Network configuration for devices with constrained resources
First Claim
Patent Images
1. A method, comprising:
- receiving a wireless beacon from a local configuration device over an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point;
configuring the wireless device for communication with the access point according to the at least the portion of the wireless identifier of the access point;
establishing a connection between the wireless device and the access point utilizing a wireless network established based on the at least a portion of the wireless identifier;
receiving another wireless beacon at the wireless device, wherein the other wireless beacon comprises a next-time data structure, wherein the next-time data structure comprises updated security information; and
reconfiguring the already configured wireless device for communication with the access point according to the updated security information.
0 Assignments
0 Petitions
Accused Products
Abstract
A method includes receiving a wireless beacon from an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point. The method includes configuring the wireless device from the data structure received from the wireless beacon. The method also includes establishing a wireless network between the access point and the wireless device utilizing at least a portion of the wireless identifier encoded in the data structure.
-
Citations
19 Claims
-
1. A method, comprising:
-
receiving a wireless beacon from a local configuration device over an ad hoc network at a wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point; configuring the wireless device for communication with the access point according to the at least the portion of the wireless identifier of the access point; establishing a connection between the wireless device and the access point utilizing a wireless network established based on the at least a portion of the wireless identifier; receiving another wireless beacon at the wireless device, wherein the other wireless beacon comprises a next-time data structure, wherein the next-time data structure comprises updated security information; and reconfiguring the already configured wireless device for communication with the access point according to the updated security information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
receiving a wireless beacon over an ad hoc network from a local configuration device at a wireless device, the wireless beacon having a configuration data structure comprising at least a portion of a wireless identifier an access point; configuring the wireless device according to at least the portion of the wireless identifier for the access point; establishing a connection with the access point utilizing a wireless connection established based on the at least the portion of the new wireless identifier for the access point; receiving another wireless beacon comprising a next-time data structure at the wireless device over a designated communications port, the next-time data structure comprises an updated security profile for communication with the access point; and re-configuring the wireless device according to the updated security profile specified in the next-time data structure. - View Dependent Claims (16, 17, 18)
-
-
19. A non-transitory computer readable medium comprising computer executable instructions that when executed cause a processor to:
-
process a wireless beacon at a wireless device for a configuration of the wireless device, wherein the wireless beacon includes a data structure that encodes at least a portion of a wireless identifier of an access point, wherein the wireless beacon is received over an ad hoc network from a local configuration device; configure the wireless device based on the data structure; establish a connection with the access point based on the configuration of the wireless device; receive a second wireless beacon comprising a next-time data structure at the wireless device over a designated communications port, the next-time data structure specifying an updated security protocol for the connection; re-configure the wireless device according to the updated security protocol; and reestablish the connection utilizing the updated security protocol.
-
Specification