NETWORK CONFIGURATION FOR DEVICES WITH CONSTRAINED RESOURCES
First Claim
Patent Images
1. A method, comprising:
- receiving a wireless beacon from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point;
configuring the wireless device based on the data structure received from the wireless beacon; and
establishing a wireless network between the access point and the wireless device utilizing the at least a portion of the wireless identifier encoded in the data structure.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving a wireless beacon from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point. The method includes configuring the wireless device from the data structure received from the wireless beacon. The method also includes establishing a wireless network between the access point and the wireless device utilizing at least a portion of the wireless identifier encoded in the data structure.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving a wireless beacon from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point; configuring the wireless device based on the data structure received from the wireless beacon; and establishing a wireless network between the access point and the wireless device utilizing the at least a portion of the wireless identifier encoded in the data structure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
receiving a wireless beacon at a wireless device via an ad hoc network, the wireless beacon having a first configuration data structure to specify initial network settings for the wireless device; configuring the wireless device according to the initial network settings specified in the first data structure; establishing a connection with an access point utilizing the initial network settings specified in the first data structure; broadcasting a second data structure to the wireless device over a designated communications port, the second data structure specifying a an updated security protocol for the wireless device; configuring the wireless device and the access point according to the updated security protocol specified in the second data structure; and reestablishing the connection between the wireless device and the access point utilizing the updated security protocol. - View Dependent Claims (17, 18, 19)
-
-
20. A non-transitory computer readable medium comprising computer executable instructions that when executed cause a processor to:
-
process a wireless beacon received from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point; configure the wireless device based on the data structure of the wireless beacon; and establish a wireless network between the access point and the wireless device utilizing the at least a portion of the wireless identifier encoded in the data structure.
-
Specification