Interface for access management of FEMTO cell coverage
First Claim
Patent Images
1. A system, comprising:
- a memory to store instructions; and
a processor, coupled to the memory, that facilitates execution of the instructions to perform operations, comprising;
determining association data indicative of an association between access control data structures associated with respective femto access point devices, wherein the access control data structures comprise identifier data associated with user equipments that are authorized to access the respective femto access point devices, andfacilitating storage of the access control data structures based on the association data, wherein the facilitating comprises compressing the identifier data based on the association data.
1 Assignment
0 Petitions
Accused Products
Abstract
Access management of femto cell service through access control list(s), or “white list(s)” is disclosed. Such white list(s) can be configured via a networked interface which facilitates access management to a femto cell. White list(s) includes a set of subscriber station(s) identifier numbers, codes or tokens, and can also include additional fields for femto cell access management based on desired complexity. Various interfaces and user profiles are associated with granting different levels of access to requesting UEs.
193 Citations
25 Claims
-
1. A system, comprising:
-
a memory to store instructions; and a processor, coupled to the memory, that facilitates execution of the instructions to perform operations, comprising; determining association data indicative of an association between access control data structures associated with respective femto access point devices, wherein the access control data structures comprise identifier data associated with user equipments that are authorized to access the respective femto access point devices, and facilitating storage of the access control data structures based on the association data, wherein the facilitating comprises compressing the identifier data based on the association data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
determining, by a system comprising a processor, association data indicative of an association between a first access control data structure and a second access control data structure, wherein the first access control data structure is employed to control access to a first femto access point device and the second access control data structure is employed to control access to a second femto access point device; determining, by the system, a compressed access control data structure based on compressing the first access control data structure and the second access control data structure in accordance with the association data; and facilitating, by the system, storage of the compressed access control data structure. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system, comprising:
-
a memory to store instructions; and a processor, coupled to the memory, that facilitates execution of the instructions to perform operations, comprising; in response to determining that a first user equipment associated with a first femto access point device is authorized to access a second femto access point device, and that a second user equipment associated with the second femto access point device is authorized to access a third femto access point device, determining association data indicative of an association of the first femto access point device with the third femto access point device, based on the association data, determining a hierarchical access control data structure associated with the first femto access point device and the third femto access point device, wherein the determining the hierarchical access control data structure comprises compressing identifier data indicative of a first set of user equipments that is authorized to access the first femto access point device and a second set of user equipments that is authorized to access the second femto access point device, and facilitating storage of the hierarchical access control data structure. - View Dependent Claims (20, 21, 22)
-
-
23. A non-transitory computer readable storage medium having instructions stored thereon that, in response to execution, cause a system comprising a processor to perform operations, comprising:
determining association data indicative of an association between access control data structures associated with respective femto access point devices, wherein the access control data structures comprise identifier data associated with user equipments that are authorized to access the respective femto access point devices; and
facilitating storage of the access control data structures based on the association data, wherein the facilitating comprises compressing the identifier data based on the association data.- View Dependent Claims (24, 25)
Specification