Exchange of access control lists to manage femto cell coverage
First Claim
1. A method, comprising:
- receiving an access list, wherein the access list is employed to grant femto coverage;
retaining the access list in a data storage in response to a subscriber source of the access list opting to share the access list;
prompting a subscriber intended to receive the access list, for acceptance thereof, in response to the access list being authorized for transfer; and
transferring the access list from the data storage to a femto access point associated with the subscriber intended to receive the access list.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Access lists exchange among subscribers that posses provisioned femto access points and elect to share access lists also is provided. Transference of access list(s) among subscribers is secured and based at least in part on subscriber privacy policy. Subscribers can be prompted to opt in access list sharing, or to update privacy policies to allow reciprocate sharing and update privacy settings. Based at least in part on association criteria, component identifies femto access points for a subscriber to access lists with.
321 Citations
24 Claims
-
1. A method, comprising:
-
receiving an access list, wherein the access list is employed to grant femto coverage; retaining the access list in a data storage in response to a subscriber source of the access list opting to share the access list; prompting a subscriber intended to receive the access list, for acceptance thereof, in response to the access list being authorized for transfer; and transferring the access list from the data storage to a femto access point associated with the subscriber intended to receive the access list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable storage medium comprising computer-executable instructions that, in response to execution, cause a system to perform operations, comprising:
-
receiving an access list, wherein the access list is employed to grant femto coverage; retaining the access list in a data storage in response to a subscriber source of the access list opting to share the access list; prompting a subscriber intended to receive the access list, for acceptance thereof, in response to the list being authorized for transfer; and transferring the access list from the data storage to a femto access point associated with the subscriber intended to received the access list. - View Dependent Claims (13, 14)
-
-
15. A system, comprising:
-
an access management component configured to receive an access list, wherein the access list is employed to grant femto coverage; a security component configured to edit the access list in accordance at least in part with a privacy policy for dissemination of the access list associated with a subscriber that shares the access list; and a data storage configured to retain the access list. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification