Abstract:
include using an application on a mobile device to establish first wireless communications with a first smart-home device that was previously paired with the user account. The method may also include transmitting, to the first smart-home device and using the first wireless protocol, a transmission that instructs the first smart-home device to establish second wireless communications with a second smart-home device, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first smart-home device using the first wireless protocol, where the credentials are then sent from the first smart-home device to the second smart-home device using the second wireless protocol, such that the second smart-home device can pair with the user account using the first wireless protocol.
Abstract:
A method for using a first device to pair a second device to a user account may include receiving first wireless communications using a first wireless protocol, where the first device has previously been paired with the user account. The method may also include receiving a transmission that instructs the first device to establish second wireless communications with the second device, and then establishing the second wireless communications between the first device and the second device using a second wireless protocol. The method may additionally include receiving, using the first wireless protocol, information allowing the second device to use the first wireless protocol, and sending the information to the second device using the second wireless protocol, where a new pairing between the second device and the user account is established using the first wireless protocol.
Abstract:
include using an application on a mobile device to establish first wireless communications with a first hazard detector that was previously paired with the user account. The method may also include transmitting, to the first hazard detector and using the first wireless protocol, a transmission that instructs the first hazard detector to establish second wireless communications with a second hazard detector, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first hazard detector using the first wireless protocol, where the credentials are then sent from the first hazard detector to the second hazard detector using the second wireless protocol, such that the second hazard detector can pair with the user account using the first wireless protocol.
Abstract:
include using an application on a mobile device to establish first wireless communications with a first smart-home device that was previously paired with the user account. The method may also include transmitting, to the first smart-home device and using the first wireless protocol, a transmission that instructs the first smart-home device to establish second wireless communications with a second smart-home device, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first smart-home device using the first wireless protocol, where the credentials are then sent from the first smart-home device to the second smart-home device using the second wireless protocol, such that the second smart-home device can pair with the user account using the first wireless protocol.
Abstract:
include using an application on a mobile device to establish first wireless communications with a first hazard detector that was previously paired with the user account. The method may also include transmitting, to the first hazard detector and using the first wireless protocol, a transmission that instructs the first hazard detector to establish second wireless communications with a second hazard detector, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first hazard detector using the first wireless protocol, where the credentials are then sent from the first hazard detector to the second hazard detector using the second wireless protocol, such that the second hazard detector can pair with the user account using the first wireless protocol.