Certains contenus de cette application ne sont pas disponibles pour le moment.
Si cette situation persiste, veuillez nous contacter àObservations et contact
1. (WO2017180352) POLITIQUE DE FONCTION MODEM POUR CONNECTIVITÉ DE RÉSEAU PAR L'INTERMÉDIAIRE D'UNE CONNEXION PAR FONCTION MODEM
Note: Texte fondé sur des processus automatiques de reconnaissance optique de caractères. Seule la version PDF a une valeur juridique

CLAIMS

1. A system for enabling device connectivity to a network via a tethered connection, the system comprising:

one or more processors; and

one or more computer-readable storage media storing computer-executable instructions that are executable by the one or more processors to perform operations including:

receiving a request to establish a tethering connection between a first device and a second device for purposes of providing network connectivity to the second device, the first device being connected to a first network;

causing a tethered connection to be established between the first device and the second device;

ascertaining based on a tethering policy that network connectivity for the second device is to be provided by a third device connected to a second network different than the first network; and

causing a connection to be established between the first device and the third device to cause the second device to be connected to the second network via the tethered connection between the first device and the second device, and the connection between the first device and the third device.

2. A system as described in claim 1, wherein said causing comprises:

querying a tethering service with an indication that the second device is requesting to tether to the first device; and

receiving a notification from the tethering service indicating that the second device is permitted to tether to the first device.

3. A system as described in claim 1, further comprising receiving the tethering policy in conjunction with the request to establish a tethering connection.

4. A system as described in claim 1, further comprising receiving the tethering policy from the second device, and applying the tethering policy at the first device.

5. A system as described in claim 1, further comprising receiving the tethering policy from a cloud-based tethering service, and applying the tethering policy at the first device.

6. A system as described in claim 1, wherein the tethering policy specifies that the second network is preferred over the first network.

7. A system as described in claim 1, wherein the tethering policy specifies that the first network is a disallowed network for providing network connectivity to the second device.

8. A system as described in claim 1, wherein the tethering policy specifies a security procedure to be implemented by one or more of the first device or the second device for communicating data from the second device over the second network.

9. A system as described in claim 1, wherein the tethering policy specifies encryption to be applied by one or more of the first device or the second device for communicating data from the second device over the second network.

10. A computer-implemented method for enabling device connectivity to a network via a tethered connection, the method comprising:

receiving a notification indicating a request to establish a tethering connection between a first device and a second device for purposes of providing network connectivity to the second device;

ascertaining whether the second device is permitted to establish a tethering connection with the first device; and

responsive to ascertaining that the second device is permitted to establish a tethering connection with the first device, communicating a notification indicating that the tethering connection is permitted, the notification being effective to cause the tethering connection between the first device and the second device to be established and network connectivity to be provided to the second device via the tethering connection and subject to a tethering policy for providing network connectivity to the second device.

11. A computer-implemented method as recited in claim 10, wherein said receiving and said ascertaining are performed at a network service remote from the first device and the second device.

12. A computer-implemented method as recited in claim 10, wherein said ascertaining is based on one or more of a network identity or a network type of a network to which the first device is connected.

13. A computer-implemented method as recited in claim 10, wherein the tethering policy specifies one or more preferred networks for providing the network connectivity.

14. A computer-implemented method as recited in claim 10, wherein the tethering policy specifies one or more disallowed networks for providing the network connectivity.

15. A computer-implemented method as recited in claim 10, wherein the tethering policy specifies a security procedure to be implemented for data transmitted from the second device over the tethering connection.