CPC H04L 41/0803 (2013.01) [G06F 3/0481 (2013.01); G06F 3/0482 (2013.01); G06F 3/04842 (2013.01); G06F 3/04847 (2013.01); H04L 12/28 (2013.01); H04L 12/2803 (2013.01); H04L 12/2807 (2013.01); H04L 12/2809 (2013.01); H04L 41/0809 (2013.01); H04L 41/22 (2013.01); H04L 63/10 (2013.01); H04L 63/20 (2013.01); H04L 65/60 (2013.01); H04L 67/02 (2013.01); H04L 67/10 (2013.01); H04L 67/141 (2013.01); H04W 12/04 (2013.01); H04W 12/50 (2021.01); H04L 41/28 (2013.01); H04L 63/065 (2013.01); H04L 63/0823 (2013.01); H04L 63/205 (2013.01); H04L 2012/2841 (2013.01); H04L 2012/2849 (2013.01); H04W 12/08 (2013.01); H04W 84/12 (2013.01)] | 20 Claims |
1. A first computing device comprising:
a network interface that is configured to provide an interconnection with at least one data network;
at least one processor;
a non-transitory computer-readable medium; and
program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor such that the first computing device is configured to:
detect a triggering event that causes the first computing device to enter a setup mode in which the first computing device transmits a first set of one or more messages collectively indicating that the first computing device is available for setup;
while in the setup mode, establish an initial wireless communication path with a second computing device that is installed with software for controlling the first computing device;
process a second set of one or more messages received from the second computing device via the initial wireless communication path, wherein the second set of one or more messages collectively comprises security information for a secure wireless network configured to exchange digital data packets that is defined by one or more network devices, and wherein the initial wireless communication path with the second computing device does not traverse any of the one or more network devices;
use the security information to connect to the secure wireless network; and
transition from communicating with the second computing device via the initial wireless communication path to communicating with the second computing device via the secure wireless network.
|