Access control lists and profiles to manage femto cell coverage
First Claim
1. A method, comprising:
- receiving, by a system comprising a processor, access field indication data, comprising identifier data indicative of an identifier of a mobile device, for inclusion in an access control data structure associated with a femtocell device, wherein the access control data structure is employed to control access to the femtocell device;
comparing, by the system, the identifier data with information associated with the mobile device that is received from a subscriber data store within a macro network;
andin response to determining, based on the comparing, that the identifier is an active identifier, updating, by the system, the access control data structure with the access field indication data.
1 Assignment
0 Petitions
Accused Products
Abstract
System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Values of attribute fields that determine white list(s), black list(s), or white list profile(s) can be generated through various sources. An access list management component facilitates generation and maintenance of white list(s), black list(s), or white list profile(s). Values for identifier attribute field(s) available for inclusion in a white list are validated prior to inclusion therein. Various example aspects such as white list(s) management, maintenance and dissemination; automatic population or pre-configuration; and inclusion of wireless device(s) or subscriber(s) are also provided.
242 Citations
32 Claims
-
1. A method, comprising:
-
receiving, by a system comprising a processor, access field indication data, comprising identifier data indicative of an identifier of a mobile device, for inclusion in an access control data structure associated with a femtocell device, wherein the access control data structure is employed to control access to the femtocell device; comparing, by the system, the identifier data with information associated with the mobile device that is received from a subscriber data store within a macro network; and in response to determining, based on the comparing, that the identifier is an active identifier, updating, by the system, the access control data structure with the access field indication data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
-
a memory to store instructions; and a processor, coupled to the memory, that facilitates execution of the instructions to perform operations, comprising; receiving an access field indication data associated with an access control data structure relating to a femtocell device, wherein the access control data structure is employed to control access to the femtocell device and the access field indication data comprises identifier data indicative of an identifier of a mobile device that is authorized to access the femtocell device; receiving information associated with the mobile device from a subscriber data store of a macro network, prior to entering the access field indication data identifier into the access control data structure; and in response to a determination, based on the information, that the identifier is an active identifier of the mobile device, adding the access field indication data to the access control data structure. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A non-transitory computer-readable storage medium having instructions stored thereon that, in response to execution, cause a system comprising a processor to perform operations, comprising:
-
receiving access field indication data, comprising identifier data indicative of an identifier assigned to a mobile device; receiving information relating to the mobile device from a subscriber data store within a macro network; based on the information, determining that the identifier is not an active identifier; and in response to the determining, prohibiting addition of the identifier data to an access control data structure relating to a femtocell device associated with the mobile device, wherein the access control data structure is employed to control access to the femtocell device. - View Dependent Claims (31, 32)
-
Specification