System and method for enabling wireless social networking

ABSTRACT

Exemplary systems and methods for sharing a personal network of a first user are provided. The exemplary method comprises receiving credentials for the personal network which are used to generate a network profile. When an indication to share the personal network is received, one or more user devices of a second user are queued to receive the network profile. The network profile is then provided to the one or more user devices to provision the one or more user devices for accessing the personal network.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims priority benefit from U.S. ProvisionalPatent Application Ser. No. 60/901,161, filed Feb. 13, 2007, andentitled “Enabling a Social Wireless Network,” which is hereinincorporated by reference.

BACKGROUND

1. Field of the Invention

Embodiments of the present invention relate generally to networking, andmore particularly, to providing wireless network access on personalnetworks.

2. Description of Background Art

Wireless networking technology or wireless fidelity (Wi-Fi) follows theIEEE 802.11 standard. Wi-Fi uses unlicensed radio spectrum and, as aresult, allows very low cost wireless data networks to be implemented.The growth of Wi-Fi has been substantial in recent years, with millionsof private networks deployed in homes and businesses, and hundreds ofthousands public networks, know as “hotspots”, having been deployed.Analysts also predict that by 2010 there may be around one billioncomputing devices deployed that can utilize these Wi-Fi networks.

Recently a new paradigm in Internet usage has emerged where groups ofpeople congregate on websites based on common interests or goals, and asa result, create virtual online communities. In most cases, members ofsuch online communities will usually choose or pre-approve other membersbefore they are allowed to join the community or sub-community on theweb site. This type of website is referred to as a “social networking”site. An example of a social networking site is. MySpace, which givesusers the ability to create groups that share common interests oraffiliations, upload videos, and hold discussions in forums. Otherexamples of such sites are Facebook and LinkedIn. This trend of newwebsites is often referred to as “Web 2.0”.

For some time, most Internet messaging (IM) services have offered aconcept of “buddy lists”, where an IM user pre-approves other IM usersthey have chosen to communicate with prior to adding them to their ownpersonal buddy list. This ensures that only a user's “buddies” caninitiate chat sessions or Internet phone sessions with the user.

Recently, the growth of home Wi-Fi networks has been substantial.Millions of home users have seen the advantage of enabling a homenetwork without wires. However, security issues become prevalent sincemany home networks are left open (i.e., with no form of encryption orauthentication) allowing anyone to access the user's home network. Ashome Wi-Fi users have become more educated, more and more users nowutilize one of several 802.11 based security standards, typically WEP(Wireless Equivalent Privacy) or WPA (Wireless Protected Access). Whilethese standards offer protection for the user's home network, theyprevent any use of the network by friends or other visitors to theuser's home without going through complex network setup. Even if thisnetwork setup is performed, it may not be easy to revoke access at alater date.

Typically, Wi-Fi networks in homes, businesses, and hotspots areidentified by a human readable name called a SSID (Service SetIdentifier). An example of the SSID may be “My Home Network.” Inaddition to the SSID, when a secure Wi-Fi network is first connected,various security parameters need to be entered to configure either theWEP or WPA (or other) security schemes. Most computers and devices thatcan access Wi-Fi networks store the combination of SSID and securityinformation (and other network information) so that this informationdoes not have to be entered next time the device attempts to connect tothe network. This combination of information is known as a Wi-Fi ornetwork profile.

Therefore, there is a need for social wireless networking capabilitythat may be used to apply the social networking concept to one or moreprivate/personal Wi-Fi networks that can be shared by a social group.

SUMMARY OF THE INVENTION

Embodiments of the present invention provide systems and methods forsharing a personal network which provide access to a communicationnetwork. The exemplary method comprises receiving credentials for thepersonal network of a first user. The credentials are utilized togenerate a network profile comprising network settings, securityinformation, and keys.

Messages may be exchanged between the first user to a second userregarding sharing of the first user's personal network. In oneembodiment, the message comprises an invitation from the first user toshare their personal network. In an alternative embodiment, the messagecomprises a request from the second user to the first user to access thefirst user's personal network.

An acceptance indication for sharing the personal network may then bereceived. If the message is a request, the acceptance indication maycomprise the first user's acceptance of the request. If the message isan invitation, the acceptance indication may comprise the second user'sacceptance of the invitation. Once accepted, the user accounts of bothusers are updated to reflect the sharing of the personal network.

One or more user device of the second user are queued to receive anetwork profile associated with the shared personal network. The networkprofile is provided to the one or more user devices to provision the oneor more user devices for accessing the shared personal network. Thenetwork profile may be provided during a next poll by the user device.The poll may occur periodically or during a next connection by the userdevice to the communication network.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an exemplary communication environment inwhich embodiments of the present invention may be practiced.

FIG. 2 is a block diagram of an exemplary network management server.

FIG. 3 is an exemplary block diagram of a user account engine.

FIG. 4 is an exemplary block diagram of a device enablement engine.

FIG. 5 is an exemplary block diagram of a personal network engine.

FIG. 6 is a flowchart of an exemplary method for providing access to apersonal network via an invitation.

FIG. 7 is a flowchart of an exemplary method for providing access to apersonal network via a request.

FIG. 8 is a flowchart of an exemplary method for removing access to apersonal network.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

Embodiments of the present invention provide systems and methods forenabling wireless social networking. Exemplary embodiments allow usersto share their private/personal networks (e.g., access points) withother users. When a first user allows access to their personal networkto a second user, a network profile comprising network access andsecurity information is provided to devices of the second user. In thisway, the second user does not need to manually determine access andsecurity information or configure their devices to work on the personalnetwork.

Referring to FIG. 1, an exemplary communication environment 100 in whichembodiments of the present invention may be practiced is shown. Inexemplary embodiments, a plurality of user devices 102 may communicatewith a communication network 104 via a hotspot 106 or a personal network108. The user devices 102 may comprise computers, laptops, cameras,personal media players, gaming systems, phones, or any other Wi-Fienabled devices. The communication network 104 may comprise theInternet.

The hotspot 106 may comprise a geographic boundary covered by a Wi-Fi(802.11) wireless access point. Typically, the hotspot 106 is configuredfor communication network 104 access, whereby any user device 102 withinthe hotspot 106 can connect to the communication network 104. Inembodiments where the hotspot 106 is public, the hotspot 106 does notrequire an authorization password or key for access. In embodimentswhere the hotspot 106 is not public, a security key may be associatedwith the hotspot 106, which will need to be provided to any user device102 in order for the user device 102 to access the hotspot 106.

The personal network 108 may comprise a private Wi-Fi networkestablished by a user. In some embodiments, the personal network 108comprises a Wi-Fi network within the user's home or business whichcommunicates with the communication network 104 via broadband. In manyembodiments, the personal network 108 will comprise added security suchas WEP or WPA which provides an encryption key. Without the key, userdevices 102 will not be able to utilize the protected personal network108. While Wi-Fi personal networks 108 are discussed, alternativepersonal networks 108 are contemplated. Those skilled in the art willappreciate that there may be many ways to add security to a personalnetwork 108.

The environment 100 further comprises a network management server 110configured to manage communication network 104 access for registereduser devices 102 and personal networks 108. In exemplary embodiments,the network management server 110 provides a central location whereby auser can manage their personal networks 108 as well as hotspots 106frequently used by the user. This allows the user to easily associateuser devices 102 with their personal networks 108 and hotspots 106, andto share their personal networks 108 with other registered users. Thenetwork management server 110 will be discussed in more detail inconnection with FIG. 2.

It should be noted that the environment of FIG. 1 is exemplary.Alternative embodiments may comprise any number of user devices 102,hotspots 106, and personal networks 108 coupled in communication.Furthermore, any number of network management servers 110 may beprovided.

Referring now to FIG. 2, the exemplary network management server 110 isshown in more detail. The exemplary network management server 110 maycomprise a user account engine 202, a device enablement engine 204, apersonal network engine 206, and a messaging engine 208. Additionally,the network management server 110 may comprise storage 210 that includesone or more databases. These databases may comprise a user database 212,a software database 214, and a messaging database 216. Alternativeembodiments may combine functions of some of these engines anddatabases, or comprise other engines, modules, and databases.

The exemplary user account engine 202 is configured to manage useraccounts with the network management server 110. The accounts enginewill be discussed in more detail in connection with FIG. 3.

In exemplary embodiments, the device enablement engine 204 is configuredto manage user devices 102 associated with users registered with thenetwork management server 110. The exemplary device enablement engine204 may provide software and network profile information to the userdevices 102. The device enablement engine 204 will be discussed in moredetail in connection with FIG. 4.

The exemplary personal network engine 206 is configured to manage theprivate/personal networks 108 of each user. The personal network 108 maycomprise any Wi-Fi network established by the user for their own usage(e.g., home or business network). In exemplary embodiments, the user mayshare their personal network 108 with other users, including registeredusers having accounts with the network management server 110. Thepersonal network engine 206 will be discussed in more detail inconnection with FIG. 5.

In exemplary embodiments, the messaging engine 208 provides messagingfunctionality to users of the network management server 110. In someembodiments, the messaging engine 208 provides templates from themessaging database 216 which may be filled in or customized by theusers. The messages may comprise invitations and requests to share auser's personal network 108. Other messages such as, for example, newuser referrals are also contemplated.

If the user is logged in with the network management server 110,messages may be automatically customized for the user by the messagingengine 208. For example, a “from” field may be populated with the user'sname and/or e-mail address.

In exemplary embodiments, the messaging engine 208 may perform, in part,via email, instant message (IM), or short message service (SMS). In oneexample, a customized message may be sent to another user's cell phoneby SMS messaging. In other embodiments, the messaging engine 208 workswith other third-party services or servers including email servers, webservers, IM servers, SMS servers, and the like.

The user database 212 stores data associated with each registered user.The data may comprise a user name, contact information, password,listing of hotspots 106 and personal networks 108 associated with theuser, listing of user devices 102 used by the user, and any otherinformation which may be associated with or identify the user, theuser's user devices 102, and hotspots/networks 106 and 108.

The software database 214 comprises software that may be installed inuser devices 102 in order for the user devices 102 to function with thenetwork management server 110. In some embodiments, the software may beinstalled at manufacture of the user devices 102. In other embodiments,the software may need to be downloaded from the software database 214.The exemplary software configures the user device 102 to pollinformation from, and provide information to, the network managementserver 110 as will be described in more detail below.

FIG. 3 illustrates a block diagram of the exemplary user account engine202. The user account engine 202 may comprise an account module 302, anauthentication module 304, and a user interface module 306. The accountmodule 302 is configured to register and maintain a user's account withthe network management server 110. Initially, the account module 302will obtain user identification and log in information. The accountmodule 302 may also obtain and manage information regarding user devices102, hotspots 106, and personal networks 108 associated with the useraccount.

The exemplary authentication module 304 is configured to verify eachuser accessing the network management server 110. In some embodiments,the authentication module 304 will compare entered user name andpassword with user names and passwords stored in the user database 212.Once verified, the user may access and update their account informationincluding their personal networks 108, user devices 102, and list ofbuddies. Buddies comprise other users that are associated with theregistered user's account. In some embodiments, buddies may have accessto the registered user's personal networks 108 and/or share theirpersonal networks 108 with the registered user.

The authentication module 304 may further be configured to authenticatevia an encryption key. In one example, the user provides a username anda digitally signed password. The authentication module 304 may decryptthe password with an encryption key and then determine if the passwordis associated with the username. Those skilled in the art willappreciate that there may be many ways to authenticate a user.

The exemplary user interface module 306 is configured to provide webpages associated with each user's account. The web pages may comprise,for example, a networks web page (e.g., listing of all hotspots 106 andpersonal networks 108 including shared personal networks 108 of theuser), a buddy list web page, a device web page (e.g., listing of alluser devices 102 registered to the user), and a general account web page(e.g., providing account information such as user name and contactinformation).

Referring now to FIG. 4, the exemplary device enablement engine 204 isshown. The device enablement engine 204 may comprise a software downloadmodule 402, device identity module 404, and a polling module 406. Inorder to utilize shared networks being managed by the network managementserver 110, each user device 102 may need to be registered with thenetwork management server 110 and be associated with a user account.

In exemplary embodiments, each user device 102 comprises software whichenables the user device 102 to function with the network managementserver 110. In some embodiments, the software is manufactured in theuser device 102. In other embodiments, the software is downloaded fromthe software database 214 to the user device 102. The software downloadmodule 402 provides the software from the software database 214 to theuser device 102. In exemplary embodiments, the software download module402 will determine, based on the user device 102 (e.g., brand, type,etc.,) which software module(s) to provide to the user device. Forexample, a particular brand of a cellular phone may require a softwaremodule that is different from a different brand of cellular phone.

In some embodiments, the software download module 402 receives a userdevice selection which may identify a user device 102. The user deviceselection comprises information provided by the user that identifies theuser device 102. The software download module 402 may provide thesoftware to the user device 102 based on the user device selection. Inone example, the user provides a name of a manufacturer, a model number,and/or a version number for a user device 102 (e.g., via pull down menusor entering the information within a field). The software downloadmodule 402 may receive the information and subsequently provide thecorrect software (e.g., software driver) to the user device 102. Inother embodiments, the user chooses the correct software from a list andinitiates the software download.

The exemplary device identity module 404 is configured to identify andassociate each of the user devices 102 with a user account and one ormore Wi-Fi networks (e.g., hotspots 106 and personal networks 108). Whenthe user device 102 is first registered by the user with the networkmanagement server 110, the device identity module 404 obtains the deviceidentifier (DID) and stores the DID in the user database 212. In someembodiments, the user device 102 may provide a pin number or otheridentification number associated with the network management server 110.The user takes the pin/identification number and accesses a websiteassociated with the network management server 110. Either before orafter logging in with the network management server 110, a field withinthe website is provided for entry of the pin/identification number. Thedevice is then associated with the user and the user's account.

The (DID) may comprise any identifier that is associated with thedevice. In one example, the DID is a media access control (MAC) address.The DID may be based on a component of the device (such as the MACaddress), chosen by the user, or may be generated by the deviceenablement engine 204.

The exemplary polling module 406 exchanges data with each user device102. In some embodiments, the polling module 406 provides networkprofiles, as will be discussed in more detail below, to the user device102, which will provision the user device 102 to work on the associatedpersonal network 108. In further embodiments, the polling module 406will receive verification requests from the user devices 102. Theverification requests are used to confirm network addresses andconnectivity of the user devices 102. In return, the polling module 406may provide an acknowledgement confirming connectivity and provide anynetwork profiles that are queued up for the user device 102. Inaccordance with one embodiment, the exchanged data may be encrypted. Theverification requests may occur when the user device 102 attempts toconnect with a hotspot 106 or personal network 108. Additionally, theverification request may occur periodically.

Referring now to FIG. 5, an exemplary block diagram of the personalnetwork engine 206 is shown. The personal network engine 206 maycomprise a network identity module 502 and a profile module 504.

In exemplary embodiments, the network management server 110 allows usersto manage their personal networks 108, as well as hotspots 106, andconfigure their user devices 102 to work with these personal networks108 and hotspots 106. The network identity module 502 manages the SSIDand other security information for each personal network 108. Accordingto one embodiment, a user may add a personal network 108 to theiraccount by entering their private network credentials (e.g., the SSID,WEP key, WPA pass-phrase, and other network and security information)into a user interface provided by the network identity module 502. In analternative embodiment, the network credentials may be automaticallyobtained by the network identity module 502 from the personal network108. The network credentials may then be stored in the user database212.

The exemplary profile module 504 is configured to manage networkprofiles generated from the network credentials for each personalnetwork 108, and provide a resulting network profile to each user device102 allowed access to the particular personal network 108. Each networkprofile may be given a common name by the user. For example, the commonname may be “My Home Network.”

Once the network profile is created, any registered user device 102associated with the user may automatically receive a copy of the networkprofile via a secure network connection with the network managementserver 110. In one embodiment, the secure network connection maycomprise HTTP over SLL. Once the network profile is downloaded to theuser device 102, the user device 102 may automatically connect to thepersonal network 108.

In exemplary embodiments, when access to the personal network 108changes or is updated, the network profile for the personal network 108is updated and prepared for forwarding to the affected user devices 102.New user devices 102 also must acquire the network profile in order toaccess the personal network 108. According to one embodiment, theprofile module 504 notifies the polling module 406 to provide thenetwork profile during the next poll by the affected user devices 102(e.g., queue up the user device 102 for receiving the network profile).

Once a personal network 108 is registered with the network managementserver 110 and the corresponding network profile is created, thepersonal network 108 may be shared with other users. In one instance,the personal network 108 may comprise a user's home Wi-Fi network.Subsequently, the user may have one or more friends over at his home whowants to use the home Wi-Fi network. For example, an online gamingsocial event may be hosted at the home, or a guest may want to sharetheir MP3 files or photos from their Wi-Fi enabled user device 102.

In accordance with some embodiments, the registered user may share theirpersonal network 108 by inviting another user. FIG. 6 is a flowchart 600of an exemplary method for providing access to a personal network via aninvitation. Initially, the registered user may log in with the networkmanagement server 110. Once logged in, the user may send an invitationto an invitee in step 602. In one embodiment, the messaging engine 208may access the messaging database 216 and provide an e-mail templatecomprising the invitation. The user provides a name or e-mail address ofthe invitee and can customize a message in the invitation.

Once the invitee receives the invitation, the invitee will decide ifthey would like to share the personal network 108 of the inviter. If theinvitee wants to share the personal network 108, then, in oneembodiment, the invitee will select a link embedded in the invitation,which will direct the invitee to a website of the network managementserver 110.

The network management server 110 then determines in step 604 whetherthe invitee is a registered user with the network management server 110.The determination may be based on the e-mail address associated with theinvitee. If the invitee is a registered user, then the invitee isrequested to log in. The invitee may provide a password or other logininformation. The authentication module 304 will then verify the inviteein step 606.

If the invitee is not a registered user, then the invitee may bepresented with an opportunity to register with the network managementserver 110. The account module 302 will set up the new user account instep 608.

Once the user is logged in with the network management server 110 andhas accepted the invitation, the network management server 110 willupdate the users accounts in step 610. In exemplary embodiments, theinvitee may be added as a “buddy” on the inviter's account. The invitercan view their list of buddies as well as manage which buddies haveaccess to which personal networks 108. On the invitee's account, theshared personal network will be added to the invitee's list of networks.

In some embodiments, if the invitee has their own personal networks 108,the network management server 110 may ask the invitee if they would liketo share their personal networks 108 with the inviter. If so, theinvitee is now the inviter and vice-versa. The steps of FIG. 6 may thenbe performed.

In step 612, the buddy (i.e., invitee) user devices 102 are queued up toreceive the network profile of the shared personal network 108. Inexemplary embodiments, the profile module 504 will indicate to thepolling module 406 which user devices 102 will require the networkprofile for the newly shared personal network 108.

The next time the indicated user device 102 polls the network managementserver 110, the network profile will be provided to the user device 102in step 614. Polling may occur periodically or when the user device 102connects to a hotspot 106 or another personal network 108 (e.g., thebuddy's own personal network 108 or another user's shared personalnetwork 108). As previously discussed, the network profile comprises thenetwork settings, security information, and/or keys required to accessthe personal network 108. Once the network profile of the newly sharedpersonal network 108 is downloaded onto the buddy client device 102, theclient device 102 is provisioned to use the newly shared personalnetwork 108.

In some embodiments, the buddy user device 102 that is used to acceptthe invitation may receive the network profile substantiallysimultaneously with the update to the inviter's account. That is,shortly after the buddy accepts the invitation, the user device 102 usedto accept the invitation will receive the network profile without a newconnection or substantial period of time passing.

It should be noted that when a user shares their personal network 108with a buddy, all of the user devices 102 associated with the buddy maybe able to use the shared personal network 108. However, if the user hasmore than one personal network 108, the user may choose to share one ormore of the personal networks, but need not share all of them with eachbuddy. For example, the user may decide to only share personal network Awith buddy X, but shares personal networks A and B with buddy Y.

Referring now to FIG. 7, a flowchart 700 of an exemplary method forproviding access to a personal network via a request is shown.Typically, the requestor is a registered member with the networkmanagement server 110. As such, the requestor may search for friends whoare also registered via a search mechanism provided by the networkmanagement server 110, according to one embodiment. Alternatively, therequestor may know that a friend has a personal network 108 and wouldlike access to the personal network 108. Regardless of how the requestordiscovers the presence of a personal network 108 he would like accessto, the requestor sends a request to the owner of the personal network108.

In step 702, the network management server 110 forwards the request. Insome embodiments, the requestor may utilize a template provide by themessaging engine 208 to generate the request. Generally, the requestwill comprise the requestor's identity, a statement requesting access tothe friend's personal network 108, and a link to a website of thenetwork management server 110.

In step 704, the user (i.e., friend) receives the request and decides ifhe is willing to share the personal network 108. In some embodiments,the user will log into their account with the network management server110. The account may provide an indication of the pending request. Ifthe user decides not to share his personal network 108 (e.g., selectingan entry on a webpage that denies the request), then a denialnotification will be sent by the messaging engine 208 to the requestorin step 706.

However, if the user accepts the request (e.g., selecting an entry onthe webpage that accepts the request), then both users' accounts areupdated in step 708. In exemplary embodiments, the requestor may beadded as a “buddy” on the sharing user's account. The requesting user'saccount will also be updated to indicate the shared personal networkbeing available for use.

In step 710, the buddy (i.e., requestor) user devices 102 are queued upto receive the network profile of the newly shared personal network 108.In exemplary embodiments, the profile module 504 will indicate to thepolling module 406 which user devices 102 will require the networkprofile of the newly shared personal network 108.

The next time the indicated user device 102 polls the network managementserver 110, the network profile will be provided to the user device 102in step 712. Polling may occur periodically or when the user device 102connects to a hotspot 106 or another personal network 108 (e.g., thebuddy's own personal network 108 or another user's shared personalnetwork 108). As previously discussed, the network profile comprises thenetwork settings, security information, and/or keys required to accessthe newly shared personal network 108. Once the network profile isdownloaded onto the buddy client device 102, the client device 102 isprovisioned to use the shared personal network 108.

If the user adds a new personal network 108, the user may share the newpersonal network 108 with existing buddies. In exemplary embodiments,the user may access their buddy list and select a box indicating the newpersonal network 108 next to the buddies that the user wants to sharethe new personal network 108 with. In one embodiment, a message is sentto the buddies that the user wants to share the new personal network 108with. Steps 610-614 or steps 708-712 are then performed to download thenetwork profiles to the affected user devices 102.

In an alternative embodiment, the affected buddy may not need to respondto the new personal network 108 message. Instead, the network profilesmay automatically be queued to be delivered to the affected buddy userdevices 102 without the affected buddy having to perform any action.

According to exemplary embodiments, if the user edits a personal network108 (e.g., change the security key), any affected user devices 102(including the user's and buddies' user devices 102) will automaticallybe queued to be updated with the new network profile. In someembodiments, the affected buddies may not receive any notification ofthe change.

In some situations, the user may desire to revoke access to theirpersonal network 108 for one or more buddies. FIG. 8 is a flowchart 800of an exemplary method for removing access. Initially, the user may login with the network management server 110, and access their accountinformation. In exemplary embodiments, the user may proceed to theirbuddy list to view the list of buddies and the personal networks 108being shared with each buddy. The user may then indicate which buddy orpersonal network 108 being shared should be suspended or denied. In someembodiments, the user may decide to suspend access to one (or more) ofseveral personal networks 108 a buddy is sharing. For example, the usermay deselect one of the shared personal networks 108 on the buddy list.In other embodiments, the user may decide to suspend access to the buddyin general. The indication is then received by the network managementengine in step 802.

In step 804, the user's account is updated to reflect the suspension ofthe buddy or personal network 108. In some embodiments, the buddy isremoved from the buddy list. Alternatively, the buddy may still belisted, but with an indication that no personal networks 108 are beingshared.

In step 806, the buddy user devices 102 are queued up for removal of thenetwork profile of the suspended personal network 108. In exemplaryembodiments, the profile module 504 will indicate to the polling module406 which user devices 102 will require removal of the network profile.

The next time the indicated user device 102 polls the network managementserver 110, the network profile will be removed from the user device instep 808. Polling may occur periodically or when the user device 102connects to a hotspot 106 or personal network 108.

In some embodiments, the suspended buddy may remain on the buddy listwith an indication that no personal networks 108 are being shared withthe suspended buddy. A ‘re-activate” button may also be provide next tothe suspended buddy name in case the user wants to share his personalnetworks 108 with the suspended buddy in the future.

The above-described functions and components can be comprised ofinstructions that are stored on a computer readable storage medium(i.e., a machine readable medium). The instructions can be retrieved andexecuted by a processor. Some examples of instructions are software,program code, and firmware. Some examples of storage medium are memorydevices, tape, disks, integrated circuits, and servers. The instructionsare operational when executed by the processor to direct the processorto operate in accord with embodiments of the present invention. Thoseskilled in the art are familiar with instructions, processor(s), andcomputer readable storage medium.

The present invention has been described above with reference toexemplary embodiments. It will be apparent to those skilled in the artthat various modifications may be made and other embodiments can be usedwithout departing from the broader scope of the invention. Therefore,these and other variations upon the exemplary embodiments are intendedto be covered by the present invention.

1. A method for sharing a personal network, comprising: receivingcredentials for the personal network of a first user; receiving anindication to share the personal network with a second user; generatinga network profile based on the received credentials; queuing one or moreuser devices of the second user to receive the network profile; andproviding the network profile to the one or more user devices toprovision the one or more user devices for accessing the personalnetwork.
 2. The method of claim 1 wherein the personal network comprisesa Wi-Fi network.
 3. The method of claim 1 further comprising providingan invitation message from the first user to the second user to sharethe personal network
 4. The method of claim 1 further comprisingproviding a request message from the second user to the first user toshare the personal network.
 5. The method of claim 1 further comprisingauthenticating the first and second users to provide the users access totheir accounts.
 6. The method of claim 1 further comprising setting upan account for the second user.
 7. The method of claim 1 furthercomprising updating accounts of the first and second users to indicatethe sharing of the personal network.
 8. The method of claim 1 whereinproviding the network profile comprises providing the network profileduring a next poll by the user device.
 9. The method of claim 8 whereinthe next poll occurs periodically.
 10. The method of claim 8 wherein thenext poll occurs when the user device connects to a network.
 11. Themethod of claim 1 further comprising suspending sharing of the personalnetwork.
 12. The method of claim 11 further comprising queuing one ormore user devices for removal of the network profile and removing thenetwork profile.
 13. The method of claim 1 further comprising providinga search mechanism to search for a user to share the personal network.14. The method of claim 1 further comprising providing software to theone or more user devices, the software configuring the one or more userdevices to operate with a network management server managing the sharingof the personal network.
 15. The method of claim 1 further comprisingallowing the second user to share personal networks of the second userwith the first user.
 16. A system for sharing a personal network,comprising: a messaging engine configured to send and receive messagesregarding sharing of the personal network; a personal network engineconfigured to receive credentials of the personal network and generate anetwork profile based on the credentials; and a polling moduleconfigured to provide the network profile to one or more user devices ofa sharing user.
 17. The system of claim 16 further comprising an accountmodule configured to manage user accounts including sharing of thepersonal network.
 18. The system of claim 16 wherein the network is aWi-Fi network.
 19. The system of claim 16 further comprising a softwaredownload module configured to provide software to the one or more userdevices, the software configuring the one or more user devices tooperate with a network management server managing the sharing of thepersonal network.
 20. A machine readable medium having embodied thereona program, the program having instructions operable by a machine forsharing a personal network, the method comprising: receiving credentialsfor the personal network of a first user; receiving an indication toshare the personal network with a second user; generating a networkprofile based on the received credentials; queuing one or more userdevices of the second user to receive the network profile; and providingthe network profile to the one or more user devices to provision the oneor more user devices for accessing the personal network.