ACCESS CONTROL LISTS AND PROFILES TO MANAGE FEMTO CELL COVERAGE
First Claim
1. A system, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
determining identifier data indicative of a user equipment that has been authorized to access a femto access point device; and
based on the identifier data and in response to verifying that status data indicative of a status associated with the user equipment satisfies a defined status criterion, facilitating an update of an access control data structure that is employable to control access to the femto access point device, wherein the status data differs from the identifier data.
1 Assignment
0 Petitions
Accused Products
Abstract
Access to femto cell service can be managed through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Values of attribute fields that determine white list(s), black list(s), or white list profile(s) can be generated through various sources. An access list management component facilitates generation and maintenance of white list(s), black list(s), or white list profile(s). Values for identifier attribute field(s) available for inclusion in a white list are validated prior to inclusion therein. Various example aspects such as white list(s) management, maintenance and dissemination; automatic population or pre-configuration; and inclusion of wireless device(s) or subscriber(s) are also provided.
-
Citations
20 Claims
-
1. A system, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; determining identifier data indicative of a user equipment that has been authorized to access a femto access point device; and based on the identifier data and in response to verifying that status data indicative of a status associated with the user equipment satisfies a defined status criterion, facilitating an update of an access control data structure that is employable to control access to the femto access point device, wherein the status data differs from the identifier data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
determining, by a system comprising a processor, identifier data indicative of a user equipment that is to be authorized to access a femto access point device; and in response to determining that status data indicative of a status associated with the user equipment satisfies a defined status criterion and based on the identifier data, modifying, by the system, an access control data structure that is employable to control access to the femto access point device, wherein the status data is different from the identifier data. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
determining identifier data indicative of a user equipment that is to be authorized access to a femto access point device; and in response to determining that status data indicative of a status associated with the user equipment satisfies a defined status criterion and based on the identifier data, modifying an access control data structure used to control access to the femto access point device, wherein the status data is different from the identifier data. - View Dependent Claims (19, 20)
-
Specification