Exchange of access control lists to manage femto cell coverage
First Claim
1. A system, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
determining pattern data indicative of a pattern of locations likely to be visited by a user equipment;
determining that respective locations of femto access point devices satisfy a location criterion associated with the pattern data; and
facilitating a transmission of a data signal that represents notification data to the user equipment, wherein the notification data is indicative of identification information of the femto access point devices, and wherein the notification data is employable to initiate a transfer of access control data, associated with the user equipment, between the user equipment and a group of the femto access point devices.
1 Assignment
0 Petitions
Accused Products
Abstract
Access management to femto cell service is provided through access control list(s), e.g., white list(s), or black list(s). White list(s) include a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Access lists exchange among subscribers that posses provisioned femto access points and elect to share access lists also is provided. Transference of access list(s) among subscribers is secured and based at least in part on subscriber privacy policy. Subscribers can be prompted to opt in access list sharing, or to update privacy policies to allow reciprocate sharing and update privacy settings. Based at least in part on association criteria, a component identifies femto access points with which a subscriber accesses lists.
337 Citations
20 Claims
-
1. A system, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; determining pattern data indicative of a pattern of locations likely to be visited by a user equipment; determining that respective locations of femto access point devices satisfy a location criterion associated with the pattern data; and facilitating a transmission of a data signal that represents notification data to the user equipment, wherein the notification data is indicative of identification information of the femto access point devices, and wherein the notification data is employable to initiate a transfer of access control data, associated with the user equipment, between the user equipment and a group of the femto access point devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
determining, by a device comprising a processor, pattern data indicative of a pattern of locations that have been visited by a user equipment; selecting, by the device, femto access point devices that are determined to satisfy a location criterion associated with the pattern data; and facilitating, by the device, a transmission a data signal to a user equipment, wherein the data signal is indicative of identifying information for femto access point devices that is employable to initiate a transfer of access control data, associated with the user equipment, between the user equipment and a femto access point device of the femto access point devices. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
determining pattern data indicative of a pattern of locations, at which a user equipment is likely to be located; determining a femto access point device located within an area that satisfies a location criterion associated with the pattern data; and facilitating a transmission of a data signal that represents notification data to the user equipment, wherein the notification data is indicative of an identification of the femto access point device, and wherein the notification data is to be utilized to initiate a transfer of access control data, associated with the user equipment, between the user equipment and the femto access point device. - View Dependent Claims (17, 18, 19, 20)
-
Specification