comprises establishing, with a first device, a first wireless connection of a first wireless connection type; receiving, from the first device via the first wireless connection, provisioning data for establishing, with a second device, a second wireless connection of a second wireless connection type that is different than the first wireless connection type; establishing, based on the provisioning data, the second wireless connection with the second device.
-
Citations
19 Claims
-
1. A computer-implemented method, comprising:
-
sending, to a headless tracking device via a first wireless connection of a first wireless connection type, a request causing the headless tracking device to detect one or more wireless networks of a second wireless connection type that is different than the first wireless connection type, wherein the request comprises a request for the tracking device to detect one or more wireless networks of the second wireless connection type, and wherein the headless tracking device comprises circuitry that collects data related to location or movement of the headless tracking device; receiving, from the headless tracking device, wireless network data comprising identifiers of one or more detected wireless networks of the second wireless connection type; generating a display of the identifiers of the one or more detected wireless networks of the second wireless connection type; receiving user input provisioning data comprising of, for a particular wireless network of the detected wireless networks, one or more of a wireless network security type and a wireless network key, wherein the provisioning data represents a wireless device profile comprising one or more of a wireless network name, a wireless network security type, and a wireless network key; and sending, to the headless tracking device, the provisioning data for establishing a second wireless connection with a particular wireless network of the one or more detected wireless networks; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium storing one or more sequences of instructions, which when executed by one or more processors, cause the one or more processors to carry out the steps of:
-
sending, to a headless tracking device via a first wireless connection of a first wireless connection type, a request causing the headless tracking device to detect one or more wireless networks of a second wireless connection type that is different than the first wireless connection type, wherein the request comprises a request for the tracking device to detect one or more wireless networks of the second wireless connection type, and wherein the headless tracking device comprises circuitry configured to collect data related to location or movement of the headless tracking device; receiving, from the headless tracking device, wireless network data comprising identifiers of one or more detected wireless networks of the second wireless connection type; generating a display of the identifiers of the one or more detected wireless networks of the second wireless connection type; receiving user input provisioning data comprising of, for a particular wireless network of the detected wireless networks, one or more of a wireless network security type and a wireless network key, wherein the provisioning data represents a wireless device profile comprising one or more of a wireless network name, a wireless network security type, and a wireless network key; and sending, to the headless tracking device, the provisioning data for establishing a second wireless connection with a particular wireless network of the one or more detected wireless networks; wherein the method is performed by one or more computing devices. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
by circuitry of a headless tracking device; collecting data related to location or movement of the headless tracking device; and by one or more computers; sending, to the headless tracking device via a first wireless connection of a first wireless connection type, a request causing the headless tracking device to detect one or more wireless networks of a second wireless connection type that is different than the first wireless connection type, wherein the request comprises a request for the tracking device to detect one or more wireless networks of the second wireless connection type; receiving, from the headless tracking device, wireless network data comprising identifiers of one or more detected wireless networks of the second wireless connection type; generating a display of the identifiers of the one or more detected wireless networks of the second wireless connection type; receiving user input provisioning data comprising of, for a particular wireless network of the detected wireless networks, one or more of a wireless network security type and a wireless network key, wherein the provisioning data represents a wireless device profile comprising one or more of a wireless network name, a wireless network security type, and a wireless network key; and sending, to the headless tracking device, the provisioning data for establishing a second wireless connection with a particular wireless network of the one or more detected wireless networks. - View Dependent Claims (18, 19)
-
Specification