Einige Inhalte dieser Anwendung sind momentan nicht verfügbar.
Wenn diese Situation weiterhin besteht, kontaktieren Sie uns bitte unterFeedback&Kontakt
1. (WO2017180352) TETHERING POLICY FOR NETWORK CONNECTIVITY VIA A TETHERED CONNECTION
Anmerkung: Text basiert auf automatischer optischer Zeichenerkennung (OCR). Verwenden Sie bitte aus rechtlichen Gründen die PDF-Version.

CLAIMS

1. A system for enabling device connectivity to a network via a tethered connection, the system comprising:

one or more processors; and

one or more computer-readable storage media storing computer-executable instructions that are executable by the one or more processors to perform operations including:

receiving a request to establish a tethering connection between a first device and a second device for purposes of providing network connectivity to the second device, the first device being connected to a first network;

causing a tethered connection to be established between the first device and the second device;

ascertaining based on a tethering policy that network connectivity for the second device is to be provided by a third device connected to a second network different than the first network; and

causing a connection to be established between the first device and the third device to cause the second device to be connected to the second network via the tethered connection between the first device and the second device, and the connection between the first device and the third device.

2. A system as described in claim 1, wherein said causing comprises:

querying a tethering service with an indication that the second device is requesting to tether to the first device; and

receiving a notification from the tethering service indicating that the second device is permitted to tether to the first device.

3. A system as described in claim 1, further comprising receiving the tethering policy in conjunction with the request to establish a tethering connection.

4. A system as described in claim 1, further comprising receiving the tethering policy from the second device, and applying the tethering policy at the first device.

5. A system as described in claim 1, further comprising receiving the tethering policy from a cloud-based tethering service, and applying the tethering policy at the first device.

6. A system as described in claim 1, wherein the tethering policy specifies that the second network is preferred over the first network.

7. A system as described in claim 1, wherein the tethering policy specifies that the first network is a disallowed network for providing network connectivity to the second device.

8. A system as described in claim 1, wherein the tethering policy specifies a security procedure to be implemented by one or more of the first device or the second device for communicating data from the second device over the second network.

9. A system as described in claim 1, wherein the tethering policy specifies encryption to be applied by one or more of the first device or the second device for communicating data from the second device over the second network.

10. A computer-implemented method for enabling device connectivity to a network via a tethered connection, the method comprising:

receiving a notification indicating a request to establish a tethering connection between a first device and a second device for purposes of providing network connectivity to the second device;

ascertaining whether the second device is permitted to establish a tethering connection with the first device; and

responsive to ascertaining that the second device is permitted to establish a tethering connection with the first device, communicating a notification indicating that the tethering connection is permitted, the notification being effective to cause the tethering connection between the first device and the second device to be established and network connectivity to be provided to the second device via the tethering connection and subject to a tethering policy for providing network connectivity to the second device.

11. A computer-implemented method as recited in claim 10, wherein said receiving and said ascertaining are performed at a network service remote from the first device and the second device.

12. A computer-implemented method as recited in claim 10, wherein said ascertaining is based on one or more of a network identity or a network type of a network to which the first device is connected.

13. A computer-implemented method as recited in claim 10, wherein the tethering policy specifies one or more preferred networks for providing the network connectivity.

14. A computer-implemented method as recited in claim 10, wherein the tethering policy specifies one or more disallowed networks for providing the network connectivity.

15. A computer-implemented method as recited in claim 10, wherein the tethering policy specifies a security procedure to be implemented for data transmitted from the second device over the tethering connection.