Method and apparatus for providing an access to a tethering service via an endpoint device
First Claim
Patent Images
1. A method for providing an access to a tethering service, the method comprising:
- detecting an attempt to access the tethering service at a first endpoint device where a second endpoint device connects to the first endpoint device while the first endpoint device is communicating with a service provider network, where data that is accessed by the first endpoint device via the service provider network is transferred to the second endpoint device;
determining, by the first endpoint device, whether the first endpoint device is authorized to access the tethering service by;
sending a query to a server in the service provider network, wherein the query comprises a hyper text transfer protocol message that comprises a unique identifier associated with the tethering service, wherein the unique identifier comprises a universal resource locator that uniquely identifies the tethering service from among a plurality of non-network monitored services, wherein the non-network monitored services comprise services that do not require the server in the service provider network for operation; and
receiving from the server in the service provider network, an authorization message to access the tethering service; and
providing, by the first endpoint device, the access to the tethering service when the first endpoint device receives the authorization message.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and non-transitory computer readable medium for providing an access to a tethering service via an endpoint device are disclosed. For example, the method detects an attempt to access a non-network monitored service at an endpoint device, determines whether the endpoint device is authorized to access the non-network monitored service by sending a query to a service provider network, and provides an access to the non-network monitored service if the endpoint is authorized.
9 Citations
20 Claims
-
1. A method for providing an access to a tethering service, the method comprising:
-
detecting an attempt to access the tethering service at a first endpoint device where a second endpoint device connects to the first endpoint device while the first endpoint device is communicating with a service provider network, where data that is accessed by the first endpoint device via the service provider network is transferred to the second endpoint device; determining, by the first endpoint device, whether the first endpoint device is authorized to access the tethering service by; sending a query to a server in the service provider network, wherein the query comprises a hyper text transfer protocol message that comprises a unique identifier associated with the tethering service, wherein the unique identifier comprises a universal resource locator that uniquely identifies the tethering service from among a plurality of non-network monitored services, wherein the non-network monitored services comprise services that do not require the server in the service provider network for operation; and receiving from the server in the service provider network, an authorization message to access the tethering service; and providing, by the first endpoint device, the access to the tethering service when the first endpoint device receives the authorization message. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing instructions which, when executed by a processor of a first endpoint device, cause the processor to perform operations for providing an access to a tethering service, the operations comprising:
-
detecting an attempt to access the tethering service at the first endpoint device where a second endpoint device connects to the first endpoint device while the first endpoint device is communicating with a service provider network, where data that is accessed by the first endpoint device via the service provider network is transferred to the second endpoint device; determining whether the first endpoint device is authorized to access the tethering service by; sending a query to a server in the service provider network, wherein the query comprises a hyper text transfer protocol message that comprises a unique identifier associated with the tethering service, wherein the unique identifier comprises a universal resource locator that uniquely identifies the tethering service from among a plurality of non-network monitored services, wherein the non-network monitored services comprise services that do not require the server in the service provider network for operation; and receiving from the server in the server provider network, an authorization message to access the tethering service; and providing the access to the tethering service when the first endpoint device receives the authorization message. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus for providing an access to a tethering service, comprising:
-
a processor of a first endpoint device; and a computer-readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; detecting an attempt to access the tethering service at the first endpoint device where a second endpoint device connects to the first endpoint device while the first endpoint device is communicating with a service provider network, where data that is accessed by the first endpoint device via the service provider network is transferred to the second endpoint device; determining whether the first endpoint device is authorized to access the tethering service by; sending a query to a server in the service provider network, wherein the query comprises a hyper text transfer protocol message that comprises a unique identifier associated with the tethering service, wherein the unique identifier comprises a universal resource locator that uniquely identifies the tethering service from among a plurality of non-network monitored services, wherein the non-network monitored services comprise services that do not require the server in the service provider network for operation; and receiving from the server in the service provider network an authorization message to access the tethering service; and providing the access to the tethering service when the first endpoint device receives the authorization message. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification