RECIPROCAL ADDITION OF ATTRIBUTE FIELDS IN ACCESS CONTROL LISTS AND PROFILES FOR FEMTO CELL COVERAGE MANAGEMENT
First Claim
1. A method comprising:
- including a first mobile device identifier linked to a first subscriber in a white list configured by a second subscriber;
prompting the first subscriber to reciprocate inclusion of one or more mobile device identifiers from the white list configured by the second subscriber in another white list configured by the first subscriber as a part of a provisioning procedure of a femto access point associated with the first subscriber; and
including a second mobile device identifier linked to the second subscriber in a white list configured by the first subscriber in response to the prompting.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). A mechanism for reciprocal addition of access field attributes in access control lists and white list profiles also is provided. The mechanism allows at least in part for a first subscriber to be added to a configured white list of a second subscriber, when the first subscriber configures a new white list, the second subscriber is reciprocally incorporated in the new white list. Such mechanism can be driven and facilitates generation of associations among groups of subscribers that share specific commonalities.
171 Citations
20 Claims
-
1. A method comprising:
-
including a first mobile device identifier linked to a first subscriber in a white list configured by a second subscriber; prompting the first subscriber to reciprocate inclusion of one or more mobile device identifiers from the white list configured by the second subscriber in another white list configured by the first subscriber as a part of a provisioning procedure of a femto access point associated with the first subscriber; and including a second mobile device identifier linked to the second subscriber in a white list configured by the first subscriber in response to the prompting. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable medium having instructions stored thereon that, when executed by a processor, cause a computer to perform the following acts:
-
including a mobile device identifier linked to a first subscriber in a white list configured by a second subscriber; prompting the first subscriber to reciprocate inclusion of the mobile device identifier in the white list configured by the second subscriber as a part of a provisioning procedure of a femto access point; and including the a mobile device identifier linked to the second subscriber in a white list configured by the first subscriber in response to the prompting. - View Dependent Claims (13)
-
-
14. The computer-readable medium of claim 14 further having instructions stored thereon that, when executed by a processor, cause a computer to further perform the act of, within the subset of subscribers, incenting a second group of subscribers to include one or more subscribers in the first group within one or more white lists.
-
15. A system comprising:
-
a component that identifies a first subscriber for addition of a first device identifier associated therewith in a white list of a second subscriber; a component that conveys an indication to the first subscriber to reciprocate addition in a white list thereof of a second device identifier associated with the second subscriber when a femto access point linked to the first subscriber is provisioned; and a memory that retains a forward shared white list. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification