ANONYMOUS CUSTOMER REFERENCE SERVICES ENABLER
First Claim
1. A system, comprising:
- at least one memory that stores computer-executable instructions;
at least one processor, communicatively coupled to the at least one memory, that facilitates execution of the computer-executable instructions to at least;
perform an authentication of a user equipment to allow the user equipment to connect with a telecommunications network, the authentication employing a static identifier associated with the user equipment;
receive in the telecommunications network, from the user equipment, a request for an operation to be performed by an untrusted entity accessible via the telecommunications network;
based on the authentication, assign a variable subscriber identifier to the static identifier associated with the user equipment;
insert the variable subscriber identifier into the request; and
facilitate transmission of the request including the inserted variable subscriber identifier to the untrusted entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and methodology that facilitates generation and management of variable subscriber identifiers (V-SubIds) for protecting subscriber privacy is disclosed herein. In one aspect, an Anonymous Customer Reference Services (ACRS) component generates a V-SubId, which is a short-lived subscriber identifier that is inserted in a request received from a user equipment during request enrichment. Moreover, a different V-SubId can be inserted in subsequent request from the user equipment and thus, cross-site behavior tracking can be mitigated. In one aspect, the V-SubId can be exchanged for a subscriber identifier (SubId) associated with the user equipment, upon query by trusted systems/applications. Further, the V-SubId can be exchanged for a site-specific Anonymous Customer Reference (ACR) upon query by untrusted systems/applications, if user authorization is received. Moreover, the life cycle of the ACR is managed by the ACRS component, based on subscriber input.
-
Citations
25 Claims
-
1. A system, comprising:
-
at least one memory that stores computer-executable instructions; at least one processor, communicatively coupled to the at least one memory, that facilitates execution of the computer-executable instructions to at least; perform an authentication of a user equipment to allow the user equipment to connect with a telecommunications network, the authentication employing a static identifier associated with the user equipment; receive in the telecommunications network, from the user equipment, a request for an operation to be performed by an untrusted entity accessible via the telecommunications network; based on the authentication, assign a variable subscriber identifier to the static identifier associated with the user equipment; insert the variable subscriber identifier into the request; and facilitate transmission of the request including the inserted variable subscriber identifier to the untrusted entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
receiving, by a system comprising at least one processor, a query for a variable subscriber identifier that is to be inserted into a request from a user equipment, the request being directed to an untrusted entity; identifying, by the system, a static identifier associated with the user equipment based in part on an authorization of the user equipment with a telecommunications network; automatically generating, by the system, the variable subscriber identifier; and assigning, by the system, the variable subscriber identifier to the static identifier. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable storage medium comprising computer-executable instructions that, in response to execution, cause a system, including at least one processor, to perform operations comprising:
-
determining that a request received at a telecommunications network from a user equipment is directed to an untrusted entity accessible via the telecommunications network based on analyzing the request, the request being for an operation to be performed by the untrusted entity; identifying a static identifier associated with the user equipment based in part on an authorization of the user equipment with the telecommunications network; obtaining a variable subscriber identifier assigned to the static identifier associated with the user equipment; inserting the variable subscriber identifier into the request; and directing the request with the variable subscriber identifier thus inserted to the untrusted entity. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification