`(12) Patent Application Publication (10) Pub. No.: US 2011/0289229 A1
`
`
` Subramaniam (43) Pub. Date: NOV. 24, 201 1
`
`US 20110289229A1
`
`(54) METHODS AND SYSTEMS FOR WI-FI SETUP
`AND CONFIGURATION
`
`(75)
`
`Inventor:
`
`Ramanathan Subramaniam, Old
`Bridge, NJ (US)
`
`(73) Assignee:
`
`BridgeCo Inc.
`
`(21) Appl. No.:
`
`13/098,779
`
`(22)
`
`Filed:
`
`May 23 2011
`
`Related US, Application Data
`
`(60) Provisional application No. 61/331,459, filed 011 May
`5, 2010.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2006.01)
`G06F 15/16
`(200901)
`H04 W 76/02
`(52) US. Cl. ........................................................ 709/228
`(57)
`ABSTRACT
`
`The present invention relates generally to the configuration of
`wireless networks and the configuration of electronic devices
`to connect to wireless networks, especially when those elec-
`tronic devices have limited user interfaces and/or no display
`screen. The present invention makes use of devices already
`connected to a wireless network, previously connected to a
`w1reless network, or capable of acting as an 1nterface to
`discover the connection settings required to connect to the
`wireless network. The present invention further uses a shared
`communication medium between that connected device and
`an unconnected device in order to share the connection set-
`tings needed to connect the unconnected device.
`
`/\
`
`BEGIN
`
`j
`
`f 8410
`
`
`
`
`
`l M
`
`S420
`Trigger Electronic Device to
`\s/W
`Enter Configuration Mode
`
`
`Gather Connection Settings for
`J 8440
`
`
`Wireless Network
`
`Connect Computing Device to
`Electronic Device
`
`
`
`
`
`
`
`Configure Electronic Device with ‘/1/ S450
`Connection Settings
`
`
`
`8460
`
`(
`
`END
`
`)M
`
`1
`
`APPLE 1005
`
`1
`
`APPLE 1005
`
`
`
`Patent Application Publication
`
`Nov. 24, 2011 Sheet 1 of 4
`
`US 2011/0289229 A1
`
`115
`
`I 110
`
`(f
`
`130
`
`120
`
`120
`
`120
`
`
`
`Fig. 1
`
`2
`
`
`
`Patent Application Publication
`
`Nov. 24, 2011 Sheet 2 of 4
`
`US 2011/0289229 A1
`
`210
`
`
`
` Wireless Access
`
`Point
`
`
`
`230
`
`220
`
`
`
`240
`
`
`
`
`
`
`Computing Device
`
`Electronic Device
`
`Fig. 2
`
`3
`
`
`
`Patent Application Publication
`
`Nov. 24, 2011 Sheet 3 of 4
`
`US 2011/0289229 A1
`
` 3210
`
`
`
`Wireless Access
`
`Point
`
`
`
`240
`
`Electronic Device J
`
`220
`
`1 JI
`
`,
`
`230
`
`I«,l
`
`Computing Device 5
`
`
`
`
`
`
`
`
`
`380
`
`K
`
`'
`
`.
`.
`Triggering
`
`Module
`
`1350
`
`A.
`
`.
`
`
`Setting Module
`360/
`_.,_
`J_\f Networking
`Module
`
`
`370
`
`Configuration
`
`/ Module
`
`390
`
`Fig. 3
`
`4
`
`
`
`Patent Application Publication
`
`Nov. 24, 2011 Sheet 4 of 4
`
`US 2011/0289229 A1
`
`Gather Connection Settings for
`
`8440
`
`l M
`
`Trigger Electronic Device to
`S420
`Enter Configuration Mode
`\c/\
`
`
`
`(_/
`Wireless Network
`
`1
`
`
`l”
`
`Configure Electronic Device with Jt/ S450
`Connection Settings
`
`Connect Computing Device to
`Electronic Device
`
`
`
`Fig. 4
`
`5
`
`
`
`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`METHODS AND SYSTEMS FOR WI—FI SETUP
`AND CONFIGURATION
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`[0001] This application claims priority to and the benefit of
`US. provisional patent application with Ser. No. 61/331,459
`filed on May 5, 2010, entitled “WiFi Setup Configuration.”
`
`FIELD OF THE INVENTION
`
`[0002] The present invention relates generally to the con-
`figuration of wireless networks and the configuration of elec-
`tronic devices to connect to wireless networks, especially
`when those electronic devices have limited user interfaces
`
`and/or no display screen.
`
`BACKGROUND
`
`[0003] Establishing a basic at-home wireless network
`between traditional computing devices (e.g., desktop and lap-
`top computers) has become very easy. For example, next-
`generation customer-premises equipment
`for broadband
`access (e.g., cable and DSL modems provided by Internet
`service providers) may directly support wireless networks.
`Alternatively, a user may connect a wireless access point
`(“WAP”) to a broadband modem to create a wireless home
`network.
`
`[0004] A simple, unsecured wireless network, however,
`may permit anyone to snoop on the conversations between the
`devices and/or gain access to the network and the information
`being exchanged. To avoid these unwanted intrusions, access
`points may be configured to use wireless security. A secure
`wireless network is created by sharing confidential informa-
`tion among the various devices and the WAP. The WAP may
`then be used for the establishment of a wireless connection.
`
`[0005] Over the years, various wireless security schemes
`have evolved, such as Wired Equivalent Privacy (“WEP”),
`Wi-Fi ProtectedAccess (“WPA”), and WPA2. These schemes
`often involve complex, hexadecimal “keys” orpasswords as a
`part of the confidential information that is shared among the
`devices. The process of securing a wireless network involves
`configuring the router for the desired type of security and then
`providing each wireless client with the settings and pass-
`words to be used (i.e., the ones associated with the type of
`security scheme used in the router). This process may be
`tedious and challenging for an average home user, especially
`when the device requiring wireless configuration settings has
`limited input and display capabilities, such as a digital media
`player. As demand for networked and internet-based media
`rises, however, more next-generation media-rendering
`devices support networkingipreferably wireless network-
`ing, given its ease and convenience of use.
`[0006]
`To address the above-mentioned problem, some
`efforts have been made to simplify wireless network security.
`For example, the Wi-Fi Alliance promotes a set of standards
`known as Wi-Fi Protected Setup (“WPS”) for the purpose of
`simplifying wireless configuration. Additionally, newer ver-
`sions of Microsoft Windows support a technology called
`Windows Connect Now (“WCN”) that supports storing con-
`figuration settings on a portable storage device, such as a USB
`flash memory, and transferring the settings to a device that
`needs to be configured. However, this does not completely
`solve the problems explained above, as most access points
`currently deployed still do not support WPS. Therefore, WPS
`
`is rarely an adequate solution. Further, the devices that need to
`be configured may not support interfaces for portable/remov-
`able storage media as required by WCN. Therefore, WCN is
`rarely an adequate solution.
`[0007] There is, therefore, a remaining need in the field to
`be able to setup devices to connect to a wireless network with
`ease, especially when those devices have limited user inter-
`faces.
`
`SUMMARY OF THE INVENTION
`
`techniques and supporting systems
`[0008] Accordingly,
`and methods as described herein address the above-described
`
`problems, as well as other issues facing users of wireless
`networks. In order for users to fully realize the benefits of
`wireless networks and the benefits of a growing number of
`wireless-enabled devices, it must become simpler to config-
`ure devices to connect to wireless networks, regardless of the
`type of device and user interface present on the device.
`[0009] Therefore, in one aspect of the present invention, a
`system facilitates the addition of an electronic device to a
`wireless network. The system includes a module for trigger-
`ing the electronic device to enter a configuration mode and a
`settings module for gathering settings pertaining to connect-
`ing a device to the wireless network. The settings are gathered
`from a computing device that may already be a member ofthe
`wireless network, however, it is also possible that the com-
`puting device is not a member of the wireless network. For
`instance, it is possible that the computing device was at one
`point a member of the wireless network but is no longer a
`member, or else that the computing device simply has the
`wireless network settings without having ever been a member
`of the wireless network. It is also possible that the computing
`device acts as an interface to retrieve the wireless settings
`without wireless capabilities. In this case, it is possible that
`the computing device is not even capable of being a member
`of the wireless network.
`
`[0010] The system also includes a module for connecting
`the computing device to the electronic device using a network
`link. The system also includes a module for configuring the
`electronic device to connect to the wireless network using the
`gathered settings and the network link.
`[0011]
`In certain embodiments, the system includes a wire-
`less network using an IEEE 802.1 1 protocol for communica-
`tion, and, in some cases the wireless network is secured using
`WEP, WPA, or WPA2. The computing device may include a
`display screen, whereas in some implementations the elec-
`tronic device is devoid of a display screen. In some embodi-
`ments, the triggering module is triggered based on input from
`a user interacting with the electronic device.
`[0012]
`In further embodiments, while in configuration
`mode the electronic device transmits requests for ad hoc
`networks to all computing devices within transmission range,
`and, in some cases, establishes itselfas a wireless access point
`and transmits its presence as well as a pre-specified SSID
`indicating that the electronic device is in configuration mode.
`[0013]
`In some implementations, the settings module gath-
`ers the connection settings from the computing device on
`which it is located, from the wireless access point, and/or
`from a user of the computing device.
`[0014]
`In another aspect of the present invention, a com-
`puter-implemented method facilitates the addition of an elec-
`tronic device to a wireless network. The method includes
`
`triggering the electronic device to enter a configuration mode
`and gathering settings pertaining to connecting a device to the
`
`6
`
`
`
`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`wireless network from a computing device. The method also
`includes connecting the computing device to the electronic
`device using a network link and configuring the electronic
`device to connect to the wireless network using the settings
`and the network link.
`[0015]
`In certain embodiments, the wireless network uses
`an IEEE 802.11 protocol for communication, and in some
`cases the network may also be secured using WEP, WPA, or
`WPA2.
`
`[0016] The trigger to enter configuration mode may, in
`some cases, be based on input from a user interacting with the
`electronic device. While in configuration mode, the electronic
`device may transmit requests for ad hoc networks to all com-
`puting devices within transmission range. In certain imple-
`mentations, the electronic device establishes itself as a wire-
`less access point and transmits its presence as well as a pre-
`specified SSID indicating that the electronic device is in
`configuration mode.
`[0017] The connection settings may be gathered from a
`computing device other than the wireless access point that
`created the wireless network, from the wireless access point
`that created the wireless network, and/or from a user Via an
`input device on/with the computing device.
`[0018]
`It is to be understood that both the foregoing general
`description of the invention and the following detailed
`descriptions are exemplary, but are not restrictive, of the
`invention.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`features, and
`[0019] The foregoing and other objects,
`advantages of the present invention, as well as the invention
`itself, will be more fully understood from the following
`description ofvarious embodiments, when read together with
`the accompanying drawings, in which:
`[0020]
`FIG. 1 illustrates an exemplary network diagram of
`various devices that are members of a wireless network and
`one electronic device that is not a member of the wireless
`
`network according to various embodiments of the invention;
`[0021]
`FIG. 2 illustrates an exemplary block diagram of a
`computing device that is a member of a wireless network and
`an electronic device that is not a member of the wireless
`
`network according to various embodiments of the invention;
`[0022]
`FIG. 3 illustrates an exemplary block diagram of a
`computing device, containing various modules,
`that is a
`member of a wireless network and an electronic device, con-
`taining one module, that is not a member of the wireless
`network according to various embodiments of the invention,
`and the two devices are connected by a network link; and
`[0023]
`FIG. 4 illustrates an exemplary flow diagram for
`joining an electronic device to a wireless network according
`to various embodiments of the invention.
`
`DETAILED DESCRIPTION
`
`[0024] The detailed description set forth below, in connec-
`tion with the associated drawings, is intended to provide a
`description of the presently-preferred embodiments of the
`invention, and is in no way intended to limit the forms in
`which the present
`invention may be construed or used.
`Accordingly, it is well-understood by those with ordinary
`skill in the art that the same or equivalent functions may be
`accomplished by different embodiments
`that are also
`intended to be encompassed within the spirit and scope of the
`present
`invention. Moreover, with respect
`to particular
`
`method steps, it is readily understood by those with skill in the
`art that the steps may be performed in any order, and are not
`limited to any particular order unless expressly stated or
`otherwise inherent within the steps.
`[0025] The systems and methods described herein facilitate
`the joining of an electronic device to a wireless network using
`a computing device that is already a member of the wireless
`network. The term “wireless network” is used herein to
`
`describe a set of networked devices that exchange data
`through a device that functions as a wireless access point.
`While a wireless network may have devices as members of
`the network that are not connected wirelessly, but rather
`through physical wire, a wireless network when used herein
`indicates that at least one member ofthe network is a wireless
`
`access point, thereby enabling devices to join using wireless
`connectivity should such a wireless-enabled device be
`present. When used herein, the terms “join” and “connect”
`and “member of” in relation to a wireless network indicate
`
`that a device is capable of communicating with at least the
`wireless access point ofthe wireless network. As noted above,
`a device that is a member of, connects to, or joins a wireless
`network need not actually effectuate communication with the
`wireless access point using wireless communication. How-
`ever, all three of these terms when used herein indicate that
`such a device is sufficiently configured to comply with any
`security settings that the wireless access point may be enforc-
`ing. The terms “computing device” and “electronic device”
`are used very generally herein and describe any device with
`an electronic circuit and capable of executing instructions.
`The terms “computing device” and “electronic device” will
`typically be used in contradistinction to denote respectively a
`device presently a member of the wireless network and a
`device not presently a member of the wireless network. Nota-
`bly while a computing device may be a member of the wire-
`less network using a wireless and/or wired connection, and
`while the electronic device may be capable of a wired con-
`nection in addition to a wireless connection, an “electronic
`device” as used herein must be capable at least of a wireless
`connection, as the object of the invention is generally to
`connect the electronic device to the wireless network.
`
`[0026] As shown in FIG. 1, a wireless access point 110
`creates a wireless network of which computing devices 120
`are members. As illustrated, a computing device can be any
`sort of device. For example, it may be a cellular phone, a
`desktop computer, a laptop computer, tablet computer, a
`receiver and speaker system, television, as well as a stereo
`system as shown in FIG. 1. There are, however, many other
`forms of devices that would constitute computing devices for
`the purposes of this invention. The invention is indifferent to
`the type of computing device. The computing devices are
`members of the wireless network because they are connected
`to the wireless access point 110 via network links 130.
`[0027]
`In one embodiment of the invention, network link
`130 is a wireless connection using a wireless communication
`protocol shared between the computing device 120 and the
`wireless access point 110. Given the popularity of wireless-
`enabled devices, this embodiment is common in practice. A
`typical wireless communication protocol is the family of
`IEEE 802.11 protocols. For example, a laptop computer may
`communicate with a wireless access point using IEEE 802.
`11n. In this scenario, therefore, the computing device 120 is a
`laptop and the network link 130 is the wireless connection
`using a IEEE 802.11n protocol between the laptop and the
`wireless access point 110.
`
`7
`
`
`
`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`In another embodiment of the invention, such a net-
`[0028]
`work link 130 includes a wired connection using a “wired”
`communication protocol shared between the computing
`device 120 and the wireless access point 110. A person with
`ordinary skill in the art would understand that a conventional
`wired network may comprise a desktop computer communi-
`cating with a wireless access point Via a Cat 5 cable and the
`Ethernet protocol. In this scenario, therefore, the computing
`device 120 is a desktop computer and the network link 130 is
`the wired connection using Ethernet over a Cat 5 cable con-
`necting the desktop computer and the wireless access point.
`[0029] As shown in FIG. 1, the wireless access point 110
`may be connected to the Internet 115. It may also be con-
`nected to some other external network. While such situations
`
`are highly foreseeable, the invention would still cover a situ-
`ation where the wireless access point 110 is not connected to
`the Internet 115 or an external network. If the wireless access
`
`point 110 is connected to an external network, the modem
`used for interfacing with that external network may be inte-
`grated into a single device with the wireless access point. It is
`also foreseeable, though, that the modem may be external to
`the device that contains the wireless access point, which
`would therefore necessitate some sort of network link
`
`between the wireless access point 110 and the external
`modem.
`
`[0030] As shown in FIG. 1, the computing devices 120 are
`connected to the wireless access point 110 via a network link
`130. However, this diagram is simplified and not intended to
`imply that the computing devices 120 must connect with the
`wireless access point 110 via a point-to-point network link
`130. It is known to persons with ordinary skill in the art that
`different communication protocols implement different com-
`munication methods. In particular, some communication pro-
`tocols implement point-to-point communications while oth-
`ers
`implement
`broadcast
`communications. Wireless
`communications typically implement broadcast communica-
`tions. Therefore, it is foreseen that the present invention can
`be implemented for wireless networks where the computing
`devices 120 communicate in a variety of methods, including
`in point-to-point fashion and broadcast fashion. Therefore,
`while FIG. 1 demonstrates network links 130 running directly
`from wireless access point 110 to each computing device 120,
`the present invention as well as this diagram are intended to
`also describe implementations in which the computing
`devices 120 are broadcasting their communications with the
`wireless access point 110 and thus are effectively transmitting
`to other computing devices 120, even though no such network
`links are shown.
`
`[0031] As shown in FIG. 1, an electronic device 140 is not
`a member of the wireless network because it is not commu-
`
`nicating with the wireless access point 110. For the purposes
`of this invention, the wireless device 140 is capable of a
`wireless connection to wireless access point 110. However,
`the electronic device 140 is not a member of the wireless
`
`network because it is not configured with the appropriate
`security settings that are being enforced by the wireless
`access point 110 against devices connected using a wireless
`connection.
`
`Such security settings may come in a variety of
`[0032]
`forms. Persons with ordinary skill in the art would realize that
`security settings are often implemented through an industry
`standard protocol, such as WEP, WPA, or WPA2. Regardless
`of the particular security settings being used, FIG. 1 depicts a
`situation where an electronic device 140 is otherwise capable
`
`of forming a wireless connection to a wireless access point
`110, but for certain pieces of information that the wireless
`access point 110 requires the electronic device 140 to provide
`in order to allow the electronic device 140 to join the network.
`[0033] As shown in FIG. 2, a wireless access point 210
`creates a wireless network having computing device 220 as a
`member. The computing device 220 is a member of the wire-
`less network because it is connected to the wireless access
`
`point 210 via network link 230. Similar to the network link in
`FIG. 1, the network link 230 in FIG. 2 can take numerous
`forms, including wired and wireless forms of connections.
`Further, there is an electronic device 240 that is not a member
`ofthe wireless network because it is not communicating with
`the wireless access point 210. As in FIG. 1, the wireless
`device 240 is capable of a wireless connection to wireless
`access point 210. However, the electronic device 240 is not a
`member of the wireless network because it is not configured
`with the appropriate security settings that are being enforced
`by the wireless access point 210 against devices connected
`using a wireless connection.
`[0034] As shown in FIG. 3, a wireless access point 210
`creates a wireless network of which a computing device 220
`is a member. The computing device 220 is a member of the
`wireless network because it is connected to the wireless
`
`access point 210 via network link 230. Similar to FIG. 1 and
`FIG. 2, the network link 230 in FIG. 3 can take numerous
`forms, including wired and wireless forms of connections.
`Further, electronic device 240 is not a member ofthe wireless
`network because it is not communicating with the wireless
`access point 210. As in FIG. 1 and FIG. 2, the wireless device
`240 in FIG. 3 is capable of a wireless connection to wireless
`access point 210. However, the electronic device 240 is not a
`member of the wireless network because it is not configured
`with the appropriate security settings that are being enforced
`by the wireless access point 210 against devices connected
`using a wireless connection.
`[0035] Also in FIG. 3 there is a triggering module 350
`located on the electronic device 240. This triggering module
`350 takes some form of input and puts the electronic device
`240 into configuration mode should certain conditions of that
`input be met.
`[0036] The input received by the triggering module 350 can
`take a variety of forms. In one embodiment, the electronic
`device 240 has a physical button on its outer case that a user
`is able to depress. When the button is depressed, the triggering
`module 350 places the electronic device 240 into configura-
`tion mode. In another embodiment, the electronic device has
`a touch screen input on which a virtual button is displayed.
`When the button is selected, the triggering module 350 puts
`the electronic device 240 into configuration mode. In another
`embodiment of the invention, the triggering module 350
`receives as input the set of wireless networks, as identified by
`their corresponding SSIDs, detected by the electronic device
`240. Upon detection of some pre-specified SSID, the trigger-
`ing module 350 places the electronic device 240 into configu-
`ration mode. In other implementations, the triggering module
`350 receives timing information, such as clock cycles or time
`of day. In such cases the triggering module 350 places the
`electronic device 240 into configuration mode at certain times
`of the day or at certain intervals (e.g., every five minutes).
`These triggering mechanisms are merely examples of certain
`possible triggering devices that may be used and are not
`meant to limit the scope of inputs that the triggering module
`350 can receive.
`
`8
`
`
`
`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`[0037] Based on receiving the proper input, the triggering
`module 350 places the electronic device into configuration
`mode which allows the electronic device 240 to interact with
`
`the computing device 220 as described below. Regardless of
`what form the interaction with the computing device 220
`takes, the configuration mode permits such interactions to
`take place.
`[0038]
`In one embodiment, when placed into configuration
`mode, the electronic device 240 transmits requests to form ad
`hoc wireless networks to computing devices within the range
`of its transmission. Such a computing device 220 can detect
`the ad hoc network requests and form a network link with the
`electronic device 240 as described below. In another instance
`
`when the triggering module 350 puts the electronic device
`240 into configuration mode, the electronic device 240 con-
`figures itself as a wireless access point with a pre-specified
`SSID and transmits its presence. In such a case, computing
`device 220, which is in range of electronic device 240 trans-
`missions, detects the pre-specified SSID and is thereby able to
`create a network link with the electronic device 240. In
`
`another instance when the triggering module 350 puts the
`electronic device 240 into configuration mode, the electronic
`device 240 communicates configuration requests to all
`devices to which it is connected. These other devices may be
`connected to the electronic device 240 by wireless connec-
`tions or by wired connections, such as over a USB or UART/
`ANALOG interface. When configuring the electronic device
`using a docked computing device, the need to explicitly trig-
`ger the electronic device into configuration mode may be
`avoided. The triggering may instead be effected by the user
`performing some action on the docked device (e.g., launching
`a configuration application).
`[0039]
`Still referring to FIG. 3, a setting module 360 is
`located on the computing device 220. This setting module 360
`detects the computing device 220 connection to the wireless
`access point 210 Via network link 230 and gathers settings
`pertaining to that connection. When wireless access point 210
`is enforcing security settings on connected wireless devices,
`such as computing device 220 ifit is connected wirelessly, the
`setting module gathers the security settings necessary for a
`device to connect to the wireless access point 210, such as a
`security protocol and/or a passphrase.
`[0040]
`In certain embodiments, the setting module 360
`gathers settings pertaining to the wireless access point 210 by
`querying the operating system or a network utility running on
`the computing device 220. In such a situation, the setting
`module 360 determines what information the computing
`device 220 used to connect to wireless access point 210 and
`stores that information for later configuration of the elec-
`tronic device 240. In this embodiment, it is likely that the
`network link 230 between the computing device 220 and the
`wireless access point 210 is a wireless network connection, in
`which case the setting module 360 gathers wireless connec-
`tion settings, as it is unlikely that the computing device 220
`will have such settings if it is not itself using a wireless
`connection to wireless access point 210.
`[0041]
`In another embodiment of the invention, the setting
`module 360 gathers settings pertaining to the wireless access
`point 210 by querying the wireless access point 210. This may
`take the form ofthe setting module 3 60 remotely querying the
`operating system or a network utility on the wireless access
`point 210 to determine which security settings are being used
`for wireless connections. This may also take the form of the
`setting module 360 communicating with a separate module
`
`running on the wireless access point 210 specifically provid-
`ing such information to requesting modules such as the set-
`ting module 360. The module providing such settings may, in
`some cases, require that a requesting module be running on a
`device that is already using proper security settings and
`thereby a member of the wireless network. In such a case, the
`settings gathering module stores the connection settings pro-
`vided by the wireless access point 210.
`[0042]
`In other configurations,
`the setting module 360
`gathers settings pertaining to the wireless access point 210 by
`querying a user of the computing device 220 for the informa-
`tion. This may take the form of creating and displaying a
`prompt on some user interface of the computing device 220
`thereby requesting the user to enter security settings which
`the setting module 360 then stores for subsequent user.
`[0043]
`In another configuration, the setting module 360
`acts as an interface by gathering settings pertaining to the
`wireless access point 210 by querying the user of the com-
`puting device 220 for the information. In this exemplary
`embodiment, network link 230 may be ineffectual or not
`present at all. However, the setting module 360 may gather
`settings for wireless access point 210 from a user of the
`computing device, so the computing device 220 does not
`actually need to be a member of the wireless network. This
`configuration could cover situations where the computing
`device is in fact a member of the wireless network, situations
`where the computing device 220 had never been a member of
`the wireless network, and situations where the computing
`device 220 had at one time been a member of the wireless
`
`network (but e.g., no longer has accurate settings for the
`wireless access point 210 or simply is no longer connected to
`the wireless access point).
`[0044] Also in FIG. 3, a networking module 370 is located
`on the computing device 220. This networking module 370
`detects electronic device 240 when that device is in configu-
`ration mode. The networking module 370 then establishes a
`network link 380 between the computing device 220 and the
`electronic device 240.
`
`In one embodiment of the invention, the networking
`[0045]
`module 370 detects that electronic device 240 is in configu-
`ration mode as it monitors the wireless network information
`
`received by the computing device 220 and notices a request
`for an ad hoc network by electronic device 240. In such a
`situation, networking module 370 causes computing device
`220 to accept the ad hoc network request, thereby establishing
`a network link 380 as a wireless connection between comput-
`ing device 220 and electronic device 240.
`[0046] The networking module 370 may also detect when
`electronic device 240 is in configuration mode as it monitors
`the wireless networks that computing device 220 detects, and
`notices that a wireless network with a pre-specified SSID is
`detected by computing device 220 as it is transmitted by
`electronic device 240. In such a situation, networking module
`370 may cause computing device 220 to request a connection
`to the wireless network created by electronic device 240.
`When electronic device 240 accepts the request to join the
`network, network link 380 has been established between the
`computing device 220 and electronic device 240 as a wireless
`network connection.
`
`In another embodiment of the invention, the net-
`[0047]
`working module 370 detects when the electronic device 240
`is in configuration mode as it monitors the messages received
`by the computing device 220 from devices to which it is
`connected, and notices a configuration request communi-
`
`9
`
`
`
`US 2011/0289229 A1
`
`Nov. 24, 2011
`
`cated from the electronic device 240 to which it is already
`connected. In such a situation, networking module 370 may
`not need to create the network link 380 as the devices are
`
`work utility operating thereon. These settings can also be
`obtained from the wireless access point that creates the wire-
`less network to which the electronic device will connect. The
`
`already connected. This embodiment, for instance, allows for
`a situation where the electronic device 240 is connected to the
`
`computing device 220 Via a USB interface, and the electronic
`device 240 communicates configuration requests to all
`devices to which it is connected, thereby communicating a
`configuration request to the computing device 220 which is
`detected by networking module 370.
`[0048] While the above mentioned embodiments are ideal
`techniques of forming network link 380 between computing
`device 220 and electronic device 240, it is foreseen that a
`variety of other network links can be formed, including wired
`links, that fall within the scope of this invention.
`[0049] Also in FIG. 3, a configuration module 390, located
`on the computing device 220, uses the connection settings
`information gathered by the settings gathering mo