EXCHANGE OF ACCESS CONTROL LISTS TO MANAGE FEMTO CELL COVERAGE
First Claim
1. A method comprising:
- receiving an access list, wherein the access control list grants or denies femto coverage;
retaining the access list in a data storage when a subscriber source of the access list opted to share the access list;
prompting a subscriber intended to receive the access list for acceptance thereof when the list is authorized for transfer; and
transferring the access list from the data storage to a femto access point associated with the subscriber intended to received the access list.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Access lists exchange among subscribers that posses provisioned femto access points and elect to share access lists also is provided. Transference of access list(s) among subscribers is secured and based at least in part on subscriber privacy policy. Subscribers can be prompted to opt in access list sharing, or to update privacy policies to allow reciprocate sharing and update privacy settings. Based at least in part on association criteria, component identifies femto access points for a subscriber to access lists with.
130 Citations
24 Claims
-
1. A method comprising:
-
receiving an access list, wherein the access control list grants or denies femto coverage; retaining the access list in a data storage when a subscriber source of the access list opted to share the access list; prompting a subscriber intended to receive the access list for acceptance thereof when the list is authorized for transfer; and transferring the access list from the data storage to a femto access point associated with the subscriber intended to received the access list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable medium having instructions stored thereon that, when executed by a processor, cause a computer to perform the following acts:
-
receiving an access list, wherein the access control list grants or denies femto coverage; retaining the access list in a data storage when a subscriber source of the access list opted to share the access list; prompting a subscriber intended to receive the access list for acceptance thereof when the list is authorized for transfer; and transferring the access list from the data storage to a femto access point associated with the subscriber intended to received the access list. - View Dependent Claims (13, 14)
-
-
15. A system comprising:
-
a component that receives an access list, wherein the access control list grants or denies femto coverage; a security component that edits a received access list in accordance at least in part with a privacy policy for dissemination of an access list associated with a subscriber that shares the access list; and a data storage that retains at least one of the received access list, an edited access list, or the privacy policy. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification