throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2011/0289229 A1
`
`
` Subramaniam (43) Pub. Date: NOV. 24, 201 1
`
`US 20110289229A1
`
`(54) METHODS AND SYSTEMS FOR WI-FI SETUP
`AND CONFIGURATION
`
`(75)
`
`Inventor:
`
`Ramanathan Subramaniam, Old
`Bridge, NJ (US)
`
`(73) Assignee:
`
`BridgeCo Inc.
`
`(21) Appl. No.:
`
`13/098,779
`
`(22)
`
`Filed:
`
`May 23 2011
`
`Related US, Application Data
`
`(60) Provisional application No. 61/331,459, filed 011 May
`5, 2010.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2006.01)
`G06F 15/16
`(200901)
`H04 W 76/02
`(52) US. Cl. ........................................................ 709/228
`(57)
`ABSTRACT
`
`The present invention relates generally to the configuration of
`wireless networks and the configuration of electronic devices
`to connect to wireless networks, especially when those elec-
`tronic devices have limited user interfaces and/or no display
`screen. The present invention makes use of devices already
`connected to a wireless network, previously connected to a
`w1reless network, or capable of acting as an 1nterface to
`discover the connection settings required to connect to the
`wireless network. The present invention further uses a shared
`communication medium between that connected device and
`an unconnected device in order to share the connection set-
`tings needed to connect the unconnected device.
`
`/\
`
`BEGIN
`
`j
`
`f 8410
`
`
`
`
`
`l M
`
`S420
`Trigger Electronic Device to
`\s/W
`Enter Configuration Mode
`
`
`Gather Connection Settings for
`J 8440
`
`
`Wireless Network
`
`Connect Computing Device to
`Electronic Device
`
`
`
`
`
`
`
`Configure Electronic Device with ‘/1/ S450
`Connection Settings
`
`
`
`8460
`
`(
`
`END
`
`)M
`
`1
`
`APPLE 1005
`
`1
`
`APPLE 1005
`
`

`

`Patent Application Publication
`
`Nov. 24, 2011 Sheet 1 of 4
`
`US 2011/0289229 A1
`
`115
`
`I 110
`
`(f
`
`130
`
`120
`
`120
`
`120
`
`
`
`Fig. 1
`
`2
`
`

`

`Patent Application Publication
`
`Nov. 24, 2011 Sheet 2 of 4
`
`US 2011/0289229 A1
`
`210
`
`
`
` Wireless Access
`
`Point
`
`
`
`230
`
`220
`
`
`
`240
`
`
`
`
`
`
`Computing Device
`
`Electronic Device
`
`Fig. 2
`
`3
`
`

`

`Patent Application Publication
`
`Nov. 24, 2011 Sheet 3 of 4
`
`US 2011/0289229 A1
`
` 3210
`
`
`
`Wireless Access
`
`Point
`
`
`
`240
`
`Electronic Device J
`
`220
`
`1 JI
`
`,
`
`230
`
`I«,l
`
`Computing Device 5
`
`
`
`
`
`
`
`
`
`380
`
`K
`
`'
`
`.
`.
`Triggering
`
`Module
`
`1350
`
`A.
`
`.
`
`
`Setting Module
`360/
`_.,_
`J_\f Networking
`Module
`
`
`370
`
`Configuration
`
`/ Module
`
`390
`
`Fig. 3
`
`4
`
`

`

`Patent Application Publication
`
`Nov. 24, 2011 Sheet 4 of 4
`
`US 2011/0289229 A1
`
`Gather Connection Settings for
`
`8440
`
`l M
`
`Trigger Electronic Device to
`S420
`Enter Configuration Mode
`\c/\
`
`
`
`(_/
`Wireless Network
`
`1
`
`
`l”
`
`Configure Electronic Device with Jt/ S450
`Connection Settings
`
`Connect Computing Device to
`Electronic Device
`
`
`
`Fig. 4
`
`5
`
`

`

`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`METHODS AND SYSTEMS FOR WI—FI SETUP
`AND CONFIGURATION
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`[0001] This application claims priority to and the benefit of
`US. provisional patent application with Ser. No. 61/331,459
`filed on May 5, 2010, entitled “WiFi Setup Configuration.”
`
`FIELD OF THE INVENTION
`
`[0002] The present invention relates generally to the con-
`figuration of wireless networks and the configuration of elec-
`tronic devices to connect to wireless networks, especially
`when those electronic devices have limited user interfaces
`
`and/or no display screen.
`
`BACKGROUND
`
`[0003] Establishing a basic at-home wireless network
`between traditional computing devices (e.g., desktop and lap-
`top computers) has become very easy. For example, next-
`generation customer-premises equipment
`for broadband
`access (e.g., cable and DSL modems provided by Internet
`service providers) may directly support wireless networks.
`Alternatively, a user may connect a wireless access point
`(“WAP”) to a broadband modem to create a wireless home
`network.
`
`[0004] A simple, unsecured wireless network, however,
`may permit anyone to snoop on the conversations between the
`devices and/or gain access to the network and the information
`being exchanged. To avoid these unwanted intrusions, access
`points may be configured to use wireless security. A secure
`wireless network is created by sharing confidential informa-
`tion among the various devices and the WAP. The WAP may
`then be used for the establishment of a wireless connection.
`
`[0005] Over the years, various wireless security schemes
`have evolved, such as Wired Equivalent Privacy (“WEP”),
`Wi-Fi ProtectedAccess (“WPA”), and WPA2. These schemes
`often involve complex, hexadecimal “keys” orpasswords as a
`part of the confidential information that is shared among the
`devices. The process of securing a wireless network involves
`configuring the router for the desired type of security and then
`providing each wireless client with the settings and pass-
`words to be used (i.e., the ones associated with the type of
`security scheme used in the router). This process may be
`tedious and challenging for an average home user, especially
`when the device requiring wireless configuration settings has
`limited input and display capabilities, such as a digital media
`player. As demand for networked and internet-based media
`rises, however, more next-generation media-rendering
`devices support networkingipreferably wireless network-
`ing, given its ease and convenience of use.
`[0006]
`To address the above-mentioned problem, some
`efforts have been made to simplify wireless network security.
`For example, the Wi-Fi Alliance promotes a set of standards
`known as Wi-Fi Protected Setup (“WPS”) for the purpose of
`simplifying wireless configuration. Additionally, newer ver-
`sions of Microsoft Windows support a technology called
`Windows Connect Now (“WCN”) that supports storing con-
`figuration settings on a portable storage device, such as a USB
`flash memory, and transferring the settings to a device that
`needs to be configured. However, this does not completely
`solve the problems explained above, as most access points
`currently deployed still do not support WPS. Therefore, WPS
`
`is rarely an adequate solution. Further, the devices that need to
`be configured may not support interfaces for portable/remov-
`able storage media as required by WCN. Therefore, WCN is
`rarely an adequate solution.
`[0007] There is, therefore, a remaining need in the field to
`be able to setup devices to connect to a wireless network with
`ease, especially when those devices have limited user inter-
`faces.
`
`SUMMARY OF THE INVENTION
`
`techniques and supporting systems
`[0008] Accordingly,
`and methods as described herein address the above-described
`
`problems, as well as other issues facing users of wireless
`networks. In order for users to fully realize the benefits of
`wireless networks and the benefits of a growing number of
`wireless-enabled devices, it must become simpler to config-
`ure devices to connect to wireless networks, regardless of the
`type of device and user interface present on the device.
`[0009] Therefore, in one aspect of the present invention, a
`system facilitates the addition of an electronic device to a
`wireless network. The system includes a module for trigger-
`ing the electronic device to enter a configuration mode and a
`settings module for gathering settings pertaining to connect-
`ing a device to the wireless network. The settings are gathered
`from a computing device that may already be a member ofthe
`wireless network, however, it is also possible that the com-
`puting device is not a member of the wireless network. For
`instance, it is possible that the computing device was at one
`point a member of the wireless network but is no longer a
`member, or else that the computing device simply has the
`wireless network settings without having ever been a member
`of the wireless network. It is also possible that the computing
`device acts as an interface to retrieve the wireless settings
`without wireless capabilities. In this case, it is possible that
`the computing device is not even capable of being a member
`of the wireless network.
`
`[0010] The system also includes a module for connecting
`the computing device to the electronic device using a network
`link. The system also includes a module for configuring the
`electronic device to connect to the wireless network using the
`gathered settings and the network link.
`[0011]
`In certain embodiments, the system includes a wire-
`less network using an IEEE 802.1 1 protocol for communica-
`tion, and, in some cases the wireless network is secured using
`WEP, WPA, or WPA2. The computing device may include a
`display screen, whereas in some implementations the elec-
`tronic device is devoid of a display screen. In some embodi-
`ments, the triggering module is triggered based on input from
`a user interacting with the electronic device.
`[0012]
`In further embodiments, while in configuration
`mode the electronic device transmits requests for ad hoc
`networks to all computing devices within transmission range,
`and, in some cases, establishes itselfas a wireless access point
`and transmits its presence as well as a pre-specified SSID
`indicating that the electronic device is in configuration mode.
`[0013]
`In some implementations, the settings module gath-
`ers the connection settings from the computing device on
`which it is located, from the wireless access point, and/or
`from a user of the computing device.
`[0014]
`In another aspect of the present invention, a com-
`puter-implemented method facilitates the addition of an elec-
`tronic device to a wireless network. The method includes
`
`triggering the electronic device to enter a configuration mode
`and gathering settings pertaining to connecting a device to the
`
`6
`
`

`

`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`wireless network from a computing device. The method also
`includes connecting the computing device to the electronic
`device using a network link and configuring the electronic
`device to connect to the wireless network using the settings
`and the network link.
`[0015]
`In certain embodiments, the wireless network uses
`an IEEE 802.11 protocol for communication, and in some
`cases the network may also be secured using WEP, WPA, or
`WPA2.
`
`[0016] The trigger to enter configuration mode may, in
`some cases, be based on input from a user interacting with the
`electronic device. While in configuration mode, the electronic
`device may transmit requests for ad hoc networks to all com-
`puting devices within transmission range. In certain imple-
`mentations, the electronic device establishes itself as a wire-
`less access point and transmits its presence as well as a pre-
`specified SSID indicating that the electronic device is in
`configuration mode.
`[0017] The connection settings may be gathered from a
`computing device other than the wireless access point that
`created the wireless network, from the wireless access point
`that created the wireless network, and/or from a user Via an
`input device on/with the computing device.
`[0018]
`It is to be understood that both the foregoing general
`description of the invention and the following detailed
`descriptions are exemplary, but are not restrictive, of the
`invention.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`features, and
`[0019] The foregoing and other objects,
`advantages of the present invention, as well as the invention
`itself, will be more fully understood from the following
`description ofvarious embodiments, when read together with
`the accompanying drawings, in which:
`[0020]
`FIG. 1 illustrates an exemplary network diagram of
`various devices that are members of a wireless network and
`one electronic device that is not a member of the wireless
`
`network according to various embodiments of the invention;
`[0021]
`FIG. 2 illustrates an exemplary block diagram of a
`computing device that is a member of a wireless network and
`an electronic device that is not a member of the wireless
`
`network according to various embodiments of the invention;
`[0022]
`FIG. 3 illustrates an exemplary block diagram of a
`computing device, containing various modules,
`that is a
`member of a wireless network and an electronic device, con-
`taining one module, that is not a member of the wireless
`network according to various embodiments of the invention,
`and the two devices are connected by a network link; and
`[0023]
`FIG. 4 illustrates an exemplary flow diagram for
`joining an electronic device to a wireless network according
`to various embodiments of the invention.
`
`DETAILED DESCRIPTION
`
`[0024] The detailed description set forth below, in connec-
`tion with the associated drawings, is intended to provide a
`description of the presently-preferred embodiments of the
`invention, and is in no way intended to limit the forms in
`which the present
`invention may be construed or used.
`Accordingly, it is well-understood by those with ordinary
`skill in the art that the same or equivalent functions may be
`accomplished by different embodiments
`that are also
`intended to be encompassed within the spirit and scope of the
`present
`invention. Moreover, with respect
`to particular
`
`method steps, it is readily understood by those with skill in the
`art that the steps may be performed in any order, and are not
`limited to any particular order unless expressly stated or
`otherwise inherent within the steps.
`[0025] The systems and methods described herein facilitate
`the joining of an electronic device to a wireless network using
`a computing device that is already a member of the wireless
`network. The term “wireless network” is used herein to
`
`describe a set of networked devices that exchange data
`through a device that functions as a wireless access point.
`While a wireless network may have devices as members of
`the network that are not connected wirelessly, but rather
`through physical wire, a wireless network when used herein
`indicates that at least one member ofthe network is a wireless
`
`access point, thereby enabling devices to join using wireless
`connectivity should such a wireless-enabled device be
`present. When used herein, the terms “join” and “connect”
`and “member of” in relation to a wireless network indicate
`
`that a device is capable of communicating with at least the
`wireless access point ofthe wireless network. As noted above,
`a device that is a member of, connects to, or joins a wireless
`network need not actually effectuate communication with the
`wireless access point using wireless communication. How-
`ever, all three of these terms when used herein indicate that
`such a device is sufficiently configured to comply with any
`security settings that the wireless access point may be enforc-
`ing. The terms “computing device” and “electronic device”
`are used very generally herein and describe any device with
`an electronic circuit and capable of executing instructions.
`The terms “computing device” and “electronic device” will
`typically be used in contradistinction to denote respectively a
`device presently a member of the wireless network and a
`device not presently a member of the wireless network. Nota-
`bly while a computing device may be a member of the wire-
`less network using a wireless and/or wired connection, and
`while the electronic device may be capable of a wired con-
`nection in addition to a wireless connection, an “electronic
`device” as used herein must be capable at least of a wireless
`connection, as the object of the invention is generally to
`connect the electronic device to the wireless network.
`
`[0026] As shown in FIG. 1, a wireless access point 110
`creates a wireless network of which computing devices 120
`are members. As illustrated, a computing device can be any
`sort of device. For example, it may be a cellular phone, a
`desktop computer, a laptop computer, tablet computer, a
`receiver and speaker system, television, as well as a stereo
`system as shown in FIG. 1. There are, however, many other
`forms of devices that would constitute computing devices for
`the purposes of this invention. The invention is indifferent to
`the type of computing device. The computing devices are
`members of the wireless network because they are connected
`to the wireless access point 110 via network links 130.
`[0027]
`In one embodiment of the invention, network link
`130 is a wireless connection using a wireless communication
`protocol shared between the computing device 120 and the
`wireless access point 110. Given the popularity of wireless-
`enabled devices, this embodiment is common in practice. A
`typical wireless communication protocol is the family of
`IEEE 802.11 protocols. For example, a laptop computer may
`communicate with a wireless access point using IEEE 802.
`11n. In this scenario, therefore, the computing device 120 is a
`laptop and the network link 130 is the wireless connection
`using a IEEE 802.11n protocol between the laptop and the
`wireless access point 110.
`
`7
`
`

`

`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`In another embodiment of the invention, such a net-
`[0028]
`work link 130 includes a wired connection using a “wired”
`communication protocol shared between the computing
`device 120 and the wireless access point 110. A person with
`ordinary skill in the art would understand that a conventional
`wired network may comprise a desktop computer communi-
`cating with a wireless access point Via a Cat 5 cable and the
`Ethernet protocol. In this scenario, therefore, the computing
`device 120 is a desktop computer and the network link 130 is
`the wired connection using Ethernet over a Cat 5 cable con-
`necting the desktop computer and the wireless access point.
`[0029] As shown in FIG. 1, the wireless access point 110
`may be connected to the Internet 115. It may also be con-
`nected to some other external network. While such situations
`
`are highly foreseeable, the invention would still cover a situ-
`ation where the wireless access point 110 is not connected to
`the Internet 115 or an external network. If the wireless access
`
`point 110 is connected to an external network, the modem
`used for interfacing with that external network may be inte-
`grated into a single device with the wireless access point. It is
`also foreseeable, though, that the modem may be external to
`the device that contains the wireless access point, which
`would therefore necessitate some sort of network link
`
`between the wireless access point 110 and the external
`modem.
`
`[0030] As shown in FIG. 1, the computing devices 120 are
`connected to the wireless access point 110 via a network link
`130. However, this diagram is simplified and not intended to
`imply that the computing devices 120 must connect with the
`wireless access point 110 via a point-to-point network link
`130. It is known to persons with ordinary skill in the art that
`different communication protocols implement different com-
`munication methods. In particular, some communication pro-
`tocols implement point-to-point communications while oth-
`ers
`implement
`broadcast
`communications. Wireless
`communications typically implement broadcast communica-
`tions. Therefore, it is foreseen that the present invention can
`be implemented for wireless networks where the computing
`devices 120 communicate in a variety of methods, including
`in point-to-point fashion and broadcast fashion. Therefore,
`while FIG. 1 demonstrates network links 130 running directly
`from wireless access point 110 to each computing device 120,
`the present invention as well as this diagram are intended to
`also describe implementations in which the computing
`devices 120 are broadcasting their communications with the
`wireless access point 110 and thus are effectively transmitting
`to other computing devices 120, even though no such network
`links are shown.
`
`[0031] As shown in FIG. 1, an electronic device 140 is not
`a member of the wireless network because it is not commu-
`
`nicating with the wireless access point 110. For the purposes
`of this invention, the wireless device 140 is capable of a
`wireless connection to wireless access point 110. However,
`the electronic device 140 is not a member of the wireless
`
`network because it is not configured with the appropriate
`security settings that are being enforced by the wireless
`access point 110 against devices connected using a wireless
`connection.
`
`Such security settings may come in a variety of
`[0032]
`forms. Persons with ordinary skill in the art would realize that
`security settings are often implemented through an industry
`standard protocol, such as WEP, WPA, or WPA2. Regardless
`of the particular security settings being used, FIG. 1 depicts a
`situation where an electronic device 140 is otherwise capable
`
`of forming a wireless connection to a wireless access point
`110, but for certain pieces of information that the wireless
`access point 110 requires the electronic device 140 to provide
`in order to allow the electronic device 140 to join the network.
`[0033] As shown in FIG. 2, a wireless access point 210
`creates a wireless network having computing device 220 as a
`member. The computing device 220 is a member of the wire-
`less network because it is connected to the wireless access
`
`point 210 via network link 230. Similar to the network link in
`FIG. 1, the network link 230 in FIG. 2 can take numerous
`forms, including wired and wireless forms of connections.
`Further, there is an electronic device 240 that is not a member
`ofthe wireless network because it is not communicating with
`the wireless access point 210. As in FIG. 1, the wireless
`device 240 is capable of a wireless connection to wireless
`access point 210. However, the electronic device 240 is not a
`member of the wireless network because it is not configured
`with the appropriate security settings that are being enforced
`by the wireless access point 210 against devices connected
`using a wireless connection.
`[0034] As shown in FIG. 3, a wireless access point 210
`creates a wireless network of which a computing device 220
`is a member. The computing device 220 is a member of the
`wireless network because it is connected to the wireless
`
`access point 210 via network link 230. Similar to FIG. 1 and
`FIG. 2, the network link 230 in FIG. 3 can take numerous
`forms, including wired and wireless forms of connections.
`Further, electronic device 240 is not a member ofthe wireless
`network because it is not communicating with the wireless
`access point 210. As in FIG. 1 and FIG. 2, the wireless device
`240 in FIG. 3 is capable of a wireless connection to wireless
`access point 210. However, the electronic device 240 is not a
`member of the wireless network because it is not configured
`with the appropriate security settings that are being enforced
`by the wireless access point 210 against devices connected
`using a wireless connection.
`[0035] Also in FIG. 3 there is a triggering module 350
`located on the electronic device 240. This triggering module
`350 takes some form of input and puts the electronic device
`240 into configuration mode should certain conditions of that
`input be met.
`[0036] The input received by the triggering module 350 can
`take a variety of forms. In one embodiment, the electronic
`device 240 has a physical button on its outer case that a user
`is able to depress. When the button is depressed, the triggering
`module 350 places the electronic device 240 into configura-
`tion mode. In another embodiment, the electronic device has
`a touch screen input on which a virtual button is displayed.
`When the button is selected, the triggering module 350 puts
`the electronic device 240 into configuration mode. In another
`embodiment of the invention, the triggering module 350
`receives as input the set of wireless networks, as identified by
`their corresponding SSIDs, detected by the electronic device
`240. Upon detection of some pre-specified SSID, the trigger-
`ing module 350 places the electronic device 240 into configu-
`ration mode. In other implementations, the triggering module
`350 receives timing information, such as clock cycles or time
`of day. In such cases the triggering module 350 places the
`electronic device 240 into configuration mode at certain times
`of the day or at certain intervals (e.g., every five minutes).
`These triggering mechanisms are merely examples of certain
`possible triggering devices that may be used and are not
`meant to limit the scope of inputs that the triggering module
`350 can receive.
`
`8
`
`

`

`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`[0037] Based on receiving the proper input, the triggering
`module 350 places the electronic device into configuration
`mode which allows the electronic device 240 to interact with
`
`the computing device 220 as described below. Regardless of
`what form the interaction with the computing device 220
`takes, the configuration mode permits such interactions to
`take place.
`[0038]
`In one embodiment, when placed into configuration
`mode, the electronic device 240 transmits requests to form ad
`hoc wireless networks to computing devices within the range
`of its transmission. Such a computing device 220 can detect
`the ad hoc network requests and form a network link with the
`electronic device 240 as described below. In another instance
`
`when the triggering module 350 puts the electronic device
`240 into configuration mode, the electronic device 240 con-
`figures itself as a wireless access point with a pre-specified
`SSID and transmits its presence. In such a case, computing
`device 220, which is in range of electronic device 240 trans-
`missions, detects the pre-specified SSID and is thereby able to
`create a network link with the electronic device 240. In
`
`another instance when the triggering module 350 puts the
`electronic device 240 into configuration mode, the electronic
`device 240 communicates configuration requests to all
`devices to which it is connected. These other devices may be
`connected to the electronic device 240 by wireless connec-
`tions or by wired connections, such as over a USB or UART/
`ANALOG interface. When configuring the electronic device
`using a docked computing device, the need to explicitly trig-
`ger the electronic device into configuration mode may be
`avoided. The triggering may instead be effected by the user
`performing some action on the docked device (e.g., launching
`a configuration application).
`[0039]
`Still referring to FIG. 3, a setting module 360 is
`located on the computing device 220. This setting module 360
`detects the computing device 220 connection to the wireless
`access point 210 Via network link 230 and gathers settings
`pertaining to that connection. When wireless access point 210
`is enforcing security settings on connected wireless devices,
`such as computing device 220 ifit is connected wirelessly, the
`setting module gathers the security settings necessary for a
`device to connect to the wireless access point 210, such as a
`security protocol and/or a passphrase.
`[0040]
`In certain embodiments, the setting module 360
`gathers settings pertaining to the wireless access point 210 by
`querying the operating system or a network utility running on
`the computing device 220. In such a situation, the setting
`module 360 determines what information the computing
`device 220 used to connect to wireless access point 210 and
`stores that information for later configuration of the elec-
`tronic device 240. In this embodiment, it is likely that the
`network link 230 between the computing device 220 and the
`wireless access point 210 is a wireless network connection, in
`which case the setting module 360 gathers wireless connec-
`tion settings, as it is unlikely that the computing device 220
`will have such settings if it is not itself using a wireless
`connection to wireless access point 210.
`[0041]
`In another embodiment of the invention, the setting
`module 360 gathers settings pertaining to the wireless access
`point 210 by querying the wireless access point 210. This may
`take the form ofthe setting module 3 60 remotely querying the
`operating system or a network utility on the wireless access
`point 210 to determine which security settings are being used
`for wireless connections. This may also take the form of the
`setting module 360 communicating with a separate module
`
`running on the wireless access point 210 specifically provid-
`ing such information to requesting modules such as the set-
`ting module 360. The module providing such settings may, in
`some cases, require that a requesting module be running on a
`device that is already using proper security settings and
`thereby a member of the wireless network. In such a case, the
`settings gathering module stores the connection settings pro-
`vided by the wireless access point 210.
`[0042]
`In other configurations,
`the setting module 360
`gathers settings pertaining to the wireless access point 210 by
`querying a user of the computing device 220 for the informa-
`tion. This may take the form of creating and displaying a
`prompt on some user interface of the computing device 220
`thereby requesting the user to enter security settings which
`the setting module 360 then stores for subsequent user.
`[0043]
`In another configuration, the setting module 360
`acts as an interface by gathering settings pertaining to the
`wireless access point 210 by querying the user of the com-
`puting device 220 for the information. In this exemplary
`embodiment, network link 230 may be ineffectual or not
`present at all. However, the setting module 360 may gather
`settings for wireless access point 210 from a user of the
`computing device, so the computing device 220 does not
`actually need to be a member of the wireless network. This
`configuration could cover situations where the computing
`device is in fact a member of the wireless network, situations
`where the computing device 220 had never been a member of
`the wireless network, and situations where the computing
`device 220 had at one time been a member of the wireless
`
`network (but e.g., no longer has accurate settings for the
`wireless access point 210 or simply is no longer connected to
`the wireless access point).
`[0044] Also in FIG. 3, a networking module 370 is located
`on the computing device 220. This networking module 370
`detects electronic device 240 when that device is in configu-
`ration mode. The networking module 370 then establishes a
`network link 380 between the computing device 220 and the
`electronic device 240.
`
`In one embodiment of the invention, the networking
`[0045]
`module 370 detects that electronic device 240 is in configu-
`ration mode as it monitors the wireless network information
`
`received by the computing device 220 and notices a request
`for an ad hoc network by electronic device 240. In such a
`situation, networking module 370 causes computing device
`220 to accept the ad hoc network request, thereby establishing
`a network link 380 as a wireless connection between comput-
`ing device 220 and electronic device 240.
`[0046] The networking module 370 may also detect when
`electronic device 240 is in configuration mode as it monitors
`the wireless networks that computing device 220 detects, and
`notices that a wireless network with a pre-specified SSID is
`detected by computing device 220 as it is transmitted by
`electronic device 240. In such a situation, networking module
`370 may cause computing device 220 to request a connection
`to the wireless network created by electronic device 240.
`When electronic device 240 accepts the request to join the
`network, network link 380 has been established between the
`computing device 220 and electronic device 240 as a wireless
`network connection.
`
`In another embodiment of the invention, the net-
`[0047]
`working module 370 detects when the electronic device 240
`is in configuration mode as it monitors the messages received
`by the computing device 220 from devices to which it is
`connected, and notices a configuration request communi-
`
`9
`
`

`

`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`cated from the electronic device 240 to which it is already
`connected. In such a situation, networking module 370 may
`not need to create the network link 380 as the devices are
`
`work utility operating thereon. These settings can also be
`obtained from the wireless access point that creates the wire-
`less network to which the electronic device will connect. The
`
`already connected. This embodiment, for instance, allows for
`a situation where the electronic device 240 is connected to the
`
`computing device 220 Via a USB interface, and the electronic
`device 240 communicates configuration requests to all
`devices to which it is connected, thereby communicating a
`configuration request to the computing device 220 which is
`detected by networking module 370.
`[0048] While the above mentioned embodiments are ideal
`techniques of forming network link 380 between computing
`device 220 and electronic device 240, it is foreseen that a
`variety of other network links can be formed, including wired
`links, that fall within the scope of this invention.
`[0049] Also in FIG. 3, a configuration module 390, located
`on the computing device 220, uses the connection settings
`information gathered by the settings gathering mo

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket