MANAGEMENT OF ACCESS TO SERVICE IN AN ACCESS POINT
First Claim
1. A system that controls access to wireless service and features thereof, the system comprising:
- a set of access points (APs) that includes at least one an indoor-based base stations or an outdoor-based base stations; and
a manager component that configures at least one of an access control list associated with an access point in the set of APs or an access profile linked to the access control list, the access control list (ACL) identifies one or more devices authorized to receive wireless service through the access point, and the access profile includes a set of service attributes that control logic for provision of wireless service to a device identified in an ACL, wherein the manager component resides at least in part in at least one of an access point in the set of APs, or a centralized network platform or component(s) therein.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) are provided to configure access rights to wireless resources and telecommunication service(s) supplied through a set of access points (APs). Access to wireless resources is authorized by access attributes in access control list(s) (ACL(s)) while a profile of service attributes linked to the ACL(s) regulate provision of telecommunication service(s). Access and service attributes can be automatically or dynamically configured, at least in part, in response to changes in data that directly or indirectly affects an operation environment in which the set of APs is deployed. Automatic or dynamic configuration of access or service attributes enable control or coordination of wireless service provided through the set of APs; degree of control or coordination is determined at least in part by enablement or disablement of disparate services for disparate devices at disparate access points at disparate times and with disparate service priority.
234 Citations
22 Claims
-
1. A system that controls access to wireless service and features thereof, the system comprising:
-
a set of access points (APs) that includes at least one an indoor-based base stations or an outdoor-based base stations; and a manager component that configures at least one of an access control list associated with an access point in the set of APs or an access profile linked to the access control list, the access control list (ACL) identifies one or more devices authorized to receive wireless service through the access point, and the access profile includes a set of service attributes that control logic for provision of wireless service to a device identified in an ACL, wherein the manager component resides at least in part in at least one of an access point in the set of APs, or a centralized network platform or component(s) therein. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
employing a processor to execute code instructions retained in a computer-readable medium, the code instructions when executed by the one or more processors perform at the least the following acts; provisioning a set of rules to control at least one of a set of access control lists or a set of access profiles, wherein the provisioning act includes provisioning a set of criteria to establish access attributes in an access control list for a prospective consumer; monitoring reference data identified in the set of rules; applying a rule in the set of rules to the monitored reference data; and configuring at least one of an access control list or an access profile based at least in part on at least one of the set of rules, the monitored reference data, or the outcome of application of the rule in the set of rules to the monitored reference data. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system, comprising:
-
means for provisioning a group of one or more rules to control at least one of a set of access control lists or a set of access profiles; means for monitoring reference data identified in the group of one or more rules; means for applying a rule in the group of one or more rules to the monitored reference data; and means for configuring at least one of an access control list or an access profile based at least in part on at least one of the group or one or more rules, the monitored reference data, or the outcome of application of the rule in the set of rules to the monitored reference data.
-
Specification