Facilitating Network Login

ABSTRACT

A system and method for transmitting user credentials to another device. According to some embodiments, a method is described of receiving into a first portable electronic device a set of credentials from a user, the set of credentials to include a WLAN SSID and a network key, the set of credentials to allow the first device to connect to the WLAN. The set of credentials is used to connect the first device to the WLAN. The first device creates a message for wireless transmission, the message includes the set of credentials for accessing the WLAN and is adapted to be delivered to a second device. Finally, the first device transmits the message over the air, wherein the message is addressed to the second device. The second device receives the message and uses the credentials in the message to connect to the WLAN. Other embodiments are also described.

This application is a continuation of U.S. application Ser. No.14/963,042, filed Dec. 8, 2015, which is a divisional application of theearlier filing date of U.S. application Ser. No. 13/534,936 filed Jun.27, 2012.

FIELD

Embodiments of the present invention relate generally to portableelectronic devices capable of accessing wireless local area networks(WLANs).

BACKGROUND

The ubiquitous Internet is typically accessible via a modem through anInternet service provider. For the typical user to access the Interneton a home computer, the user's home computer is conventionally coupledto a router and the router is coupled to the modem. The router passesdata between a user's computer and the modem; accordingly, a typicaluser can connect to the Internet.

More commonly, individuals desire to connect to the Internet wirelesslyso that their devices are not physically connected to a router. Torealize this, a wireless network can be created that allows a user'sdevice to wirelessly connect to a router through a wireless accesspoint. Thus, the wireless access point creates a wireless network (e.g.,wireless local area network) for accessing the Internet.

Often times, larger establishments (e.g., hotels, restaurants, etc.)accommodating a number of diverse patrons provide those patrons withInternet access through a wireless network. However, such establishmentstypically wish to limit wireless access to their own patrons whilerestricting access from freeloaders. Accordingly, many of these wirelessnetworks implement some method of security (e.g., wired equivalentprivacy) that renders the network inaccessible without a password ornetwork key, for example. In this way, a proprietor of the establishmentproviding the wireless network may supply a password or network key tothose patrons of the establishment. A patron receiving the password ornetwork key can then access the establishment's wireless network, andthereby access the Internet, by using the password or network key at theuser's device. For example, a user may have a laptop computer at whichthe user selects the establishment's wireless network and subsequentlytypes in the provided network key. A similar process may be performed byusers of smart phones, tablet computers, and other similar devicescapable of wirelessly accessing the Internet.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments of the invention are illustrated by way of example andnot by way of limitation in the figures of the accompanying drawings inwhich like references indicate similar elements. It should be noted thatreferences to “an” or “one” embodiment of the invention in thisdisclosure are not necessarily to the same embodiment, and they mean atleast one.

FIG. 1 is a block diagram illustrating wirelessly facilitating networklogin for commonly owned devices according to one embodiment of theinvention.

FIG. 2 is a flow diagram illustrating one embodiment of the invention.

FIG. 3 is a flow diagram illustrating one embodiment of the invention.

FIG. 4 is a flow diagram illustrating one embodiment of the invention.

FIG. 5 is block diagram illustrating wirelessly facilitating networklogin for commonly owned devices through message transmission.

FIG. 6a is a block diagram of an example message data structureaccording to one embodiment of the invention.

FIG. 6b is a block diagram of an example message according to anotherembodiment of the invention.

FIG. 7 is a functional block diagram of an initiating portableelectronic device to facilitate network login for a supplementalportable electronic device according to one embodiment of the invention.

FIG. 8 is a functional block diagram of a supplemental portableelectronic device to receive network login facilitation from aninitiating portable electronic device according to one embodiment of theinvention.

FIG. 9 is a block diagram illustrating a display at the initiatingportable electronic device according to one embodiment of the invention.

FIG. 10a is a block diagram illustrating a display at the initiatingportable electronic device according to one embodiment of the invention.

FIG. 10b is a block diagram illustrating a display at the initiatingportable electronic device according to one embodiment of the invention.

FIG. 11 is a flow diagram illustrating one embodiment of the invention.

FIG. 12 is a block diagram illustrating displays at the initiatingportable electronic device and the supplemental portable electronicdevice according to one embodiment of the invention.

FIG. 13 is a flow diagram illustrating one embodiment of the invention.

FIG. 14 is a block diagram illustrating wirelessly facilitatingconnecting to an auxiliary device by commonly owned devices according toone embodiment of the invention.

DETAILED DESCRIPTION

Several embodiments of the invention with reference to the appendeddrawings are now explained. The following description and drawings areillustrative of the invention and are not to be construed as limitingthe invention. Numerous specific details are described to provide athorough understanding of various embodiments of the present invention.However, in certain instances, well-known or conventional details arenot described in order to provide a concise discussion of embodiments ofthe present invention.

An embodiment of this invention is directed to allowing multiplecommonly owned portable devices to access a wireless network, byreceiving the network's credentials as input at one commonly owneddevice and that device subsequently transmitting the network credentialsto a second commonly owned device. Embodiments described herein refer toa wireless local area network (e.g., in accordance with IEEE 802.11,Wi-Fi), but it is understood that embodiments described in thisSpecification are applicable to analogous wireless networks havingdifferent coverage areas such as Worldwide Interoperability forMicrowave Access (WiMax) networks. In the simplest embodiment, oneinitiating portable electronic device (e.g., a Smartphone or tabletcomputer) receives the WLAN credentials via user input. This initiatingdevice then accesses the WLAN, using those credentials. Subsequently, aprocess running in the initiating device completes preparation of amessage that includes the WLAN credentials. This “credentials message”is transmitted by the process, preferably over the air, to at least oneother commonly owned device (e.g., a laptop) referred to here as asupplemental portable electronic device. Transmission can occur througha wireless personal area network (WPAN), a cellular network, or acombination of a WLAN and a cellular network. It is understood thattransmission between the two commonly owned devices can be realizedthrough any type between the two devices, such as through apoint-to-point network (e.g., near field communication network). Aprocess running in the supplemental device obtains the received messageand then extracts the network credentials from the received message, anduses the extracted credentials to identify or locate and then access theWLAN to which the initiating device has connected. This makes it easierfor the user of multiple commonly owned devices to access, for example,Internet services when arriving at a WiFi hotspot.

To begin, FIG. 1 illustrates an example of facilitating a network loginthrough commonly owned devices. This embodiment depicts a userendeavoring to connect commonly owned (also encompassing commonlyadministered) portable electronic devices 110 and 150 to WLAN 120, wherean initiating portable electronic device 110 receives credentials andsubsequently transmits those credentials to a supplemental portableelectronic device 150 in a message (e.g., message 500 at FIG. 5).

In the embodiment shown at FIG. 1, a modem 121 (e.g., a DSL modem, acable modem) connects to the Internet 130 to provide access thereto. Arouter 122 is coupled to the modem 121 to create a local area networkallowing devices coupled to router 122 to access the Internet 130. Awireless access point (WAP) 123 is connected to the router 122 toaccommodate wireless devices, thus creating wireless local area network(WLAN) 120 (with WLAN service set identifier “NetworkOne”). The modem121, the router 122 and the WAP 123 do not have to be physicallyseparate and may in fact be housed within the same physical container.As a result of this arrangement of components, the Internet 130 iswirelessly accessible to a device connected to the WLAN 120. Otherarrangements of network equipment that allow a device connected to theWLAN 120 to access the Internet 130 are possible, e.g. a broadbandconnection such as a T1 line modem.

FIG. 1 further shows wireless personal area network (WPAN) 190. WPAN 190can be any short-range low power consumption wireless network capable ofassociating (e.g., pairing) initiating device 110 and supplementaldevice 150 with the capacity to deliver a message (e.g., message 500 atFIG. 5) to supplemental device 150 from initiating device 110. The term“short range” is used here as an approximation, but in most cases willbe shorter than the range of a WLAN. Examples of commonly usedtechnologies for WPANs include Bluetooth, infrared data association(IrDA), wireless universal serial bus (wireless USB), and near fieldcommunications (NFC).

The network (or networks, in some embodiments) utilized to transmit amessage from initiating device 110 and the network utilized to receivethe message at supplemental device 150 are dependent upon the particularembodiment. Thus, WPAN 190 and the cellular network 140 shown at FIG. 5are not necessarily present in all embodiments. However, cellularnetwork 140 may still be present even where only WPAN 190 is utilizedfor message transmission, and vice versa.

Still referring to FIG. 1, an initiating portable electronic initiatingdevice 110 with the capability to connect to a wireless network isshown. As explained in this Specification, initiating portableelectronic device 110 facilitates network login to WLAN 120 for commonlyowned supplemental device 150. As set forth above, WLAN 120 providesaccess to Internet 130. Ultimately, both initiating device 110 andsupplemental device 150 are able to access Internet 130 through WLAN120.

In some embodiments where initiating device 110 is a network client,initiating device 110 acts as the initiator in connecting to WLAN 120.Here, WAP 123 acts as a responder to initiating device 110. Inembodiments wherein WLAN 120 employs wired equivalent privacy (WEP)security, initiating device 110 may use a shared key included in thecredentials (not shown) to connect to WAP 123. In some WEP embodiments,initiating device 110 acts as the initiator by sending an authenticationrequest to the responder WAP 123. WAP 123 responds to the authenticationrequest with a clear text challenge (e.g., an unencrypted randomnumber). In reply, initiating device 110 sends back a new authenticationrequest that includes the clear text challenge encrypted using theshared key. Finally, WAP 123 decrypts the reply from initiating device110 and responds with a confirmation if the decrypted challenge isauthenticated.

In some embodiments, a similar process is repeated by supplementaldevice 150 in connecting to WLAN 120, once supplemental device 150 hasreceived the credentials from initiating device 110. Similar toinitiating device 110, supplemental device 150 is also a network clientacting as the initiator in connecting to WLAN 120. Thus, WAP 123 acts asa responder to supplemental device 150. In embodiments wherein WLAN 120employs wired equivalent privacy (WEP) security, supplemental device 150may use a shared key included in the credentials (not shown) to connectto WAP 123. In some WEP embodiments, supplemental device 150 acts as theinitiator by sending an authentication request to the responder WAP 123.WAP 123 responds to the authentication request with a clear textchallenge (e.g., an unencrypted random number). In reply, supplementaldevice 150 sends back a new authentication request that includes theclear text challenge encrypted using the shared key. Finally, WAP 123decrypts the reply from supplemental device 150 and responds with aconfirmation if the decrypted challenge is authenticated.

In an alternative embodiment, WAP 123 and initiating device 110 can bethe same device. In such embodiments, the supplemental device 150 canstill access WLAN 120 as described above and herein. However, becausethe initiating device 110 creates WLAN 120 by acting as WAP 123,initiating device 110 can control the credentials that are transmittedto supplemental device 150. For example, initiating device 110 maytransmit credentials that are only valid for a certain duration at WAP123.

In most embodiments, the shared key or password for WLAN 120 is definedat WAP 123 by a network administrator for WAP 123 (not shown). Thenetwork administrator can be the same individual having the commonlyowned devices or can be another individual (e.g., the proprietor of ahotel or restaurant offering a WLAN). The network administrator candefine a shared key or password for WLAN 120 that is perpetually valid.Alternatively, the network administrator can define a shared key orpassword that is valid for a temporary period of time. Consequently,initiating device 110 and/or supplemental device 150 will be unable toaccess WLAN 120 using the temporary shared key or password once thedurational validity has expired.

Turning to FIG. 2, a process flow of actions or operations forfacilitating network login of commonly owned devices is illustrated. Atoperation 201, initiating portable electronic device 110 receives inputto connect to WLAN 120. Generally, the input includes some credentials(e.g., a service set identifier and a shared network key) that allowinitiating device 110 to connect to WLAN 120 at wireless access point123. In one embodiment, this input is received from a user at initiatingdevice 110 (e.g., an owner or administrator of that device manuallytyping in the SSID and shared key/password). In such an embodiment,initiating device 110 can run a process that presents to the userthrough a graphical user interface a selectable list of available WLANnetworks that have been discovered. In other embodiments, thecredentials are not received as user input; for example, the credentialscan be received from a universal serial bus (USB) drive. In response toreceiving the input that identifies a desired WLAN 120 by its SSID andincludes the shared key, initiating device 110 then uses thesecredentials to connect to the selected WLAN 120 in operation 202.

Still in reference to operation 202 of FIG. 2, initiating device 110receives a request for a shared network key (also colloquially called apassword) to connect to WLAN 120 after initiating device 110 sends arequest to connect to WLAN 120 (e.g., as a request transmitted over theair to the WAP 123). At operation 203, initiating device 110 uses thepreviously inputted network key to connect to WLAN 120 and is thuslyconnected thereto. In this way, initiating device 110 is able to accessInternet 130 through WLAN 120.

Either as part of operation 203 or following operation 203, initiatingdevice 110 may verify that the credentials are valid for accessing WLAN120 and Internet 130 at any point after receiving the networkcredentials as input. In one embodiment, where initiating device 110determines that the network credentials are invalid for accessing WLAN120 or for accessing Internet 130 through WLAN 120, the initiatingdevice can decline to take further action.

At operation 204 of FIG. 2, initiating device 110 can completepreparation or creation of a message at any point after receiving thenetwork credentials as input. In one embodiment, this message, shown at500 of FIG. 5, is not prepared or created until after initiating device110 has verified that the inputted network credentials are valid forconnecting to WLAN 120 and/or Internet 130. It is understood thatmessage 500 can be prepared according to a number of different formats,some of which are discussed in this Specification.

The format of message 500 is dictated by the particular method oftransmission by initiating device 110. Thus, message 500 is prepared byinitiating device 110 according to a format that is interpretable by thecommonly owned supplemental device 150. Additionally, message 500 isadapted to be transmitted across a particular wireless network accordingto the particular embodiment—e.g., where the wireless network is aBluetooth network, message 500 may be an object according to theBluetooth generic object exchange profile. The content of message 500prepared by initiating device 110 includes the values necessary toconnect to WLAN 120. These values include at least some of the inputtedcredentials. Embodiments of message 500 are explored in greater detaillater in this Specification.

Following operation 204, message 500 is transmitted to an address ofsupplemental device 150. An address of supplemental device 150 is anyaddress at which electronic messages addressed to the user or to theuser's commonly owned supplemental device 150 can be accessed bysupplemental device 150. Illustratively, an address can be a Bluetoothnetwork address of supplemental device 150, an SMS or MMS phone numberof supplemental device 150, or an email address of the user accessibleby a client at supplemental device 150.

According to the embodiment of FIG. 2, initiating device 110 transmitsmessage 500 to supplemental device 150 across WPAN 190. In an embodimentwherein WPAN 190 is a Bluetooth network, initiating device 110 pairswith supplemental device 150. The pairing partnership can be establishedat any point prior to transmission of message 500. In one embodiment,initiating device 110 detects supplemental device 150 and identifies itas a pairing partner. The two devices can create a shared link key andrespectively store the link key, thus pairing initiating device 110 withsupplemental device 150 and effectively creating WPAN 190.Alternatively, supplemental device 150 detects initiating device 110 andidentifies initiating device 110 as a pairing partner. In someembodiments, a process running at initiating device 110 recognizes thatinitiating device 110 has paired with supplemental device 150 and,accordingly, sends the message. This process can recognize thatinitiating device 110 has paired with supplemental device 150 at anypoint after receiving the credentials; thus, initiating device 110 doesnot have to transmit the credentials after receiving them, but can do soat any later time.

In embodiments wherein WPAN 190 is a Bluetooth network, message 500 istransmitted by initiating device 110 across WPAN 190 to a Bluetoothaddress of supplemental device 150 via Bluetooth protocol according to aspecific Bluetooth profile. For example, message 500 can be transmittedas an object using object exchange (e.g., generic object exchange forBluetooth). In such an embodiment, initiating device 110 detects theBluetooth address of supplemental device 150 and therefore is able totransmit message 500 to the Bluetooth address of supplemental device150.

According to an embodiment of the invention shown at operation 205 ofFIG. 2, transmission of message 500 can be done automatically. In someembodiments, a process running in the background at initiating device110 is alerted, or triggered, when initiating device 110 has paired withsupplemental device 150. This alert or trigger causes the message to besent across WPAN 190 to supplemental device 150. In one embodiment,message 500 is sent to a family of devices (not shown) that includessupplemental device 150; for example, the family of devices can includesupplemental device 150 and, additionally, a tablet computer performingsubstantially the same recipient functions as supplemental device 150.The family of devices can be stored in a data structure at initiatingdevice 110. The data structures for storing information such as a familyof devices are well known to people of ordinary skill in the art.Accordingly, the process running at initiating device 110 can access thedata structure describing the family of devices and send the message tothose devices included in the data structure. Alternatively, initiatingdevice 110 presents to the user a list of supplemental portableelectronic device addresses to which initiating device 110 can transmitmessage 500.

FIG. 9 illustrates an embodiment of the selection display presented to auser at initiating device 110. In this embodiment, initiating device 110presents the user with a list of selectable devices 910 that have anassociated address to which initiating device 110 can transmit amessage. In some embodiments, a family of devices that are commonlyowned populates the list 910. This family of devices is stored in a datastructure at initiating device 110. In response to receiving a selectionfrom the user, initiating device 110 transmits message 500 to therespective addresses of user-selected devices 920, 930 of list ofselectable devices 910.

In the context of FIG. 5, the path of message 500 in the embodimentdescribed at operation 205 of FIG. 2 is illustrated. As described above,the message is prepared at initiating portable electronic device 110 andtransmitted by initiating device 110 over WPAN 190 to an address ofcommonly owned supplemental device 150. Thus according to operation 205of FIG. 2, message 500 traverses WPAN message path 540 across WPAN 190;message 500 is subsequently received by supplemental device 150 atoperation 206.

Referring back to the embodiment of FIG. 2, supplemental device 150receives message 500 at operation 206. In one embodiment, supplementaldevice 150 provides a prompt to the user at a user interface ofsupplemental device 150 to accept message 500. Thus, where the userprefers not to accept message 500 to connect to WLAN 120, supplementaldevice 150 may receive input in response to the displayed promptindicating that supplemental device 150 is to reject message 500. Here,supplemental device 150 takes no further action.

In an alternative embodiment of operation 206, supplemental device 150accepts message 500 and subsequently provides information to the user ata user interface of supplemental device 150 about received message 500.Where the user desires to connect to WLAN 120, supplemental device 150may provide a prompt at the user interface of supplemental device 150 tothe user about whether supplemental device 150 is to use message 500 toconnect to WLAN 120.

In some embodiments of operation 206, supplemental device 150 identifiesmessage 500 as one containing values to connect to a WLAN by receivingit at a particular module of supplemental device 150. For example, aprocess running at supplemental device 150 is adapted to receive andhandle the message. This process can be running in the background ofsupplemental device 150 and can be running perpetually. Alternatively,supplemental device 150 can identify message 500 as one containingvalues to connect to a WLAN by identifying message 500 as a particularobject type. It is understood that other methods of messageidentification are comprehended by this Specification.

Also at embodiments of operation 206, supplemental device 150 extractsthe values, including the credentials originally received as input atinitiating device 110, upon receiving message 500 and identifying thatmessage 500 contains values for connecting to a WLAN. Numerous methodsof extracting values from a message exist; methods beyond those setforth herein are nonetheless encompassed by this Specification. In anembodiment in which message 500 is received at supplemental device 150as an object—e.g., over a Bluetooth wireless network—a value can beextracted by calling a public variable containing the value or bycalling a method that returns the value. For example, message 500returns values “NetworkOne” as the SSID and “Password” as the networkkey or password. Thus, the values necessary to connect to WLAN 120 cometo exist at supplemental device 150. The extracted values can be storedin data structures (e.g., string, object, etc.) at supplemental device150 for fluid access.

At operation 207 of FIG. 2, the extracted values are used bysupplemental device 150 to connect to WLAN 120. In one embodiment, anSSID value is extracted from message 500. The SSID is used to locate orverify the WLAN to which supplemental device 150 is to connect. Forexample, supplemental device 150 sends a request to connect to a WLANwith the SSID “NetworkOne.” The WLAN with SSID “NetworkOne”—e.g., WLAN120—receives the request and returns a request for a network key tosupplemental device 150. In response to this request from WLAN 120 atoperation 207, supplemental device 150 uses the extracted value for thenetwork key—e.g., “Password”. In an alternative embodiment, supplementaldevice 150 accepts input from a user of a selection of a WLAN (e.g.,supplemental device 150 accepts a user selection of an SSID shown at adisplay of supplemental device 150); supplemental device 150 then usesthe network key associated with the user-selected SSID to connect to theWLAN. In some embodiments, a process running in the background atsupplemental device 150 is alerted or notified that a message has beenreceived for connecting to a WLAN. Still running in the background, theprocess automatically selects the appropriate WLAN using the SSID andautomatically connects thereto with the network key, thereby seamlesslyguiding supplemental device 150 to operation 208 without disrupting anydisplay at supplemental device 150.

Following operation 207, a connection is established at operation 208between supplemental device 150 and WLAN 120, as well as Internet 130through WLAN 120. An embodiment of this operation wherein WLAN 120 usesWEP security is described in greater detail above.

FIG. 5 depicts components shown at FIG. 1, but illustrates somealternatives to the preferred embodiment of FIG. 1. For example, FIG. 5shows cellular base station 141 capable of sending and receiving datafrom Internet 130. Cellular base station 141 provides cellular network140 to one or both of initiating device 110 and supplemental device 150.Cellular base station 141 can provide cellular network 140 as a simplemobile telecommunications network with only cellular voice, such as a 2Gnetwork. In other embodiments, cellular network 140 can be a mobiletelecommunications network with mobile broadband or ultra-broadbandfunctionality for cellular data such as a 3G or 4G network.

An alternative embodiment of the invention is depicted in FIG. 3. Inthis embodiment, many of the operations of the invention are analogousto those depicted in FIG. 2. However, message 500 with values forconnecting to WLAN 120 is not transmitted across WPAN 190. Rather,initiating device 110 transmits message 500 to an address ofsupplemental device 150 across WLAN 120 and, consequently, acrossInternet 130.

In the embodiment shown at FIG. 3, operations 201 through 204 areanalogous to those operations described with respect to FIG. 2. Asmentioned above, the preparation of message 500 by initiating device 110is dependent upon the particular embodiment. With respect to operation204 of the embodiment of FIG. 3, message 500 is to be prepared in aformat transmissible to WLAN 120, relayed through Internet 130 tocellular network 140 and receivable at supplemental device 150.

In one embodiment of operation 301 of FIG. 3, initiating device 110transmits message 500 to an electronic mail (email) address of the userof commonly owned portable electronic devices 110 and 150. This emailaddress can be an address of an email account associated with a mailserver and accessible by a local mail client (e.g., a Gmail account oriCloud account) at supplemental device 150. In an alternativeembodiment, this address can be a short message service (SMS) ormultimedia messaging service (MMS) gateway—e.g., 5731235678@txt.att.netor 5731235678@mms.att.net, respectively. It is understood that otherpossible implementations of message transmission are comprehended bythis Specification. For example, message 500 may be transmitted as aninstant message to the address of an instant messaging client atsupplemental device 150.

At operation 302 of FIG. 3, message 500 is received from initiatingdevice 110 at WAP 123 via WLAN 120. Message 500 then traverses router122 and modem 121 to Internet 130. Subsequently, message 500 isforwarded through Internet 130 to cellular network 140 for dispatch toan address of supplemental device 150. Here, message 500 may beforwarded from Internet 130 to cellular network 140 through a gatewaysuch as wireless application protocol or other similar Internet gateway.

Following operation 302, cellular network 140 resolves the deliverypoint for message 500 according to the address provided by initiatingdevice 110 at message 500. Thus, at operation 303 of FIG. 3, message 500is delivered to the address of supplemental device 150 by cellularnetwork 140.

In the context of FIG. 5, the path of message 500 in the embodimentdescribed at operations 301, 302 and 303 of FIG. 3 is illustrated bymessage path 510. As described above, the message is prepared atportable electronic initiating device 110 and transmitted by initiatingdevice 110 to an address of commonly owned supplemental device 150.Message 500 is first received into WLAN 120 at WAP 123. Message 500 thenpasses through router 122 and modem 121 to Internet 130. According tothe address of message 500, Internet 500 forwards message 500 tocellular network 140. In turn, cellular network 140 resolves the addresspoint at which to deliver message 500 and relays the message to thisaddress.

Where supplemental device 150 receives message 500 at operation 206 ofFIG. 3, operation 206 is substantially analogous to operation 206described with respect to FIG. 2. However, particular embodiments of theextracting the credentials at supplemental device 150 may depart fromthose described with respect to the embodiment of FIG. 2. Varyingembodiments notwithstanding, operation 206 shows that the valuesnecessary to connect to WLAN 120 are received at supplemental device 150through extraction of the credentials from message 500.

According to one embodiment of the invention shown at FIG. 3, message500 is received as an email message at an email client of supplementaldevice 150. Either the email client or another program (e.g., amessaging module to process incoming messages or a process, such as abackground process) operating at supplemental device 150 can be adaptedto recognize that an incoming email message contains values forconnecting to WLAN 120. For example, the email message can have aspecific subject header field or another x-header field indicating thatthe email message contains values for connecting to WLAN 120.Alternatively, the email client or other program can scan the body ofthe email message (e.g., by parsing the text) for specific content ortags (e.g., XML tags) indicating that the email message contains valuesfor connecting to WLAN 120.

In the embodiment of FIG. 3 in which message 500 is received as an SMSmessage at supplemental device 150, an SMS client or other program(e.g., an application within a messaging module to process incomingmessages or a process, such as a process running in the background)scans the body of message 500 to determine if it contains values forconnecting to WLAN 120. Preferably, message 500 has specific content ortags—e.g., extensible markup language (XML) tags—indicating that themessage contains values for connecting to WLAN 120.

An embodiment according to FIG. 3 in which message 500 is an MMS messageis similar to the embodiment in which message 500 is an SMS message—thatis, an MMS client or other program (e.g., an application within amessaging module to process incoming messages or other process runningin the background) scans the body of message 500 to determine if itcontains values for connecting to WLAN 120. In one embodiment, message500 has specific content or tags (e.g., XML tags) indicating that themessage contains values for connecting to WLAN 120. However, because anMMS message can include a subject field, this embodiment alsocomprehends an MMS client or other program that identifies a messagecontaining values to connect to WLAN 120 by the value of subject of themessage.

Operations 207 and 208 of FIG. 3 are analogous to those operationsdescribed above with respect to FIG. 2. Thus, the extracted values areused by supplemental device 150 to connect to WLAN 120. In oneembodiment, an SSID value is extracted from message 500. The SSID isused to locate or verify the WLAN to which supplemental device 150 is toconnect. For example, supplemental device 150 sends a request to connectto a WLAN with the SSID “NetworkOne.” The WLAN with SSID“NetworkOne”—e.g., WLAN 120—receives the request and returns a requestfor a network key to supplemental device 150. In response to thisrequest from WLAN 120 at operation 207, supplemental device 150 uses theextracted value for the network key—e.g., “Password.” Accordingly, aconnection is established at operation 208 between supplemental device150 and WLAN 120, as well as Internet 130 through WLAN 120. Anembodiment of this operation wherein WLAN 120 uses WEP security isdescribed in greater detail above.

A third embodiment of the invention is depicted in FIG. 4. In thisembodiment, many of the operations of the invention are analogous tothose depicted in FIGS. 2 and 3. However, message 500 with values forconnecting to WLAN 120 is transmitted by initiating device 110 to anaddress of supplemental device 150 across cellular network 140.

In the embodiment shown at FIG. 4, operations 201 through 204 areanalogous to those operations described with respect to FIG. 2. Asmentioned above, the preparation of message 500 by initiating device 110is dependent upon the particular embodiment. With respect to operation204 of the embodiment of FIG. 4, message 500 is to be prepared in aformat transmissible across cellular network 140 and receivable atsupplemental device 150.

In one embodiment of operation 401 of FIG. 4, initiating device 110transmits message 500 to an SMS address of supplemental device 150across cellular network 140. In this embodiment, cellular network 140 isa cellular voice network. In the context of FIG. 5, the path of message500 in the embodiment described at operations 401 and 303 of FIG. 4 isillustrated along cellular voice network 520. As described above, themessage is prepared at initiating portable electronic device 110 andtransmitted by initiating device 110 to an address of commonly ownedsupplemental device 150. Message 500 is transmitted across cellularvoice network 520 into cellular network 140 at cellular base station141. Cellular network 140 resolves the address point at which to delivermessage 500 and relays the message to this address along cellular voicenetwork 520. Thus, at operation 303 of FIG. 4, message 500 is deliveredto the address of supplemental device 150 by cellular network 140.

In an alternative embodiment of FIG. 4, this address can be an MMSaddress of supplemental device 150. In this embodiment, cellular network140 is a cellular data network. In the context of FIG. 5, the path ofmessage 500 in the embodiment described at operations 401 and 303 ofFIG. 4 is illustrated along cellular data network 530. As describedabove, the message is prepared at initiating portable electronic device110 and transmitted by initiating device 110 to an address of commonlyowned supplemental device 150. Message 500 is transmitted acrosscellular data network 530 to cellular base station 141. Cellular network140 resolves the address point at which to deliver message 500 andrelays the message to this address along cellular data network 530.Thus, at operation 303 of FIG. 4, message 500 is delivered to theaddress of supplemental device 150 by cellular network 140.

In another embodiment of FIG. 4 wherein message 500 is transmittedacross a cellular data network (e.g., 530 of FIG. 5), the address ofmessage 500 specified by initiating device 110 can be an instantmessaging address of supplemental device 150. It is understood thatother possible implementations of message transmission are comprehendedby this Specification. In all embodiments of operation 303 in FIG. 4,cellular network 140 resolves the delivery point for message 500according to the address provided by initiating device 110 and deliversmessage 500 thereto.

Where supplemental device 150 receives message 500 at operation 206 ofFIG. 4, operation 206 is substantially analogous to operation 206described with respect to FIG. 2 and FIG. 3. However, particularembodiments of extracting the credentials at supplemental device 150 maydepart from those described with respect to the embodiments of FIG. 2and FIG. 3. Varying embodiments notwithstanding, operation 206 showsthat the values necessary to connect to WLAN 120 are received atsupplemental device 150 through extraction of the credentials frommessage 500.

In the embodiment of FIG. 4 in which message 500 is received as an SMSmessage at supplemental device 150, an SMS client or other program(e.g., an application within a messaging module to process incomingmessages, or a process such as a background process) scans the body ofmessage 500 to determine that it contains values for connecting to WLAN120. Preferably, message 500 has specific content or tags (e.g., XMLtags) indicating that the email message contains values for connectingto WLAN 120.

An embodiment according to FIG. 4 in which message 500 is an MMS messageis similar to the embodiment in which message 500 is an SMS message—thatis, an MMS client or other program (e.g., an application within amessaging module to process incoming messages or a process such as abackground process) scans the body of message 500 to determine if itcontains values for connecting to WLAN 120. In one embodiment, message500 has specific content or tags (e.g., XML tags) indicating that theemail message contains values for connecting to WLAN 120. However,because an MMS message can include a subject field, this embodiment alsocomprehends an MMS client or other program that identifies a messagecontaining values to connect to WLAN 120 by the value of subject of themessage.

Operations 207 and 208 of FIG. 4 are analogous to those operationsdescribed above with respect to FIG. 2. Thus, the extracted values areused by supplemental device 150 to connect to WLAN 120. In oneembodiment, an SSID value is extracted from message 500. The SSID isused to locate or verify the WLAN to which supplemental device 150 is toconnect. For example, supplemental device 150 sends a request to connectto a WLAN with the SSID “NetworkOne.” The WLAN with SSID“NetworkOne”—e.g., WLAN 120—receives the request and returns a requestfor a network key to supplemental device 150. In response to thisrequest from WLAN 120 at operation 207, supplemental device 150 uses theextracted value for the network key—e.g., “Password.” Accordingly, aconnection is established at operation 208 between supplemental device150 and WLAN 120, as well as Internet 130 through WLAN 120. Anembodiment of this operation wherein WLAN 120 uses WEP security isdescribed in greater detail above.

In one embodiment, the operations described at FIGS. 2 through 4 havethe robustness to handle dynamic changes to certain parameters of WLAN120 after devices 110 and 150 are connected thereto. For example,consider a scenario in which a user changes the display name or SSID ofWLAN 120 while both initiating device 110 and supplemental device 150are connected thereto. In this situation, initiating device 110 can betransferred to the new network (e.g., automatically, through user input,etc.). For example, in one embodiment a process at initiating device 110is configured to detect a change to the display name or SSID of WLAN 120and update a data structure at initiating device 110 containing thedisplay name or SSID of the WLAN to which initiating device 110 iscurrently connected. Alternatively, initiating device 110 can acceptuser input to connect to the WLAN having the changed display name orSSID. Thereafter, initiating device 110 can create a new message 500indicating that the SSID of WLAN 120 is updated (e.g., by providing anupdated display name or SSID in the message) and the supplemental device150 is to connect to WLAN 120 using the updated SSID. Analogoustechniques apply so that other dynamic changes to WLAN 120 propagate tosupplemental device 150; for example, changes to the password of WLAN120. Accordingly, both initiating device 110 and supplemental device 150remain robustly connected to WLAN 120.

Message

FIGS. 6a and 6b exemplify simple embodiments of the message to betransmitted from an initiating device to a supplemental portableelectronic device wherein the message contains values to connect to aWLAN. The embodiments shown at FIGS. 6a and 6b can be the messagestransmitted as message 500 in the embodiment at FIG. 2 and message 500in the embodiment at FIGS. 3 and 4, respectively. It is understood thatthese two embodiments are illustrative and should not be regarded aslimiting. The message can have additional value fields, alternativeformatting, or any number of different configurations while stillmaintaining the spirit of the invention.

Beginning first with the embodiment of FIG. 6a , message 500 includesthe SSID 620 of WLAN 120 and network key 630 to access WLAN 120. Inother embodiments, additional values can be included in the message. Inone embodiment, additional values are received as input from a user.Furthermore, additional values can be parameters detected by initiatingdevice 110 that may be necessary to access WLAN 120 and Internet 130.Examples of other values include security type (e.g., wired equivalentprivacy) and proxy server information (e.g., port or server).

The format of the message varies according to the embodiment of theinvention. In the embodiment of FIGS. 3 and 4, the message 500 must beof a format suitable to be received by supplemental device 150 viacellular network 140.

In an embodiment shown in FIG. 3, message 500 is prepared by initiatingdevice 110 as an electronic mail (email) message. In this embodiment,the content (i.e., values to access WLAN 120) of message 500 can beformatted for compatibility with an application program interface on thesupplemental device 150. For example, the body of message 500 can becomposed as in a markup language, such as XML. In such a case, thevalues can be clearly delineated and easily interpretable by thesupplemental device 150. The body of message 500 can be especially briefto promote speed and simplicity in the transmission and reception of themessage 500. A simple XML embodiment is depicted at FIG. 6a . Here,markup tags 620 act to clearly delineate SSID value 630 and network keyvalue 640.

In an alternative embodiment, the values (e.g., credentials) withinmessage 500 are separated by delimiters. For example, the value of theSSID and the value of the network key or password are separated by asemicolon in body of the message: NetworkOne;Password1. It is understoodthat other delimiters (e.g., comma, forward slash, etc.) are encompassedby this Specification.

As explained above, supplemental device 150 of FIGS. 3 and 4 is adaptedto receive message 500 and extract values 630, 640 therefrom. Accordingto an embodiment of the message shown at FIG. 6a , supplemental portableelectronic device 150 receives message 500 as an email message or MMSmessage and identifies it as a message having values to connect to aWLAN by evaluating Subject 610. Where message 500 is an email message,Subject 610 can be the subject header field or another x-header field ofthe email message. Upon determining that message 500 contains values forconnecting to a WLAN, supplemental device 150 can extract values 630,640 from message 500. In an embodiment according to FIG. 6a , values630, 640 can be extracted through an XML unmarshaller. Alternatively,the values can be extracted through simply parsing message 500.

In embodiments of FIG. 4 wherein message 500 is an SMS message, Subject610 is absent from message 500. Thus, supplemental device 150 canidentify message 500 as one having values to connect to a WLAN byevaluating markup tags 620. For example, message 500 can containadditional markup tags, such as <Credentials> . . . </Credentials>, toindicate message 500 contains values for connecting to a WLAN.

Turning to the embodiment shown at FIG. 6b , message 500 is illustratedas an object adapted to be exchanged via a WPAN. In accordance with anembodiment of FIG. 2, message 500 can be an object that is transmittedfrom initiating device 110 to supplemental device 150 according to thegeneric object exchange profile of Bluetooth. It is understood thatother Bluetooth profiles are encompassed by this Specification.

According to an embodiment of FIG. 6b , message 500 includes thevariables SSID 650 of WLAN 120 and network key 660 to access WLAN 120.In other embodiments, additional values can be included in the message.In one embodiment, these additional values are received at supplementaldevice 150 as input from a user. In another embodiment, additionalvalues can be parameters detected by the initiating device 110 that maybe necessary to access WLAN 120 and Internet 130. Examples of othervalues include security type (e.g., wired equivalent privacy) and proxyserver information (e.g., port or server).

The format of the message varies according to the embodiment of theinvention. In the embodiment of FIG. 2, message 500 must be of a formatsuitable for transmission by the initiating device 110 across WPAN 190and suitable to be received by supplemental device 150 via WPAN 190.

In an embodiment shown in FIG. 2, message 500 is prepared by initiatingdevice 110 as an object. In this embodiment, the object can be formattedfor compatibility with an application program interface on supplementaldevice 150. For example, the object can have variables 650, 660 that arepublically accessible, such as by calling Message.SSID orMessage.NetworkKey, respectively. Alternatively, the object can havepublically accessible methods that return the values 650, 660—shown atFIG. 6b as Message.Get_SSID( ) 670 and Message.Get_NetworkKey( ) 680,respectively. It is understood that this embodiment is illustrative;other techniques for extracting values from a message transmitted over aWPAN are comprehended by this Specification.

As explained above, supplemental device 150 is adapted to receivemessage 500 and extract values 650, 660 therefrom. According to anembodiment of the message shown at FIG. 6b , supplemental device 150receives message 500 as an object. Supplemental device 150 is adapted torecognize message 500 contains values for connecting to a WLAN by, forexample, recognizing that message 500 is of a particular object type orby receiving message 500 at a particular module (e.g., a messagingmodule to process an incoming message of supplemental device 150, or aprocess running at supplemental device 150 such as a backgroundprocess).

In an alternative embodiment, connecting to WLAN 120 is predicated uponfirst accessing a WLAN connection page at a local browser. The WLANconnection page may be, for example, a website configured to acceptpayment prior to connecting a device to WLAN 120. In such a scenario,each device may only be able to access WLAN 120 through the WLANconnection page. Therefore, initiating device 110 may include in message500 the uniform resource locator (URL) of the WLAN connection page.Accordingly, supplemental device 150 may extract the URL of the WLANconnection page from the received message 500, and then access the URLwhereupon the user is then guided through a payment process beforeauthorizing the supplemental device 150 to access the WLAN 120.

Initiating Device

FIG. 7 is a block diagram of an initiating device in accordance with anembodiment of the invention. This block diagram illustrates anembodiment of initiating device 110 of FIG. 1. Initiating device 100 caninclude processor 700 and associated memory 701. The modules 710-750 and780 for realizing the functionality of initiating device 110 may bestored at memory 701 and accessed through processor 700. It should benoted that not all modules 810-880 and transceivers 860-863 arenecessarily present in every embodiment—for example, the memory 701 ofinitiating device 110 can include WPAN connection module 740 even wherethe message is transmitted through WLAN connection module 720.Initiating device 110 may be a personal computer, such as a laptop,tablet, or handheld computer. Alternatively, the initiating device maybe embodied in another portable electronic device having thefunctionality of a cellular phone handset, a personal digital assistant(PDA), a digital multimedia player, or a multi-function consumerelectronic device combining some or all of the foregoing functions.

Memory 701 of initiating device 110 has a user interface module 710 thatdisplays a graphical user interface (GUI) to allow a user of initiatingdevice 110 to interact with various modules located at memory 701 ofinitiating device 110. The GUI displays icons or graphical images thatrepresent application programs, files, and their associated commands atdisplay screen 771 of initiating device 110. These may include windows,fields, dialog boxes, input boxes, menus, buttons, cursors, scrollbars,etc. During operation, the user can select and activate variousgraphical images to initiate functions associated therewith. Initiatingdevice 110 accepts input from the user to user interface module 710through manual input interface 770. Manual input interface 770 may be aphysical keyboard, a mouse, or other dedicated input device; however,manual input interface 770 may be a touch sensitive input device and caneven be located at display screen 771.

In one embodiment, user interface module 710 presents to the user atdisplay screen 771 a selection menu of WLAN networks that are withinrange of initiating device 110. Initiating device 110 receives from theuser through manual input interface 770 a selection of a particularWLAN. Alternatively, user interface module 710 can present to the useran input box so initiating device 110 can receive a specific SSID asuser input (e.g., in the case of a WLAN that does not broadcast itsSSID). In the embodiment depicted at FIG. 1, initiating device 110receives a selection of WLAN having SSID “NetworkOne.”

According to the embodiment of initiating device 110 at FIG. 7, WLANconnection module 720 receives from WLAN transceiver 761 a clear textchallenge originating from WAP 123. WLAN connection module 720 encryptsthe clear text challenge using a network key and responds via WLANtransceiver 761 with a request that includes the encrypted clear textchallenge. Accordingly, the network key should be resolved for WAP 123prior to initiating device 110 receiving the clear text challenge fromWAP 123. In one embodiment, initiating device 110 presents at displayscreen 771 an input box for the network key to a user through userinterface module 710. Accordingly, initiating device 110 receives fromthe user into the input box at display screen 771 and into userinterface module 710 a network key value for WAP 123. WLAN connectionmodule 720 is then able to encrypt the clear text challenge receivedfrom WAP 123 using the user-inputted network key. In one embodiment,WLAN connection module 720 then verifies that initiating device 110 isconnected to WLAN 120 through WAP 123 and can connect to Internet 130through WLAN 120.

Still referring to the embodiment of FIG. 7, at any point afterreceiving the SSID selection and network key at user interface module710, communications module 730 can complete creation or preparation of amessage containing the SSID selection and network key received as userinput. The embodiment of the message is dependent upon the particularmethod of transmission to be used by initiating device 110. In someembodiments, user interface module 710 can provide a prompt at displayscreen 771 to the user requesting confirmation that the message is to beprepared and/or sent. An embodiment of such a prompt is provided at FIG.9 and described above.

Following message preparation by communications module 730 according tothe embodiment of FIG. 2, the message is transmitted by initiatingdevice 110 through WPAN connection module 740 using WPAN transceiver760. In one embodiment, WPAN connection module 740 is a Bluetooth moduleand WPAN transceiver 760 is a Bluetooth transceiver. In this embodiment,WPAN connection module 740 detects the presence of a pairing partner(e.g., supplemental device 150) and correspondingly pairs with thepairing partner; this function is executed prior to transmission of themessage.

In one embodiment, WPAN connection module 740 verifies that the pairingpartner (e.g., supplemental device 150) is adapted to accept message500. This verification can be performed by transmitting a request usingWPAN transceiver 760 to the pairing partner and receiving a response tothe request or, alternatively, by receiving a response from the pairingpartner without a request from initiating device 110. In suchembodiments, initiating device 110 first pairs with the pairing partnerand then performs message capability verification prior to transmittingmessage 500.

Following message preparation by communications module 730 according tothe embodiment of FIG. 3, the message is transmitted by initiatingdevice 110 through WLAN connection module 720 using WLAN transceiver 761to WLAN 120 and then to Internet 130 for receipt at supplemental device150. Various message formats according to this embodiment are describedabove.

Following message preparation by communications module 730 according tothe embodiment of FIG. 4, the message is transmitted by initiatingdevice 110 through cellular connection module 750 using cellulartransceiver 762 to cellular network 140 for delivery to supplementaldevice 150. Various message formats according to this embodiment aredescribed above.

According to another embodiment of the invention, the message istransmitted by point-to-point module 780 using point-to-pointtransceiver 763. Point-to-point transceiver 763 can transmit messageover the air across a point-to-point network using near fieldcommunication.

Supplemental Device

FIG. 8 is a block diagram of a supplemental portable electronic devicein accordance with an embodiment of the invention. This block diagramsillustrates an embodiment of supplemental device 150 of FIG. 1.Initiating device 100 can include processor 800 and associated memory801. The modules 810-850 and 880 for realizing the functionality ofsupplemental device 150 may be stored at memory 801 and accessed throughprocessor 800. It should be noted that not all modules 810-880 andtransceivers 860-863 are necessarily present in every embodiment—forexample, supplemental device 150 can include WPAN connection module 840and associated WPAN transceiver 860 even where the message is receivedat cellular connection module 830 through cellular transceiver 862.Supplemental device 150 may be a cellular phone handset, a personaldigital assistant (PDA), a digital multimedia player, or amulti-function consumer electronic device combining some or all of theforegoing functions. Alternatively, the supplemental portable electronicdevice may be embodied in another electronic device having thefunctionality of a personal computer, such as a laptop, tablet, orhandheld computer.

Supplemental device 150 has a user interface module 850 that displays agraphical user interface (GUI) at display screen 871 to allow a user ofsupplemental device 150 to interact with various modules located atsupplemental device 150. The GUI displays icons or graphical images thatrepresent application programs, files, and their associated commands atsupplemental device 150. These may include windows, fields, dialogboxes, input boxes, menus, buttons, cursors, scrollbars, etc. Duringoperation, the user can select and activate various graphical images toinitiate functions associated therewith. Supplemental device 150 acceptsinput from the user to user interface module 850 through manual inputinterface 870. Manual input interface 870 may be a physical keyboard, amouse, or other dedicated input device; however, manual input interface870 may be a touch sensitive input device and can even be located atdisplay screen 871.

According to one embodiment of supplemental device 150 shown at FIG. 8,supplemental device 150 has WPAN connection module 840. WPAN connectionmodule 840 is adapted to process message 500 transmitted across WPAN 190and received at WPAN transceiver 860. In an embodiment, WPAN connectionmodule 840 is a Bluetooth module and, associated WPAN transceiver 860 isa Bluetooth transceiver. This Bluetooth module can be implementedaccording to any different Bluetooth profile. In one embodiment in whichmessage 500 is an object, WPAN connection module 840 has a genericobject exchange profile according to Bluetooth protocol. It isunderstood that message 500 can be received at supplemental device 150through either a push or pull request. Upon receiving message 500 atWPAN connection module 840, message 500 is processed (e.g., values areextracted) at messaging module 810.

According to an embodiment of supplemental device 150 shown at FIG. 8,supplemental device 150 has cellular connection module 830 andassociated cellular transceiver 862. Cellular connection module 830 isadapted to receive message 500 through cellular transceiver 862transmitted across cellular network 140. Cellular transceiver 862 may beadapted to receive messages across both a cellular voice network and acellular data network. Correspondingly, cellular connection module 830can be adapted to receive message from both a cellular voice network anda cellular data network. In one embodiment, message 500 is received asan email message at cellular connection module 830. Alternatively,message 500 can be received as an SMS or MMS message at cellularconnection module 830. Upon receiving message 500 at cellular connectionmodule 830, message 500 is processed (e.g., values are extracted) atmessaging module 810.

According to one embodiment of the invention, user interface module 850provides a prompt to the user at display screen 871 of supplementaldevice 150 confirming that supplemental portable electronic device 150is to accept message 500. In another embodiment, user interface module850 provides a prompt to the user at display screen 871 of supplementaldevice 150 confirming that supplemental portable electronic device is toconnect to WLAN 120 using values extracted from message 500.

In embodiments of supplemental device 150 according to FIGS. 2 through4, messaging module 810 is adapted to extract the values from respectivemessage 500. Illustrative embodiments of value extraction from themessage are described in greater detail above. Example values include anSSID of a WLAN and a network key to access the WLAN. In one embodiment,messaging module 810 stores the extracted values in data structures atsupplemental device 150. According to such an embodiment, the storedvalues for accessing WLAN 120 are available to other modules (e.g., WLANconnection module 820).

Still referring to embodiments of the supplemental portable electronicdevice according to FIGS. 2 through 4, WLAN connection module 820 isadapted to leverage the values made available by messaging module 810 toaccess WLAN 120.

In one embodiment, WLAN connection module 820 locates or detects WLAN120 through an SSID value extracted from respective message 500 bymessaging module 810. In response to locating WLAN 120 by WLANconnection module 820 using the SSID value, WLAN connection module 820sends a request using WLAN transceiver 861 to connect to WLAN 120. Inembodiments wherein WLAN 120 is a secure WLAN, WLAN connection module820 can receive a clear text challenge from WAP 123 through WLANtransceiver 861 before gaining access to WLAN 120. In response, WLANconnection module 820 transmits an authentication request using WLANtransceiver 861 that includes the clear text challenge encrypting usingthe network key extracted from message 500 by messaging module 810.Thus, supplemental device 150 gains access to WAP 123, to WLAN 120, andto Internet 130.

According to another embodiment of the invention, the message isreceived by point-to-point module 880 using point-to-point transceiver863. Point-to-point transceiver 863 can receive the message over the airacross a point-to-point network using near field communication.

Other Embodiments

In some embodiments, the credentials can be sent from supplementaldevice 150 to additional devices (not shown) that function in the samecapacity as supplemental device 150 (e.g., receiving the message andusing the message to access a wireless network). In such embodiments, asingle device operates as both supplemental device 150 and initiatingdevice 110. For example, consider a user with three devices she wouldlike to connect to a WLAN: a laptop, a tablet computer, and a smartphone. Initially, the laptop receives the credentials as user input anduses the credentials to access a WLAN; here, the laptop is theinitiating device 110. Thereafter, the laptop forwards the credentialsto a tablet computer; here, the tablet computer is the supplementaldevice 150. If this user subsequently desires to send the credentials toher smart phone, the credentials can be forwarded from the tabletcomputer to the smart phone (instead of from the laptop). In thissubsequent circumstance, the tablet computer, having received thecredentials as input from the laptop, acts as an initiating device 110and forwards the credentials to the smart phone, the smart phone thenreceiving the credentials as a supplemental device 150. Variations onthis embodiment are comprehended by this Specification; for example, aprompt can be presented to the user at a display of a device that isacting first as a supplemental device and then as an initiating device,requesting the user to confirm that the device should forward thecredentials to another device.

In the embodiments described above, it is assumed that there is anassociation between initiating device 110 and one or more supplementaldevices, thereby creating a family of commonly owned devices. Thisfamily of commonly owned devices can be identified as such, in a datastructure that is stored in the initiating device 110. The datastructure can then be accessed by one or more processes running in theinitiating device 110, such as a process to transmit a messagecontaining the credentials. The association can be defined by the user.In the embodiment shown at FIG. 10a , initiating device 110 presents tothe user (on its display) a list of selectable devices 1000 includingidentifiers 1010, 1020, 1030. The user is able to select and confirm(via an OK button 1040) one or more devices which are in the commonlyowned family of devices and to which the initiating device 110 cantransmit the message (e.g., message 500 shown at FIG. 5). In the exampleshown at FIG. 10a , the user has selected tablet 1020 and portable mediaplayer 1030. The list of selectable devices 1000 can be populated in anumber of different ways. In some embodiments, the list of selectabledevices 1000 shows supplemental devices that have been previously pairedwith initiating device 110. In other embodiments, the list of selectabledevices 1000 presents a list of supplemental devices with whichinitiating device 110 can currently pair. In the embodiment shown atFIG. 10b , the user may define an address (entered via OK button 1060)at which a supplemental device can receive a message from initiatingportable electronic device 110. This address can be, for example, anemail address having a mailbox at a supplemental device or a textmessage gateway (shown at Value 1050) for a phone number of asupplemental device. Values inputted by the user in this embodiment ofFIG. 10b can populate the list of selectable devices 1000 shown at FIG.10a . In an alternative embodiment, the list of selectable devices 1000is populated through another method for defining commonly owned devices(e.g., those methods described above). In some embodiments, once thefamily of commonly owned devices has been established, this family ofdevices populates the list of available devices 910, via identifiers920, 930, 940 shown at FIG. 9, which the user can select and confirm(via an OK button 950) at initiating device 110 such that the message(e.g., message 500 of FIG. 5) will be sent from initiating device 110 tothose selected supplemental devices.

In an embodiment described at FIG. 11, the message (e.g., message 500 ofFIG. 5) is not used to access a secure WLAN, but is instead used toaccess some protected content. Protected content can be contentaccessible at, for example, a website that requires login credentials(e.g., a user name and password), a website that requires anauthentication certificate, an application that requires login orauthentication and that resides in the memory of a portable electronicdevice, a web application that requires login or authentication runningat a remote server, a web application that requires login orauthentication wherein application data is downloaded to the portableelectronic device, or any substantially similar method or system foraccessing content through a password-protected or other similarauthentication mechanism.

At operation 1101 of FIG. 11, the user enters his/her login credentialsat an authentication mechanism presented at initiating portableelectronic device 110. In the embodiment shown at FIG. 12, the userenters his/her username at username input field 1230 and password atpassword input field 1220 provided at a display of initiating device110. In this embodiment, the authentication mechanism is a username andpassword input; however, other authentication mechanisms (e.g., securitycertificate) are comprehended by this Specification. Accordingly, atoperation 1102 the protected content becomes accessible at initiatingdevice 110 (e.g., the protected content can be presented at a display ofinitiating device 110) if the credentials inputted by the user to theauthentication mechanism are valid.

Now, the user may also wish to access the protected content at anotherdevice in the user's family of commonly owned devices—such assupplemental device 150. To facilitate accessibility of the protectedcontent at the supplemental device 150, a process in the initiatingdevice 110 first prepares a message (e.g., message 500 of FIG. 5) thatincludes the credentials at operation 1103. In some embodiments, thismessage also includes an identification of the application, webpage(e.g., uniform resource locator), etc., having an authenticationmechanism to receive the credentials.

Still referring to FIG. 11, at operation 1104, the initiating device 110transmits the message to a supplemental device 150. Thus, thecredentials to access the protected content are received at supplementaldevice 150, obviating repeated user entry of the same credentials intomultiple devices to access the same protected content across thosemultiple devices. In the embodiment shown at FIG. 12, this message canbe sent across WPAN 190, such as a Bluetooth network, from initiatingdevice 110 to supplemental device 150. Thus, the credentials foraccessing the protected content are received at supplemental device 150.

In some embodiments, the credentials will automatically populate at theauthentication mechanism of supplemental device 150. For example in theembodiment shown at FIG. 12, the credentials from the received message(e.g., a username and password) automatically populate the respectiveusername input field 1260 and password input field 1250 at supplementaldevice 150. In situations wherein the authentication mechanism is not infocus at supplemental device 150, a process running at supplementaldevice 150 can bring the authentication into focus (e.g., by launchingan application, by navigating to a specific uniform resource locator,etc. and brining the authentication mechanism to the foreground of adisplay of supplemental device 150). It is understood that the messagecan be transmitted from initiating device 110 to supplemental device 150over the air according to any of the methods described above, not justacross a WPAN. Thus, initiating device 110 can transmit the messageacross cellular network 140, across Internet 130 through WLAN 120, oracross WPAN 190. Accordingly, supplemental device 150 can receive themessage from cellular network 140 or across WPAN 190. Analogousembodiments are described in more detail above. In some embodiments,supplemental device 150 may be connected to Internet 130 through WLAN120 and therefore can receive the message across Internet 130 throughWLAN 120.

Embodiments of the initiating device shown at FIG. 11 and FIG. 12 anddescribed above can be implemented in a processor and associated memory,such as processor 700 and memory 701 as shown at FIG. 7. In such anembodiment, a user enters credentials to access protected content usingmanual input interface 770. The credentials are thus received at userinterface module 710; user module 710 can distribute the credentials toother modules residing at memory 701. The protected content can beaccessed through an authentication module at memory 701 (not shown). Insome embodiments, the authentication module validates the usercredentials (e.g., password) and then displays the protected content atdisplay screen 771. Communications module 730 can receive thesecredentials from user interface module 710. Accordingly, communicationsmodule 730 prepares a message (e.g., message 500 at FIG. 5) containingthe credentials. The embodiment of the message is dependent upon theparticular method of transmission to be used by initiating device110—e.g., in embodiments in which the message is transmitted across theInternet via a WLAN, the message is adapted to be distributed across theInternet.

Following message preparation by communications module 730 according tothe embodiments wherein the message is transmitted across a WPAN, themessage is transmitted by initiating device 110 through WPAN connectionmodule 740 using WPAN transceiver 760. In one embodiment, WPANconnection module 740 is a Bluetooth module and WPAN transceiver 760 isa Bluetooth transceiver. In this embodiment, WPAN connection module 740detects the presence of a pairing partner (e.g., supplemental device150) and correspondingly pairs with the pairing partner; this functionis executed prior to transmission of the message.

In one embodiment, WPAN connection module 740 verifies that the pairingpartner (e.g., supplemental device 150) is adapted to accept message500. This verification can be performed by transmitting a request usingWPAN transceiver 760 to the pairing partner and receiving a response tothe request or, alternatively, by receiving a response from the pairingpartner without a request from initiating device 110. In suchembodiments, initiating device 110 first pairs with the pairing partnerand then performs message capability verification prior to transmittingmessage 500.

Following message preparation by communications module 730 and accordingto embodiments wherein the message is transmitted across the Internet,the message is transmitted by initiating device 110 through WLANconnection module 720 using WLAN transceiver 761 to WLAN 120 and then toInternet 130 for receipt at supplemental device 150. Various messageformats according to this embodiment are described above.

Following message preparation by communications module 730 and accordingto the embodiments wherein the message is sent across a cellularnetwork, the message is transmitted by initiating device 110 throughcellular connection module 750 using cellular transceiver 762 tocellular network 140 for delivery to supplemental device 150. Variousmessage formats according to this embodiment are described above.

According to another embodiment of the invention, the message istransmitted by point-to-point module 780 using point-to-pointtransceiver 763. Point-to-point transceiver 763 can transmit messageover the air across a point-to-point network using near fieldcommunication.

Embodiments of supplemental device 150 according to the embodimentsshown at FIG. 11 and FIG. 12 can be implemented in a processor andassociated memory, such as processor 800 and memory 801 as shown at FIG.8. In such embodiments, messaging module 810 is adapted to extract thecredentials to access the protected content using those credentials. Theprotected content can be accessed through an authentication module atmemory 801 (not shown). In some embodiments, the authentication modulevalidates the user credentials (e.g., password) and then displays theprotected content at display screen 871.

Turning to FIG. 13, an embodiment of the present invention is shownwherein the user desires to pair supplemental device 150 with anauxiliary accessory device, such as auxiliary device 1410 of FIG. 14.Auxiliary device 1410 can be any device capable of pairing withinitiating device 110 and supplemental device 150. Preferably, auxiliarydevice 1410 will have a static passkey for pairing (e.g., “0000” or“1234”) so that the passkey will be the same for both initiating device110 and supplemental device 150. Auxiliary device 1410 can be, forexample, a Bluetooth headset, Bluetooth headphones, a Bluetooth mouse, aBluetooth keyboard or any other substantially similar peripheral device.

Still referring to FIG. 13, at operation 1301 the credentials to pairwith auxiliary device 1410 are received at initiating device 110. Insome embodiments, the credentials include receiving from the user atinitiating device 110 a selection of an auxiliary device available forpairing. For example, initiating device 110 can present to the user alist of discoverable devices as a selectable menu at the display ofinitiating device 110. Upon selecting a discoverable device, initiatingdevice 110 may present an input prompt to the user at the displayprompting the user to enter the passkey for the selected discoverabledevice. In some embodiments, this selection of a discoverable device anda passkey for the discoverable device constitute the credentials. Atoperation 1302, initiating device 110 pairs with auxiliary device 1410using the passkey inputted by the user at initiating device 110,creating Initiating to Auxiliary Wireless Personal Area Network 1420 asshown in the embodiment of FIG. 14.

To facilitate the pairing process between supplemental device 150 andauxiliary device 1410, initiating device 110 creates a message (e.g.,message 500 of FIG. 5) to transmit to supplemental device 150. Thismessage includes the credentials for pairing with auxiliary device 1410.In some embodiments, the credentials include the network address orother identifying information (e.g., a name) of auxiliary device 1410 sothat supplemental device 150 has an indication for which discoverabledevice the passkey provided by initiating device 110 is to be used.Preferably, the credentials include at a minimum a passkey for pairingwith auxiliary device 1410.

Still referring to FIG. 13, at operation 1304 initiating device 110transmits the message to supplemental device 150. Thus, the credentialsto pair with auxiliary device 1410 are received at supplemental device150, obviating repeated user entry of the same credentials at differentdevices to pair with the same peripheral device. In the embodiment shownat FIG. 14, this message can be sent across a WPAN 190, such as aBluetooth network, from initiating device 110 to supplemental device150. Thus, the credentials for pairing with auxiliary device 1410 arereceived at supplemental device 150. It is understood that the messagecan be transmitted from initiating device 110 to supplemental device 150over the air according to any of the methods described above, not justacross a WPAN. Thus, initiating device 110 can transmit the messageacross cellular network 140, across Internet 130 through WLAN 120, oracross WPAN 190. Accordingly, supplemental device 150 can receive themessage from cellular network 140 or across WPAN 190. Analogousembodiments are described in more detail above. In some embodiments,supplemental device 150 may be connected to Internet 130 through WLAN120 and therefore can receive the message across Internet 130 throughWLAN 120. After receiving the credentials, supplemental device 150 canpair with auxiliary device 1410, creating Supplemental to AuxiliaryWireless Personal Area Network 1430.

Embodiments of the initiating device shown at FIG. 13 and FIG. 14 anddescribed above can be implemented in a processor and associated memory,such as processor 700 and memory 701 as shown at FIG. 7. In such anembodiment, a user enters credentials to pair with auxiliary device 1410using manual input interface 770. The credentials are thus received atuser interface module 710; user module 710 can distribute thecredentials to other modules residing at memory 701. Initiating device110 can pair with auxiliary device 1410 using a pairing module at memory701 (not shown); in some embodiments, this pairing module is included inWPAN connection module 740. Communications module 730 can receive thesecredentials from user interface module 710. Accordingly, communicationsmodule 730 prepares a message (e.g., message 500 at FIG. 5) containingthe credentials. The embodiment of the message is dependent upon theparticular method of transmission to be used by initiating device110—e.g., in embodiments in which the message is transmitted across theInternet via a WLAN, the message is adapted to be distributed across theInternet.

Following message preparation by communications module 730 according tothe embodiments wherein the message is transmitted across a WPAN, themessage is transmitted by initiating device 110 through WPAN connectionmodule 740 using WPAN transceiver 760. In one embodiment, WPANconnection module 740 is a Bluetooth module and WPAN transceiver 760 isa Bluetooth transceiver. In this embodiment, WPAN connection module 740detects the presence of a pairing partner (e.g., supplemental device150) and correspondingly pairs with the pairing partner; this functionis executed prior to transmission of the message.

In one embodiment, WPAN connection module 740 verifies that the pairingpartner (e.g., supplemental device 150) is adapted to accept message500. This verification can be performed by transmitting a request usingWPAN transceiver 760 to the pairing partner and receiving a response tothe request or, alternatively, by receiving a response from the pairingpartner without a request from initiating device 110. In suchembodiments, initiating device 110 first pairs with the pairing partnerand then performs message capability verification prior to transmittingmessage 500.

Following message preparation by communications module 730 and accordingto embodiments wherein the message is transmitted across the Internet,the message is transmitted by initiating device 110 through WLANconnection module 720 using WLAN transceiver 761 to WLAN 120 and then toInternet 130 for receipt at supplemental device 150. Various messageformats according to this embodiment are described above.

Following message preparation by communications module 730 and accordingto the embodiments wherein the message is transmitted across a cellularnetwork, the message is transmitted by initiating device 110 throughcellular connection module 750 using cellular transceiver 762 acrosscellular network 140 for delivery to supplemental device 150. Variousmessage formats according to this embodiment are described above.

According to another embodiment of the invention, the message istransmitted by point-to-point module 780 using point-to-pointtransceiver 763. Point-to-point transceiver 763 can transmit messageover the air across a point-to-point network using near fieldcommunication.

An apparatus comprising an article of manufacture in which acomputer-readable medium has stored thereon instructions that program afirst portable electronic device (a) to connect to a secure wirelesslocal area network (WLAN) using a secret shared network key that isreceived by the device via user input, and (b) to transmit over the airto a second portable electronic device a service set identifier (SSID)of the WLAN and the network key. In one instance, (b) may beaccomplished by transmitting over the air the SSID and the network keyacross the secure WLAN. In another instance, (b) may be accomplished bytransmitting over the air the SSID and the network key across a wirelesspersonal area network (WPAN). In yet another instance, (b) isaccomplished by transmitting over the air the SSID and the network keyacross a point-to-point network. Also, the instructions may program thefirst portable electronic device to connect to the secure WLAN inresponse to user input that a) selects from amongst available broadcastWLAN SSIDs or provides a display name of a hidden WLAN SSID, and b)provides the secret shared network key.

An apparatus comprising: an article of manufacture having acomputer-readable medium in which are stored instructions that program aportable electronic device to (a) receive over the air a message via awireless network to which the portable electronic device is connected,wherein the message contains a service set identifier (SSID) of a securewireless local area network (WLAN) and a network key of the secure WLAN;(b) extract, from the message, the SSID of the secure WLAN; (c) extract,from the message, the network key; (d) locate the secure WLAN using theextracted SSID; and (e) connect to the secure WLAN using the extractednetwork key.

A first portable electronic device having a processor and associatedmemory comprising: a user interface, the user interface to accept aservice set identifier (SSID) and a network key; a WLAN connectionmodule, the WLAN connection module to allow the first device to connectas a node to a secure wireless local area network (WLAN) having the SSIDusing the network key; a communications module, the communicationsmodule adapted to create a message for transmission over the air to asecond device, the message including the SSID and the network key,wherein the message is adapted to provide the second device with theSSID and the network key for accessing the secure wireless local areanetwork and further wherein the message is adapted to be transmittedover the air by the first device; and a connection module, theconnection module adapted to transmit over the air the message createdat the communications module. The connection module may be a WPANconnection module adapted to pair the first device with a second deviceand transmit the message across a WPAN. The connection module mayalternatively be a cellular connection module adapted to transmit themessage across one of a cellular voice network and a cellular datanetwork. The WLAN connection module may also be the connection module,wherein the WLAN connection module is adapted to transmit the messageacross the secure wireless local area network. The connection module maybe a point-to-point connection module adapted to transmit the messageacross a point-to-point network. The point-to-point connection modulemay be adapted to transmit the message using near field communication.The connection module can be adapted to send the message where the WPANmodule has paired the first device with the second device.

A portable electronic device comprising: a connection module, theconnection module allowing the device to connect to receive messagesover the air at the device; a messaging module, the messaging module toprocess an incoming message received at the device; a wireless networkmodule, the wireless network module allowing the device to connect to asecure wireless local area network using the received message; whereinthe connection module is adapted to receive a message over the air, themessaging module is adapted to extract from the received message aservice set identifier (SSID) and a network key for a secure wirelesslocal area network (WLAN) having the SSID, and the wireless networkmodule is adapted to connect to the secure WLAN having the SSIDextracted from the received message using the extracted network key. Theconnection module can be a WPAN module adapted to receive the messageacross a WPAN. The connection module can alternatively be apoint-to-point module adapted to receive the message across apoint-to-point network.

A computer-implemented method comprising: receiving into a firstportable electronic device credentials from a user, the credentials toinclude a passkey, and the credentials to allow the first device to pairwith an auxiliary accessory device; using the credentials to pair thefirst device with the auxiliary accessory device; creating a message forwireless transmission, wherein the message includes the credentials forpairing with the auxiliary accessory device and an identification of theauxiliary accessory device and further wherein the message is adapted tobe delivered to a second portable electronic device over the air; andtransmitting the message over the air by the first device, wherein themessage is addressed to the second device. The auxiliary accessorydevice may be one of a Bluetooth headset or Bluetooth headphones. Theidentification of the auxiliary accessory device may be a Bluetoothdevice address.

A computer-implemented method of a portable electronic device,comprising: receiving, by a portable electronic device, a message overthe air, wherein the message contains credentials for pairing with anauxiliary accessory device; extracting, from the message, thecredentials allowing the portable electronic device to pair with theauxiliary accessory device; identifying the auxiliary accessory devicewith which the portable electronic device can pair using thecredentials; and pairing with the auxiliary device using the extractedcredentials.

A first portable electronic device having a processor and associatedmemory comprising: a user interface, the user interface to accept acredentials at an authentication mechanism presented at the userinterface; an authentication module, the authentication module to allowthe first device to access protected content where the credentials arevalid; a communications module, the communications module adapted tocreate a message for transmission over the air to a second device, themessage including the credentials, wherein the message is adapted toprovide the second device with credentials for accessing the protectedcontent and further wherein the message is adapted to be transmittedover the air by the first device; and a connection module, theconnection module adapted to transmit over the air the message createdat the communications module.

A first portable electronic device having a processor and associatedmemory comprising: a user interface, the user interface to accept acredentials for pairing with an auxiliary accessory device; an WPANmodule, the WPAN module to allow the first device pair with theauxiliary accessory device using the credentials; a communicationsmodule, the communications module adapted to create a message fortransmission over the air to a second device, the message including thecredentials, wherein the message is adapted to provide the second devicewith credentials for pairing with the auxiliary accessory device andfurther wherein the message is adapted to be transmitted over the air bythe first device; and a connection module, the connection module adaptedto transmit over the air the message created at the communicationsmodule.

Embodiments of supplemental device 150 according to the embodimentsshown at FIG. 13 and FIG. 14 can be implemented in a processor andassociated memory, such as processor 800 and memory 801 as shown at FIG.8. In such embodiments, messaging module 810 is adapted to extract thecredentials to pair with the auxiliary device using those credentials.Supplemental device 150 can pair with auxiliary device 1410 using apairing module at memory 801 (not shown); in some embodiments, thispairing module is included in WPAN connection module 840.

Embodiments of the invention also relate to an apparatus for performingthe operations herein. Such a computer program is stored in anon-transitory computer readable medium. A machine-readable mediumincludes any mechanism for storing information in a form readable by amachine (e.g., a computer). For example, a machine-readable (e.g.,computer-readable) medium includes a machine (e.g., a computer) readablestorage medium (e.g., read only memory (“ROM”), random access memory(“RAM”), magnetic disk storage media, optical storage media, flashmemory devices).

The processes or methods depicted in the preceding figures can beperformed by processing logic that comprises hardware (e.g., circuitry,dedicated logic, etc.), software (e.g., embodied on a non-transitorycomputer readable medium), or a combination of both. Although theprocesses or methods are described above in terms of some sequentialoperations, it should be appreciated that some of the operationsdescribed can be performed in a different order. Moreover, someoperations can be performed in parallel rather than sequentially.

Embodiments of the present invention are not described with reference toany particular programming language. It will be appreciated that avariety of programming languages can be used to implement the teachingsof embodiments of the invention as described herein.

In this Specification, embodiments of the invention have been describedwith reference to specific embodiments thereof. It will be evident thatvarious modifications can be made thereto without departing from thebroader spirit and scope of the invention as set forth in the followingclaims. The Specification and drawings are, accordingly, to be regardedin an illustrative sense rather than a restrictive sense.

1. A computer-implemented method comprising: receiving into a firstportable electronic device credentials from a user, the credentials toinclude a password, and the credentials to allow the first device toaccess protected content; using the credentials to access the protectedcontent such that at least a portion of the protected content isdisplayed at the first device; creating a message for wirelesstransmission, wherein the message includes the credentials for accessingthe protected content and an identification of the protected contentaccessible with the credentials and further wherein the message isadapted to be delivered to a second electronic device over the air; andtransmitting the message over the air by the first device, wherein themessage is addressed to the second device.
 2. The method of claim 1,wherein the protected content is one of an application, a web siterequiring login, or a web site requiring authentication.
 3. The methodof claim 1, wherein the message is transmitted over the air through oneof a cellular network, a wireless local area network (WLAN), and awireless personal area network (WPAN).
 4. The method of claim 1, whereinthe first portable electronic device and the second electronic deviceare in a family of commonly owned devices, wherein the method furthercomprises displaying a list of devices from which the user can select adevice in the family of commonly owned devices to receive the message,wherein the message is transmitted to the second electronic device beingthe selected device.
 5. The method of claim 4, wherein the list ofdevices are devices in the family of commonly owned devices that havebeen previously paired with the first portable electronic device.
 6. Themethod of claim 1, wherein using the credentials to access the protectedcontent comprises initiating an authentication mechanism of theprotected content for authenticating the user through use of thecredentials.
 7. The method of claim 1, wherein the first portableelectronic device and the second electronic device are in a list ofcommonly owned devices associated with the user.
 8. The method of claim7 further comprising identifying a third device in the list of commonlyowned devices for receiving the message from the second electronicdevice; and transmitting by the second electronic device the message tothe third device, such that upon receipt of the message the third devicebecomes configured to use the credentials to access the protectedcontent at the third device.
 9. A first portable electronic devicecomprising: a processor; and memory having stored therein a userinterface that when executed by the processor accepts a credentialpresented by a user wherein the credential includes a password andallows the first portable device to access protected content, anauthentication module that when executed by the processor uses thecredential to access the protected content, wherein at least a portionof the protected content is then displayed at the first portableelectronic device, a communications module that when executed by theprocessor creates a message for wireless transmission, wherein themessage includes the credential for accessing the protected content andan identification of the protected content that is accessible with thecredential, and further wherein the message is adapted to be deliveredto a second electronic device over the air, and a connection module thatwhen executed by the processor is adapted to cause the message to betransmitted over the air by the first portable electronic device,wherein the message is addressed to the second device.
 10. The firstportable electronic device of claim 9 wherein the protected content isone of an application, a website requiring login, or a website requiringauthentication.
 11. The first portable electronic device of claim 9wherein the connection module causes the message to be transmitted overthe air through one of a cellular network, a wireless local areanetwork, or a wireless personal area network.
 12. The first portableelectronic device of claim 9 wherein the first portable electronicdevice and the second electronic device are in a family of commonlyowned devices, and wherein the user interface is to cause a list ofdevices to be displayed from which the user can select a device in thefamily of commonly owned devices to receive the message, and wherein themessage is transmitted to the second electronic device being theselected device.
 13. The first portable electronic device of claim 12wherein the list of devices are devices in the family of commonly owneddevices that have been previously paired with the first portableelectronic device.
 14. The first portable electronic device of claim 9wherein the credential to access the protected content is used toinitiate an authentication mechanism of the protected content forauthenticating the user through use of the credential.
 15. The firstportable electronic device of claim 9 wherein the first portableelectronic device and the second electronic device are in a list ofcommonly owned devices associated with the user, and wherein the list isstored in the memory of the first portable electronic device.
 16. Thefirst portable electronic device of claim 15 wherein the memory hasstored therein instructions that when executed by the processor identifya third device in the list of commonly owned devices for receiving themessage, and cause the second electronic device to transmit the messageto the third device so that upon receipt of the message the third devicebecomes configured to use the credential to access the protected contentat the third device.