Tethering Policy for Network Connectivity via a Tethered Connection

作者: Amer Aref Hassan

DOI:

关键词:

摘要: Techniques for tethering policy network connectivity via a tethered connection are described. According to one or more embodiments, policies enforced enable between guest device and host providing the device.

参考文章(25)
Sun-Kee Lee, Kyung-Soo Lim, Jong-Man Park, Dae-Jin Kim, Tae-Hee Lee, Method and apparatus for sharing internet connection based on automatic configuration of network interface ,(2011)
Chihsien Li, Liangchan Liao, Dongsheng Guo, Chengming He, Liquid crystal display and pixel units thereof ,(2010)
Dzung Tran, Bikramjit Singh, Thanh Lim, Ryan MacPherson, Kevin Warmerdam, Managing Tethered Data Traffic Over a Hotspot Network ,(2012)
David Francis Tapuska, Michael Stephen Brown, Graham Russell, Herbert Anthony Little, Establishing connectivity between an enterprise security perimeter of a device and an enterprise ,(2012)
James Donahue, Bill Shapiro, Controlling access to electronic documents ,(2003)
Kent W. MacKay, Digital speech signal processing for pitch change with jump control in accordance with pitch period Journal of the Acoustical Society of America. ,vol. 89, pp. 1488- 1488 ,(1987) , 10.1121/1.400611
Jack McGwire, Scott Barkley, Daniel Collins, Jahangir Mohammed, Amit Gupta, Method for enabling a wireless device for geographically preferential services ,(2014)
Pascal F. Menezes, Paul W. Garnett, Paul William Alexander Mitchell, Shadi Mahassel, Amer A. Hassan, Tethering Parameters for a Tethering Connection ,(2014)