发明名称 Secure communication paths in data networks with tethered devices
摘要 A communication network processes intermediate security data from intermediate access nodes on a communication path between a network access node and an end-point device to determine if the intermediate access nodes are authorized. If the intermediate access nodes are authorized, then the network processes end-point security data from the end-point device to determine if the end-point device is authorized. If the end-point device is authorized, then the network processes end-point tethering data from the end-point device to determine if any tethered communication devices are coupled to the end-point device. If the end-point device is not coupled to any tethered communication devices, then the network authorizes a data transfer session for the end-point device over the communication path. If the end-point device is coupled to a tethered communication device, then the network denies authorization for the data transfer session over the communication path for the end-point device.
申请公布号 US9485241(B2) 申请公布日期 2016.11.01
申请号 US201414550344 申请日期 2014.11.21
申请人 Sprint Communications Company L.P. 发明人 Paczkowski Lyle Walter;McRoberts Mike L.;Renner Thomas M.;Fenwick Ivan Sheon
分类号 H04L29/06;H04L12/723;H04W12/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method of operating a communication network to secure a communication path comprising a network access node, one or more intermediate access nodes, and an end-point device, the method comprising: processing intermediate security data from the one or more intermediate access nodes on the communication path to determine if the one or more intermediate access nodes are authorized; if the one or more intermediate access nodes are authorized, then processing end-point security data from the end-point device to determine if the end-point device is authorized; if the end-point device is authorized, then processing end-point tethering data from the end-point device to determine if any tethered communication devices are coupled to the end-point device and if the end-point device is not coupled to any of the tethered communication devices, then authorizing a data transfer session for the end-point device over the communication path; if the end-point device is coupled to any of the tethered communication devices, then denying authorization for the data transfer session for the end-point device over the communication path; processing additional end-point tethering data during the data transfer session to determine if any of the tethered communication devices become coupled to the end-point device, and in response to one of the tethered communication devices coupling to the end-point device, inhibiting the data transfer session for the end-point device over the communication path; and processing intermediate tethering data during the data transfer session to determine if any of the tethered communication devices become coupled to any of the authorized intermediate access nodes on the communication path, and in response to one of the tethered communication devices coupling to one of the authorized intermediate access nodes, inhibiting the data transfer session for the authorized end-point device over the communication path.
地址 Overland Park KS US