Wireless connection mode activation

ABSTRACT

A system includes a router including a processor and a memory. The memory stores instructions executable by the processor to receive a wireless request from a first computing device to initiate a connection mode for a wireless network. The instructions are further executable to join a second computing device to the wireless network under the connection mode. wherein the connection mode allows the second device to join the wireless network without input of a password stored prior to the wireless request.

BACKGROUND

Routers can be equipped with a button to initiate a connection mode,i.e., in response to detecting an activation of the button, the routercan be programmed to initiate the connection mode for a time duringwhich computing devices can join a wireless network provided by therouter without user input to submit an identifier previously stored bythe router. Routers may be installed in remote or inconvenientlocations.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example network system including a wirelessrouter.

FIG. 2 is a user interface for activating a connection mode via acomputing device.

FIG. 3 is a user interface for selecting access parameters for theconnection mode of FIG. 2 via the computing device.

FIG. 4 is a flowchart of an example process for a router to receive acommand to open the connection mode from a first computing device andthen joining a second computing device to a wireless network provided bythe router.

DESCRIPTION Introduction

Disclosed herein is a system comprising a router including a processor,and a memory storing instructions executable by the processor to receivea wireless request from a first computing device to initiate aconnection mode for a wireless network; and join a second computingdevice to the wireless network under the connection mode. The connectionmode allows the second device to join the wireless network without inputof a password stored prior to the wireless request.

The connection mode may be active for a predetermined time afterinitiation. Further, the connection mode may be a Wi-Fi protected setup(WPS) mode.

The instructions may further include instructions to receive a set ofparameters specifying the connection mode from the first device; andinitiate the connection mode based on the parameters.

The set of parameters may specify at least one of an amount of time forthe connection mode, a type of computing device authorized to join thewireless network and specification that a temporary password is requiredto join the wireless network.

The instructions may further include instructions to verify that thesecond computing device is of a type specified by the set of parameters.

The instructions may further include instructions to receive a requestfrom the second computing device to connect to the wireless network; andverify that the request is received within a Wi-Fi protected setup (WPS)mode.

The instructions may further include instructions to transmit atemporary password to the first computing device based on receiving thewireless request; and join the second computing device to the wirelessnetwork based on receiving the temporary password from the secondcomputing device.

The instructions may further include instructions to provide the secondcomputing device network operations based on joining the secondcomputing device to the wireless network.

The system may further comprise the first computing device. The firstcomputing device may include a second processor, and a second memorystoring second instructions executable by the second processor totransmit the wireless request to initiate a connection mode for awireless network. The second instructions may further includeinstructions to display a user interface to a user; receive input fromthe user specifying an access parameter for the connection mode; andtransmit the access parameter to the router 115.

Further disclosed herein is a method, comprising receiving a wirelessrequest from a first computing device to initiate a connection mode fora wireless network; and joining a second computing device to thewireless network under the connection mode. The connection mode allowsthe second device to join the wireless network without input of apassword stored prior to the wireless request.

The connection mode may be active for a predetermined time afterinitiation. Further, the connection mode may be a Wi-Fi protected setup(WPS) mode.

The method may further include receiving a set of parameters specifyingthe connection mode from the first device; and initiating the connectionmode based on the parameters.

The set of parameters may specify at least one of an amount of time forthe connection mode, a type of computing device authorized to join thewireless network and specification that a temporary password is requiredto join the wireless network.

The method may further include verifying that the second computingdevice is of a type specified by the set of parameters.

The method may further include receiving a request from the secondcomputing device to connect to the wireless network; and verifying thatthe request is received within a Wi-Fi protected setup (WPS) mode.

The method may further include transmitting a temporary password to thefirst computing device based on receiving the wireless request; andjoining the second computing device to the wireless network based onreceiving the temporary password from the second computing device.

The method may further include providing the second computing devicenetwork operations based on joining the second computing device to thewireless network.

Exemplary System Elements

As illustrated in FIG. 1, a system 100 includes one or more usercomputing devices such as the illustrated devices 105, 110, a router115, a network connecting device 120, and may further include a server125, each having a processor, a memory, and as will be understood,typically other hardware components. Additional devices are not shownfor ease of illustration.

A computer memory, e.g., for storing instructions executable by aprocessor, can be implemented via circuits, chips or other electroniccomponents and can include one or more of read only memory (ROM), randomaccess memory (RAM), flash memory, electrically programmable memory(EPROM), electrically programmable and erasable memory (EEPROM),embedded MultiMediaCard (eMMC), a hard drive, or any volatile ornon-volatile media. The memory may store instructions executable by theprocessor and other data. The processor is implemented via circuits,chips, or other electronic component(s) and may include one or moremicrocontrollers, one or more field programmable gate arrays (FPGAs),one or more application specific integrated circuits (ASICs), one ormore digital signal processors (DSPs), one or more customer specificintegrated circuits, etc. The processors may be included in andprogrammed to execute instructions stored in a memory to carry out theactions of, variously, the router 115, the first and second computingdevices 105, 110, the network connecting device 120, and the server 125as discussed herein.

The first and second computing devices 105, 110 include a computerincluding a processor and a memory and a human machine interface and maybe, for example, a laptop or desktop computer, a smart phone, a tablet,etc. The first and second computing devices 105, 110 are programmed toreceive input from a user via the human machine interface and transmitdata to the router 115 according to a wireless communication standardsuch as IEEE 802.11.

The router 115 may be communicatively coupled, via a wireless network130 to the first computing device 105 and the second computing device110. The router 115 includes a local interface 135. The local interface135 provides short range communications via the wireless network 130. Inone example, the wireless network 130 may operate according to the IEEE802.11 specification, including the protocol known as Wi-Fi®. Via Wi-Fior the like in the local interface 135, the router 115 may communicatewith the first and second computing devices 105, 110, e.g., within acoverage range, e.g., 200 meters of the router 115.

Additionally, the local interface 135 may be arranged to supportcommunication with the first and second computing devices 105, 110according to Zigbee® or Bluetooth® Low Energy standards and/or accordingto wired communications, e.g., based on Ethernet or the like. Forexample, the first computing device 105 may have a wired connection 132to the router 115. In an example, the wired connection 132 includes anEthernet cable physically connecting the first computing device 105 andthe router 115.

The router 115 includes programming to join a computing device such asthe first computing device 105 and second computing device 110 to thewireless network 130. Joining a device to the wireless network 130, asused herein, means to add the device to a list of devices recognized tobe authorized to communicate via the wireless network 130 to the router115.

In some cases, a computing device such as the computing device 105 canconnect, i.e., be communicatively coupled, to the router 115 withoutjoining the wireless network 130, such as through the wired connection132. Additionally or alternatively, computing devices may connect to therouter 115 via another wireless protocol, such as the Zigbee® orBluetooth® Low Energy standards, not included in the wireless network130.

The router 115 is typically programmed to maintain, and typically storesin a non-volatile or persistent memory, a list of computing devicesauthorized to communicate via, i.e., that are joined to, the wirelessnetwork 130. Computing devices such as computing devices 105, 110 haveunique or substantially unique identifiers, e.g., an alphanumericidentifier such as a Media Access Control (MAC) address, which can beincluded in communications from the respective computing devices. A listof authorized computing devices stored in a memory of a router 115typically includes the identifiers of computing devices that have beenauthorized.

The router 115 is programmed to confirm that incoming communications(i.e., communications received via the wireless network 130) come from acomputing device joined to (i.e., authorized to communicate with otherdevices over) the wireless network 130. The router 115 looks for adevice identifier in incoming communications, and only acceptscommunications that include a device identifier included in the list ofauthorized computing devices.

The router 115 further includes programming to add and/or remove devicesto or from the stored list of authorized computing devices. For example,the router 115 may support Wi-Fi Protected Setup (WPS). WPS is awireless security network standard, certified by the Wi-Fi Alliance(10900-B Stonelake Boulevard, Suite 126, Austin, Tex. 78759 U.S.A.; seehttps://www.wi-fi.org/), to facilitate establishing encrypted wirelessconnections between a router such as the router 115, and a computingdevice such as the first computing device 105 or second computing device110.

For example, a user may wish to join the first computing device 105 tothe wireless network 130. In one instance, the first computing device105 may detect that the wireless network 130 is available in a locationwhere the first computing device 105 is operating. The first computingdevice 105 may transmit a request to connect to the wireless network130. For example, a user of the first computing device 105 may selectthe wireless network 130 from a list of available networks presented tothe user on a user interface.

Upon receiving the request to connect to the router 115, the router 115may respond by requesting that the first computing device 105 supply analphanumeric password or the like stored by the router 115 prior toreceiving the wireless request, and which the router 115 is programmedto require from a device 105, 110 for authentication and access to thewireless network 130.

To respond to the router 115, the user of the first computing device 105may obtain the password (which may be included on a WPS configurationuser interface provided by the router 115, e.g., via a web page or thelike, and/or included on a label such as a rear label on the router 115)and input it to the first computing device 105. The first computingdevice 105 may then transmit the password, together with an identifierfor the first computing device 105, to the router 115. Upon receivingthe password and identifier from the first computing device 105, therouter 115 can add the identifier to the list of authorized computingdevices for the wireless network 130.

In another instance, the router 115 may include a WPS button 150. TheWPS button 150 is a physical button, switch, etc., typically located ona case of the router 115, that can be activated (e.g., pressed orpushed) by a user. The router 115 may be programmed, upon detecting anactivation of the WPS button 150, to open a connection mode. Aconnection mode is an access window, i.e., an amount of time (e.g., twominutes) during which a computing device such as the first computingdevice 105 can join the wireless network 130 without submitting apassword. Initiating a connection mode may also be referred to herein asinitiating the Wi-Fi protected setup mode.

For example, during the connection mode, a user may select the wirelessnetwork 130 from a list of available networks presented on a userinterface of the first computing device 105. The first computing device105 may send a request including the first computing device identifierto the router 115 to join the wireless network 130. The router 115 mayreceive the request and add the first computing device identifier to thelist of authorized computing devices.

In another example, the router 115 may include programming to initiatethe connection mode based on receiving a command from a computing deviceconnected to the router 115. A computing device connected to the router115 includes computing devices previously joined to the wireless network130 and may further include computing devices connected via alternativewireless or wired connections. For example, a first computing device 105may have been previously added to the list of authorized computingdevices for the wireless network 130. The first computing device 105 maytransmit a command to the router 115 to initiate the connection mode forconnecting to other computing devices, such as the second computingdevice 110.

In response to the command, the router 115 may initiate a connectionmode (e.g., if the router 115 provides a Wi-Fi network 130, initiate theWPS mode) during which a computing device can join the wireless network130 without input of a password stored prior to the wireless request. Auser of the second computing device 110 may select the wireless network130 on a user interface on the second computing device 110. The secondcomputing device 110 may, based on the user selection, send a request tojoin the wireless network 130 including an identifier for the secondcomputing device 110 to the router 115. In a case that the router 115receives the request within the connection mode, the router 115 can beprogrammed to add the second computing device 110 to the list ofauthorized devices.

The router 115 may further include or have access to non-volatile memoryor data store that can include program instructions executable forwireless activation of the connection mode. For example, the firstcomputing device 105 may download and install the software applicationfrom the router 115. When the first computing device 105 is connected tothe router 115, a user may initiate the connection mode on the router115 from the first computing device 105 by providing input to the router115, upon receipt of which the router 115 initiates execution of theconnection mode.

The router 115 may further be programmed to communicate via a networkconnecting device 120 and network 140 to a server 125.

The network connecting device 120 is a computer-based communicationsdevice implemented via circuits, chips, antennas and other electroniccomponents that can communicate with, for example a satellite and/orcable-based network and may include a modulator and/or demodulator(e.g., as in a conventional modem) to facilitate communications with anetwork, such as the network 140. In some cases, the router 115 andnetwork connecting device 120 may be included in a terminal, e.g., avery small aperture terminal (VSAT) for satellite communications.Accordingly, the connection between the router 115 and the networkconnecting device 120 may be external or included within a commonchassis.

The server 125 is a computing device connected via a wired and/orwireless connection to communicate via a network 140 and may, in somecases, be classified as a Network Operating Center or HUB. Additionallyor alternatively to the router 115, the server 125 may include and/orhave access to a non-volatile memory or data store that can include thesoftware application for wireless activation of the connection mode tojoin the wireless network 130. In this case, e.g., the first computingdevice 105 may download a software application (i.e., what is popularlyreferred to as an “app”) for wireless activation of the connection modefrom the server 125.

The network 140 may be a wide area network, and represents one or moremechanisms, typically including the Internet, for sending and receivingdata between first and second computing devices 105, 110 via the router115 and network connecting device 120, and other computing devices suchas the server 125. The network 140 is distinguished from the wirelessnetwork 130 in that the network 140 can encompass any distance on thesurface of the earth, whereas the wireless network 130 is limited to aspecified geographic area, typically a single building, complex, orcampus, e.g., according to a wireless range of one or more routers 115.The network 140 may be one or more of various wired or wirelesscommunication mechanisms, including any desired combination of wired(e.g., cable and fiber) and/or wireless (e.g., cellular, wireless,satellite, microwave, and radio frequency) communications mechanisms andany desired network topology (or topologies when multiple communicationmechanisms are utilized).

As described above, a computing device such as the first computingdevice 105 may download a software application (the initiate connectionmode application) for wireless activation of the connection mode fromone of the router 115 or the server 125. When activated by a user, theinitiate connection mode application may, for example, display on thefirst computing device 105 a first example user interface 200 as shownin FIG. 2.

The first user interface 200, may, for example, include two virtualbuttons, a “Quick Access” button 205 and a “Customized Access” button210. The Quick Access button may initiate the connection mode to jointhe wireless network 130 based on a default set of parameters. Thedefault set of parameters may include, for example, a default amount oftime for the connection mode (e.g., two minutes), allowing any type ofcomputing device to join during the connection mode, and not requiring apassword, e.g., similar to allowing a device 110 to join the network 130when a physical WPS button or the like is pressed. The Customized Accessbutton 210 may display a second user interface that allows a user tocustomize parameters for the connection mode.

FIG. 3 illustrates an example second user interface 300. The second userinterface 300 may have a first input window 305 for inputting the amountof time for the connection mode, a second input window 310 for inputtinga type of device that can join the wireless network 130 and a thirdinput window 315 for selecting whether the user would like the router115 to provide a temporary password to be used to join the wirelessnetwork 130.

Each of the input windows 305, 310, 315 may provide a list of choices(e.g., in a dropdown list or the like) from which the user may select.For example, the first input window 305 may provide a list of times(e.g., one minute, two minutes, five minutes, etc.) for opening theconnection mode. The second input window 310 may provide a list of typesof devices (e.g., smartphones, tablets, laptops, any, etc.). The thirdwindow 315 may provide the options “yes” to set up a temporary passwordand “no” to proceed without a temporary password.

The second user interface 300 may further include a “Initiate CustomizedConnection Mode” button 320 that sends a command to the router 115 toinitiate the connection mode. When the user activates the button 320,the first computing device 105 can be programmed to send a command tothe router 115 to initiate the connection mode according to thecustomized parameters.

Processing

FIG. 4 is an example process 400 for the router 115 to open a connectionmode based on a command provided from a first computing device 105connected to the router 115, and for then joining a second computingdevice 110 to the wireless network 130 during the connection mode. Theprocess 400 begins in a block 405.

In the block 405, the router 115 receives a command message from thefirst computing device 105 to initiate the connection mode. For example,a user of the first computing device 105 may activate the initiateconnection mode application included on the first computing device 105.The application may have been previously downloaded to the firstcomputing device 105 as described above. Alternatively, the user may,for example by activating an icon on the first computing device 105,request access to the initiate connection mode application. Based on theuser input, the first computing device 105 may request the router 115 toprovide access to the application. In response, the router 115 maytransmit a web page to the first computing device 105. The web page mayprovide the user access to the initiate connection mode application.

Via the user interface provided via the first computing device 105, auser may input a request to the first computing device 105 to initiatethe connection mode on the router 115 including access parameters suchas an amount of time for the connection mode, type(s) of devices thatcan obtain access and whether the router 115 should set up a temporarypassword or the like. Further, the user interface on the user device 105can prompt a user to provide the temporary password, personalidentification number (PIN) or the like, to be provided by a user of adevice 110. Thus, the router 115 can be instructed to e.g., randomlygenerate a brief PIN or password (e.g., 4 digits, 6 characters, etc.),and/or user input to a device 105 could provide the temporary password.The first computing device 105 can be programmed to then transmit thecommand message to the router 115.

Following the block 405, in the block 410, the router 115 initiates theconnection mode based on the access parameters included in the commandmessage. In the case that the command requests that the router 115provide a temporary password, i.e., provided by the device 105 orgenerated by the router 115, the router 115 is programmed to transmitthe temporary password to the first computing device 105. The process300 continues in a block 415.

In the block 415, the router 115 may receive a request to join thesecond computing device 110 to the wireless network 130.

For example, a user of the second computing device 110 may open aninterface on the second computing device 110 for selecting a network.The interface may include the wireless network 130 on a list ofavailable networks. The user may then select the wireless network 130from the list. The second computing device 110 may then, in response tothe user selection, send a request to the router 115 to connect thesecond computing device 110 to the router. The request may include anidentifier for the second computing device 110.

In a case that the access parameters specify that the user supply atemporary password, the router 115 may respond with a request to inputthe temporary password. In this case, the user may, for example, obtainthe temporary password from the first computing device 105 (e.g., fromthe user of the first computing device). The user (e.g., the user of thesecond computing device 110) may then input the temporary password intothe second computing device 110, and the second computing device 110 cantransmit the temporary password to the router 115. The process 400continues in a block 420.

In the block 420, the router 115 is programmed to determine whether therequest fulfills the access parameters. That is, the router 115determines whether the request is received within the connection mode,is from a computing device of a type authorized to obtain access, and,if required, includes the temporary password set up by the router 115.In the case that the request fulfills the access parameters, the process400 continues in a block 425. Otherwise, the process 400 ends.

In the block 425, the computing device adds the second computing device110 identifier to the list of authorized devices. The process 400 thenends.

In the case that the router 115 adds the identifier of the secondcomputing device 110 to the list of authorized devices, the router 115may, thereafter, from time-to-time, operate in a conventional manner toprovide the device 110 network operations, e.g., to receivecommunications from the second computing device 110 and transmit themvia the network 140 to the server 125 or other computing devicesconnected to the network 140 and transmit to the second computing device110 communications received from the server 125.

CONCLUSION

In general, the computing systems and/or devices described may employany of a number of computer operating systems, including, but by nomeans limited to, versions and/or varieties of the Microsoft Windows®operating system, the Unix operating system (e.g., the Solaris®operating system distributed by Oracle Corporation of Redwood Shores,Calif.), the AIX UNIX operating system distributed by InternationalBusiness Machines of Armonk, N.Y., the Linux operating system, e.g.,embedded in a customized chipset, the Mac OSX and iOS operating systemsdistributed by Apple Inc. of Cupertino, Calif., and the Androidoperating system developed by Google, Inc. and the Open HandsetAlliance. Examples of computing devices include, without limitation,network devices such as a gateway or terminal, a computer workstation, aserver, a desktop, notebook, laptop, or handheld computer, or some othercomputing system and/or device.

Computing devices generally include computer-executable instructions,where the instructions may be executable by one or more computingdevices such as those listed above. Computer-executable instructions maybe compiled or interpreted from computer programs created using avariety of programming languages and/or technologies, including, withoutlimitation, and either alone or in combination, Java™, C, C++, VisualBasic, Java Script, Perl, etc. Some of these applications may becompiled and executed on a virtual machine, such as the Java VirtualMachine, the Dalvik virtual machine, or the like. In general, aprocessor (e.g., a microprocessor) receives instructions, e.g., from amemory, a computer-readable medium, etc., and executes theseinstructions, thereby performing one or more processes, including one ormore of the processes described herein. Such instructions and other datamay be stored and transmitted using a variety of computer-readablemedia.

A computer-readable medium (also referred to as a processor-readablemedium) includes any non-transitory (e.g., tangible) medium thatparticipates in providing data (e.g., instructions) that may be read bya computer (e.g., by a processor of a computer). Such a medium may takemany forms, including, but not limited to, non-volatile media andvolatile media. Non-volatile media may include, for example, optical ormagnetic disks and other persistent memory. Volatile media may include,for example, dynamic random-access memory (DRAM), which typicallyconstitutes a main memory. Such instructions may be transmitted by oneor more transmission media, including coaxial cables, copper wire andfiber optics, including the wires that comprise a system bus coupled toa processor of a computer. Common forms of computer-readable mediainclude, for example, a floppy disk, a flexible disk, hard disk,magnetic tape, any other magnetic medium, a CD-ROM, DVD, any otheroptical medium, punch cards, paper tape, any other physical medium withpatterns of holes, a RAM, a PROM, an EPROM, a FLASH-EEPROM, any othermemory chip or cartridge, or any other medium from which a computer canread.

Databases, data repositories or other data stores described herein mayinclude various kinds of mechanisms for storing, accessing, andretrieving various kinds of data, including a hierarchical database, aset of files in a file system, an application database in a proprietaryformat, a relational database management system (RDBMS), etc. Each suchdata store is generally included within a computing device employing acomputer operating system such as one of those mentioned above, and areaccessed via a network in any one or more of a variety of manners. Afile system may be accessible from a computer operating system, and mayinclude files stored in various formats. An RDBMS generally employs theStructured Query Language (SQL) in addition to a language for creating,storing, editing, and executing stored procedures, such as the PL/SQLlanguage mentioned above.

In some examples, system elements may be implemented ascomputer-readable instructions (e.g., software) on one or more computingdevices (e.g., servers, personal computers, etc.), stored on computerreadable media associated therewith (e.g., disks, memories, etc.). Acomputer program product may comprise such instructions stored oncomputer readable media for carrying out the functions described herein.

With regard to the processes, systems, methods, heuristics, etc.described herein, it should be understood that, although the steps ofsuch processes, etc. have been described as occurring according to acertain ordered sequence, such processes could be practiced with thedescribed steps performed in an order other than the order describedherein. It further should be understood that certain steps could beperformed simultaneously, that other steps could be added, or thatcertain steps described herein could be omitted. In other words, thedescriptions of processes herein are provided for the purpose ofillustrating certain embodiments and should in no way be construed so asto limit the claims.

Accordingly, it is to be understood that the above description isintended to be illustrative and not restrictive. Many embodiments andapplications other than the examples provided would be apparent uponreading the above description. The scope should be determined, not withreference to the above description, but should instead be determinedwith reference to the appended claims, along with the full scope ofequivalents to which such claims are entitled. It is anticipated andintended that future developments will occur in the technologiesdiscussed herein, and that the disclosed systems and methods will beincorporated into such future embodiments. In sum, it should beunderstood that the application is capable of modification andvariation.

All terms used in the claims are intended to be given their ordinarymeanings as understood by those knowledgeable in the technologiesdescribed herein unless an explicit indication to the contrary is madeherein. In particular, use of the singular articles such as “a,” “the,”“said,” etc. should be read to recite one or more of the indicatedelements unless a claim recites an explicit limitation to the contrary.

The Abstract is provided to allow the reader to quickly ascertain thenature of the technical disclosure. It is submitted with theunderstanding that it will not be used to interpret or limit the scopeor meaning of the claims. In addition, in the foregoing DetailedDescription, it can be seen that various features are grouped togetherin various embodiments for the purpose of streamlining the disclosure.This method of disclosure is not to be interpreted as reflecting anintention that the claimed embodiments require more features than areexpressly recited in each claim. Rather, as the following claimsreflect, inventive subject matter lies in less than all features of asingle disclosed embodiment. Thus, the following claims are herebyincorporated into the Detailed Description, with each claim standing onits own as a separately claimed subject matter.

What is claimed is:
 1. A system comprising a router including aprocessor, and a memory storing instructions executable by the processorto: receive a wireless request from a first computing device to initiatea connection mode for a wireless network; and join a second computingdevice to the wireless network under the connection mode; wherein theconnection mode allows the second device to join the wireless networkwithout input of a password stored prior to the wireless request.
 2. Thesystem of claim 1, wherein the connection mode is active for apredetermined time after initiation.
 3. The system of claim 1, whereinthe connection mode is a Wi-Fi protected setup (WPS) mode.
 4. The systemof claim 1, the instructions further including instructions to: receivea set of parameters specifying the connection mode from the firstdevice; and initiate the connection mode based on the parameters.
 5. Thesystem of claim 4, wherein the set of parameters specifies at least oneof an amount of time for the connection mode, a type of computing deviceauthorized to join the wireless network and specification that atemporary password is required to join the wireless network.
 6. Thesystem of claim 4, the instructions further including instructions to:verify that the second computing device is of a type specified by theset of parameters.
 7. The system of claim 1, the instructions furtherincluding instructions to: receive a request from the second computingdevice to connect to the wireless network; and verify that the requestis received within a Wi-Fi protected setup (WPS) mode.
 8. The system ofclaim 1, the instructions further including instructions to: transmit atemporary password to the first computing device based on receiving thewireless request; and join the second computing device to the wirelessnetwork based on receiving the temporary password from the secondcomputing device.
 9. The system of claim 1, the instructions furtherincluding instructions to: provide the second computing device networkoperations based on joining the second computing device to the wirelessnetwork.
 10. The system of claim 1, further comprising: the firstcomputing device, including a second processor, and a second memorystoring second instructions executable by the second processor to:transmit the wireless request to initiate a connection mode for awireless network.
 11. The system of claim 10, the second instructionsincluding instructions to: display a user interface to a user; receiveinput from the user specifying an access parameter for the connectionmode: and transmit the access parameter to the router
 115. 12. A method,comprising: receiving a wireless request from a first computing deviceto initiate a connection mode for a wireless network; and joining asecond computing device to the wireless network under the connectionmode; wherein the connection mode allows the second device to join thewireless network without input of a password stored prior to thewireless request.
 13. The method of claim 12, wherein the connectionmode is active for a predetermined time after initiation.
 14. The methodof claim 12, wherein the connection mode is a Wi-Fi protected setup(WPS) mode.
 15. The method of claim 12, further comprising: receiving aset of parameters specifying the connection mode from the first device;and initiating the connection mode based on the parameters.
 16. Themethod of claim 15, wherein the set of parameters specifies at least oneof an amount of time for the connection mode, a type of computing deviceauthorized to join the wireless network and specification that atemporary password is required to join the wireless network.
 17. Themethod of claim 15, further comprising: verifying that the secondcomputing device is of a type specified by the set of parameters. 18.The method of claim 12, further comprising: receiving a request from thesecond computing device to connect to the wireless network; andverifying that the request is received within a Wi-Fi protected setup(WPS) mode.
 19. The method of claim 12, further comprising: transmittinga temporary password to the first computing device based on receivingthe wireless request; and joining the second computing device to thewireless network based on receiving the temporary password from thesecond computing device.
 20. The method of claim 12, further comprising:providing the second computing device network operations based onjoining the second computing device to the wireless network.