Selecting embedded cells in wireless networks
First Claim
Patent Images
1. A method performed by an access terminal, comprising:
- receiving a signal from an access point to a radio area network, the signal comprising a first identifier;
determining whether the first identifier corresponds to a second identifier in a white list in memory of the access terminal, the white list identifying one or more access points that the access terminal is authorized to use, the second identifier comprising wildcard data, the first identifier being determined to correspond to the second identifier if data in the first identifier matches data at corresponding positions in the second identifier excluding the wildcard data;
determining whether the first identifier corresponds to a third identifier in a black list in memory of the access terminal, the black list identifying one or more access points that the access terminal is not authorized to use, the first identifier being determined to correspond to the third identifier if data in the first identifier matches data at corresponding positions in the third identifier; and
determining whether to communicate with the radio area network through the access point based on whether the first identifier corresponds to the second identifier and based on whether the first identifier corresponds to the third identifier.
20 Assignments
0 Petitions
Accused Products
Abstract
An access terminal determines whether a parameter encoded in a signal received from an embedded access point is identified by a list in a memory of the access terminal. Based on the determination, the access terminal initiates communication with a radio area network through the embedded access point.
106 Citations
58 Claims
-
1. A method performed by an access terminal, comprising:
-
receiving a signal from an access point to a radio area network, the signal comprising a first identifier; determining whether the first identifier corresponds to a second identifier in a white list in memory of the access terminal, the white list identifying one or more access points that the access terminal is authorized to use, the second identifier comprising wildcard data, the first identifier being determined to correspond to the second identifier if data in the first identifier matches data at corresponding positions in the second identifier excluding the wildcard data; determining whether the first identifier corresponds to a third identifier in a black list in memory of the access terminal, the black list identifying one or more access points that the access terminal is not authorized to use, the first identifier being determined to correspond to the third identifier if data in the first identifier matches data at corresponding positions in the third identifier; and determining whether to communicate with the radio area network through the access point based on whether the first identifier corresponds to the second identifier and based on whether the first identifier corresponds to the third identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus comprising:
an access terminal for communicating with a radio area network, the access terminal comprising one or more processing devices programmed to perform operations rising; receiving a signal from an access point, the signal comprising a first identifier; determining whether the first identifier corresponds to a second identifier in a white list in memory of the access terminal, the white list identifying one or more access points that the access terminal is authorized to use the second identifier comprising wildcard data, the first identifier being determined to correspond to the second identifier if data in the first identifier matches data at corresponding positions in the second identifier excluding the wildcard data; determining whether the first identifier corresponds to a third identifier in a black list in memory of the access terminal, the black list identifying one or more access points that the access terminal is not authorized to use, the first identifier being determined to correspond to the third identifier if data in the first identifier matches data at corresponding positions in the third identifier; and determining whether to communicate with the radio area network through the access point based on whether the first identifier corresponds to the second identifier and based on whether the first identifier corresponds to the third identifier. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 33)
-
32. One or more non-transitory machine-readable storage media storing instructions that are executable by one or more processing devices to perform operations comprising:
-
receiving a signal from an access point, the signal comprising a first identifier; determining whether the first identifier corresponds to a second identifier in a white list in memory of an access terminal, the white list identifying one or more access points that the access terminal is authorized to use, the second identifier comprising wildcard data, the first identifier being determined to correspond to the second identifier if data in the first identifier matches data at corresponding positions in the second identifier excluding the wildcard data; determining whether the first identifier corresponds to a third identifier in a black list in memory of the access terminal, the black list identifying one or more access points that the access terminal is not authorized to use, the first identifier being determined to correspond to the third identifier if data in the first identifier matches data at corresponding positions in the third identifier; and determining whether to communicate with a radio area network through the access point based on whether the first identifier corresponds to the second identifier and based on whether the first identifier corresponds to the third identifier. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A method performed by one or more servers, comprising:
-
obtaining information for one or more access points through which an access terminal is granted or denied access to a radio area network; generating, based on the information, a white list identifying one or more access points that the access terminal is authorized to use, the white list comprising first identifiers, at least one of the first identifiers comprising wildcard data, wherein a first identifier is determined to correspond to an access point identifier if data in the first identifier matches data at corresponding positions in the access point identifier excluding the wildcard data generating, based on the information, a black list identifying one or more access points that the access terminal is not authorized to use, the black list comprising second identifiers, wherein a second identifier is determined to correspond to the access point identifier if data in the second identifier matches data at corresponding positions in the access point identifier; and sending the white list and the black list to the access terminal. - View Dependent Claims (50, 51)
-
-
52. An apparatus comprising:
-
one or more processing devices programmed to perform operations comprising; obtaining information for one or more access points through which an access terminal is granted or denied access to a radio area network; generating, based on the information, a white list identifying one or more access points that the access terminal is authorized to use, the white list comprising first identifiers, at least one of the first identifiers comprising wildcard data, wherein a first identifier is determined to correspond to an access point identifier if data in the first identifier matches data at corresponding positions in the access point identifier excluding the wildcard data generating, based on the information, a black list identifying one or more access points that the access terminal is not authorized to use, the black list comprising second identifiers, wherein a second identifier is determined to correspond to the access point identifier if data in the second identifier matches data at corresponding positions in the access point identifier; and sending the white list and the black list to the access terminal. - View Dependent Claims (53, 54, 55)
-
-
56. One or more non-transitory machine-readable media storing instructions that are executable by one or more processing devices to perform operations comprising:
-
obtaining information for one or more access points through which an access terminal is granted or denied access to a radio area network; generating, based on the information, a white list identifying one or more access points that the access terminal is authorized to use, the black list comprising first identifiers, at least one of the first identifiers comprising wildcard data, wherein a first identifier is determined to correspond to an access point identifier if data in the first identifier matches data at corresponding positions in the access point identifier excluding the wildcard data generating, based on the information, a black list identifying one or more access points that the access terminal is not authorized to use, the white list comprising second identifiers, wherein a second identifier is determined to correspond to the access point identifier if data in the second identifier matches data at corresponding positions in the access point identifier; and sending the white list and the black list to the access terminal. - View Dependent Claims (57, 58)
-
Specification