Browse Prior Art Database

a method to control bandwidth or traffic consumption when share wifi network thru mobile tethering

IP.com Disclosure Number: IPCOM000245307D
Publication Date: 2016-Feb-29
Document File: 2 page(s) / 74K

Publishing Venue

The IP.com Prior Art Database

Abstract

this is a disclosure about a method to control bandwidth or traffic consumption where share wifi network thru mobile tethering. it address the problem that tethering be general available to a group of people that get the password of the wifi network without control and and visibility.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 75% of the total text.

Page 01 of 2

a method to control bandwidth or traffic consumption when share wifi network thru mobile tethering

for mobile phone that share the network connectivity with others by tethering, the consumption on bandwidth and traffic is not under control. for example, mobile phone A share the network with mobile phone B and C. mobile phone B and C can use up the network bandwidth and mobile phone A cannot control the consumption in detail, and just can choose to terminate the tethering in case. a method to control the network consumption is desired for tethering sharing scenario.

define multiple passwords for tethering network share, which provide different level of service. e.g. to connect to the host with password Q, the guest can consume the bandwidth up to 100MB. and with password K, the guest can only consume the bandwidth up to 50MB.

it will simplified the management with:

1) you can grant the access to your tethering by few passwords, which each of them grant specific level of service.
2) you can control how much bandwidth to be share to different group of user.

3) you can kick a group of user from accessing your tethering.

4) you can overview the consumption of bandwidth

1



Page 02 of 2


1) host phone can define multiple group for network sharing, each group with have a password, a limit of traffic.

2) the host phone can overview the consumption of the bandwidth as usage

3) for the guess phone try to get access, they just key in the password they know, and they will not k...