18004488. USER EQUIPMENT TETHERING POLICY simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

USER EQUIPMENT TETHERING POLICY

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

[[:Category:Miguel Angel Mu�oz De La Torre Alonso|Miguel Angel Mu�oz De La Torre Alonso]][[Category:Miguel Angel Mu�oz De La Torre Alonso]]

Thorsten Lohmar

USER EQUIPMENT TETHERING POLICY - A simplified explanation of the abstract

This abstract first appeared for US patent application 18004488 titled 'USER EQUIPMENT TETHERING POLICY

The abstract describes a method for detecting tethering traffic and applying tethering policies at a User Equipment (UE).

  • Receiving subscription information from a subscriber data repository entity.
  • Transmitting tethering policies to the UE.
  • Applying the tethering policy to the traffic of a tethered device.
  • The policy control entity may be a PCF.
  • The subscriber data repository entity may be a UDR.
  • Tethering policy may include blocking, marking, or reporting tethering traffic and devices.

Potential Applications: - Mobile network management - Data usage control - Network security enhancement

Problems Solved: - Unauthorized tethering - Efficient network resource allocation - Policy enforcement

Benefits: - Improved network performance - Enhanced security - Better resource utilization

Commercial Applications: Title: "Enhanced Tethering Traffic Management for Mobile Networks" This technology can be used by mobile network operators to optimize network resources, enforce policies, and enhance security, ultimately improving user experience and reducing operational costs.

Prior Art: Research existing methods for tethering detection and policy enforcement in mobile networks.

Frequently Updated Research: Stay informed about advancements in mobile network management, policy control, and security measures related to tethering traffic.

Questions about Tethering Traffic Management: 1. How does this method improve network efficiency and security? 2. What are the key differences between this approach and existing tethering detection methods?


Original Abstract Submitted

A method for enabling the detection of tethering traffic and the application of tethering policies to such traffic at a User Equipment (UE). The method comprises receiving subscription information at a policy control entity from a subscriber data repository entity, the subscription information including an indication of actions to apply to the traffic of tethered devices at the UE, transmitting from the policy control entity to the UE a tethering policy including the received actions to apply to the traffic of tethered devices, and applying at the UE the tethering policy to the traffic of a tethered device. The policy control entity may be a PCF. The subscriber data repository entity may be a UDR. The tethering policy may include an indication to block the tethering traffic, to mark the tethering traffic or to report information or events related to the tethering traffic and tethering devices.