Jump to content

Telefonaktiebolaget lm ericsson (publ) (20240244501). USER EQUIPMENT TETHERING POLICY simplified abstract

From WikiPatents

USER EQUIPMENT TETHERING POLICY

Organization Name

telefonaktiebolaget lm ericsson (publ)

Inventor(s)

[[:Category:Miguel Angel Mu�oz De La Torre Alonso|Miguel Angel Mu�oz De La Torre Alonso]][[Category:Miguel Angel Mu�oz De La Torre Alonso]]

Thorsten Lohmar

USER EQUIPMENT TETHERING POLICY - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240244501 titled 'USER EQUIPMENT TETHERING POLICY

The abstract describes a method for detecting tethering traffic and applying tethering policies to such traffic at a user equipment (UE).

  • Receiving subscription information from a subscriber data repository entity at a policy control entity.
  • Transmitting a tethering policy from the policy control entity to the UE, including actions to apply to the traffic of tethered devices.
  • Applying the tethering policy at the UE to the traffic of a tethered device.
  • The policy control entity may be a PCF, and the subscriber data repository entity may be a UDR.
  • The tethering policy may include actions such as blocking tethering traffic, marking tethering traffic, or reporting information related to tethering traffic and devices.

Potential Applications: - Mobile network management - Data usage control - Network security enhancement

Problems Solved: - Efficient detection and management of tethering traffic - Ensuring compliance with subscription policies - Enhancing network performance and security

Benefits: - Improved network efficiency - Enhanced user experience - Better control over data usage

Commercial Applications: Title: "Enhanced Tethering Traffic Management for Mobile Networks" This technology can be utilized by mobile network operators to optimize network performance, ensure fair data usage, and enhance security for subscribers. It can also be integrated into network management systems to streamline operations and improve overall network efficiency.

Questions about Tethering Traffic Management: 1. How does this method improve network security in mobile environments? This method enhances network security by allowing operators to apply specific actions to tethering traffic, such as blocking or marking it, thereby reducing potential security risks associated with unauthorized tethering.

2. What are the key benefits of implementing tethering policies at the user equipment level? Implementing tethering policies at the UE level allows for more granular control over data usage and network management, leading to improved network efficiency and a better user experience.


Original Abstract Submitted

a method for enabling the detection of tethering traffic and the application of tethering policies to such traffic at a user equipment (ue). the method comprises receiving subscription information at a policy control entity from a subscriber data repository entity, the subscription information including an indication of actions to apply to the traffic of tethered devices at the ue, transmitting from the policy control entity to the ue a tethering policy including the received actions to apply to the traffic of tethered devices, and applying at the ue the tethering policy to the traffic of a tethered device. the policy control entity may be a pcf. the subscriber data repository entity may be a udr. the tethering policy may include an indication to block the tethering traffic, to mark the tethering traffic or to report information or events related to the tethering traffic and tethering devices.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.