Algorithm-based anonymous customer references
First Claim
1. A system, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
receiving, via a network device of a telecommunication network, a message sent from a user equipment and directed to a device of an untrusted entity, the user equipment being authenticated to the network device of the telecommunication network using a static identifier associated with the user equipment;
assigning a domain-specific first anonymous customer reference to the static identifier;
inserting the domain-specific first anonymous customer reference into the message resulting in an updated message;
facilitating a transmission of the updated message to the device of the untrusted entity;
receiving a request for a second anonymous customer reference; and
based on determining that the second anonymous customer reference is a valid anonymous customer reference, transmitting the second anonymous customer reference to a network gateway device of the telecommunication network.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and methodology that facilitates management and utilization of domain-specific anonymous customer references (ACRs) for protecting subscriber privacy across different domains is disclosed herein. In one aspect, on receiving user authorization, an ACR services (ACRS) component can generate an ACR that is to be inserted in a communication or message transmitted from a user equipment to an untrusted entity. The ACR can be generated based on address data associated with the untrusted entity and/or a unique subscriber identifier associated with the user equipment. As an example, the ACR creation component can generate the ACR based on a cryptographic hash, a static encryption key, and/or a dynamic encryption key. If the ACR is forwarded to a trusted entity, the trusted entity can calculate the unique subscriber identifier based on evaluating the ACR and/or exchange the ACR for the unique subscriber identifier via a secure communication with the ACRS component.
27 Citations
20 Claims
-
1. A system, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; receiving, via a network device of a telecommunication network, a message sent from a user equipment and directed to a device of an untrusted entity, the user equipment being authenticated to the network device of the telecommunication network using a static identifier associated with the user equipment; assigning a domain-specific first anonymous customer reference to the static identifier; inserting the domain-specific first anonymous customer reference into the message resulting in an updated message; facilitating a transmission of the updated message to the device of the untrusted entity; receiving a request for a second anonymous customer reference; and based on determining that the second anonymous customer reference is a valid anonymous customer reference, transmitting the second anonymous customer reference to a network gateway device of the telecommunication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
receiving, by a system comprising at least one processor within a wireless communication network, a communication transmitted by a user equipment and directed to a device of an untrusted entity; determining, by the system, a static identifier associated with the user equipment based at least in part on an authorization of the user equipment with the wireless communication network; determining, by the system, a static encryption key based on address data associated with the device of the untrusted entity; receiving, by the system, a request for an anonymous customer reference; determining, by the system, that a previous anonymous customer reference associated with the untrusted entity is unavailable; based at least in part on the static identifier, the static encryption key, and the previous anonymous customer reference being determined to be unavailable, generating, by the system, the anonymous customer reference specific to the untrusted entity; inserting, by the system, the anonymous customer reference into the communication; and facilitating, by the system, a transmission of the communication comprising the anonymous customer reference to the device of the untrusted entity. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
receiving a message transmitted from a user equipment and directed to a device of an untrusted entity; identifying a static identifier associated with the user equipment based at least in part on an authorization of the user equipment with a telecommunication network; determining a static encryption key based on address data associated with the device of the untrusted entity; receiving an anonymous customer reference request, wherein the anonymous customer reference request comprises an anonymous customer reference; modifying the message resulting in a modified message, the modifying comprising inserting the anonymous customer reference into the message; transmitting a decryption key to another device of a trusted entity in response to a condition related to the trusted entity being determined to have been satisfied; and directing the modified message to the device of the untrusted entity. - View Dependent Claims (19, 20)
-
Specification