Anonymous customer reference client
First Claim
1. A user equipment, comprising:
- a memory that stores executable instructions; and
a processor, coupled to the memory, that facilitates execution of the executable instructions to perform operations, comprising;
facilitating an authentication that allows a user equipment to communicate via a first network device of a first communication network, wherein the authentication is based on static identifier data indicative of a static identifier associated with a subscriber account related to the user equipment and wherein the first communication network is a telecommunication network;
in response to the authentication being determined to be successful, receiving, via the first network device, variable identifier data indicative of a variable subscriber identifier that has been assigned to the static identifier, wherein the variable identifier data is updated in response to determining that an expiration criterion has been satisfied comprising determining that defined number of data sessions performed by a set of applications of the user equipment have been terminated; and
directing, to second network device of a second communication network, the variable identifier data as an identifier of the user equipment during a communication associated with an application of the user equipment that takes place via the second network device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and methodology that facilitates management and utilization of variable subscriber identifiers (V-SubIds) for protecting subscriber privacy is disclosed herein. In one aspect, an Anonymous Customer Reference (ACR) component receives a V-SubId, which is a short-lived subscriber identifier that is to be inserted in a communication messages transmitted from a user equipment instead of a unique device identifier (UDID) of the user equipment. On expiration of the V-SubId, a new V-SubId is received and utilized in subsequent communication messages transmitted from the user equipment. Further, trusted systems/applications can exchange the V-SubId for a subscriber identifier (SubId) associated with the user equipment. Furthermore, untrusted systems/applications can exchange, based on user authorization, the V-SubId for an application-specific ACR that remains static and/or valid for a predefined time period. Moreover, the application-specific ACR is utilized as a device identifier for the user equipment in subsequent communication messages for the predefined time period.
33 Citations
20 Claims
-
1. A user equipment, comprising:
-
a memory that stores executable instructions; and a processor, coupled to the memory, that facilitates execution of the executable instructions to perform operations, comprising; facilitating an authentication that allows a user equipment to communicate via a first network device of a first communication network, wherein the authentication is based on static identifier data indicative of a static identifier associated with a subscriber account related to the user equipment and wherein the first communication network is a telecommunication network; in response to the authentication being determined to be successful, receiving, via the first network device, variable identifier data indicative of a variable subscriber identifier that has been assigned to the static identifier, wherein the variable identifier data is updated in response to determining that an expiration criterion has been satisfied comprising determining that defined number of data sessions performed by a set of applications of the user equipment have been terminated; and directing, to second network device of a second communication network, the variable identifier data as an identifier of the user equipment during a communication associated with an application of the user equipment that takes place via the second network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
directing, by a user equipment comprising a processor, request data to a network gateway device of a telecommunications network, wherein the request data represents a request for a variable subscriber identifier that is to be utilized as a device identifier for the user equipment; receiving, by the user equipment, variable identifier data indicative of the variable subscriber identifier that is generated by the network gateway in response to an authentication of the user equipment with the telecommunications network by employing a static identifier associated with a subscriber account related to the user equipment; and utilizing, by the user equipment, the variable identifier data as the device identifier of the user equipment during a transmission of a communication message, wherein the variable identifier data is modified in response to determining that an expiration criterion has been satisfied comprising determining that defined number of data sessions performed by a set of applications of the user equipment have ended. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage device comprising executable instructions that, in response to execution, cause a user equipment comprising a processor to perform operations, comprising:
-
directing, to a first network device of a first communication network, static identifier data indicative of a subscriber account related to the user equipment to facilitate an authentication of a user equipment in connection with determining whether to allow the user equipment to connect with the first network device, wherein the first communication network is a telecommunication network; in response to the authentication being determined to be successful, receiving, via the first network device, first variable identifier data indicative of a first variable subscriber identifier that has been assigned to the static identifier data, wherein the first variable identifier data is utilized as a device identifier of the user equipment during a first communication via a second network device of a second communication network; and in response to determining that an expiration criterion has been satisfied comprising determining that defined number of data sessions performed by a set of applications of the user equipment have been terminated, receiving, via the first network device, second variable identifier data indicative of a second variable subscriber identifier that has been assigned to the static identifier data, wherein the second variable identifier data is utilized as the device identifier of the user equipment during a second communication via the second network device. - View Dependent Claims (20)
-
Specification