Management of access to service in an access point
First Claim
1. An access point device, comprising:
- a memory to store instructions; and
a processor, communicatively coupled to the memory, that facilitates execution of the instructions to perform operations, comprising;
receiving a first access control data structure, wherein the first access control data structure is utilized by the access point device to control access to a network;
storing the first access control data structure;
validating a credential of a mobile device requesting establishment of attachment signaling with the access point device, wherein the validating is performed utilizing a first criterion in the first access control data structure;
in response to the credential of the mobile device failing the validating with reference to the first criterion in the first access control data structure, forwarding the credential of the mobile device to a second access control data structure, wherein the second access control data structure is not stored on the access point device;
receiving from a data store comprising the second access control data structure, an indication of successfully validating the credential of the mobile device with a second criterion in the second access control data structure;
in response to successfully validating the credential of the mobile device with the second criterion, downloading the second criterion from the data store based on the second access control data structure; and
updating the first access control data structure with the second criterion.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) are provided to configure access rights to wireless resources and telecommunication service(s) supplied through a set of access points (APs). Access to wireless resources is authorized by access attributes in access control list(s) (ACL(s)) while a profile of service attributes linked to the ACL(s) regulate provision of telecommunication service(s). Access and service attributes can be automatically or dynamically configured, at least in part, in response to changes in data that directly or indirectly affects an operation environment in which the set of APs is deployed. Automatic or dynamic configuration of access or service attributes enable control or coordination of wireless service provided through the set of APs; degree of control or coordination is determined at least in part by enablement or disablement of disparate services for disparate devices at disparate access points at disparate times and with disparate service priority.
244 Citations
22 Claims
-
1. An access point device, comprising:
-
a memory to store instructions; and a processor, communicatively coupled to the memory, that facilitates execution of the instructions to perform operations, comprising; receiving a first access control data structure, wherein the first access control data structure is utilized by the access point device to control access to a network; storing the first access control data structure; validating a credential of a mobile device requesting establishment of attachment signaling with the access point device, wherein the validating is performed utilizing a first criterion in the first access control data structure; in response to the credential of the mobile device failing the validating with reference to the first criterion in the first access control data structure, forwarding the credential of the mobile device to a second access control data structure, wherein the second access control data structure is not stored on the access point device; receiving from a data store comprising the second access control data structure, an indication of successfully validating the credential of the mobile device with a second criterion in the second access control data structure; in response to successfully validating the credential of the mobile device with the second criterion, downloading the second criterion from the data store based on the second access control data structure; and updating the first access control data structure with the second criterion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, by an access point device comprising a processor, a first access control data structure, wherein the first access control data structure is utilized by the access point device to control access to a network; storing, by the access point device, the first access control data structure; initiating, by the access point device, a potential validation of a credential of a mobile device determined to be attempting to establish attachment signaling with the access point device, wherein the credential is to be validated with reference to a first criterion in the first access control data structure; in response to determining that the potential validation has failed with reference to the first criterion based on the credential of the mobile device, forwarding, by the access point device, the credential to a second access control data structure, wherein the second access control data structure is located remotely from the access point device; receiving, by the access point device, from a remote data store comprising the second access control data structure, an indication of a successful validation of the credential of the mobile device with reference to a second criterion in the second access control data structure; in response to the receiving the indication of the successful validation, receiving, by the access point device, the second criterion from the second access control data structure; and modifying, by the access point device, the first access control data structure to comprise the second criterion. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A tangible computer readable medium comprising computer executable instructions that, in response to execution, cause an access point device comprising a processor to perform operations, the operations comprising:
-
receiving a first access control data structure, wherein the first access control data structure is utilized by the access point device to control access to a network; storing the first access control data structure; validating a credential of a mobile device attempting to establish attachment signaling with the access point device, wherein the validating is performed with reference to a first criterion in the first access control data structure; in response to failure to validate the credential of the mobile device with the first criterion in the first access control data structure, forwarding the credential of the mobile device to a second access control data structure, wherein the second access control data structure is stored remotely from the access point device; receiving from the remotely located second access control data structure, an indication of successfully validating the credential of the mobile device with a second criterion in the second access control data structure; in response to successfully validating the mobile device credential with the second criterion, downloading the second criterion from the second access control data structure; and updating the first access control data structure with the second criterion. - View Dependent Claims (21, 22)
-
Specification