| CPC H04L 41/0803 (2013.01) [G06F 3/0481 (2013.01); G06F 3/0482 (2013.01); G06F 3/04842 (2013.01); G06F 3/04847 (2013.01); H04L 12/28 (2013.01); H04L 12/2803 (2013.01); H04L 12/2807 (2013.01); H04L 12/2809 (2013.01); H04L 41/0809 (2013.01); H04L 41/22 (2013.01); H04L 63/10 (2013.01); H04L 63/20 (2013.01); H04L 65/60 (2013.01); H04L 67/02 (2013.01); H04L 67/10 (2013.01); H04L 67/141 (2013.01); H04W 12/04 (2013.01); H04W 12/50 (2021.01); H04L 2012/2841 (2013.01); H04L 2012/2849 (2013.01); H04L 41/28 (2013.01); H04L 63/065 (2013.01); H04L 63/0823 (2013.01); H04L 63/205 (2013.01); H04W 12/08 (2013.01); H04W 84/12 (2013.01)] | 20 Claims |

|
1. A first computing device comprising:
a user interface;
a network interface;
at least one processor;
a non-transitory computer-readable medium; and
program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor such that the first computing device is configured to:
while connected to a secure wireless network configured to exchange digital data packets that is defined by one or more network devices:
receive, via software installed on the first computing device having functionality for controlling one or more second computing devices, input indicating a user selection of a second computing device to be set up for operation on the secure wireless network; and
receive a first set of one or more messages collectively indicating that the second computing device is available for setup;
after receiving the input and receiving the first set of one or more messages, transmit a response to the first set of one or more messages that facilitates establishing an initial wireless communication path with the second computing device, wherein the initial wireless communication path with the second computing device does not traverse any of the one or more network devices;
transmit, to the second computing device via the initial wireless communication path, a second set of one or more messages collectively comprising security information for the secure wireless network;
after transmitting the second set of one or more messages collectively comprising the security information, detect an indication that the second computing device has connected to the secure wireless network; and
after detecting the indication, transition from communicating with the second computing device via the initial wireless communication path to communicating with the second computing device via the secure wireless network.
|