The present invention relates generally to the configuration of wireless networks and the configuration of electronic devices to connect to wireless networks, especially when those electronic devices have limited user interfaces and/or no display screen.
Establishing a basic at-home wireless network between traditional computing devices (e.g., desktop and laptop computers) has become very easy. For example, next-generation customer-premises equipment for broadband access (e.g., cable and DSL modems provided by Internet service providers) may directly support wireless networks. Alternatively, a user may connect a wireless access point (“WAP”) to a broadband modem to create a wireless home network.
A simple, unsecured wireless network, however, may permit anyone to snoop on the conversations between the devices and/or gain access to the network and the information being exchanged. To avoid these unwanted intrusions, access points may be configured to use wireless security. A secure wireless network is created by sharing confidential information among the various devices and the WAP. The WAP may then be used for the establishment of a wireless connection.
Over the years, various wireless security schemes have evolved, such as Wired Equivalent Privacy (“WEP”), Wi-Fi Protected Access (“WPA”), and WPA2. These schemes often involve complex, hexadecimal “keys” or passwords as a part of the confidential information that is shared among the devices. The process of securing a wireless network involves configuring the router for the desired type of security and then providing each wireless client with the settings and passwords to be used (i.e., the ones associated with the type of security scheme used in the router). This process may be tedious and challenging for an average home user, especially when the device requiring wireless configuration settings has limited input and display capabilities, such as a digital media player. As demand for networked and internet-based media rises, however, more next-generation media-rendering devices support networking—preferably wireless networking, given its ease and convenience of use.
To address the above-mentioned problem, some efforts have been made to simplify wireless network security. For example, the Wi-Fi Alliance promotes a set of standards known as Wi-Fi Protected Setup (“WPS”) for the purpose of simplifying wireless configuration. Additionally, newer versions of Microsoft Windows support a technology called Windows Connect Now (“WCN”) that supports storing configuration settings on a portable storage device, such as a USB flash memory, and transferring the settings to a device that needs to be configured. However, this does not completely solve the problems explained above, as most access points currently deployed still do not support WPS. Therefore, WPS is rarely an adequate solution. Further, the devices that need to be configured may not support interfaces for portable/removable storage media as required by WCN. Therefore, WCN is rarely an adequate solution.
There is, therefore, a remaining need in the field to be able to setup devices to connect to a wireless network with ease, especially when those devices have limited user interfaces.
Accordingly, techniques and supporting systems and methods as described herein address the above-described problems, as well as other issues facing users of wireless networks. In order for users to fully realize the benefits of wireless networks and the benefits of a growing number of wireless-enabled devices, it must become simpler to configure devices to connect to wireless networks, regardless of the type of device and user interface present on the device.
Therefore, in one aspect of the present invention, a system facilitates the addition of an electronic device to a wireless network. The system includes a module for triggering the electronic device to enter a configuration mode and a settings module for gathering settings pertaining to connecting a device to the wireless network. The settings are gathered from a computing device that may already be a member of the wireless network, however, it is also possible that the computing device is not a member of the wireless network. For instance, it is possible that the computing device was at one point a member of the wireless network but is no longer a member, or else that the computing device simply has the wireless network settings without having ever been a member of the wireless network. It is also possible that the computing device acts as an interface to retrieve the wireless settings without wireless capabilities. In this case, it is possible that the computing device is not even capable of being a member of the wireless network.
The system also includes a module for connecting the computing device to the electronic device using a network link. The system also includes a module for configuring the electronic device to connect to the wireless network using the gathered settings and the network link.
In certain embodiments, the system includes a wireless network using an IEEE 802.11 protocol for communication, and, in some cases the wireless network is secured using WEP, WPA, or WPA2. The computing device may include a display screen, whereas in some implementations the electronic device is devoid of a display screen. In some embodiments, the triggering module is triggered based on input from a user interacting with the electronic device.
In further embodiments, while in configuration mode the electronic device transmits requests for ad hoc networks to all computing devices within transmission range, and, in some cases, establishes itself as a wireless access point and transmits its presence as well as a pre-specified SSID indicating that the electronic device is in configuration mode.
In some implementations, the settings module gathers the connection settings from the computing device on which it is located, from the wireless access point, and/or from a user of the computing device.
In another aspect of the present invention, a computer-implemented method facilitates the addition of an electronic device to a wireless network. The method includes triggering the electronic device to enter a configuration mode and gathering settings pertaining to connecting a device to the wireless network from a computing device. The method also includes connecting the computing device to the electronic device using a network link and configuring the electronic device to connect to the wireless network using the settings and the network link.
In certain embodiments, the wireless network uses an IEEE 802.11 protocol for communication, and in some cases the network may also be secured using WEP, WPA, or WPA2.
The trigger to enter configuration mode may, in some cases, be based on input from a user interacting with the electronic device. While in configuration mode, the electronic device may transmit requests for ad hoc networks to all computing devices within transmission range. In certain implementations, the electronic device establishes itself as a wireless access point and transmits its presence as well as a pre-specified SSID indicating that the electronic device is in configuration mode.
The connection settings may be gathered from a computing device other than the wireless access point that created the wireless network, from the wireless access point that created the wireless network, and/or from a user via an input device on/with the computing device.
It is to be understood that both the foregoing general description of the invention and the following detailed descriptions are exemplary, but are not restrictive, of the invention.
The foregoing and other objects, features, and advantages of the present invention, as well as the invention itself, will be more fully understood from the following description of various embodiments, when read together with the accompanying drawings, in which:
The detailed description set forth below, in connection with the associated drawings, is intended to provide a description of the presently-preferred embodiments of the invention, and is in no way intended to limit the forms in which the present invention may be construed or used. Accordingly, it is well-understood by those with ordinary skill in the art that the same or equivalent functions may be accomplished by different embodiments that are also intended to be encompassed within the spirit and scope of the present invention. Moreover, with respect to particular method steps, it is readily understood by those with skill in the art that the steps may be performed in any order, and are not limited to any particular order unless expressly stated or otherwise inherent within the steps.
The systems and methods described herein facilitate the joining of an electronic device to a wireless network using a computing device that is already a member of the wireless network. The term “wireless network” is used herein to describe a set of networked devices that exchange data through a device that functions as a wireless access point. While a wireless network may have devices as members of the network that are not connected wirelessly, but rather through physical wire, a wireless network when used herein indicates that at least one member of the network is a wireless access point, thereby enabling devices to join using wireless connectivity should such a wireless-enabled device be present. When used herein, the terms “join” and “connect” and “member of” in relation to a wireless network indicate that a device is capable of communicating with at least the wireless access point of the wireless network. As noted above, a device that is a member of, connects to, or joins a wireless network need not actually effectuate communication with the wireless access point using wireless communication. However, all three of these terms when used herein indicate that such a device is sufficiently configured to comply with any security settings that the wireless access point may be enforcing. The terms “computing device” and “electronic device” are used very generally herein and describe any device with an electronic circuit and capable of executing instructions. The terms “computing device” and “electronic device” will typically be used in contradistinction to denote respectively a device presently a member of the wireless network and a device not presently a member of the wireless network. Notably while a computing device may be a member of the wireless network using a wireless and/or wired connection, and while the electronic device may be capable of a wired connection in addition to a wireless connection, an “electronic device” as used herein must be capable at least of a wireless connection, as the object of the invention is generally to connect the electronic device to the wireless network.
As shown in
In one embodiment of the invention, network link 130 is a wireless connection using a wireless communication protocol shared between the computing device 120 and the wireless access point 110. Given the popularity of wireless-enabled devices, this embodiment is common in practice. A typical wireless communication protocol is the family of IEEE 802.11 protocols. For example, a laptop computer may communicate with a wireless access point using IEEE 802.11n. In this scenario, therefore, the computing device 120 is a laptop and the network link 130 is the wireless connection using a IEEE 802.11n protocol between the laptop and the wireless access point 110.
In another embodiment of the invention, such a network link 130 includes a wired connection using a “wired” communication protocol shared between the computing device 120 and the wireless access point 110. A person with ordinary skill in the art would understand that a conventional wired network may comprise a desktop computer communicating with a wireless access point via a Cat 5 cable and the Ethernet protocol. In this scenario, therefore, the computing device 120 is a desktop computer and the network link 130 is the wired connection using Ethernet over a Cat 5 cable connecting the desktop computer and the wireless access point.
As shown in
As shown in
As shown in
Such security settings may come in a variety of forms. Persons with ordinary skill in the art would realize that security settings are often implemented through an industry standard protocol, such as WEP, WPA, or WPA2. Regardless of the particular security settings being used,
As shown in
As shown in
Also in
The input received by the triggering module 350 can take a variety of forms. In one embodiment, the electronic device 240 has a physical button on its outer case that a user is able to depress. When the button is depressed, the triggering module 350 places the electronic device 240 into configuration mode. In another embodiment, the electronic device has a touch screen input on which a virtual button is displayed. When the button is selected, the triggering module 350 puts the electronic device 240 into configuration mode. In another embodiment of the invention, the triggering module 350 receives as input the set of wireless networks, as identified by their corresponding SSIDs, detected by the electronic device 240. Upon detection of some pre-specified SSID, the triggering module 350 places the electronic device 240 into configuration mode. In other implementations, the triggering module 350 receives timing information, such as clock cycles or time of day. In such cases the triggering module 350 places the electronic device 240 into configuration mode at certain times of the day or at certain intervals (e.g., every five minutes). These triggering mechanisms are merely examples of certain possible triggering devices that may be used and are not meant to limit the scope of inputs that the triggering module 350 can receive.
Based on receiving the proper input, the triggering module 350 places the electronic device into configuration mode which allows the electronic device 240 to interact with the computing device 220 as described below. Regardless of what form the interaction with the computing device 220 takes, the configuration mode permits such interactions to take place.
In one embodiment, when placed into configuration mode, the electronic device 240 transmits requests to form ad hoc wireless networks to computing devices within the range of its transmission. Such a computing device 220 can detect the ad hoc network requests and form a network link with the electronic device 240 as described below. In another instance when the triggering module 350 puts the electronic device 240 into configuration mode, the electronic device 240 configures itself as a wireless access point with a pre-specified SSID and transmits its presence. In such a case, computing device 220, which is in range of electronic device 240 transmissions, detects the pre-specified SSID and is thereby able to create a network link with the electronic device 240. In another instance when the triggering module 350 puts the electronic device 240 into configuration mode, the electronic device 240 communicates configuration requests to all devices to which it is connected. These other devices may be connected to the electronic device 240 by wireless connections or by wired connections, such as over a USB or UART/ANALOG interface. When configuring the electronic device using a docked computing device, the need to explicitly trigger the electronic device into configuration mode may be avoided. The triggering may instead be effected by the user performing some action on the docked device (e.g., launching a configuration application).
Still referring to
In certain embodiments, the setting module 360 gathers settings pertaining to the wireless access point 210 by querying the operating system or a network utility running on the computing device 220. In such a situation, the setting module 360 determines what information the computing device 220 used to connect to wireless access point 210 and stores that information for later configuration of the electronic device 240. In this embodiment, it is likely that the network link 230 between the computing device 220 and the wireless access point 210 is a wireless network connection, in which case the setting module 360 gathers wireless connection settings, as it is unlikely that the computing device 220 will have such settings if it is not itself using a wireless connection to wireless access point 210.
In another embodiment of the invention, the setting module 360 gathers settings pertaining to the wireless access point 210 by querying the wireless access point 210. This may take the form of the setting module 360 remotely querying the operating system or a network utility on the wireless access point 210 to determine which security settings are being used for wireless connections. This may also take the form of the setting module 360 communicating with a separate module running on the wireless access point 210 specifically providing such information to requesting modules such as the setting module 360. The module providing such settings may, in some cases, require that a requesting module be running on a device that is already using proper security settings and thereby a member of the wireless network. In such a case, the settings gathering module stores the connection settings provided by the wireless access point 210.
In other configurations, the setting module 360 gathers settings pertaining to the wireless access point 210 by querying a user of the computing device 220 for the information. This may take the form of creating and displaying a prompt on some user interface of the computing device 220 thereby requesting the user to enter security settings which the setting module 360 then stores for subsequent user.
In another configuration, the setting module 360 acts as an interface by gathering settings pertaining to the wireless access point 210 by querying the user of the computing device 220 for the information. In this exemplary embodiment, network link 230 may be ineffectual or not present at all. However, the setting module 360 may gather settings for wireless access point 210 from a user of the computing device, so the computing device 220 does not actually need to be a member of the wireless network. This configuration could cover situations where the computing device is in fact a member of the wireless network, situations where the computing device 220 had never been a member of the wireless network, and situations where the computing device 220 had at one time been a member of the wireless network (but e.g., no longer has accurate settings for the wireless access point 210 or simply is no longer connected to the wireless access point).
Also in
In one embodiment of the invention, the networking module 370 detects that electronic device 240 is in configuration mode as it monitors the wireless network information received by the computing device 220 and notices a request for an ad hoc network by electronic device 240. In such a situation, networking module 370 causes computing device 220 to accept the ad hoc network request, thereby establishing a network link 380 as a wireless connection between computing device 220 and electronic device 240.
The networking module 370 may also detect when electronic device 240 is in configuration mode as it monitors the wireless networks that computing device 220 detects, and notices that a wireless network with a pre-specified SSID is detected by computing device 220 as it is transmitted by electronic device 240. In such a situation, networking module 370 may cause computing device 220 to request a connection to the wireless network created by electronic device 240. When electronic device 240 accepts the request to join the network, network link 380 has been established between the computing device 220 and electronic device 240 as a wireless network connection.
In another embodiment of the invention, the networking module 370 detects when the electronic device 240 is in configuration mode as it monitors the messages received by the computing device 220 from devices to which it is connected, and notices a configuration request communicated from the electronic device 240 to which it is already connected. In such a situation, networking module 370 may not need to create the network link 380 as the devices are already connected. This embodiment, for instance, allows for a situation where the electronic device 240 is connected to the computing device 220 via a USB interface, and the electronic device 240 communicates configuration requests to all devices to which it is connected, thereby communicating a configuration request to the computing device 220 which is detected by networking module 370.
While the above mentioned embodiments are ideal techniques of forming network link 380 between computing device 220 and electronic device 240, it is foreseen that a variety of other network links can be formed, including wired links, that fall within the scope of this invention.
Also in
In certain cases, the configuration module 390 communicates across network link 380 with the operating system or a network utility on electronic device 240. In such a situation, configuration module 390 provides the connection settings information gathered by the module 360 to the operating system or network utility thereby causing the operating system or network utility to properly store the connection settings. The configuration module 390 then terminates network link 380 or prompts the networking module 370 to do so given that the electronic device 240 is now properly configured and able to join the wireless network created by wireless access point 210.
In another embodiment, the configuration module 390 communicates across network link 380 with a module running on the electronic device 240 that receives configuration information. In such a situation, configuration module 390 provides the connection settings information gathered by the setting module 360 to the configuration information receiving module running on electronic device 240, and that module then properly stores the connection information on the electronic device 240. The configuration information receiving module, the configuration module 390, or the networking module 370 then terminates network link 380, given that the electronic device 240 is now properly configured and able to join the wireless network created by wireless access point 210. The configuration information receiving module may be implemented in a variety of technologies, such as a web service or some other web interface or a proxy agent.
At step S420, connection settings are gathered for the wireless network to which the electronic device is to join. While these settings may be gathered in a variety of fashions, it is foreseen that these settings will be available on the computing device already connected to the wireless network and that, therefore, the connection settings can be gathered from that computing device, namely its operating system or a network utility operating thereon. These settings can also be obtained from the wireless access point that creates the wireless network to which the electronic device will connect. The settings may alternatively be gathered from a user via an input device made available on the computing device, especially when the computing device is not already a member of the wireless access point. The connection settings may be gathered from a variety of other locations, but must be gathered so as to comprise the security settings necessary for devices to connect to the wireless network. It is foreseen, therefore, that among the connection settings gathered, information such as security protocol and passphrase are likely to be gathered. Once gathered, the connection settings are stored in a location suitable to persist them until communication is established with the electronic device.
Step S430 entails triggering the electronic device which is not a member of the wireless network to enter a configuration mode. While the electronic device may be triggered in a variety of fashions, some suitable fashions foreseen in the present invention include a physical button on the electronic device, a virtual button on a touch-screen display on the electronic device, a logical check of SSIDs detected within range of the electronic device, or a timing rule for the electronic device. Once triggered, the electronic device enters configuration mode, which indicates that the electronic device is capable of communicating with a computing device to receive configuration by that computing device.
In one embodiment of the invention, entering configuration mode may cause the electronic device to send out ad hoc network requests to all computing devices within range. The configuration mode may also cause the electronic device to establish itself as a wireless access point and transmit its presence with a pre-specified SSID to all computing devices within range. Such an SSID would be understood by both the electronic device and the computing device to indicate that the electronic device is attempting to receive wireless network configuration settings from a computing device already connected to the wireless network. The configuration mode may also cause the electronic device to communicate configuration requests to devices to which it is already connected via wireless and wired connections.
When step S430 terminates, control passes to step S440, in which the computing device is connected to the electronic device. In one embodiment of the invention, the computing device receives the ad hoc network request transmitted by the electronic device in step S430 and accepts the request, thereby establishing a wireless network connection to the electronic device. In another embodiment of the invention, the computing device receives the SSID transmission from the electronic device acting as a wireless access point as performed in step S430. The computing device requests to connect to the electronic device's wireless network, which the electronic device accepts, thereby establishing a wireless network connection between the two devices. In another embodiment, the electronic device and computing device are already connected, and the computing device receives the configuration request via that existing connection. In this embodiment, the electronic device and computing device may not create an additional network link. It is foreseen that other embodiments of the invention comprise creating other forms of wired and wireless network connections between the computing device and the electronic device in step S440.
When both step S420 and step S440 terminate, control passes to step S450, during which the electronic device is configured with connection settings for the wireless network. In one embodiment of the invention, a process running on the computing device retrieves the connection information stored during step S420 and communicates that information to a process running on the electronic device. The process on the electronic device then stores the connection information on the electronic device by communicating with the electronic device's operating system or a network utility running thereon. The electronic device is thereby properly configured to connect to the wireless network and either the computing device or the electronic device may terminate the network connection created between them as it is no longer needed.
When step S450 terminates, the electronic device is properly configured and can join the wireless network. Control passes to step S460 wherein the process ends.
In various embodiments the modules described above may be provided as either software, hardware, or some combination thereof. For example, the system may be implemented on one or more server-class computers, such as a PC having a CPU board containing one or more processors such as those manufactured by Intel Corporation of Santa Clara, Calif., Motorola Corporation of Schaumburg, Ill., and/or Advanced Micro Devices, Inc., of Sunnyvale, Calif. The processor may also include a main memory unit for storing programs and/or data relating to the methods described above. The memory may include random access memory (RAM), read only memory (ROM), and/or FLASH memory residing on commonly available hardware such as one or more application specific integrated circuits (ASIC), field programmable gate arrays (FPGA), electrically erasable programmable read-only memories (EEPROM), programmable read-only memories (PROM), programmable logic devices (PLD), or read-only memory devices (ROM). In some embodiments, the programs may be provided using external RAM and/or ROM such as optical disks, magnetic disks, as well as other commonly storage devices.
For embodiments in which the invention is provided as a software program, the program may be written in any one of a number of high level languages such as FORTRAN, PASCAL, JAVA, C, C++, C#, LISP, PERL, BASIC or any suitable programming language. Additionally, the software can be implemented as application specific integrated circuitry.
As described above, the foregoing discussion discloses and describes merely exemplary embodiments of the present invention. As will be understood by those skilled in the art, the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Accordingly, the disclosure of the present invention is intended to be illustrative, but not limiting of the scope of the invention, as well as other claims. The disclosure, including any readily discernible variants of the teachings herein, define, in part, the scope of the foregoing claim terminology.
This application claims priority to and the benefit of U.S. provisional patent application with Ser. No. 61/331,459 filed on May 5, 2010, entitled “WiFi Setup Configuration.”
Number | Date | Country | |
---|---|---|---|
61331459 | May 2010 | US |