Method and arrangement for concealing true identity of user in communications system
First Claim
1. A method for concealing the true identity of a user in a communications system comprising a first user equipment having a first characteristic identifier, a second user equipment having a second characteristic identifier, a service network serving the first and the second user equipment, the method comprising:
- requesting a virtual identifier by means of the first user equipment;
establishing the virtual identifier for the first user equipment;
linking the virtual identifier of the first user equipment to the first characteristic identifier of the first user equipment; and
using the virtual identifier of the first user equipment for communication between the first and the second user equipment.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method and an arrangement for concealing the true identity of a user in a communications system comprising a first user equipment having a first characteristic identifier, a second user equipment having a second characteristic identifier, a service network serving the first and the second user equipment. The method according to the invention comprises: requesting (200) a virtual identifier by means of the first user equipment; establishing (202) the virtual identifier for the first user equipment; linking (202) the virtual identifier of the first user equipment to the first characteristic identifier of the first user equipment and using (210) the virtual identifier of the first user equipment for communication between the first and the second user equipment.
17 Citations
20 Claims
-
1. A method for concealing the true identity of a user in a communications system comprising a first user equipment having a first characteristic identifier, a second user equipment having a second characteristic identifier, a service network serving the first and the second user equipment, the method comprising:
-
requesting a virtual identifier by means of the first user equipment;
establishing the virtual identifier for the first user equipment;
linking the virtual identifier of the first user equipment to the first characteristic identifier of the first user equipment; and
using the virtual identifier of the first user equipment for communication between the first and the second user equipment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An arrangement for concealing the true identity of a user in a communications system comprising:
- a first user equipment having a first characteristic identifier, a second user equipment having a second characteristic identifier, a service network connecting the first and the second user equipment, wherein the arrangement is configured to;
request a virtual identifier by means of the first user equipment;
establish the virtual identifier for the first user equipment;
link the virtual identifier of the first user equipment to the first characteristic identifier of the first user equipment; and
use the virtual identifier of the first user equipment for communication between the first and the second user equipment. - View Dependent Claims (16, 17, 18, 19, 20)
- a first user equipment having a first characteristic identifier, a second user equipment having a second characteristic identifier, a service network connecting the first and the second user equipment, wherein the arrangement is configured to;
Specification