Interface for access management of FEMTO cell coverage
First Claim
Patent Images
1. A system, comprising:
- a memory that stores executable instructions; and
a processor, coupled to the memory, that facilitates execution of the executable instructions to perform operations, comprising;
employing a first access control data structure to manage access to a femto access point device;
receiving, from a user equipment, instruction data to perform an action associated with femtocell access provisioning, wherein the instruction data is received via a text message and comprises timing data indicative of a time period during which a device is allowed to access the femto access point device associated with the user equipment;
based on the instruction data, initiating the action; and
in response to determining that first identifier data representing the user equipment is stored in a second access control data structure that is employed to manage access to a second femto access point device associated with a second device, directing, to the user equipment via a second text message, configuration data that requests an authorization to add second identifier data representing the second device to the first access control data structure.
1 Assignment
0 Petitions
Accused Products
Abstract
Access to femto cell service is managed through access control list(s), or “white list(s).” Such white list(s) can be configured via a networked interface which facilitates access management to a femto cell. White list(s) includes a set of subscriber station(s) identifier numbers, codes or tokens, and can also include additional fields for femto cell access management based on desired complexity. Various interfaces and user profiles are associated with granting different levels of access to requesting UEs.
252 Citations
20 Claims
-
1. A system, comprising:
-
a memory that stores executable instructions; and a processor, coupled to the memory, that facilitates execution of the executable instructions to perform operations, comprising; employing a first access control data structure to manage access to a femto access point device; receiving, from a user equipment, instruction data to perform an action associated with femtocell access provisioning, wherein the instruction data is received via a text message and comprises timing data indicative of a time period during which a device is allowed to access the femto access point device associated with the user equipment; based on the instruction data, initiating the action; and in response to determining that first identifier data representing the user equipment is stored in a second access control data structure that is employed to manage access to a second femto access point device associated with a second device, directing, to the user equipment via a second text message, configuration data that requests an authorization to add second identifier data representing the second device to the first access control data structure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
employing, by a system comprising a processor, a first access control data structure to manage access to a femto access point device; receiving, by the system, instruction data that is indicative of an action associated with femtocell access provisioning, wherein the receiving comprises receiving the instruction data from a user equipment via a text message and receiving information indicative of a time period during which a device is allowed to access the femto access point device associated with the user equipment; based on the instruction data, facilitating, by the system, an execution of the action; determining, by the system, that first identifier data representing the user equipment is stored in a second access control data structure that is employed to manage access to a second femto access point device associated with a second device; and in response to the determining, directing, by the system, to the user equipment via a second text message, configuration data that requests an authorization to add second identifier data representing the second device to the first access control data structure. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium comprising instructions that, in response to execution, cause a mobile device comprising a processor to perform operations, comprising:
-
facilitating management of access to a femto access point device based on a first access control data structure; determining instruction data that specifies an action associated with femtocell access provisioning, wherein the instruction data comprises information indicative of a time period during which a device is allowed to access the femto access point device associated with a user equipment; facilitating a transmission of the instruction data to a network management device via a text message to facilitate an execution of the action; determining that first identifier data representing the user equipment is stored in a second access control data structure that is employed to manage access to a second femto access point device associated with a second device; and in response to the determining, directing to the user equipment via a second text message, configuration data that requests an authorization to add second identifier data representing the second device to the first access control data structure. - View Dependent Claims (18, 19, 20)
-
Specification