ACCESS CONTROL LISTS AND PROFILES TO MANAGE FEMTO CELL COVERAGE
First Claim
1. A method comprising:
- receiving a set of access field indications associated with a set of mobile devices, each access field indication in the set of received access field indications intended for at least one of an access control list or a white list profile, wherein the access control list grants or denies femto coverage and the white list profile establishes access privileges to the femto coverage; and
validating the received set of access field indications, and updating the at least one of an access list or white list profile with one or more valid access fields.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Values of attribute fields that determine white list(s), black list(s), or white list profile(s) can be generated through various sources. An access list management component facilitates generation and maintenance of white list(s), black list(s), or white list profile(s). Values for identifier attribute field(s) available for inclusion in a white list are validated prior to inclusion therein. Various example aspects such as white list(s) management, maintenance and dissemination; automatic population or pre-configuration; and inclusion of wireless device(s) or subscriber(s) are also provided.
-
Citations
33 Claims
-
1. A method comprising:
-
receiving a set of access field indications associated with a set of mobile devices, each access field indication in the set of received access field indications intended for at least one of an access control list or a white list profile, wherein the access control list grants or denies femto coverage and the white list profile establishes access privileges to the femto coverage; and validating the received set of access field indications, and updating the at least one of an access list or white list profile with one or more valid access fields. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a component that validates content identified in a received set of access field indications directed to at least one of an access list or white list profile, wherein the access control list grants or denies femto coverage and the white list profile establishes access privileges to the femto coverage; a component that generates at least one of an access list or a white list profile based at least in part on valid content identified in the received set of access field indication(s); and a memory that retains the generated at least one of an access list or a white list profile. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer-readable medium having instructions stored thereon that, when executed by a processor, cause a computer to perform the following acts:
-
receiving a set of access field indications associated to a set of mobile devices, each access field indication in the set of received access field indications intended for at least one of an access control list or a white list profile, wherein the access control list grants or denies femto coverage and the white list profile establishes access privileges to the femto coverage; and validating the received set of access field indications, and updating the at least one of an access list or white list profile with one or more valid access fields. - View Dependent Claims (32, 33)
-
Specification