Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PROVISIONING WIRELESS COMMUNICATION PROFILES IN A HEADLESS DEVICE
Document Type and Number:
WIPO Patent Application WO/2014/144126
Kind Code:
A4
Abstract:
Approaches, techniques, and mechanisms are disclosed for provisioning wireless device profiles of a wireless computing device. In this context, a wireless device profile generally may comprise one or more network and device settings including network identifiers, network security types, network keys, and other configuration information that enables a computing device to connect to a particular wireless computer network. According one embodiment, a computer-implemented method comprises establishing, with a first device, a first wireless connection of a first wireless connection type; receiving, from the first device via the first wireless connection, provisioning data for establishing, with a second device, a second wireless connection of a second wireless connection type that is different than the first wireless connection type; establishing, based on the provisioning data, the second wireless connection with the second device.

Inventors:
LLOYD KEVIN (US)
AIUTO CHRIS (US)
EIDELMAN STEVEN (US)
JACOBS BEN (US)
Application Number:
PCT/US2014/028409
Publication Date:
January 08, 2015
Filing Date:
March 14, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
WHISTLE LABS INC (US)
International Classes:
H04W8/00; H04L12/24; H04W76/02; A01K11/00; H04W84/12; H04W88/06
Attorney, Agent or Firm:
SELLARS, Eric L. et al. (Floor 12San Jose, California, US)
Download PDF:
Claims:
WO 2014/144126 AMENDED CLAIMS PCT/US2014/028409 received by the International Bureau on 15 November 2014 (15.1 1 .14)

What is claimed is:

1. A computer-implemented method, comprising:

establ ishing, with a first device, a first wireless connection of a first wireless connection type;

receiving, from the first device, a request to detect available wireless networks of the second wireless connection type; detecting available wireless networks of the second connection type; sending, to the first device, network identifiers for available networks of the second connection type;

receiving, from the first device via the first wireless connection, provisioning data that is based on the network identifiers for available networks and for establishing, with a second device, a second wireless connection of a second wireless connection type that is different than the first wireless connection type;

establishing, based on the provisioning data, the second wireless connection wit the second device;

wherein the method is performed using a tracking device that is different tha the first device and the second device;

wherein the method is performed by one or more computing devices.

2. The method of claim 1, further comprising: in response to receiving the provisioning data, closing the first wireless connection with the first device.

3. The method of claim 1, wherein the first wireless connection type is associated with a first radio frequency band and the second wireless connection, type is associated with a second radio frequency band, and wherein the first radio frequency band overlaps with the second radio frequency band.

4. The method of claim 1 , wherein the first wireless connection type is a

Bluetooth wireless connection and the second wireless connection type is a Wi-Fi wireless connection.

5. The method of claim 1 , wherein the provisioning data represents a wireless device profile comprising one or more of a wireless network name, a wireless network security type, and a wireless network key.

6. The method of claim 1 , wherein the first device is a mobi le device and the second device is a wireless access point.

7. The method of claim 1 , wherein the second wireless connection comprises one or more connection settings based on the provisioning data,

8. The method of claim 1 further comprising:

determining whether a connection is established with the second device;

in. response to determining that a. connection is not established with the second device, sending a message to the first device indicating that the connection is not established;

receiving, from the first device, second provisioning data for establishing the second wireless connection;

establishing, based on the second provisioning data, the second wireless connection with the second device.

9. The method of claim 1 , wherein the provisioning data is based on wireless connection information stored on the first device.

10. A computer- implemented method, comprising;

establishing, with a firs device, a first wireless connection of a first wireless connectio type;

sending, to a tracking device via a first wireless connection of a first wireless connection type, a request causing the tracking device to detect one or more wireless networks of a second wireless connection type that is different than the first wireless connection type;

receiving, from the tracking device, wireless network data comprising identifiers of one or more detected wireless networks of the second wireless connection type;

sending, to the tracking device, provisioning data that is based on the network identifiers for available networks and for establishing a second wireless connection with a particular wireless network of the one or more detected wireless networks;

26 establishing, based on the provisioning data, the second wireless connection with the second device;

wherein the method is performed by one or more computing devices.

1 1. The method of claim 10, wherein sending provisioning data causes the device to establish a wireless connectio of the second wireless type with the particular wireless network.

12. The method of Claim 10, further comprising:

generating a display of the identi fiers of the one or more detected wireless networks of the second wireless connection type;

receiving user input comprising, for a particular wireless network of the detected wireless networks, one or more of a wireless network security type and a wireless network key;

wherein the provisioning data is based on the user input.

13. The method of claim 10, wherein the first wireless connection type is associated with a first radio frequency band and the second wireless connection type is associated with a second radio frequency band, and wherein the first radio frequency band overlaps with the second radio frequency band.

14. The method of claim 10, wherein the first wireless connection type is a Bluetooth wireless connection and the second wireless connection type is a Wi-Fi wireless connection.

15. The method of claim 10, wherein the provisioning data represents a wireless device profile comprising one or more of a wireless network name, a wireless network security type, and a wireless network key.

16. The method of claim 10, wherein each of the identifiers comprises a service set identifier (SSID).

17. The method of claim 10, wherein the device is a tracking device attached to a non-human animal.

27

18. The method of claim 10, wherein the device comprises a sealed housing without any connector for a wired connection.

1 . A computer-implemented method, comprising:

establishing, by a tracking device comprising a sealed housing without any connector for a wired connection, a Bluetooth wireless connection with a second device;

using the tracking device, receiving a request to detect available wireless networks of a second wireless connection type, detecting available wireless networks of the second connection type, and sending, to the second device, network identifiers for available networks of the second connection type;

using the tracking device, receiving, from the second, device via the Bluetooth wireless connection, provisioning data that is based on the network identifiers for available networks and for establishing, with a wireless access point, a Wi-Fi wireless connection: in response to receiving the provisioning data, the tracking device establishing the Wi-Fi wireless connection with the wireless access point;

wherein the method is performed by one or more computing devices.

20. The method of claim 1 , wherein the provisioning data comprises one or more of a wireless network name, a wireless network security type, and a wireless network key.

21. A non-transitory computer-readable mediu storing one or more sequences of instructions, which when executed by one or more processors, cause the one or more processors to carry out the steps of;

establishing, with a first device, a first wireless connection of a first wireless connection type;

receiving, from the first device, a request to detect available wireless networks of the second wireless connection type; detecting available wireless networks of the second connection type; sending, to the first device, network identifiers for available networks of the second connection type;

receiving, from the first device via the first wireless connection, provisioning data that is based on the network identifiers for available networks and for establishing, with a second device, a second wireless connection of a second wireless connection type that is di fferent than the first wireless connection type;

establishing, based on the provisioning data, the second wireless connection with the second device

28 wherein the steps are performed using a tracking device that is different than the first device and the second device.

22. The non-transitory computer-readable medium of claim 21 , wherein the one or more instructions further comprise instructions which, when executed by one or more processors, cause the one or more processors to perform: in response to receiving the provisioning data, closing the first wireless connection with the first device.

23. The non-transitory computer-readable medium of claim 21 , wherein the first wireless connection type is associated with a first radio frequency band and the second wireless connection type is associated with a second radio Ixequency band, and wherein the first radio frequency band overlaps with the second radio frequency band.

24. The non-transitory computer-readable medium of claim [ 10]] 21 , wherein the first wireless connection type is a Bluetooth wireless connection and the second wireless connection, type is a Wi-Fi wireless connection.

25. The non-transitory computer-readable medium of claim |'[10J] 21 , wherein the provisioning data represents a wireless device pro file comprising one or more of a wireless network name, a wireless network security type, and a wireless network key.

26. The non-transitory computer-readable medium of claim 21 , wherein the first device is a mobile device and the second device is a wireless access point.

27. The non-transitory computer-readable medium of claim 21 , wherein the second wireless connection comprises one or more connection settings based on the provisioning data.

28. The non-transitory computer-readable medium of claim 21 , wherein the one or more instructions further comprise instructions which, when executed, by one or more processors, cause the one or more processors to perform:

determining whether a connection is established with the second device;

in response to determining that a connection is not established with the second device, sending a message to the first device indicating that the connection is not established;

29 receiving, from the first device, second provisioning data for establishing the second wireless connection;

establishing, based on the second provisioning data, the second wireless connection with the second device.

29. The non-transitory computer-readable medium of claim 21, wherein the provisioning data is based on wireless connection information stored on the first device.

30. A non-transitory computer-readable medium storing one or more sequences of instructions, which when executed by one or more processors, cause the one or more processors to cany out the steps of:

establishing, with a first device, a first wireless connection of a first wireless connection type;

sending, to a tracking device via a first wireless connection of a first wireless connectio type, a request causing the tracking device to detect one or more wireless networks of a second wireless connection type that is different than the first wireless connection type;

receiving, from the device, wireless network data comprising identifiers of one or more detected wireless networks of the second wireless connecti on type;

sending, to the device, provisioning data that is based on the network identifiers for available networks and for establishing a second wireless connection with a particular wireless network of the one or more detected wireless networks;

establishing, based on the provisioning data, the second wireless connection with the second device.

31. The non-transitory computer-readable medium of claim 30, wherein sending provisioning data causes the device to establish a wireless connection of the second wireless type with the particular wireless network.

32. The non-transitory computer-readable medium of claim 30, wherein the one or more instructions further comprise instructions which, when executed by one or more processors, cause the one or more processors to perform:

generating a display of the identi fiers of the one or more detected wireless networks of the second wireless connection type;

30 receiving user input comprising, for a particular wireless network of the detected wireless networks, one or more of a wireless network security type and a wireless network key;

wherein the provisioning data is based on the user input.

33. The non-transitory computer-readable medium of claim 30, wherein the first wireless connection type is associated with a first radio frequency band and the second wireless connection type is associated with a second radio irequency band, and wherein the first radio frequency band overlaps with the second radio frequency band.

34. The non-transitory computer-readable medium of claim 30, wherein the first wireless connection type is a Bluetooth wireless connection and the second wireless connection type is a Wi-Fi wireless connection.

35. The non-transitory computer-readable medium of claim 30, wherein the provisioning data represents a wireless device profile comprising one or more of a wireless network name, a wireless network security type, and a wireless network key.

36. The non-transitory computer-readable medium of claim 30, wherein each of the identifiers comprises a service set identifier (SSID).

37. The non-transitory computer-readable medium of claim 30, wherein the device is a tracking device attached to a non-human animal.

38. A non-transitory computer-readable medium storing one or more sequences of instructions, which when executed by one or more processors, cause the one or more processors to carry out the steps of:

using a tracking device, establishing, with a mobile computing device, a Bluetooth wireless connection;

using the tracking device, receiving a request to detect available WiFi wireless networks, detecting available WiFi wireless networks, and sending, to the mobile computing device, network identifiers for available WiFi networks;

the tracking device receiving, from the mobile computing device via the Bluetooth wireless connection, provisioning data that is based on the network identifiers for available networks and for establishing, with a wireless access point, a Wi-Fi wireless connection:

31 in response to receiving the provisioning data, the tracking device establishing the Wi-Fi wireless connection with the wireless access point.

39. A computer-implemented method, comprising:

establishing, by a tracking device comprising a sealed housing without any connector for a wired connection, a Bluetooth wireless connection with a second device;

using the tracking device, receiving a request to detect available wireless networks of a second wireless connection type, detecti ng a vailable wireless networks of the second connection type, and sending, to the second device, network identifiers for available networks of the second connection type;

using the tracking device, receiving, from the second device via the Bluetooth wireless connection, provisioning data that is based on the network identifiers for available networks and for establishing, with a wireless access point, a Wi-Fi wireless connection; in response to receiving the provisioning data, the tracking device establishing the Wi-Fi wireless connection with the wireless access point;

40. The non-transitory computer-readable medium of claim 38, wherein the provisioning data comprises one or more of a wireless network name, a wireless network security type, and a wireless network key.

32