×

Establishing a secure wireless network with a minimum human intervention

  • US 9,787,550 B2
  • Filed: 07/20/2015
  • Issued: 10/10/2017
  • Est. Priority Date: 06/05/2004
  • Status: Active Grant
First Claim
Patent Images

1. Tangible, non-transitory, computer-readable media having instructions stored thereon that when executed cause a controller device to perform functions comprising:

  • receiving a command to configure a playback device;

    based on the received command, causing a graphical display to display a prompt that indicates an instruction to press one or more buttons of the playback device;

    after displaying the prompt that indicates the instruction to press one or more buttons of the playback device, entering into a listening mode;

    while in the listening mode, receiving from the playback device, an indication that the playback device is available, wherein the playback device transmits the indication to the controller device in response to a pressing of the one or more buttons of the playback device;

    responsive to the indication, transmitting a query message to the playback device, the query message requesting current network configuration information corresponding to the playback device;

    receiving from the playback device via a network interface, network configuration information corresponding to the playback device in response to the query message;

    determining, based on the received network configuration information, that the playback device is not configured to join a secure first network; and

    based on determining that the playback device is not configured to join the secure first network;

    generating network parameters for a secure second network;

    joining the secure second network based on the generated network parameters;

    causing the playback device to join the secure second network based on the generated network parameters; and

    causing the graphical display to display an indication that the controller device and the playback device have joined the secure second network.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×