Anonymous customer reference services enabler
First Claim
1. A system, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
facilitating an authentication of a user equipment that allows the user equipment to connect with a set of devices of a cellular network, wherein the authentication is based on static identifier data indicative of a static identifier assigned to a subscriber account related to the user equipment,based on the authentication, selecting variable subscriber identifier data indicative of a variable subscriber identifier that is to be assigned to the user equipment, wherein the variable subscriber identifier is updated in response to determining that an expiration criterion has been satisfied and wherein the variable subscriber identifier data is directed to an untrusted device with first request data indicative of a first request for a first operation to be performed that is received from the user equipment,in response to receiving, from the untrusted device, query data requesting anonymous customer reference data indicative of an anonymous customer reference value that corresponds to the variable subscriber identifier and is assigned to the untrusted device, determining the anonymous customer reference data, wherein the anonymous customer reference value remains constant for a defined time period; and
in response to receiving, from the user equipment, second request data indicative of a second request for a second operation to be performed that is to be directed to the untrusted device, directing, to the untrusted device, the anonymous customer reference data with the second request data.
1 Assignment
0 Petitions
Accused Products
Abstract
Variable subscriber identifiers (V-SubIds) for protecting subscriber privacy are generated and managed. In one aspect, an Anonymous Customer Reference Services (ACRS) component generates a V-SubId, which is a short-lived subscriber identifier that is inserted in a request received from a user equipment during request enrichment. Moreover, a different V-SubId can be inserted in subsequent request from the user equipment and thus, cross-site behavior tracking can be mitigated. In one aspect, the V-SubId can be exchanged for a subscriber identifier (SubId) associated with the user equipment, upon query by trusted systems/applications. Further, the V-SubId can be exchanged for a site-specific Anonymous Customer Reference (ACR) upon query by untrusted systems/applications, if user authorization is received. Moreover, the life cycle of the ACR is managed by the ACRS component, based on subscriber input.
21 Citations
20 Claims
-
1. A system, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; facilitating an authentication of a user equipment that allows the user equipment to connect with a set of devices of a cellular network, wherein the authentication is based on static identifier data indicative of a static identifier assigned to a subscriber account related to the user equipment, based on the authentication, selecting variable subscriber identifier data indicative of a variable subscriber identifier that is to be assigned to the user equipment, wherein the variable subscriber identifier is updated in response to determining that an expiration criterion has been satisfied and wherein the variable subscriber identifier data is directed to an untrusted device with first request data indicative of a first request for a first operation to be performed that is received from the user equipment, in response to receiving, from the untrusted device, query data requesting anonymous customer reference data indicative of an anonymous customer reference value that corresponds to the variable subscriber identifier and is assigned to the untrusted device, determining the anonymous customer reference data, wherein the anonymous customer reference value remains constant for a defined time period; and in response to receiving, from the user equipment, second request data indicative of a second request for a second operation to be performed that is to be directed to the untrusted device, directing, to the untrusted device, the anonymous customer reference data with the second request data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
based on an authorization of a user equipment with a network device of a cellular network, determining, by a gateway device of the cellular network that comprises a processor, variable subscriber identifier data indicative of a variable subscriber identifier that is to be assigned to the user equipment, wherein the variable subscriber identifier is modified in response to determining that an expiration criterion has been satisfied and wherein the authorization is based on static identifier data indicative of a static identifier assigned to a subscriber account related to the user equipment; directing, by the gateway device, the variable subscriber identifier data to an untrusted device with communication data that is received from the user equipment; in response to receiving, from the untrusted device, query data requesting anonymous customer reference data comprising an anonymous customer reference value that corresponds to the variable subscriber identifier, assigning, by the gateway device, the anonymous customer reference data to the untrusted device, wherein the anonymous customer reference value remains unchanged for a defined time period; and in response to the assigning, directing, by the gateway device, the anonymous customer reference data to the untrusted device with subsequent communication data that is received from the user equipment. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium comprising executable instructions that, in response to execution, cause a gateway device of a cellular network that comprises a processor, to perform operations comprising:
-
based on an authorization of a user equipment with a network device of the cellular network, determining variable subscriber identifier data indicative of a variable subscriber identifier that is to be assigned to the user equipment, wherein the variable subscriber identifier is updated in response to determining that an expiration criterion has been satisfied, wherein the authorization is based on static identifier data indicative of a static identifier that is assigned to a subscriber account related to the user equipment, and wherein the static identifier data that is to be utilized during a first communication of the user equipment with an untrusted device is replaced with the variable subscriber identifier data; in response to receiving, from the untrusted device, query data requesting anonymous customer reference data, linking the anonymous customer reference data to the untrusted device, wherein the anonymous customer reference data is indicative of an anonymous customer reference value that corresponds to the variable subscriber identifier and is assigned to the untrusted device for a defined time period; and subsequent to the linking and in response to receiving, from the user equipment, request data indicative of a request for a second communication of the user equipment with the untrusted device, facilitating a transmission of the anonymous customer reference data to the untrusted device during the second communication. - View Dependent Claims (20)
-
Specification