Algorithm-based anonymous customer references
First Claim
1. A system, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
in response to receiving a message from a user equipment directed to a device of an untrusted entity, inserting, a domain-specific first anonymous customer reference into the message, wherein the domain-specific first anonymous customer reference comprises variable subscriber identification data representative of a variable subscriber identification of the user equipment as a function of time, resulting in an updated message;
transmitting the updated message to the device of the untrusted entity;
receiving a request for a second anonymous customer reference; and
based on determining that the second anonymous customer reference is a valid anonymous customer reference, transmitting the second anonymous customer reference to a network gateway device of a network to be stored for a defined time period.
1 Assignment
0 Petitions
Accused Products
Abstract
Facilitation of management and utilization of domain-specific anonymous customer references (ACRs) for protection of subscriber privacy across different domains is disclosed herein. In one aspect, on receiving user authorization, an ACR services (ACRS) component can generate an ACR that is to be inserted in a communication or message transmitted from a user equipment to an untrusted entity. The ACR can be generated based on address data associated with the untrusted entity and/or a unique subscriber identifier associated with the user equipment. As an example, the ACR creation component can generate the ACR based on a cryptographic hash, a static encryption key, and/or a dynamic encryption key. If the ACR is forwarded to a trusted entity, the trusted entity can calculate the unique subscriber identifier based on evaluating the ACR and/or exchange the ACR for the unique subscriber identifier via a secure communication with the ACRS component.
25 Citations
20 Claims
-
1. A system, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; in response to receiving a message from a user equipment directed to a device of an untrusted entity, inserting, a domain-specific first anonymous customer reference into the message, wherein the domain-specific first anonymous customer reference comprises variable subscriber identification data representative of a variable subscriber identification of the user equipment as a function of time, resulting in an updated message; transmitting the updated message to the device of the untrusted entity; receiving a request for a second anonymous customer reference; and based on determining that the second anonymous customer reference is a valid anonymous customer reference, transmitting the second anonymous customer reference to a network gateway device of a network to be stored for a defined time period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
receiving, by a system comprising a processor, a communication transmitted by a user equipment and directed to a device of an untrusted entity; receiving, by the system, a request for an anonymous customer reference; determining, by the system, that a previous anonymous customer reference associated with the untrusted entity is unavailable; based on a static identifier associated with the user equipment, a static encryption key of the untrusted entity, and the previous anonymous customer reference being determined to be unavailable, generating, by the system, the anonymous customer reference as specific to the untrusted entity, wherein the anonymous customer reference comprises variable subscriber identification data representative of a variable subscriber identification of the user equipment as a function of time; inserting, by the system, the anonymous customer reference into the communication resulting in an updated communication; and facilitating, by the system, a transmission of the updated communication to the device of the untrusted entity. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
receiving a message transmitted from a first device and directed to a second device of an untrusted entity; receiving an anonymous customer reference request, wherein the anonymous customer reference request comprises an anonymous customer reference, and wherein the anonymous customer reference comprises subscriber identification data representative of a subscriber identification of the first device as a function of time; modifying the message resulting in a modified message, the modifying comprising inserting the anonymous customer reference into the message; in response to a condition related to a trusted entity being determined to have been satisfied, transmitting a decryption key to a third device of the trusted entity; and directing the modified message to be sent to the second device of the untrusted entity. - View Dependent Claims (19, 20)
-
Specification