The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 27, 2015

Filed:

Mar. 16, 2012
Applicants:

Dzung Tran, Purcellville, VA (US);

Kevin Warmerdam, Encinitas, CA (US);

Thanh Lim, Arcadia, CA (US);

Ryan Macpherson, Decatur, GA (US);

Bikramjit Singh, Carlsbad, CA (US);

Inventors:

Dzung Tran, Purcellville, VA (US);

Kevin Warmerdam, Encinitas, CA (US);

Thanh Lim, Arcadia, CA (US);

Ryan MacPherson, Decatur, GA (US);

Bikramjit Singh, Carlsbad, CA (US);

Assignee:

Smith Micro Software, Inc., Aliso Viejo, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 7/04 (2006.01); H04L 29/06 (2006.01); H04W 12/08 (2009.01); H04W 4/00 (2009.01); H04W 84/12 (2009.01); H04W 88/04 (2009.01);
U.S. Cl.
CPC ...
H04W 12/08 (2013.01); H04L 63/1416 (2013.01); H04W 4/00 (2013.01); H04W 4/001 (2013.01); H04W 84/12 (2013.01); H04W 88/04 (2013.01);
Abstract

Presented is a system and method for controlling access to a mobile hotspot on a mobile device utilizing a hotspot management application. The method includes detecting unauthorized data traffic over a tethered link between the mobile device and a tethered device by analyzing a signature of the unauthorized data traffic. Analyzing the signature of the unauthorized data traffic may be carried out utilizing a rules engine, where the rules engine is based on one or more carrier controlled tethering policies and one or more user controlled tethering policies. Detecting unauthorized data traffic may further include detecting an unauthorized tethering application on the mobile device utilizing a database of known unauthorized tethering applications. The method further includes controlling the unauthorized data traffic. The method additionally includes redirecting a user of the mobile device to a captive portal for authorized tethering plan support.


Find Patent Forward Citations

Loading…