Method and system for restricted access configuration of access point base stations

作者: Sanjiv Nanda , Brian K. Butler

DOI:

关键词: Operator (computer programming)IdentifierBase stationContact listRestricted accessReal-time computingPoint (geometry)Computer scienceTerminal (electronics)Computer network

摘要: Devices and methods are provided for the controlling access to point (AP) base stations. In particular, described herein techniques automated configuration of AP stations restricted access. For example, technique may involve receiving a contact list from an terminal (AT) associated with station network operator. From received list, saved contacts operator be identified. The further retrieving identifiers identified contacts, generating allowed user identifiers, which used configure

参考文章(14)
Peter S. Wang, Ulises Olvera-Hernandez, Jin Wang, Cell access restriction and wtru access class optimization in lte system information ,(2008)
Jonathan Michael Ackley, Cell phone parental control ,(2004)
Atsushi Teshima, Shiro Mazawa, Yoshitaka Iida, Kazuhiro Sasame, Terminal usage limiting apparatus ,(2000)
Maik Bienas, Martin Hans, Achim Luft, Hyung-Nam Choi, Network access control methods and apparatus ,(2008)
Tsutomu Sakai, Reduced power auto-configuration ,(2005)
William P. Alberth, Brett Murdock, Scott Alan Steele, Jeremy Jacobson, Advanced air time management ,(2000)
Jonjie Sena, Mehran Moghaddam, Carlos Perez, Consumer configurable mobile communication solution ,(2006)
Kenneth W. Sonberg, Thomas Erskine, Luther Rudisill, Method and system for providing supervisory control over wireless phone usage ,(2004)