PROXY-ENCRYPTED AUTHENTICATION FOR TETHERED DEVICES
摘要
Methods and apparatus are presented herein for allowing a wireless communication device to perform a proxy authentication on behalf of a tethered device and ensure the authentication is encrypted.