Method for configuring a wireless device
First Claim
1. A computer-implemented method for configuring an electronic device to join a wireless network, comprising:
- establishing, by a first electronic device, a first wireless connection with a second electronic device using a first wireless system and a first wireless communication protocol;
receiving, by the first electronic device over the first wireless connection from the second electronic device, an indication of a second wireless system available to the first electronic device,wherein the second wireless system is selected at the second electronic device from a displayed plurality of available wireless communication systems,wherein the plurality of available wireless communication systems are displayed in response to establishing the first wireless connection, andwherein receiving the indication by the first electronic device comprises receiving configuration information comprising security credentials for joining the second wireless system;
joining, by the first electronic device, the second wireless system using the configuration information by establishing a second wireless connection with a third electronic device using a second wireless communication protocol; and
disabling, responsive to the joining, acceptance of a subsequent connection to the first wireless system.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for configuring a first electronic device that includes first and second wireless communication systems. A first wireless connection is established between the first electronic device and a second electronic device using the first wireless communication system. Configuration information pertaining to the second wireless communication system is transmitted from the first electronic device to the second electronic device using the first wireless connection. Configuration instructions are transmitted from the second electronic device to the first electronic device over the first wireless connection. The configuration instructions are used to configure the first electronic device to communicate using the second wireless communication system, and the first wireless connection can then be terminated.
29 Citations
20 Claims
-
1. A computer-implemented method for configuring an electronic device to join a wireless network, comprising:
-
establishing, by a first electronic device, a first wireless connection with a second electronic device using a first wireless system and a first wireless communication protocol; receiving, by the first electronic device over the first wireless connection from the second electronic device, an indication of a second wireless system available to the first electronic device, wherein the second wireless system is selected at the second electronic device from a displayed plurality of available wireless communication systems, wherein the plurality of available wireless communication systems are displayed in response to establishing the first wireless connection, and wherein receiving the indication by the first electronic device comprises receiving configuration information comprising security credentials for joining the second wireless system; joining, by the first electronic device, the second wireless system using the configuration information by establishing a second wireless connection with a third electronic device using a second wireless communication protocol; and disabling, responsive to the joining, acceptance of a subsequent connection to the first wireless system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer program storage device comprising a non-transitory tangible computer readable storage medium that stores instructions when executed by at least one processor causes a first electronic device to:
-
establish a first wireless connection with a second electronic device before gaining access to a second wireless network, wherein the first wireless connection is associated with a first wireless network using a first wireless system and a first communication protocol; receive over the first wireless connection from the second electronic device, an indication of a second wireless system available to the first electronic device, wherein the second wireless system is selected at the second electronic device from a displayed plurality of available wireless communication systems, wherein the plurality of available wireless communication systems are displayed in response to establishing the first wireless connection, and wherein receiving the indication by the first electronic device comprises receiving configuration information that includes wireless access credentials for gaining access to the second wireless network; establish a second wireless connection with a third electronic device using a second communication protocol associated with the second wireless network; gain access to the second wireless network based at least in part on the wireless access credentials satisfying a security configuration of the second wireless network; and disable, responsive to gaining access, acceptance of a subsequent connection to the first wireless system. - View Dependent Claims (14, 15, 16)
-
-
17. A wireless device comprising:
-
at least one processor; a computer-readable memory communicatively coupled to the at least one processor and including instructions that when executed by the at least one processor, cause the wireless device to; establish a first wireless connection over a first wireless system with a second wireless device using a first wireless protocol; obtain an input to connect the second wireless device to a second wireless system from a plurality of available wireless systems, wherein the second wireless system is selected at the second wireless device from a displayed plurality of available wireless communication systems and wherein the plurality of available wireless communication systems are displayed in response to establishing the first wireless connection; obtain a security credential for joining the second wireless system; transmit over the first wireless connection the security credential to the second wireless device; and disable, responsive to the transmitting, acceptance of a subsequent connection to the first wireless system. - View Dependent Claims (18, 19, 20)
-
Specification