ANONYMOUS CUSTOMER REFERENCE CLIENT
First Claim
1. A system, comprising:
- at least one memory that stores computer-executable instructions;
at least one processor, communicatively coupled to the at least one memory, that facilitates execution of the computer-executable instructions to at least;
issue a request for an authentication between a user equipment and a first communication network to be performed, the authentication employing a static identifier associated with the user equipment;
receive at the user equipment via the first communication network a variable subscriber identifier corresponding to the static identifier, in response to the authentication being successful;
provide the variable subscriber identifier to an application, the application being executable at least in part by a processor on the user equipment; and
utilize the variable subscriber identifier as an identifier of the user equipment during a communication that involves the application and that takes place via a second communication network.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and methodology that facilitates management and utilization of variable subscriber identifiers (V-SubIds) for protecting subscriber privacy is disclosed herein. In one aspect, an Anonymous Customer Reference (ACR) component receives a V-SubId, which is a short-lived subscriber identifier that is to be inserted in a communication messages transmitted from a user equipment instead of a unique device identifier (UDID) of the user equipment. On expiration of the V-SubId, a new V-SubId is received and utilized in subsequent communication messages transmitted from the user equipment. Further, trusted systems/applications can exchange the V-SubId for a subscriber identifier (SubId) associated with the user equipment. Furthermore, untrusted systems/applications can exchange, based on user authorization, the V-SubId for an application-specific ACR that remains static and/or valid for a predefined time period. Moreover, the application-specific ACR is utilized as a device identifier for the user equipment in subsequent communication messages for the predefined time period.
-
Citations
20 Claims
-
1. A system, comprising:
-
at least one memory that stores computer-executable instructions; at least one processor, communicatively coupled to the at least one memory, that facilitates execution of the computer-executable instructions to at least; issue a request for an authentication between a user equipment and a first communication network to be performed, the authentication employing a static identifier associated with the user equipment; receive at the user equipment via the first communication network a variable subscriber identifier corresponding to the static identifier, in response to the authentication being successful; provide the variable subscriber identifier to an application, the application being executable at least in part by a processor on the user equipment; and utilize the variable subscriber identifier as an identifier of the user equipment during a communication that involves the application and that takes place via a second communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
requesting, by a system comprising at least one processor, from a network gateway within a telecommunications network, a variable subscriber identifier that is to be utilized as a device identifier for a user equipment; receiving, by the system, the variable subscriber identifier that is generated by the network gateway in response to authenticating the user equipment with the telecommunications network by employing a static identifier associated with the user equipment; and utilizing, by the system, the variable subscriber identifier as the device identifier of the user equipment during a communication. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage medium comprising computer-executable instructions that, in response to execution, cause a system, including at least one processor, to perform operations comprising:
-
requesting an authentication of a user equipment in connection with determining whether to allow the user equipment to connect with a first communication network including authenticating as a function of a static identifier associated with the user equipment; receiving, at the user equipment via the first communication network, a variable subscriber identifier that is generated in response to the authentication being successful; and utilizing the variable subscriber identifier as a device identifier of the user equipment during a communication via a second communication network. - View Dependent Claims (20)
-
Specification