Reciprocal addition of attribute fields in access control lists and profiles for femto cell coverage management
First Claim
1. A method, comprising:
- receiving input to initiate a procedure to populate a first white list that stores a set of mobile device identifiers authorized to communicate via a femto access point linked to a first subscriber;
detecting inclusion of a first mobile device identifier linked to the first subscriber in a second white list, associated with a second femto access point linked to a second subscriber, that stores a disparate set of mobile device identifiers authorized to communicate via the second femto access point;
prompting inclusion of a second mobile device identifier linked to the second subscriber in the first white list, in response to the detecting;
including the second mobile device identifier linked to the second subscriber in the first white list based on an authorization received in response to the promptingreceiving authorization to share the first mobile device identifier with a disparate white list; and
exposing the first mobile device identifier to a disparate subscriber, during provision of the disparate white list of the disparate subscriber, in response to the receiving.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). A mechanism for reciprocal addition of access field attributes in access control lists and white list profiles also is provided. The mechanism allows at least in part for a first subscriber to be added to a configured white list of a second subscriber, when the first subscriber configures a new white list, the second subscriber is reciprocally incorporated in the new white list. Such mechanism can be driven and facilitates generation of associations among groups of subscribers that share specific commonalities.
264 Citations
20 Claims
-
1. A method, comprising:
-
receiving input to initiate a procedure to populate a first white list that stores a set of mobile device identifiers authorized to communicate via a femto access point linked to a first subscriber; detecting inclusion of a first mobile device identifier linked to the first subscriber in a second white list, associated with a second femto access point linked to a second subscriber, that stores a disparate set of mobile device identifiers authorized to communicate via the second femto access point; prompting inclusion of a second mobile device identifier linked to the second subscriber in the first white list, in response to the detecting; including the second mobile device identifier linked to the second subscriber in the first white list based on an authorization received in response to the prompting receiving authorization to share the first mobile device identifier with a disparate white list; and exposing the first mobile device identifier to a disparate subscriber, during provision of the disparate white list of the disparate subscriber, in response to the receiving. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non transitory computer-readable medium having instructions stored thereon that, in response to execution, cause a system to perform operations, comprising:
-
initiating a procedure for populating a first white list that stores a first set of mobile device identifiers authorized to communicate via a first femto access point linked to a first subscriber; identifying, in response to the initiating, a second mobile device identifier associated with a second subscriber based on detecting a first mobile device identifier linked to the first subscriber stored in a second white list, associated with a second femto access point linked to the second subscriber; storing the second mobile device identifier in the first white list in response to receiving an authorization; and presenting the set of first mobile device identifiers to a disparate subscriber, during provisioning of a disparate white list of the disparate subscriber, in response to receiving permission to share the first white list with the disparate subscriber. - View Dependent Claims (13, 14)
-
-
15. A system, comprising:
-
a component configured to identify that a first device, associated with a first subscriber, is authorized to communicate via a femto access point of a second subscriber; a component configured to request authorization for a second device, associated with the second subscriber, to communicate via a disparate femto access point of the first subscriber; a data store configured to retain a forward shared white list that includes an identifier associated with the second device, in response to receipt of the authorization; and a security component configured to receive an authorization to share data associated with a list of devices that are authorized to communicate via the disparate femto access point, wherein the data is exposed to a third subscriber, during provisioning of a white list of the third subscriber, in response to receipt of the authorization. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification