Reciprocal addition of attribute fields in access control lists and profiles for femto cell coverage management
First Claim
1. A system, comprising:
- a memory to store instructions; and
a processor, coupled to the memory that facilitates execution of the instructions to perform operations, comprising;
receiving, from a data store of a macro network, information related to a set of disparate femto access point devices,based on the information, determining association data indicative of an association of devices of the set of disparate femto access point devices, andbased on the association data, determining a hierarchical data structure combining a set of access control data structures associated with the set of disparate femto access point devices, wherein the set of access control data structures comprise identifier data associated with user equipment that are authorized to access the set of disparate femto access point devices, and compressing the hierarchical data structure based on wavelet compression.
1 Assignment
0 Petitions
Accused Products
Abstract
Access management to femto cell service is provided through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). A mechanism for reciprocal addition of access field attributes in access control lists and white list profiles also is provided. The mechanism allows at least in part for a first subscriber to be added to a configured white list of a second subscriber, when the first subscriber configures a new white list, the second subscriber is reciprocally incorporated in the new white list. Such mechanism can be driven and facilitates generation of associations among groups of subscribers that share specific commonalities.
233 Citations
20 Claims
-
1. A system, comprising:
-
a memory to store instructions; and a processor, coupled to the memory that facilitates execution of the instructions to perform operations, comprising; receiving, from a data store of a macro network, information related to a set of disparate femto access point devices, based on the information, determining association data indicative of an association of devices of the set of disparate femto access point devices, and based on the association data, determining a hierarchical data structure combining a set of access control data structures associated with the set of disparate femto access point devices, wherein the set of access control data structures comprise identifier data associated with user equipment that are authorized to access the set of disparate femto access point devices, and compressing the hierarchical data structure based on wavelet compression. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
analyzing, by a system comprising a processor, data related to a set of disparate femto access point devices that is received via a data store within a macro network; based on the analyzing, determining, by the system, relationship data indicative of a relationship between a subset of the set of disparate femto access point devices; based on the relationship data, determining, by the system, a hierarchical data structure representing access control data structures of the subset of the set of disparate femto access point devices, wherein the access control data structures comprise identifier data associated with user equipment that are authorized to access the subset of the set of disparate femto access point devices; and compressing the hierarchical data structure based on wavelet compression. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable storage medium comprising computer-executable instructions that, in response to execution, cause a system comprising a processor to perform operations, comprising:
-
analyzing data related to a first femto access point device and a second femto access point device; determining association data indicative of an association between the first femto access point device and the second femto access point device based on the analyzing; and determining a hierarchical data structure that combines a first access control data structure of the first femto access point device and a second access control data structure of the second femto access point device, wherein the first access control data structure comprises first identifier data associated with a first set of user equipment that is authorized to access the first femto access point device and the second access control data structure comprises second identifier data associated with a second set of user equipment that is authorized to access the second femto access point device; and compressing the hierarchical data structure based on wavelet compression. - View Dependent Claims (19, 20)
-
Specification