作者: Sanjiv Nanda , Brian K. Butler
DOI:
关键词: Operator (computer programming) 、 Identifier 、 Base station 、 Contact list 、 Restricted access 、 Real-time computing 、 Point (geometry) 、 Computer science 、 Terminal (electronics) 、 Computer network
摘要: Devices and methods are provided for the controlling access to point (AP) base stations. In particular, described herein techniques automated configuration of AP stations restricted access. For example, technique may involve receiving a contact list from an terminal (AT) associated with station network operator. From received list, saved contacts operator be identified. The further retrieving identifiers identified contacts, generating allowed user identifiers, which used configure