Facilitating dynamic private communication networks

ABSTRACT

Private communication networks are facilitated. One method includes broadcasting, by a first device, to an access point device associated with a first network, a first signal comprising an identifier for a second network, wherein the access point device of the first network foregoes broadcast of a name of the first network, and wherein the first device is located at a first location and a second device is located at a second location remote from the first location. The first device and the second device are associated with the second network. The method also includes receiving a second signal indicative of a broadcast of the name of the second network based on an authentication of the identifier for the second network and key data representing a key for the second network; and connecting to a network device of the second network in response to the receiving the second signal.

RELATED APPLICATIONS

The subject patent application is a divisional of, and claims priorityto each of, U.S. patent application Ser. No. 16/840,810, filed Apr. 6,2020, and entitled “FACILITATING DYNAMIC PRIVATE COMMUNICATIONNETWORKS,” which is a continuation of U.S. patent application Ser. No.16/059,192 (U.S. Pat. No. 10,645,644), filed Aug. 9, 2018, and entitled“FACILITATING DYNAMIC PRIVATE COMMUNICATION NETWORKS,” which is acontinuation of U.S. patent application Ser. No. 14/547,969 (U.S. Pat.No. 10,075,906), filed Nov. 19, 2014, and entitled “FACILITATING DYNAMICPRIVATE COMMUNICATION NETWORKS,” the entireties of which priorityapplications are hereby incorporated by reference herein.

TECHNICAL FIELD

The subject disclosure relates generally to communication networks andto facilitating dynamic private communication networks.

BACKGROUND

In modern day society, user connectivity to selected networks ishighly-desirable. The drive to remain connected is fostered by thereduction in complexity resultant from interacting with familiarcomputing and device environments. However, current solutions to obtainaccess to various networks are complicated.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example block diagram of a system in which privatecommunication networks can be facilitated in accordance with one or moreembodiments.

FIG. 2 illustrates an example block diagram of a graphical userinterface of a device of FIG. 1 for which a private communicationnetwork can be facilitated in accordance with one or more embodimentsdescribed herein.

FIGS. 3 and 4 illustrate example block diagrams of other systems inwhich private communication networks can be facilitated in accordancewith one or more embodiments.

FIG. 5 illustrates an example block diagram of a device of the systemsof FIG. 1, 3 or 4 in accordance with one or more embodiments describedherein.

FIG. 6 illustrates an example block diagram of an access point device ofthe systems of FIG. 1, 3 or 4 in accordance with one or moreembodiments.

FIG. 7 illustrates an example block diagram of a provisioning serverdevice of the systems of FIG. 1, 3 or 4 in accordance with one or moreembodiments described herein.

FIG. 8 illustrates an example provisioning table of the provisioningserver device of FIG. 7 in accordance with one or more embodimentsdescribed herein.

FIGS. 9-12 illustrate example flow diagrams for facilitating privatecommunication networks in accordance with one or more embodiments.

FIG. 13 illustrates a block diagram of a computer operable to facilitateprivate communication networks in accordance with one or moreembodiments in accordance with one or more embodiments.

DETAILED DESCRIPTION

One or more embodiments are now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the various embodiments. It is evident,however, that the various embodiments can be practiced without thesespecific details (and without applying to any particular networkedenvironment or standard).

As used in this application, in some embodiments, the terms “component,”“system” and the like are intended to refer to, or include, acomputer-related entity or an entity related to an operational apparatuswith one or more specific functionalities, wherein the entity can beeither hardware, a combination of hardware and software, software, orsoftware in execution. As an example, a component may be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, computer-executableinstructions, a program, and/or a computer. By way of illustration andnot limitation, both an application running on a server and the servercan be a component.

One or more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software application orfirmware application executed by a processor, wherein the processor canbe internal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. While various components have been illustrated asseparate components, it will be appreciated that multiple components canbe implemented as a single component, or a single component can beimplemented as multiple components, without departing from exampleembodiments.

Further, the various embodiments can be implemented as a method,apparatus or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device or computer-readable storage/communicationsmedia. For example, computer readable storage media can include, but arenot limited to, magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips), optical disks (e.g., compact disk (CD), digitalversatile disk (DVD)), smart cards, and flash memory devices (e.g.,card, stick, key drive). Of course, those skilled in the art willrecognize many modifications can be made to this configuration withoutdeparting from the scope or spirit of the various embodiments.

In addition, the words “example” and “exemplary” are used herein to meanserving as an instance or illustration. Any embodiment or designdescribed herein as “example” or “exemplary” is not necessarily to beconstrued as preferred or advantageous over other embodiments ordesigns. Rather, use of the word example or exemplary is intended topresent concepts in a concrete fashion. As used in this application, theterm “or” is intended to mean an inclusive “or” rather than an exclusive“or”. That is, unless specified otherwise or clear from context, “Xemploys A or B” is intended to mean any of the natural inclusivepermutations. That is, if X employs A; X employs B; or X employs both Aand B, then “X employs A or B” is satisfied under any of the foregoinginstances. In addition, the articles “a” and “an” as used in thisapplication and the appended claims should generally be construed tomean “one or more” unless specified otherwise or clear from context tobe directed to a singular form.

Moreover, terms such as “mobile device equipment,” “mobile station,”“mobile,” subscriber station,” “access terminal,” “terminal,” “handset,”“mobile device” (and/or terms representing similar terminology) canrefer to a wireless device utilized by a subscriber or mobile device ofa wireless communication service to receive or convey data, control,voice, video, sound, gaming or substantially any data-stream orsignaling-stream. The foregoing terms are utilized interchangeablyherein and with reference to the related drawings. Likewise, the terms“access point (AP),” “Base Station (BS),” BS transceiver, BS device,cell site, cell site device, “Node B (NB),” “evolved Node B (eNode B),”“home Node B (HNB)” and the like, are utilized interchangeably in theapplication, and refer to a wireless network component or appliance thattransmits and/or receives data, control, voice, video, sound, gaming orsubstantially any data-stream or signaling-stream from one or moresubscriber stations. Data and signaling streams can be packetized orframe-based flows.

Furthermore, the terms “device,” “mobile device,” “subscriber,”“customer,” “consumer,” “entity” and the like are employedinterchangeably throughout, unless context warrants particulardistinctions among the terms. It should be appreciated that such termscan refer to human entities or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms), which can provide simulated vision,sound recognition and so forth.

Embodiments described herein can be exploited in substantially anywireless communication technology, including, but not limited to,wireless fidelity (Wi-Fi), global system for mobile communications(GSM), universal mobile telecommunications system (UMTS), worldwideinteroperability for microwave access (WiMAX), enhanced general packetradio service (enhanced GPRS), third generation partnership project(3GPP) long term evolution (LTE), third generation partnership project 2(3GPP2) ultra mobile broadband (UMB), high speed packet access (HSPA),Zigbee and other 802.XX wireless technologies and/or legacytelecommunication technologies. Further, the terms “femto” and “femtocell” are used interchangeably, and the terms “macro” and “macro cell”are used interchangeably.

Users of Wi-Fi/hot spot services typically desire an ability to expandease of use of such service across a number of different areas,including the use of public Wi-Fi networks. However, users also desiresecurity and convenience while accessing these networks. Currentsolutions make it very complicated to obtain secure Wi-Fi access. One ormore embodiments described herein reverse the traditional wirelessnetwork and/or wireless client model by centralizing the provisioning ofwireless networks, for the end user, and then allowing remotedevices/nodes to establish wireless networks, hidden and advertised,from a provisioning server device.

Embodiments described herein include systems, methods, apparatus and/orcomputer-readable storage media facilitating secure access to privatecommunication networks via public communication networks. In oneembodiment, a method includes broadcasting, by a first device comprisinga processor, to an access point device associated with a first network,a first signal comprising an identifier for a second network, whereinthe access point device of the first network foregoes broadcast of aname of the first network, wherein the first device is located at afirst location and a second device is located at a second locationremote from the first location, and wherein the first device and thesecond device are associated with the second network. The method alsoincludes receiving, by the first device, a second signal indicative of abroadcast of the name of the second network based on an authenticationof the identifier for the second network and key data representing a keyfor the second network. The method also includes connecting, by thefirst device, to a network device of the second network in response tothe receiving the second signal.

Another embodiment includes an apparatus including processor; and amemory that stores executable instructions that, when executed by theprocessor, facilitate performance of operations. The operations includetransmitting, to an access point device associated with a first network,a first signal including an identifier and key information representinga key for a second network, wherein the access point device of the firstnetwork foregoes broadcast of a name of the first network, wherein afirst device is located at a first location and a second device islocated at a second location remote from the first location, and whereinthe first device and the second device are associated with the secondnetwork.

In another embodiment, a computer-readable storage device storescomputer-executable instructions that, in response to execution, cause afirst device comprising a processor to perform operations. Theoperations include receiving, from a second device, a first broadcastsignal identifying a first network associated with the second device,wherein the first device is associated with a second network; anddetermining that the first network is approved based on correspondencebetween an identifier of the first network and information aboutapproved networks. The operations also include broadcasting a secondsignal identifying the first network in response to determining that thefirst network is approved, wherein the broadcasting the second signal isperformed after the receiving the broadcast of the first broadcastsignal.

Embodiments described herein can advantageously provide a system thatenables easy roaming by devices and secure access to a private homenetwork associated with the device. A user device can obtain secure andconvenient access to a virtual private network automatically in variouslocations to which a user may travel outside of the home without resortto cumbersome virtual private network (VPN) software or secure socketlayer (SSL) software. Thus, the device is able to communicate withdevices associated with the private network while the device is locatedremote from the devices on the private network.

Turning now to the drawings, FIG. 1 illustrates an example block diagramof a system in which private communication networks can be facilitatedin accordance with one or more embodiments. System 100 can enable adevice to advantageously maintain secure communication with or securelyconnect to a private communication network while being remote from thelocation associated with the private communication network.

In the embodiment shown, system 100 includes access point devices 102,104, devices 106, 108, 110, 112, provisioning server device 114 and/orrouting device 116. Also shown are networks 118, 120 and 122. In variousembodiments, one or more of access point devices 102, 104, devices 106,108, 110, 112, provisioning server device 114 and/or routing device 116can be electrically and/or communicatively coupled to one another toperform one or more functions of system 100. As used herein, the terms“private communication network” and “private network” mean or include anetwork that is associated with a defined user (or a defined set ofusers) and provisioned for use by a selected set of devices associatedwith the defined user (or the defined set of users). In FIG. 1, network122 is a private network provisioned for devices 106, 108, 110, 112.

Devices 106, 108, 110, 112 can include a device having hardware,software or a combination of hardware and software and configured tocommunicate over a wired or wireless network. By way of example, but notlimitation, devices 106, 108, 110, 112 can be or include smart phones,laptops, personal computers, tablet computers, digital video recorders,set top boxes, home cameras, home security systems, sensors or the like.Devices 106, 108, 110, 112 can be communicatively coupled to network 122via a wired (e.g., Ethernet) or a wireless connection in variousembodiments.

In one embodiment, devices 106, 108, 110, 112 are associated withnetwork 122. Network 122 can be a private network limited to devices106, 108, 110, 112 in some embodiments. By way of example, but notlimitation, network 122 can be a home residential network for devices106, 108, 110, 112. In other embodiments, network 122 can be atdifferent locales. For example, network 122 can be a private networkestablished at a hotel locale or other location as provisioned throughprovisioning server device 114 for the benefit of devices 106, 108, 110,112.

Access point devices 102, 104 can include hardware, software or acombination of hardware and software, and can be configured to conductcommunication with one or more of devices 106, 108, 110, 112 (or anyother device in the area covered by access point devices 102, 104), withprovisioning server device 114, with routing device 116 and/or anynumber of other devices to facilitate a location connection point to alarger network. By way of example, but not limitation, access pointdevices 102, 104 can be configured to provide Wi-Fi/hot spot servicewithin the area of communication covered by access point devices 102,104.

In some embodiments, one or more of access point devices 102, 104 can beelectrically and/or communicatively coupled to provisioning serverdevice 114 and/or routing device 116 to provide access to device 106 tothe private network for devices 106, 108, 110, 112 (e.g., network 122)while device 106 is outside of the coverage area of network 122. As usedherein, provisioning server device 114 is a central provisioning serverinside of a core network for system 100.

One or more of devices 106, 108, 110, 112 can be stationary and/ormobile devices. In one embodiment, device 106 is a mobile device thatcan roam from network 122 to the geographical area of coverageassociated with access point device 102 and corresponding network 118 tothe geographical area of coverage associated with access point device104 and corresponding network 120.

In the embodiments described herein, networks 118, 120 are hiddennetworks for which a signal indicating the presence of networks 118, 120is not broadcast or transmitted by access point devices 102, 104 unlessa defined series of events has been initiated and performed by device106 to request connection to private network 122 via one or more ofaccess point devices 102, 104. For example, access point devices 102,104 do not broadcast or transmit a signal indicative of the name of thenetwork 118 or network 120 prior to initiation of contact and/orprovisioning of defined information with access point devices 102, 104by device 106.

The process will now be described in greater detail. Device 106 can roamto or otherwise be located within the coverage area of access pointdevice 102. While within the defined coverage area such that accesspoint device 102 can detect a broadcast signal from device 106, device106 can broadcast a unique identifier (e.g., service set identifier(SSID)) for a private network with which device 106 is associated, andto which device 106 would like to be connected via access point device106. For example, notwithstanding access point device 102 does notbroadcast or transmit the name of network 118, and therefore device 106does not detect the name of network 118 and/or that access point device102 is present, device 106 initiates broadcast or transmission of thename of private network 122. By way of example, but not limitation, thebroadcast can be in accordance with 802.11 standards. In someembodiments, the signal broadcast/transmitted by device 106 includes,but is not limited to, information indicative of an identifier ofnetwork 122.

The identifier transmitted by device 106 can be pre-programmed in devicevia hardware and/or software associated with or stored in device 106 atinstallation or purchase of device 106 in some embodiments, for example.FIG. 2 illustrates an example block diagram of a graphical userinterface of a device of FIG. 1 for which a private communicationnetwork can be facilitated in accordance with one or more embodimentsdescribed herein. Repetitive description of like elements employed inother embodiments described herein is omitted for sake of brevity.

Graphical user interface is one example of a screen of device 106 thatcan be receive an identifier for a private network, password for theprivate network to manually provision the request by device 106 of theprivate network. In other embodiments, this information can bepre-stored in device 106 and the information need not be manuallyentered or is already stored in device 106 upon the arrival of device106 at the region covered by access point device 102.

As shown in FIG. 2, in some embodiments, device 106 can include agraphical user interface 200 that can display a first section forreceiving or indicating a network name associated with device 106. Inthis case, the network name 202 is “Ubiquity-0003.” As described,network name 202 can be or include the identifier (e.g., SSID)broadcast/transmitted by device 106. In some embodiments, network name202 is associated with the identifier broadcast/transmitted by device106.

As described, network name 202 can be a previously-assigned privatenetwork to which device 106 is associated. For example, in oneembodiment, provisioning server device 114 can store a set of networknames and corresponding passwords associated with various networks (asdescribed and shown later with reference to FIG. 8). In someembodiments, each user is assigned a unique network name (e.g.,identifier) and password/key.

Graphical user interface 200 can also display a second section forreceiving or indicating receipt of password/key 204 associated withnetwork name 202. Password/key 204 can be information unique to aparticular network that allows a device (e.g., device 106) to connect tothe network identified by network name 202. Graphical user interface 200can also include a third section displaying a button that can beactivated to transmit/broadcast the network name and password fromdevice 106 to access point device 102. In various embodiments, device106 can broadcast/transmit network name 202 and password 204 at periodicintervals (e.g., every two minutes, every five minutes) or upon thedetection of an event (e.g., roaming within a defined distance of amapped retail establishment).

In some embodiments, once device 106 is activated to join a specifiednetwork, device 106 can broadcast a request to be connected to network122 to access point device 102.

Turning back to FIG. 2, one or more (or every) Wi-Fi access point devicein the range of device 106 will hear the request for the network parleyfrom device 106. In the embodiment shown, access point device 102 canreceive/detect the signal from device 106 since device 106transmits/broadcasts the signal while within the coverage area ofnetwork 118. Access point device 102 can establish a secure connectionback to provisioning server device 114 to determine whether thebroadcast/transmitted identifier is an authorized network. In someembodiments, the identity of and/or identifier for a network istherefore maintained as secure. As used herein, an authorized networkcan be a network provisioned by provisioning server device 114 orotherwise part of a larger core network associated with provisioningserver device 114.

Provisioning server device 114 can include hardware, software or acombination of hardware and software configured to provision a newprivate network to one or more devices (e.g., devices 106, 108, 110,112) and/or establish provisioning of a roaming device to the privatenetwork associated with the roaming device. In some embodiments,provisioning server device 114 can store the assigned network name andpassword for the network upon assignment of such information to a userand/or to a device, for example.

In various embodiments, provisioning server device 114 can provision oneor more of devices 106, 108, 110, 112 with the following information:the unique private network name/identifier (e.g., SSID), private networkkey (e.g., password), the address space of the private network, therouting table of the private network, the target internal virtualrouter, along with appropriate key and credentials for the privatenetwork to connect to the private network securely and/or any additionalconfiguration of the network.

Virtual local area networks (VLANs) are typically common in the network.For example, a particular router can handle many virtual segments acrossa common architecture. In home networks, for example, routing can behandled by a residential gateway, or intermediate customer premisedevices, such that packets with local source and destination addresseswithin the physical network can be handled internally, and externalnetwork requests can be passed to a gateway or modem (e.g., digitalsubscriber line (DSL) modem) out to the larger Internet. In this case,with multiple devices on VLAN segments being supplied by access pointdevices that are isolating the traffic of all the client devices fromeach other, a virtual router can be the destination device in thenetwork where the virtual segments join logically and appear to be theequivalent of the home residential gateway or router, with a logicalgateway device for packets with source and destination addresses outsidethe VLAN. With reference to the foregoing example, the network can beconsidered to be a large pseudo-virtual private network. An ingresspoint and/or an egress point of the network can have a VLAN assignmentthat allows for transition from internal to external routing. There canbe traffic over a residential gateway that is internal to the residence,traffic that is specific to a particular network and traffic enteringand exiting the local network. One or more (or, in some embodiments,each) of these traffic lanes can have a defined VLAN for trafficmanagement. Therefore, in some embodiments, both destination andidentification information can identify the VLAN to which the traffic istargeted.

In some embodiments, routing and/or addressing can be managed by anynumber of applications. One example application is the VMware NSXnetwork virtualization and security platform. As described above, theseapplications can be dependent on network micro-segmentation, virtualizedinstance (e.g., cloud) and/or multi-path routing.

Provisioning of a private network to a user and/or a device can beperformed at time of installation or purchase of the one or more devicesin some embodiments. For example, if device 108 is a digital videorecorder, provisioning of network 122 for device 108 (and updating theinformation at database device 124) can be performed at the time ofinstallation of device 108 in a home location, for example. Similarly,if device 106 is a smart phone, at the time of purchase of the smartphone, or at the time that the smart phone is activated, provisioning ofnetwork 122 for device 106 (and updating the information at databasedevice 124) can be performed.

Provisioning server device 114 can include or access, directly or over anetwork, database device 124. Database device 124 can store identifiersfor different networks and can be queried by access point device 102 todetermine if the identifier transmitted/broadcast by device 106 is avalid identifier. Database device 124 can also store informationregarding how to route the information that is transmitted from device106.

Since provisioning can be performed at the time of installation, pairingof devices to a residential gateway device is not required. Noresidential gateway device is required at the area covered by network122. Devices 108, 110, 112 can connect directly to the private wirelessnetwork. While no residential gateway device is required, a residentialrepeater could be included within a distance of devices 108, 110, 112 atthe area covered by network 122 in some embodiments (e.g., if devices108, 110, 112 are located a particular distance from access point device102 or routing device 116, which transmits the signal to the areacovered by network 122). In some embodiments, an optical networkterminal (ONT) employed with fiber-to-the premises applications can beemployed at the location covered by network 122 (e.g., home).

In some embodiments, an option can be provided for installation withoutlabor being required at the location of devices 108, 110, 112. Forexample, the core network associated with provisioning server device 114or provisioning server device 114 can transmit a wireless broadcast tothe area to be covered by network 122. No modifications to the home arerequired. Access to the area covered by network 122 (e.g., a home) isonly needed if the customer desires specific installation help,otherwise installation can be performed on a user-directed self-servicebasis with the installation being done wirelessly.

In some embodiments, provisioning server device 114 can provisiondifferent amounts of speed for a particular network. The speedprovisioned can also be part of the quality of serviceprovided/guaranteed. In some embodiments, the speed can be provisionedto be variable up to several Gigabytes per second (Gbytes/s) based on avariety of factors (e.g., types of devices on the network andcorresponding sensitivity to data transmission delay, need for real-timeservice, price at which network was purchased or the like).

In some embodiments, the provisioning server device 114 (or any otherdevice in system) can provision an amount of bandwidth for the privatenetwork and/or based on the one or more devices associated with theprivate network. The amount of bandwidth can be a fixed amount ofbandwidth in some embodiments. The amount of bandwidth can be aguaranteed amount of bandwidth to provide a defined quality of servicein some embodiments. In other embodiments, the guaranteed amount ofbandwidth can be a maximum amount of bandwidth.

In either case, whether the amount of bandwidth is a guaranteed minimumamount of bandwidth or a maximum amount of bandwidth, the amount ofbandwidth provisioned can be based on the functionality of theparticular device of devices 106, 108, 110, 112, for example, in someembodiments. For example, a device that is a set top box device can beprovisioned a first amount of bandwidth while a device that is a digitalvideo recorder can be provisioned a second amount of bandwidth that isgreater than the amount of bandwidth provisioned for the set top boxsince the digital video recorder is likely to require more bandwidth dueto the purpose of the digital video recorder.

In one embodiment, 8 Mbytes/s can be provisioned for a digital videorecorder while 6 Mbytes/s can be provisioned for a set top box. Theamount of bandwidth that can be provisioned can be provisioned equallyfor incoming traffic and for outgoing traffic in some embodiments. Forexample, a digital video recorder that is provisioned 8 Mbytes/s canhave 4 Mbytes/s of bandwidth provisioned for incoming traffic and 4Mbytes/s provisioned for outgoing traffic.

In some embodiments, the incoming and outgoing bandwidth can beprovisioned in an asymmetric manner. For example, the device can beprovisioned to have more bandwidth on the incoming link for devices thathave an extensive amount of data transmitted to the device (and muchless data transmitted from the device).

In some embodiments, in lieu of provisioning bandwidth based on the oneor more devices of a network, provisioning server device 114 canestablish a class of service for the private network, and one or more(or, in some embodiments, all of the) devices associated with network122 can enjoy the service as needed. For example, a maximum bandwidth(e.g., maximum amount of instantaneous bandwidth) can be provisioned forall devices associated with network 122. Each of devices 106, 108, 110,112 can utilize any portion of the maximum bandwidth in someembodiments. As such, the amount of bandwidth utilized by a particularone of devices 106, 108, 110, 112 at any specific time can depend on theneed of the particular device at the specific time.

This provisioning allows the network to identify hotspots in usage inwhich there is not enough bandwidth to meet the needs of the devicesassociated with the private network and thereby provide capacitymanagement. In some embodiments, provisioning server device 114 candynamically adjust the maximum amount of bandwidth associated with anetwork based on detection of whether there may not be enough bandwidthto meet the needs of the devices. As such, in some embodiments,provisioning server device 114 can provision bandwidth for a privatenetwork and allow the devices associated with the private network toutilize any amount of the bandwidth for the network as needed.

Provisioning server device 114 can review the contents of databasedevice 124 (or provisioning table 800 of FIG. 8, which can be within orcommunicatively coupled to database device 124) to determine whether theidentifier broadcast/transmitted by device 106 is an authorized privatenetwork. If the provisioning server device 114 determines that theidentifier identified by access point device 102 as having been receivedby device 106 is an authorized network, provisioning server device 114can transmit the provisioned information back to access point device 102across the secure connection. In some embodiments, the provisionedinformation includes, but may not be limited to, identifier, key, androuting information for the private network corresponding to the privatenetwork.

In some embodiments, access point device 102 includes routing device 116(and therefore routing device 116 can utilize such information duringany subsequent routing of traffic to/from device 106 to network 122). Insome embodiments, in which access point device 102 does not includerouting device, routing information can be transmitted from provisioningserver device 114 to routing device 116. In some embodiments,provisioning server device 114 can provide to routing device 116 and/oraccess point device 102 (when access point device 102 includes routingdevice 116 or a routing table) routing information to join device 106 tonetwork 122.

After determination that device 106 has provided access point device 102an identifier that is approved and the transmission of provisioninginformation from provisioning server device 114 to access point device102, access point device 102 can then broadcast the name of network 122.In various embodiments, many different networks can be broadcast on agiven access point device. Further, different devices associated withthe same private network can access the same or different access pointdevices (concurrently or at non-overlapping times) to connect to theprivate network.

Upon detecting the broadcast signal from access point device 102, device106 can transmit to access point device 102, a password (e.g., key) fornetwork 122. In some embodiments, device 106 can also re-transmit theidentifier for network 122.

Access point device 102 determines whether the password received fromdevice 102 matches the password received from provisioning server device114 for network 122 (and/or whether the passwords and identifiers matchthe information received from provisioning server device 114 for network122). If there is a match of information, access point device 102 willbegin hosting network 122 for device 106. In this manner, a mobiledevice (e.g., device 106) can gain access to a private Wi-Fi network ata location remote from the access point to which the mobile device isimmediately connected without need for VPN or SSL software.

Routing device 116 can include hardware and/or software configured totransmit information between one or more devices or between two or morenetworks. In some embodiments, routing device 116 can be a network-basedrouter (e.g., virtual router) that can route traffic to/from device 106to/from network 122 (and/or one or more of devices 108, 110, 112associated with network 122).

For example, routing device 116 can receive, from access point device102 over network 118, information transmitted from device 106 intendedfor one or more of devices 108, 110, 112. Routing device 116 can storeand/or access a routing table that can indicate one or more addressesfor devices 106, 108, 110, 112 associated with network 112 to enablerouting device 116 to forward information incoming to routing device 116(e.g., from device 106 intended for one or more of devices 108, 110, 112and/or from one or more of devices 108, 110, 112 intended for device106).

Routing device 116 can be configured to allow routing device 116 tocreate and/or host many multiple networks, similar to the guest networksfeature of current routers. For example, routing device 116 can offer aguest-type network that provides different security settings fordifferent networks and/or different bandwidth or speed allocations fordifferent networks.

In some embodiments, there is no gateway device for private network 122and one or more (or, in some embodiments, each) of devices 108, 110, 112can communicatively couple directly to network 122. In some embodiments,a residential repeater can be employed within network 122. Each ofdevices 106, 108, 110, 112 connected to network 122 can therefore appearto be on a local network, regardless of the access point device to whichthe particular device is connecting. Private network 122 can be a localarea network (e.g., wireless local area network or wired local areanetwork) in various embodiments.

If device 106 roams to network 120 from network 118, device 106 canrepeat the process illustrated in FIG. 1 and previously described.However, in this case, device 106 broadcasts/transmits the identifierfor network 122 to access point device 104, and access point device 104contacts provisioning server device 114 to determine if the network 122is an authorized network. Authentication of device 106 to network 122and routing via routing device 116 proceeds as described with referenceto the case when device 106 was located within the region covered byaccess point device 102. As such, users associated with a provisionedmobile device (e.g., device 106) can find it easier to roam and/oraccess other devices in a mobile device's private network (e.g., network122) with greater security.

FIGS. 3 and 4 illustrate example block diagrams of other systems inwhich private communication networks can be facilitated in accordancewith one or more embodiments. Repetitive description of like elementsemployed in other embodiments described herein is omitted for sake ofbrevity.

Turning first to FIG. 3, in some embodiments, multiple devices (e.g.,devices 106, 126) can utilize the same access point device (e.g., accesspoint device 102) to connect to the same or different networks. Forexample, as shown, devices 106, 126 can each be located with the areacovered by network 118. Devices 106, 126 can be associated withdifferent private networks. For example, device 106 can be associatedwith network 122 while device 126 can be associated with network 123.Device 106 and device 126 can each broadcast their network names, andaccess point device 102 can communicate with provisioning server device114 to determine whether the networks (e.g., networks 122, 123) areauthorized/approved networks.

If the networks are authorized/approved networks, access point device102 can begin to broadcast the network names for networks 122, 123.Device 106 can respond to the broadcast of the network name for network122 with an identifier for network 122 and a key for network 122. Device126 can respond to the broadcast of the network name for network 123with an identifier for network 123 and a key for network 123.

In embodiments in which the respective keys (or, in some embodiments,the respective identifier and key combinations) provided by devices 106,126 are accurate, access point device 102 can establish a first securelink for device 106 to network 122 (and devices 108, 110, 112communicatively coupled to network 122), and/or access point device 102can establish a second secure link for device 126 to network 123 (anddevice 125, 127 communicatively coupled to network 123).

As described herein, a secure link exists between device 106 and routerdevice 116, which is secured by a unique identifier and a unique key. Insome embodiments, there can be a secure link between access point device102 and provisioning server device 114 so that access point device 102can verify device 106 should have access to network 122 and to obtaininformation to authenticate device 106 and correspondingly provide therequested service (e.g., connection of device 106 to network 122).

Another example system is shown in FIG. 4. Turning now to FIG. 4, insome embodiments, multiple devices (e.g., devices 106, 108) can utilizedifferent access point devices (e.g., access point devices 102, 104) toconnect to the same private network employing the same networkname/identifier and key. The connections can be established and/or existconcurrently or during overlapping or non-overlapping time periods, forexample. As shown, devices 106, 108 can be located in areas covered byrespective access point devices 102, 104. Each of devices 106, 108 canbe previously provisioned/assigned to private network 122 by or inconnection with provisioning server device 114. Device 106 canbroadcast/transmit the identifier for network 122 to access point device102. Device 108 can broadcast/transmit the identifier for network 123 toaccess point device 104.

Each of access point devices 102, 104 can communicate with provisioningserver device 114 to determine whether the identifier provided to therespective access point device is an authorized network. If the network(e.g., network 122) with which devices 106, 108 are authorized, accesspoint device 102 can broadcast the name for the network (e.g., network122), and/or access point device 104 can also broadcast the name for thenetwork (e.g., same network—network 122).

In embodiments in which devices 106, 108 transmit to their respectiveaccess point devices (e.g., access point devices 102, 104) the correctpassword for the private network 122 (or, in some embodiments, thecorrect identifier and password combination for network 122), each ofaccess point devices 102, 104 can establish routing to network 122 andfacilitate communication between devices 106, 108 and the other devices(e.g., devices 110, 112) provisioned to network 122. Each of devices106, 108, 110, 112 can view and/or access one another and cancommunicate seamlessly with one another as if each of devices 106, 108,110, 112 is physically coupled to the same local area network or routerwithin a coverage area (e.g., home) of network 122.

The described arrangement can reduce or eliminate many firewall andnetwork issues. For example, a file server device represented as device112, which is located remote from device 106 (e.g., located at a homelocation or in the cloud), for example, but assigned to private network122, could appear locally attached. A common network firewall, internetprotocol (IP) allocation, and other functions normally found at theDSL/Cable modem, VDSL or Fiber residential gateway can in fact behandled in a hosted virtual network router, and such a router may handlemany concurrent networks. There is nothing that would potentially limitone or more of these networks from being bridged by one or more virtualnetwork routers and in fact this feature can be desirable.

Utilizing one or more of the embodiments described herein, a privatenetwork and key can be provisioned by provisioning server device 114 andconfigured in device 106 during manufacturing/packaging, and then device106 is shipped to a user that has purchased device 106. When device 106arrives at the user, on activation, device 106 can then initiatebroadcast to an access point device, authenticate and establishcommunication with the private network as previously described. In someembodiments, a credential, unique identifier, or other key attached tothe device physically (e.g., tag) or logically (e.g., displayed on ascreen) can be provided to provisioning server device 114 along with theoffer to either: reconfigure device 106 to attach to a private networkdirectly; or, in the case of some semi-private devices, such as set topboxes, digital video recorders (DVRs), etc., direct a network virtualrouters to bridge a private network that may be associated with thesemi-private devices to the private network associated with device 106.Multiple bridges can be established in the network for multiple devices.In either embodiment, the configuration of the devices or the networkscan be reflexive in the network routers or provisioning server device114, and not require direct intervention by a user of device 106 (but,in some cases, require or employ only explicit or implicit authorizationby the user).

By providing security at the private network (e.g., between privatenetwork 122 and routing device 116 or between device 106 and privatenetwork 122) and the internal network level (e.g., between access pointdevice 102 and provisioning server device 114), in multiple layers,routing device 116 can effectively manage private network 122 toidentity potential issues.

Some features that can be enabled include device identification and/oraccess point history and mapping. Bandwidth management can also beperformed since knowledge of the location of a particular device can bestored and analyzed over time. Another feature can be providing devicesecurity. If the device is re-located without authorization, the devicecan be locatable by the access point device that the re-located devicebroadcasts/transmits a signal to upon attempting to access the privatenetwork associated with the device. This can also prevent or reduce thelikelihood that certain end user devices will be sold or re-provisionedwithout authorization from an authorized company or seller of thedevice.

Another feature that can be provided can be the provisioning of a commonfirewall for the private network, and isolating the private network. Insome embodiments, devices within the private network can be isolatedfrom other devices in the private network if the devices arecompromised.

Another that can be provided can be control at the media access control(MAC) to allow or block communication from a device if needed. Anotherfeature that can be provided can be device-to-device access rules.Another feature that can be provided is personal network to privatenetwork mapping, which can allow isolation and protection of trafficfrom/to semi-private devices (e.g., set top boxes and the DVR Video IPtraffic) to each other and the VDO from the end user's network, whilecontinuing to allow access to the devices for IP based applicationprogramming interfaces (APIs) (e.g., remotes, third screenapplications).

Micro-segmented networking can be employed to facilitate one or more ofthese embodiments. As an example, the DVR can have three micro-segments.One micro-segment can be a public segment for commercially broadcastinternet protocol (IP) traffic; one micro-segment can be a secondprivate segment for DVR-to-DVR or user device-to-user devicecommunications; and one micro-segment can be a third private network forappliance or applications interface. In embodiments in which the networkboundary is made granular enough, the mapping of routes to/from anynetwork and the security of that data can be the same. In someembodiments, the major difference is the visibility of that network.

One or more (or, in some embodiments, each) newly provisioned device inthe embodiments described, once connected to an access point device, canbe considered to have a VLAN of one device and a virtual network gatewayto the Internet. As described in the above example, additional devicesproviding service to a home can be joined at either the gateways, or canbe re-provisioned to share a common VLAN. An example could be a DVR andadditional set top boxes. The end user device does not need to havevisibility in the communications directly between the DVR and additionalset top boxes, and the VDO, which can supply content to the DVR andadditional set top boxes, can be accessed via the virtual gateway fortheir subnets in the network. However, IP-based content and controldevices (e.g., tablets, phones, etc.) that would interact with the DVRand/or additional set top boxes need network connectivity to the DVRand/or additional set top boxes. As such, a gateway-to-gatewayrelationship can be established so that API calls between a user's IPdata network devices (e.g., the above-mentioned tablets, phones, etc.)and the DVR and additional set top boxes can take place while keepingthe rest of the network traffic in these virtual networks separated.

Turning back to FIGS. 1, 2 and 3, in one or more of the embodiments,access point device 102 need not be a significant distance from accesspoint device 104. In some embodiments, for example, if there is aresidential area where multiple access points are provided on homes,pedestals, mailboxes at homes, one side of a home can receive servicefrom access point 102 while another side of the home can receive servicefrom access point 104. In these embodiments, access point devices 102,104 can communication information between one another. As such, in someembodiments, device 106 need not re-authenticate when roaming fromaccess point device 102 to access point device 104. From the vantagepoint of device 106, each of devices 106, 108, 110, 112 iscommunicatively coupled to a single network. As such, devices 106, 108,110, 112 can communicate with one another with freedom over the privatenetwork. However, when any of devices 106, 108, 110, 112 communicatewith any other device outside of the private network, routing device 116can protect the private network from the rest of the Internet. Any oneof devices 106, 108, 110, 112 can access the private network. VPN tokensand SSL software are unnecessary in the embodiments described herein.

FIG. 5 illustrates an example block diagram of a device of the systemsof FIG. 1, 3 or 4 in accordance with one or more embodiments describedherein. Repetitive description of like elements employed in otherembodiments described herein is omitted for sake of brevity.

In the embodiment shown, device 106 includes communication component500, network information component 502, network key component 504,provisioning component 506, memory 508, processor 510 and/or datastorage 512. In various embodiments, one or more of communicationcomponent 500, network information component 502, network key component504, provisioning component 506, memory 508, processor 510 and/or datastorage 512 can be electrically and/or communicatively coupled to oneanother to perform one or more functions of device 106.

Communication component 500 can include hardware, software and/or acombination of hardware and software configured to transmit and/orreceive information to/from one or more of devices 108, 110, 112 and/oraccess point devices 102, 104. For example, in various embodiments,communication component 700 can transmit/broadcast an identifier and/orkey indicative of a private network to which device 106 is associated.As another example, communication component 500 can receive abroadcast/transmitted signal from access point device 102 including thename of private network 122.

Network information component 502 can process information indicative ofthe identifier for network 122 while network key component 504 canprocess information indicative of the password/key for network 122.

Provisioning component 506 can include hardware and/or softwareprovisioned in device 106 for performing one or more functions describedherein. For example, provisioning component 506 can be updated and/oradjusted upon provisioning of device 106 to enable device 106 to accessprivate network 122. Provisioning component 506 can also includehardware and/or software that configures device 106 to perform one ormore different functions according to the nature of the device (e.g.,set top box operations, smart phone operations, digital video recorderoperations).

Memory 508 can store computer-executable instructions that can beexecuted by processor 510. For example, memory 508 can storeinstructions for authenticating device 106 to private network 122 and/orcommunicating with one or more devices assigned to private network 122.Processor 706 can process computer-readable storage mediumcomputer-executable instructions to perform one or more of the functionsdescribed herein with reference to device 106. Data storage 512 canstore information indicative of identifier, key or other information forfacilitating the operations of device 106.

FIG. 6 illustrates an example block diagram of an access point device ofthe systems of FIG. 1, 3 or 4 in accordance with one or moreembodiments. Repetitive description of like elements employed in otherembodiments described herein is omitted for sake of brevity.

In the embodiment shown, access point device 102 includes communicationcomponent 600, provisioning component 602, memory 604, processor 606and/or data storage 608. In various embodiments, one or more ofcommunication component 600, provisioning component 602, memory 604,processor 606 and/or data storage 608 can be electrically and/orcommunicatively coupled to one another to perform one or more functionsof access point device 102.

Communication component 600 can include hardware, software and/or acombination of hardware and software configured to transmit and/orreceive information to/from access point device. For example, in variousembodiments, communication component 600 can receive a signal includinginformation indicative of an identifier private network, a key for theprivate network or the like. Communication component 600 can broadcastthe name of the private network and/or query provisioning server device114 to determine if the received identifier is for anapproved/authorized private network.

Provisioning component 602 can process provisioning information receivedfrom provisioning server device 114, establish routing when routingdevice 116 is within or associated with access point device 102 or thelike. Memory 604 can store computer-executable instructions that can beexecuted by processor 606. For example, memory 704 can storeinstructions for determining whether an identifier represents anauthorized network, bandwidth and/or speed to provision for a networkand the like. Processor 606 can process computer-readable storage mediumcomputer-executable instructions to perform one or more of the functionsdescribed herein with reference to access point device 102. Data storage608 can store information indicative of a private network andcorresponding device communicatively coupled to access point device 102.

FIG. 7 illustrates an example block diagram of a provisioning serverdevice of the systems of FIG. 1, 3 or 4 in accordance with one or moreembodiments described herein. Repetitive description of like elementsemployed in other embodiments described herein is omitted for sake ofbrevity.

In the embodiment shown, provisioning server device 114 includescommunication component 700, private network provisioning component 702,memory 704, processor 706 and/or data storage 708. In variousembodiments, one or more of provisioning server device 114 includescommunication component 700, private network provisioning component 702,memory 704, processor 706 and/or data storage 708 can be electricallyand/or communicatively coupled to one another to perform one or morefunctions of provisioning server device 114.

Communication component 700 can include hardware, software and/or acombination of hardware and software configured to transmit and/orreceive information from provisioning server device 114. For example, invarious embodiments, communication component 700 can receive informationindicative of an identifier broadcast/transmitted to an access pointdevice and transmit, to access point device 102, information indicativeof the identifier, key and/or bandwidth or speed provisioninginformation if the identifier is determined to be an authorized networkby private network provisioning component 702.

Private network provisioning component 702 can determine whether anidentifier represents an authorized network, transmit information forallowing access point device to authenticate the device and/or providecommunication service for the network from the access point device tothe private network of the device, make decisions for and provisionbandwidth and/or speed for the network (or, in some embodiments, fordifferent devices within the network) or any number of actions asdescribed herein.

Memory 704 can store computer-executable instructions that can beexecuted by processor 706. For example, memory 704 can storeinstructions for determining whether an identifier represents anauthorized network, bandwidth and/or speed to provision for a networkand the like. Processor 706 can process computer-readable storage mediumcomputer-executable instructions to perform one or more of the functionsdescribed herein with reference to provisioning server device 114.

Data storage 708 can store information indicative of provisioning table800 shown with reference to FIG. 8 described herein, database deviceinformation or the like.

FIG. 8 illustrates an example provisioning table of the provisioningserver device of FIG. 7 in accordance with one or more embodimentsdescribed herein. Repetitive description of like elements employed inother embodiments described herein is omitted for sake of brevity.

In various embodiments, provisioning table 800 can be stored at oraccessible over a network by database device 124 of provisioning serverdevice 114. As shown, provisioning table 800 can include networkname/identifier information, which includes one or more identifiers forone or more respective private networks provisioned by provisioningserver device 114, password/key information corresponding to a privatenetwork and employed to allow access by a device to the private networkand/or provisioned devices for a particular private network (e.g.,devices 106, 108, 110, 112 are provisioned for network 122 while devices125, 126, 127 are provisioned for network 123). In some embodiments,provisioning table 800 can also include information indicating whetherthe network is currently authorized (e.g., whether service isdiscontinued, for example, if a user is vacationing out of the countryfor three months and would like to have the service discontinued duringthat time, or for any other reason, failure of payment for service,etc.). In some embodiments in which provisioning server device 114 alsoprovisions bandwidth and/or speed for a network, the provisionedrespective bandwidth and/or speed for the network can also be includedin provisioning table 800. Routing information can also be provided foreach network.

In one embodiment, the identifier, password/key and routing informationfor a network can be provided by provisioning server device 114 to anaccess point device requesting confirmation of whether a networkname/identifier broadcast to access point device is within an approvedset of networks managed by provisioning server device 114.

FIGS. 9-12 illustrate example flow diagrams for facilitating privatecommunication networks in accordance with one or more embodiments.Repetitive description of like elements employed in other embodimentsdescribed herein is omitted for sake of brevity.

Turning first to FIG. 9, at 902, method 900 can include transmitting, toan access point device associated with a first network, a first signalincluding an identifier and key information representing a key for asecond network, wherein the access point device of the first networkforegoes broadcast of a name of the first network, wherein a firstdevice is located at a first location and a second device is located ata second location remote from the first location, and wherein the firstdevice and the second device are associated with the second network.

In some embodiments, although not shown, method 900 can also includecommunicating, by the first device, via the access point device and thesecond network, with the second device. The second device can be orinclude a second device located at the residential address.

In some embodiments, although not shown, a secure link can beestablished between the first device and the access point device. Asecure link can also be established between the access point device andthe provisioning server.

At 904, method 900 can include receiving, by the first device, a secondsignal indicative of a broadcast of the name of the second network basedon an authentication of the identifier for the second network and keydata representing a key for the second network. In some embodiments, theauthentication of the identifier for the second network and the key forthe second network can be facilitated in response to informationidentifying a name of the second network being located by a provisioningdevice communicatively coupled to the access point device.

At 906, method 900 can include connecting, by the first device, to anetwork device of the second network in response to the receiving thesecond signal. In some embodiments, connecting to the second networkincludes connecting to the second network via a wireless router devicecommunicatively coupled to the first device and the second device.

Turning now to FIG. 10, at 1002, method 1000 can include receiving, froma second device, a first broadcast signal identifying a first networkassociated with the second device, wherein the first device isassociated with a second network.

In some embodiments, although not shown, the method can also includereceiving a third signal from a provisioning server device that storesapproved network information, wherein the third signal comprisesinformation indicating that the first network is an approved network.The first device can be an access point device while the second devicecan be a mobile device.

At 1004, method 1000 can include determining that the first network isapproved based on correspondence between an identifier of the firstnetwork and information about approved networks. At 1006, method 1000can include broadcasting a second signal identifying the first networkin response to determining that the first network is approved, whereinthe broadcasting the second signal is performed after the receiving thebroadcast of the first broadcast signal

In some embodiments, although not shown, authenticating the seconddevice to the first network can be based on receiving a key from thesecond device that corresponds to the first network. The method can alsoinclude transmitting data from the second device to a third devicecommunicatively coupled to the first network and located at a firstlocation remote from a second location of the second device.

Turning now to FIG. 11, at 1102, method 1100 can include transmitting,by a first device associated with a first network, to an access pointdevice associated with a second network, a signal indicative of anidentity of the first network. At 1104, method 1100 can includetransmitting, by a first device associated with a first network, to anaccess point device associated with a second network, a signalindicative of an identity of the first network. At 1106, method 1100 caninclude communicating, by the first device, via the second device and arouting device, with a third device associated with the first network,wherein the second device comprises a set top box.

Turning now to FIG. 12, at 1202, method 1200 can include determining, bya first device having a processor, that a name of a network broadcast tothe first device by a second device, is known to a provisioning serverdevice for networks. At 1204, method 1200 can include broadcasting, bythe first device, the name of the network based on the determining, andwherein the first device foregoes broadcast of any network prior to thedetermining. At 1206, method 1200 can include receiving, by the firstdevice, authentication information for the network from the seconddevice in response to the broadcasting.

FIG. 13 illustrates a block diagram of a computer operable to facilitateprivate communication networks in accordance with one or moreembodiments in accordance with one or more embodiments. Repetitivedescription of like elements employed in other embodiments describedherein is omitted for sake of brevity.

In some embodiments, the computer can be or be included within anynumber of components described herein including, but not limited to,devices 106, 108, 110, 112, 125, 126, 127 (or any components thereof),access point devices 102, 104 (or any components thereof), provisioningserver device 114 (or any components thereof) and/or routing device 116(or any components thereof).

In order to provide additional context for various embodiments describedherein, FIG. 13 and the following discussion are intended to provide abrief, general description of a suitable computing environment 1300 inwhich the various embodiments of the embodiment described herein can beimplemented. While the embodiments have been described above in thegeneral context of computer-executable instructions that can run on oneor more computers, those skilled in the art will recognize that theembodiments can be also implemented in combination with other programmodules and/or as a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the various methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The terms “first,” “second,” “third,” and so forth, as used in theclaims, unless otherwise clear by context, is for clarity only anddoesn't otherwise indicate or imply any order in time. For instance, “afirst determination,” “a second determination,” and “a thirddetermination,” does not indicate or imply that the first determinationis to be made before the second determination, or vice versa, etc.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structured dataor unstructured data. Tangible and/or non-transitory computer-readablestorage media can include, but are not limited to, random access memory(RAM), read only memory (ROM), electrically erasable programmable readonly memory (EEPROM), flash memory or other memory technology, compactdisk read only memory (CD-ROM), digital versatile disk (DVD) or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage, other magnetic storage devices and/or other media that can beused to store desired information. Computer-readable storage media canbe accessed by one or more local or remote computing devices, e.g., viaaccess requests, queries or other data retrieval protocols, for avariety of operations with respect to the information stored by themedium.

In this regard, the term “tangible” herein as applied to storage, memoryor computer-readable media, is to be understood to exclude onlypropagating intangible signals per se as a modifier and does notrelinquish coverage of all standard storage, memory or computer-readablemedia that are not only propagating intangible signals per se.

In this regard, the term “non-transitory” herein as applied to storage,memory or computer-readable media, is to be understood to exclude onlypropagating transitory signals per se as a modifier and does notrelinquish coverage of all standard storage, memory or computer-readablemedia that are not only propagating transitory signals per se.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a channelwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference again to FIG. 13, the example environment 1300 forimplementing various embodiments of the embodiments described hereinincludes a computer 1302, the computer 1302 including a processing unit1304, a system memory 1306 and a system bus 1308. The system bus 1308couples system components including, but not limited to, the systemmemory 1306 and the processing unit 1304. The processing unit 1304 canbe any of various commercially available processors. Dualmicroprocessors and other multi-processor architectures can also beemployed as the processing unit 1304.

The system bus 1308 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1306includes ROM 1310 and RAM 1312. A basic input/output system (BIOS) canbe stored in a non-volatile memory such as ROM, erasable programmableread only memory (EPROM), EEPROM, which BIOS contains the basic routinesthat help to transfer information between elements within the computer1302, such as during startup. The RAM 1312 can also include a high-speedRAM such as static RAM for caching data.

The computer 1302 further includes an internal hard disk drive (HDD)1310 (e.g., EIDE, SATA), which internal hard disk drive 1314 can also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1316, (e.g., to read from or write to aremovable diskette 1318) and an optical disk drive 1320, (e.g., readinga CD-ROM disk 1322 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1314, magnetic diskdrive 1316 and optical disk drive 1320 can be connected to the systembus 1308 by a hard disk drive interface 1324, a magnetic disk driveinterface 1326 and an optical drive interface, respectively. Theinterface 1324 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and Institute of Electrical andElectronics Engineers (IEEE) 1394 interface technologies. Other externaldrive connection technologies are within contemplation of theembodiments described herein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1302, the drives andstorage media accommodate the storage of any data in a suitable digitalformat. Although the description of computer-readable storage mediaabove refers to a hard disk drive (HDD), a removable magnetic diskette,and a removable optical media such as a CD or DVD, it should beappreciated by those skilled in the art that other types of storagemedia which are readable by a computer, such as zip drives, magneticcassettes, flash memory cards, cartridges, and the like, can also beused in the example operating environment, and further, that any suchstorage media can contain computer-executable instructions forperforming the methods described herein.

A number of program modules can be stored in the drives and RAM 1312,including an operating system 1330, one or more application programs1332, other program modules 1334 and program data 1336. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1312. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

A mobile device can enter commands and information into the computer1302 through one or more wired/wireless input devices, e.g., a keyboard1338 and a pointing device, such as a mouse 1340. Other input devices(not shown) can include a microphone, an infrared (IR) remote control, ajoystick, a game pad, a stylus pen, touch screen or the like. These andother input devices are often connected to the processing unit 1304through an input device interface 1342 that can be coupled to the systembus 1308, but can be connected by other interfaces, such as a parallelport, an IEEE 1394 serial port, a game port, a universal serial bus(USB) port, an IR interface, etc.

A monitor 1344 or other type of display device can be also connected tothe system bus 1308 via an interface, such as a video adapter 1346. Inaddition to the monitor 1344, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1302 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1348. The remotecomputer(s) 1348 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1302, although, for purposes of brevity, only a memory/storage device1350 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1352 and/orlarger networks, e.g., a wide area network (WAN) 1354. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich can connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1302 can beconnected to the local network 1352 through a wired and/or wirelesscommunication network interface or adapter 1356. The adapter 1356 canfacilitate wired or wireless communication to the LAN 1352, which canalso include a wireless AP disposed thereon for communicating with thewireless adapter 1356.

When used in a WAN networking environment, the computer 1302 can includea modem 1358 or can be connected to a communications server on the WAN1354 or has other means for establishing communications over the WAN1354, such as by way of the Internet. The modem 1358, which can beinternal or external and a wired or wireless device, can be connected tothe system bus 1308 via the input device interface 1342. In a networkedenvironment, program modules depicted relative to the computer 1302 orportions thereof, can be stored in the remote memory/storage device1350. It will be appreciated that the network connections shown areexample and other means of establishing a communications link betweenthe computers can be used.

The computer 1302 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, restroom), and telephone. This can include Wireless Fidelity(Wi-Fi) and BLUETOOTH® wireless technologies. Thus, the communicationcan be a defined structure as with a conventional network or simply anad hoc communication between at least two devices.

Wi-Fi can allow connection to the Internet from a couch at home, a bedin a hotel room or a conference room at work, without wires. Wi-Fi is awireless technology similar to that used in a cell phone that enablessuch devices, e.g., computers, to send and receive data indoors and out;anywhere within the range of a femto cell device. Wi-Fi networks useradio technologies called IEEE 802.11 (a, b, g, n, etc.) to providesecure, reliable, fast wireless connectivity. A Wi-Fi network can beused to connect computers to each other, to the Internet, and to wirednetworks (which can use IEEE 802.3 or Ethernet). Wi-Fi networks operatein the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or54 Mbps (802.11b) data rate, for example or with products that containboth bands (dual band), so the networks can provide real-worldperformance similar to the basic 10 Base T wired Ethernet networks usedin many offices.

The embodiments described herein can employ artificial intelligence (AI)to facilitate automating one or more features described herein. Theembodiments (e.g., in connection with automatically identifying acquiredcell sites that provide a maximum value/benefit after addition to anexisting communication network) can employ various AI-based schemes forcarrying out various embodiments thereof. Moreover, the classifier canbe employed to determine a ranking or priority of each cell site of anacquired network. A classifier is a function that maps an inputattribute vector, x=(x1, x2, x3, x4, . . . , xn), to a confidence thatthe input belongs to a class, that is, f(x)=confidence(class). Suchclassification can employ a probabilistic and/or statistical-basedanalysis (e.g., factoring into the analysis utilities and costs) toprognose or infer an action that a mobile device desires to beautomatically performed. A support vector machine (SVM) is an example ofa classifier that can be employed. The SVM operates by finding ahypersurface in the space of possible inputs, which the hypersurfaceattempts to split the triggering criteria from the non-triggeringevents. Intuitively, this makes the classification correct for testingdata that is near, but not identical to training data. Other directedand undirected model classification approaches include, e.g., naïveBayes, Bayesian networks, decision trees, neural networks, fuzzy logicmodels, and probabilistic classification models providing differentpatterns of independence can be employed. Classification as used hereinalso is inclusive of statistical regression that is utilized to developmodels of priority.

As will be readily appreciated, one or more of the embodiments canemploy classifiers that are explicitly trained (e.g., via a generictraining data) as well as implicitly trained (e.g., via observing mobiledevice behavior, operator preferences, historical information, receivingextrinsic information). For example, SVMs can be configured via alearning or training phase within a classifier constructor and featureselection module. Thus, the classifier(s) can be used to automaticallylearn and perform a number of functions, including but not limited todetermining according to a predetermined criteria which of the acquiredcell sites will benefit a maximum number of subscribers and/or which ofthe acquired cell sites will add minimum value to the existingcommunication network coverage, etc.

As employed herein, the term “processor” can refer to substantially anycomputing processing unit or device including, but not limited toincluding, single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally, aprocessor can refer to an integrated circuit, an application specificintegrated circuit (ASIC), a digital signal processor (DSP), a fieldprogrammable gate array (FPGA), a programmable logic controller (PLC), acomplex programmable logic device (CPLD), a discrete gate or transistorlogic, discrete hardware components or any combination thereof designedto perform the functions described herein. Processors can exploitnano-scale architectures such as, but not limited to, molecular andquantum-dot based transistors, switches and gates, in order to optimizespace usage or enhance performance of mobile device equipment. Aprocessor can also be implemented as a combination of computingprocessing units.

As used herein, terms such as “data storage,” “database,” andsubstantially any other information storage component relevant tooperation and functionality of a component, refer to “memorycomponents,” or entities embodied in a “memory” or components includingthe memory. It will be appreciated that the memory components orcomputer-readable storage media, described herein can be either volatilememory or nonvolatile memory or can include both volatile andnonvolatile memory.

Memory disclosed herein can include volatile memory or nonvolatilememory or can include both volatile and nonvolatile memory. By way ofillustration, and not limitation, nonvolatile memory can include readonly memory (ROM), programmable ROM (PROM), electrically programmableROM (EPROM), electrically erasable PROM (EEPROM) or flash memory.Volatile memory can include random access memory (RAM), which acts asexternal cache memory. By way of illustration and not limitation, RAM isavailable in many forms such as static RAM (SRAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhancedSDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).The memory (e.g., data storages, databases) of the embodiments isintended to include, without being limited to, these and any othersuitable types of memory.

What has been described above includes mere examples of variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing these examples, but one of ordinary skill in the art canrecognize that many further combinations and permutations of the presentembodiments are possible. Accordingly, the embodiments disclosed and/orclaimed herein are intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofthe appended claims. Furthermore, to the extent that the term “includes”is used in either the detailed description or the claims, such term isintended to be inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

What is claimed is:
 1. A method, comprising: facilitating, by a device comprising a processor, transmitting, to an access point device associated with a first network that is a hidden network, a first signal comprising an identifier and key information representing a key for a second network, wherein the transmitting is initiated in response to detection by the device that the device is located within a defined distance of a defined business establishment; and facilitating, by the device, receiving a second signal indicative of a broadcast of an identity of the second network based on an authentication of network devices of the second network.
 2. The method of claim 1, wherein the second network is a residential home network.
 3. The method of claim 2, wherein a defined amount of bandwidth associated with the residential home network is adjusted based on bandwidth requests of a first device, of the network devices, and a second device communicatively coupled to the residential home network.
 4. The method of claim 1, wherein the access point device of the first network broadcasts only after the authentication of the network devices of the second network.
 5. The method of claim 1, wherein a first device is located at a first location and a second device is located at a second location remote from the first location.
 6. The method of claim 1, wherein the network devices comprise a first device and a second device associated with the second network.
 7. The method of claim 1, further comprising: establishing, by the device, a secure link between a first device and the access point device.
 8. An apparatus, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: transmitting, to an access point device associated with a first network that is a hidden network, a first signal comprising an identifier and key information representing a key for a second network, wherein the transmitting is initiated in response to detection by the apparatus that the apparatus is located within a defined distance of a defined business establishment; and receiving a second signal indicative of a broadcast of an identity of the second network based on an authentication of the second network.
 9. The apparatus of claim 8, wherein the operations further comprise: communicating, via the access point device and a network device of the second network, with a device, wherein the hidden network is a network that forgoes the broadcast of the identity of the network until after the authentication of the second network.
 10. The apparatus of claim 9, wherein the device comprises a first device located at a first location, wherein a second device is located at a second location remote from the first location, and wherein the second location is located at a residential address associated with the first device and the second device.
 11. The apparatus of claim 10, wherein the second device comprises a mobile device.
 12. The apparatus of claim 8, wherein the operations further comprise: connecting to a network device of the second network via a wireless router device communicatively coupled to a first device of the second network and a second device of the second network.
 13. The apparatus of claim 8, wherein a first link between a first device of the second network and the access point device is a first encrypted link and a second link between the access point device and a provisioning server device is a second encrypted link different than the first encrypted link.
 14. The apparatus of claim 8, wherein the identifier is a first name, and wherein authentication of the first name for the second network and the key information for the second network is facilitated in response to information identifying a second name of the second network being located by a provisioning server device communicatively coupled to the access point device.
 15. The apparatus of claim 8, wherein the access point device of the first network broadcasts only after the authentication of the second network.
 16. A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: transmitting, to an access point device associated with a first network that is a hidden network, a first signal comprising an identifier and key information representing a key for a second network, wherein the transmitting is initiated in response to detection that a defined business establishment is located within a defined distance threshold of the processor; and receiving a second signal indicative of a broadcast of an identity of the second network based on an authentication of devices of the second network.
 17. The non-transitory machine-readable medium of claim 16, wherein the operations further comprise: establishing a secure link between the access point device and a provisioning server.
 18. The non-transitory machine-readable medium of claim 16, wherein a device of the devices comprises a mobile device.
 19. The non-transitory machine-readable medium of claim 16, wherein transmitting the first signal comprising the identifier and the key information representing the key for the second network comprises transmitting the first signal comprising the identifier and the key information representing the key for the second network at defined intervals.
 20. The non-transitory machine-readable medium of claim 16, wherein the operations further comprise: receiving an instruction to transmit the identifier and the key information, wherein transmitting the first signal comprising the identifier and the key information representing the key for the second network comprises transmitting the first signal comprising the identifier and the key information representing the key for the second network in response to receiving the instruction. 