US 12,224,898 B2
Wireless device connection
Nicholas A. J. Millington, Santa Barbara, CA (US); and Paul V. Hainsworth, Foxboro, MA (US)
Assigned to Sonos, Inc., Goleta, CA (US)
Filed by Sonos, Inc., Santa Barbara, CA (US)
Filed on Feb. 16, 2024, as Appl. No. 18/444,313.
Application 18/444,313 is a continuation of application No. 18/139,323, filed on Apr. 25, 2023, granted, now 11,909,588.
Application 18/139,323 is a continuation of application No. 17/888,313, filed on Aug. 15, 2022, granted, now 11,894,975, issued on Feb. 6, 2024.
Application 17/888,313 is a continuation of application No. 17/162,824, filed on Jan. 29, 2021, granted, now 11,456,928, issued on Sep. 27, 2022.
Application 17/162,824 is a continuation of application No. 15/091,113, filed on Apr. 5, 2016, granted, now 10,979,310, issued on Apr. 13, 2021.
Application 15/091,113 is a continuation of application No. 14/486,667, filed on Sep. 15, 2014, granted, now 9,866,447, issued on Jan. 9, 2018.
Application 14/486,667 is a continuation of application No. 13/618,829, filed on Sep. 14, 2012, granted, now 8,868,698, issued on Oct. 21, 2014.
Application 13/618,829 is a continuation of application No. 11/147,116, filed on Jun. 6, 2005, granted, now 8,326,951, issued on Dec. 4, 2012.
Claims priority of provisional application 60/577,284, filed on Jun. 5, 2004.
Prior Publication US 2024/0314023 A1, Sep. 19, 2024
Int. Cl. H04L 12/24 (2006.01); G06F 3/0481 (2022.01); G06F 3/0482 (2013.01); G06F 3/04842 (2022.01); G06F 3/04847 (2022.01); H04L 9/40 (2022.01); H04L 12/28 (2006.01); H04L 41/0803 (2022.01); H04L 41/0806 (2022.01); H04L 41/22 (2022.01); H04L 65/60 (2022.01); H04L 67/02 (2022.01); H04L 67/10 (2022.01); H04L 67/141 (2022.01); H04W 12/04 (2021.01); H04W 12/50 (2021.01); H04L 41/28 (2022.01); H04W 12/08 (2021.01); H04W 84/12 (2009.01)
CPC H04L 41/0803 (2013.01) [G06F 3/0481 (2013.01); G06F 3/0482 (2013.01); G06F 3/04842 (2013.01); G06F 3/04847 (2013.01); H04L 12/28 (2013.01); H04L 12/2803 (2013.01); H04L 12/2807 (2013.01); H04L 12/2809 (2013.01); H04L 41/0809 (2013.01); H04L 41/22 (2013.01); H04L 63/10 (2013.01); H04L 63/20 (2013.01); H04L 65/60 (2013.01); H04L 67/02 (2013.01); H04L 67/10 (2013.01); H04L 67/141 (2013.01); H04W 12/04 (2013.01); H04W 12/50 (2021.01); H04L 2012/2841 (2013.01); H04L 2012/2849 (2013.01); H04L 41/28 (2013.01); H04L 63/065 (2013.01); H04L 63/0823 (2013.01); H04L 63/205 (2013.01); H04W 12/08 (2013.01); H04W 84/12 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A first computing device comprising:
a user interface;
a network interface;
at least one processor;
a non-transitory computer-readable medium; and
program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor such that the first computing device is configured to:
while connected to a secure wireless network configured to exchange digital data packets that is defined by one or more network devices:
receive, via software installed on the first computing device having functionality for controlling one or more second computing devices, input indicating a user selection of a second computing device to be set up for operation on the secure wireless network; and
receive a first set of one or more messages collectively indicating that the second computing device is available for setup;
after receiving the input and receiving the first set of one or more messages, transmit a response to the first set of one or more messages that facilitates establishing an initial wireless communication path with the second computing device, wherein the initial wireless communication path with the second computing device does not traverse any of the one or more network devices;
transmit, to the second computing device via the initial wireless communication path, a second set of one or more messages collectively comprising security information for the secure wireless network;
after transmitting the second set of one or more messages collectively comprising the security information, detect an indication that the second computing device has connected to the secure wireless network; and
after detecting the indication, transition from communicating with the second computing device via the initial wireless communication path to communicating with the second computing device via the secure wireless network.