US20190281454A1 - Mobile identification method based on sim card and device-related parameters - Google Patents
Mobile identification method based on sim card and device-related parameters Download PDFInfo
- Publication number
- US20190281454A1 US20190281454A1 US15/928,348 US201815928348A US2019281454A1 US 20190281454 A1 US20190281454 A1 US 20190281454A1 US 201815928348 A US201815928348 A US 201815928348A US 2019281454 A1 US2019281454 A1 US 2019281454A1
- Authority
- US
- United States
- Prior art keywords
- mobile
- server
- ipification
- msisdn
- ids
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
- H04L61/106—Mapping addresses of different types across networks, e.g. mapping telephone numbers to data network addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/14—Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4588—Network directories; Name-to-address mapping containing mobile subscriber information, e.g. home subscriber server [HSS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
Definitions
- the present invention relates to a new method of mobile user identification by third parties based on the SIM card and device-related parameters available in telecommunication network.
- the invention is particularly, but not exclusively, applicable to a wide scope of different industry segments: Fintech companies, digital merchants, e-government solutions, enterprises, etc. and provides enhanced platform security features and improved end users experience and transaction processing in interactions with those platforms.
- Mobile phone number Mobile Station International Subscriber Directory Number or MSISDN
- MSISDN Mobile Station International Subscriber Directory Number
- the present invention has recognized Mobile Operators (i.e. the owners of users' SIM card information) as one of the most important players in providing the future of digital mobile identification options.
- the invention aims to simplify mobile identification and authentication process, thus increasing the level of security in digital ecosystem along with providing more efficient business operations for both mobile application developers and website owners.
- the aim of the present solution is to overcome the above-mentioned problems, associated with the use of known methods of identifying mobile users for the purposes of authorised access to applications or websites.
- the object of the invention is a method of a mobile user identification based on SIM card and device-related parameters available in telecommunication network, comprising the following steps:
- the method according to the present invention uses cloud service in form of the IPification server arranged between application/website developers and global network of Mobile Operators providing queries for up to six SIM card and device-related parameters.
- the communication between the IPification server and the Mobile Operator server uses at least one of the following security mechanisms: SSL/HTTPS, WSS-SOAP, VPN and PKI, thus providing the highest level of data transfer security.
- the method according to the invention involves a step of sending Mobile ID queries toward Mobile Operator server with above-mentioned specific parameters included as inputs, expecting to receive response with Mobile ID (unique user identifier) corresponding to these specific parameters.
- Mobile ID unique user identifier
- the present method involves the use of hashing algorithm to mask the real MSISDN and alphanumeric reference which will be unique for that specific mobile user (being a subscriber of the mobile communication services provided by the Mobile Operator) to further enhance the user privacy objectives while ensuring the authenticity of the mobile user.
- the integration with the Mobile Operator servers is comprised of several different Application Programming Interfaces (APIs) thus enabling up to six factors of authentication for application/website providers (e.g. digital merchants) depending on their specific needs. All the APIs required are part of standard Mobile Operator network components and are already a part of their existing infrastructure. Accordingly, in another preferred embodiment of the invention the Mobile Operator network components being used include:
- GGSN and CGN components are being used to resolve Private IP address and combination of Public IP address and Port into Mobile ID, while HLR is being used to resolve IMSI, ICCID, IMEI and MSISDN into Mobile ID.
- the IPification server sends up to six parameters to the Mobile Operator server as input parameters (Mobile ID queries) for a single user verification, expecting to receive same value of Mobile ID in response to each of the parameters, thus enabling the specific user identity confirmation beyond any doubt.
- up to six server-to-server Application Programming Interfaces (APIs Integrations) are provided in between the IPification server and the Mobile Operator server. These include:
- the APIs listed above are used within the Mobile Operator network to resolve input parameters into unique Mobile ID.
- the present invention can undoubtedly process successful authentication process, successfully authenticate the mobile user or inform related party (i.e. application/website developer) about unsuccessful authentication.
- the method according to the invention can provide up to six factor authentications, providing possibility to match up to six Mobile IDs received on the Mobile Operator side, as results of six different API calls. If required number of Mobile IDs is matched, the present invention can undoubtedly authenticate specific device/SIM card and thus confirm the successful user identification. In case some of the required Mobile IDs are not matched (Mobile ID correspond to a different Device/SIM card or Mobile ID is not resolved at all), the present invention can undoubtedly confirm the inability to authenticate specific device/SIM card and thus confirm the unsuccessful identification of the user. Based on the mobile user identification results using present invention, the application/website developers can better adjust their end user experience and customize further interactions with their platforms.
- FIG. 1 is a scheme of communication between the IPification server and the Mobile Operator server;
- FIG. 2 is a sequence diagram describing communication flow between the mobile user, the application developer, the IPification server and the Mobile Operator server in case of successful user identification;
- FIG. 3 is a sequence diagram describing communication flow between the mobile user, the website developer, IPification server and the Mobile Operator server in case of successful identification;
- FIG. 4 shows an IPification digital ecosystem
- FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator network when Public IP and Port are received as a Mobile ID query
- FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query
- FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator network when IMSI/IMEI/ICCID are received as Mobile ID queries
- FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched
- FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched.
- FIG. 1 A basic scheme of communication between the IPification server and the Mobile Operator server is presented in FIG. 1 .
- the IPification server generates API calls for Mobile ID based on Public IP: Port and/or Private IP parameters, these are transmitted to the Mobile Operator server and processed within the GGSN/CGN component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server.
- the IPification server generates API calls for Mobile ID based on at least one of the following parameters: IMEI, ICCID, IMSI, MSISDN, such API calls are also transmitted to the Mobile Operator server, but processed within the HLR component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server.
- FIG. 2 a sequence diagram is provided illustrating communication flow between the mobile user, the application developer the IPification server and the Mobile Operator server in case of successful user identification.
- the initial step of mobile user's interaction with the specific application triggers the application developer to generate a Mobile ID request based on up to six input parameters (IMSI, IMEI, ICCID, MSISDN, Private IP, Public IP: Port) which is transmitted to the IPification server, which in turn generates up to six API calls (GET MOBILE ID) corresponding to the number of input parameters used in the Mobile ID request.
- the API calls are transmitted to the Mobile Operator server and processed within assigned components of the Mobile Operator network, including GGSN, CGN and HLR. Resulting Mobile IDs are transmitted back to the IPification server and after successful mobile user identification a respective Mobile ID is sent to the application developer followed by granting the mobile user access to the application/website or approving transaction selected by the user.
- FIG. 3 The sequence diagram of FIG. 3 illustrating communication flow between the mobile user, the website developer the IPification server and the Mobile Operator server in case of successful user identification is very similar to that of FIG. 2 .
- the only difference is at the initial stage, wherein the mobile user's interaction with the specific website triggers the website developer to redirect the user for authentication to a dedicated website directly connected to the IPification server.
- FIG. 4 illustrates the IPification ecosystem, involving the mobile user, the native application or mobile website developer, the IPification server and Mobile Operator servers.
- the mobile user initiates the interaction with the native application or attempts to access a website.
- This triggers the native application or mobile website developer to generate a Mobile ID request transmitted to the IPification server, which in turn communicates with the Mobile Operator servers to obtain the specific Mobile ID based on up to six SIM card and device-related parameters in a method according to the invention already described with respect to FIGS. 2 and 3 above.
- FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator Network when Public IP and Port are received as a Mobile ID query.
- the Mobile ID is obtained in response to the Mobile ID query based on Public IP:Port by matching the Public IP:Port parameter with a corresponding Private IP parameter in a lookup table within the CGN component, followed by matching the resulting Private IP with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW, and finally transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server.
- FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query.
- the Mobile ID is obtained in response to the Mobile ID query based on Private IP by matching the Private IP parameter with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW component, and transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server.
- FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator Network when IMSI/IMEI/ICCID are received as Mobile ID queries.
- the Mobile ID is obtained in response to the Mobile ID query based on IMSI, ICCID and/or IMEI parameter by matching each of these parameters with a corresponding MSISDN parameter in a lookup table within the HLR component, and transmitting such obtained MSISDN parameters as Mobile IDs back to the IPification server
- FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched.
- server-to-server (S2S) API requests i.e. Mobile ID queries
- IMSI, ICCID, IMEI, Private IP, Public IP: Port and MSISDN are transmitted to the Mobile Operator server and in response a respective number (here: six) of Mobile IDs is generated and transmitted back to the IPification server.
- a respective number here: six
- the specific mobile user is undoubtedly identified.
- FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched. This situation differs from the scenario shown in FIG. 8 in that not all of the six Mobile IDs are identical, i.e. some of them point to a different SIM card/device or at least one of the Mobile IDs is not authenticated at all. As a result, the inability to authenticate specific device/SIM card is undoubtedly concluded.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
- The present invention relates to a new method of mobile user identification by third parties based on the SIM card and device-related parameters available in telecommunication network. The invention is particularly, but not exclusively, applicable to a wide scope of different industry segments: Fintech companies, digital merchants, e-government solutions, enterprises, etc. and provides enhanced platform security features and improved end users experience and transaction processing in interactions with those platforms.
- In today's rapidly increasing mobile-based ecosystem, a wide number of digital merchants are looking for the best way to adopt “Mobile First” or “Mobile Only” strategy. New generations of users are spending most of their time on-the-go expecting to have a seamless user experience across their mobile access channels. The increased number of different mobile applications installed on user's devices, higher online usage and mobile-based transactions as well as the growing security issues are challenging traditional username (email)-password login and verification models. Looking at those challenges digital merchants, payment providers, online enterprises and application developers are fully recognizing the need for users' security transformations in terms of identity, authentication and authorization methods, considering that changes shouldn't compromise the prominent level of user service/application experience in terms of simplicity, seamlessness and convenience.
- Mobile phone number (Mobile Station International Subscriber Directory Number or MSISDN) is at present the most widely used unique user identifier. Having that in mind, the present invention has recognized Mobile Operators (i.e. the owners of users' SIM card information) as one of the most important players in providing the future of digital mobile identification options. By leveraging closely on the Mobile Operators' network components, the invention aims to simplify mobile identification and authentication process, thus increasing the level of security in digital ecosystem along with providing more efficient business operations for both mobile application developers and website owners.
- The aim of the present solution is to overcome the above-mentioned problems, associated with the use of known methods of identifying mobile users for the purposes of authorised access to applications or websites.
- Therefore, the object of the invention is a method of a mobile user identification based on SIM card and device-related parameters available in telecommunication network, comprising the following steps:
-
- once the mobile user is trying to interact with an application or to access a website, the application/website developer transmits a Mobile ID request to an external IPification server;
- the IPification server transmits up to six Mobile ID queries in form of Application Programming Interface (API) calls to a Mobile Operator server, whereby each Mobile ID query is based on one of the following SIM card/device-related input parameters:
- IMSI (International Mobile Subscriber Identity),
- ICCID (Integrated Circuit Card Identifier)
- IMEI (International Mobile Equipment Identity),
- MSISDN (Mobile Station International Subscriber Directory Number),
- Private IP (IP address used by Mobile Operator to internally identify the user in its network), and
- Public IP: Port (IP address and port used by Mobile Subscribers externally, i.e. when accessing public domain, Internet);
- the Mobile Operator server transmits Mobile IDs back to the IPification server, whereby each of the Mobile IDs is generated in response to one of the Mobile ID queries sent to Mobile Operator server as input parameters, and whereby each Mobile ID is a unique alphanumeric identifier of the user being a subscriber of the mobile communication services provided by the Mobile Operator;
- the IPification server verifies whether all the Mobile IDs obtained from the Mobile Operator server are identical, and depending on the verification result reacts in two alternative ways:
- if the verification result is positive, the IPification server provides the user's single Mobile ID to the application/website developer thereby authenticating the mobile user and thus allowing him to interact with the application or access the website;
- if the verification result is negative, the IPification server provides the application/website developer with the information about unsuccessful authentication of the user, and as a result the user is not allowed to interact with the application or access the website.
- There are several different options (combinations of six different parameters listed above) used by the present invention to identify the current application/website user based on his/her SIM card/device information. Specific combination being used largely depends on the network access channel (cellular, Wi-Fi) as well as the application type (Android, iOS, mobile web). These six parameters are used once the user is accessing an application for the first time and during each consecutive time.
- The method according to the present invention uses cloud service in form of the IPification server arranged between application/website developers and global network of Mobile Operators providing queries for up to six SIM card and device-related parameters. In a preferred embodiment, the communication between the IPification server and the Mobile Operator server uses at least one of the following security mechanisms: SSL/HTTPS, WSS-SOAP, VPN and PKI, thus providing the highest level of data transfer security.
- The method according to the invention involves a step of sending Mobile ID queries toward Mobile Operator server with above-mentioned specific parameters included as inputs, expecting to receive response with Mobile ID (unique user identifier) corresponding to these specific parameters. In certain countries some of the Mobile Operators are using MSISDN as Mobile ID. In these cases, the present method involves the use of hashing algorithm to mask the real MSISDN and alphanumeric reference which will be unique for that specific mobile user (being a subscriber of the mobile communication services provided by the Mobile Operator) to further enhance the user privacy objectives while ensuring the authenticity of the mobile user.
- The integration with the Mobile Operator servers is comprised of several different Application Programming Interfaces (APIs) thus enabling up to six factors of authentication for application/website providers (e.g. digital merchants) depending on their specific needs. All the APIs required are part of standard Mobile Operator network components and are already a part of their existing infrastructure. Accordingly, in another preferred embodiment of the invention the Mobile Operator network components being used include:
- HLR (Home Location Register);
- GGSN/P-GW (Gateway GPRS Support Node/Packet Data Network Gateway);
- CGN (Carrier-grade NAT).
- GGSN and CGN components are being used to resolve Private IP address and combination of Public IP address and Port into Mobile ID, while HLR is being used to resolve IMSI, ICCID, IMEI and MSISDN into Mobile ID.
- As mentioned above, when the method according to the invention is performed, the IPification server sends up to six parameters to the Mobile Operator server as input parameters (Mobile ID queries) for a single user verification, expecting to receive same value of Mobile ID in response to each of the parameters, thus enabling the specific user identity confirmation beyond any doubt. Up to six server-to-server Application Programming Interfaces (APIs Integrations) are provided in between the IPification server and the Mobile Operator server. These include:
-
- PUBLIC IP: PORT to MOBILE ID (MSISDN) API (GGSN & CGN)
- PRIVATE IP to MOBILE ID (MSISDN) API (GGSN)
- IMSI to MOBILE ID (MSISDN) API (HLR)
- IMEI to MOBILE ID (MSISDN) API (HLR/EIR)
- ICCID to MOBILE (MSISDN) API (HLR)
- MSISDN to MOBILE ID API
- The APIs listed above are used within the Mobile Operator network to resolve input parameters into unique Mobile ID.
- Based on the results from up to six different Mobile ID queries in form of API calls (also called API requests), the present invention can undoubtedly process successful authentication process, successfully authenticate the mobile user or inform related party (i.e. application/website developer) about unsuccessful authentication.
- Depending on specific needs the method according to the invention can provide up to six factor authentications, providing possibility to match up to six Mobile IDs received on the Mobile Operator side, as results of six different API calls. If required number of Mobile IDs is matched, the present invention can undoubtedly authenticate specific device/SIM card and thus confirm the successful user identification. In case some of the required Mobile IDs are not matched (Mobile ID correspond to a different Device/SIM card or Mobile ID is not resolved at all), the present invention can undoubtedly confirm the inability to authenticate specific device/SIM card and thus confirm the unsuccessful identification of the user. Based on the mobile user identification results using present invention, the application/website developers can better adjust their end user experience and customize further interactions with their platforms.
- The invention will now be further illustrated in the preferred examples, with reference to the accompanying drawings, in which:
-
FIG. 1 is a scheme of communication between the IPification server and the Mobile Operator server; -
FIG. 2 is a sequence diagram describing communication flow between the mobile user, the application developer, the IPification server and the Mobile Operator server in case of successful user identification; -
FIG. 3 is a sequence diagram describing communication flow between the mobile user, the website developer, IPification server and the Mobile Operator server in case of successful identification; -
FIG. 4 shows an IPification digital ecosystem; -
FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator network when Public IP and Port are received as a Mobile ID query; -
FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query; -
FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator network when IMSI/IMEI/ICCID are received as Mobile ID queries; -
FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched; -
FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched. - A basic scheme of communication between the IPification server and the Mobile Operator server is presented in
FIG. 1 . According to this scheme, once the IPification server generates API calls for Mobile ID based on Public IP: Port and/or Private IP parameters, these are transmitted to the Mobile Operator server and processed within the GGSN/CGN component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server. In case the IPification server generates API calls for Mobile ID based on at least one of the following parameters: IMEI, ICCID, IMSI, MSISDN, such API calls are also transmitted to the Mobile Operator server, but processed within the HLR component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server. - In
FIG. 2 a sequence diagram is provided illustrating communication flow between the mobile user, the application developer the IPification server and the Mobile Operator server in case of successful user identification. The initial step of mobile user's interaction with the specific application triggers the application developer to generate a Mobile ID request based on up to six input parameters (IMSI, IMEI, ICCID, MSISDN, Private IP, Public IP: Port) which is transmitted to the IPification server, which in turn generates up to six API calls (GET MOBILE ID) corresponding to the number of input parameters used in the Mobile ID request. The API calls are transmitted to the Mobile Operator server and processed within assigned components of the Mobile Operator network, including GGSN, CGN and HLR. Resulting Mobile IDs are transmitted back to the IPification server and after successful mobile user identification a respective Mobile ID is sent to the application developer followed by granting the mobile user access to the application/website or approving transaction selected by the user. - The sequence diagram of
FIG. 3 illustrating communication flow between the mobile user, the website developer the IPification server and the Mobile Operator server in case of successful user identification is very similar to that ofFIG. 2 . The only difference is at the initial stage, wherein the mobile user's interaction with the specific website triggers the website developer to redirect the user for authentication to a dedicated website directly connected to the IPification server. In response to the user's authentication request (=Mobile ID request) based on up to six input parameters (IMSI, IMEI, ICCID, MSISDN, Private IP, Public IP: Port) the IPification server generates up to six API calls (GET MOBILE ID) corresponding to the number of input parameters used in the Mobile ID request entered via said dedicated website. Subsequent steps are identical as in the scheme ofFIG. 2 described above. -
FIG. 4 illustrates the IPification ecosystem, involving the mobile user, the native application or mobile website developer, the IPification server and Mobile Operator servers. The mobile user initiates the interaction with the native application or attempts to access a website. This triggers the native application or mobile website developer to generate a Mobile ID request transmitted to the IPification server, which in turn communicates with the Mobile Operator servers to obtain the specific Mobile ID based on up to six SIM card and device-related parameters in a method according to the invention already described with respect toFIGS. 2 and 3 above. -
FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator Network when Public IP and Port are received as a Mobile ID query. In this example the Mobile ID is obtained in response to the Mobile ID query based on Public IP:Port by matching the Public IP:Port parameter with a corresponding Private IP parameter in a lookup table within the CGN component, followed by matching the resulting Private IP with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW, and finally transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server. -
FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query. In this example the Mobile ID is obtained in response to the Mobile ID query based on Private IP by matching the Private IP parameter with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW component, and transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server. -
FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator Network when IMSI/IMEI/ICCID are received as Mobile ID queries. In this example the Mobile ID is obtained in response to the Mobile ID query based on IMSI, ICCID and/or IMEI parameter by matching each of these parameters with a corresponding MSISDN parameter in a lookup table within the HLR component, and transmitting such obtained MSISDN parameters as Mobile IDs back to the IPification server -
FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched. In this scenario server-to-server (S2S) API requests (i.e. Mobile ID queries) based on up to six input parameters (IMSI, ICCID, IMEI, Private IP, Public IP: Port and MSISDN) are transmitted to the Mobile Operator server and in response a respective number (here: six) of Mobile IDs is generated and transmitted back to the IPification server. As all six Mobile IDs are identical (i.e. have the same value and point to same device/SIM card), the specific mobile user is undoubtedly identified. -
FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched. This situation differs from the scenario shown inFIG. 8 in that not all of the six Mobile IDs are identical, i.e. some of them point to a different SIM card/device or at least one of the Mobile IDs is not authenticated at all. As a result, the inability to authenticate specific device/SIM card is undoubtedly concluded.
Claims (8)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1803719.2 | 2018-03-08 | ||
GB1803719.2A GB2573262B (en) | 2018-03-08 | 2018-03-08 | Mobile identification method based on SIM card and device-related parameters |
Publications (2)
Publication Number | Publication Date |
---|---|
US10390226B1 US10390226B1 (en) | 2019-08-20 |
US20190281454A1 true US20190281454A1 (en) | 2019-09-12 |
Family
ID=61972830
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/928,348 Active US10390226B1 (en) | 2018-03-08 | 2018-03-22 | Mobile identification method based on SIM card and device-related parameters |
Country Status (4)
Country | Link |
---|---|
US (1) | US10390226B1 (en) |
CN (1) | CN108924818A (en) |
GB (1) | GB2573262B (en) |
HK (1) | HK1248463A2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113207117A (en) * | 2021-04-14 | 2021-08-03 | 东智安通(北京)科技有限公司 | Shared reduction optimization method and device based on IMEI reduction success rate |
CN113271584A (en) * | 2021-04-14 | 2021-08-17 | 东智安通(北京)科技有限公司 | IMEI time-sharing restoration method and device |
RU2780029C1 (en) * | 2021-06-24 | 2022-09-19 | Николай Сергеевич Лагуткин | Method for identification of an online user and his device |
US12101314B1 (en) * | 2023-08-07 | 2024-09-24 | Stodge Inc. | Low latency and redundant proof of possession for content subscription |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107528694A (en) * | 2017-08-11 | 2017-12-29 | 环球智达科技(北京)有限公司 | Business datum identifies code generating method |
GB2589093A (en) * | 2019-11-15 | 2021-05-26 | Benefit Vantage Ltd | Method and system for a two-party Authentication of a mobile phone number |
RU2736166C1 (en) * | 2020-04-17 | 2020-11-12 | Общество с ограниченной ответственностью "МКС" | Method of identifying an online user and device thereof in an application |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050039050A1 (en) * | 2003-02-10 | 2005-02-17 | Lionel Morand | Method and a system for authenticating a user at a network access while the user is making a connection to the Internet |
US20070174904A1 (en) * | 2006-01-24 | 2007-07-26 | Samsung Electronics Co., Ltd. | One-time password service system using mobile phone and authentication method using the same |
US20070180503A1 (en) * | 2006-01-25 | 2007-08-02 | Chia-Hsin Li | IMX session control and authentication |
US20080184349A1 (en) * | 2007-01-30 | 2008-07-31 | Ting David M T | System and method for identity consolidation |
US20120256725A1 (en) * | 2005-03-23 | 2012-10-11 | Ihc Corporation | Authentication system |
US20130067552A1 (en) * | 2010-11-06 | 2013-03-14 | Qualcomm Incorporated | Authentication in secure user plane location (supl) systems |
US20160087957A1 (en) * | 2013-04-26 | 2016-03-24 | Interdigital Patent Holdings, Inc. | Multi-factor authentication to achieve required authentication assurance level |
US20160226848A1 (en) * | 2015-01-30 | 2016-08-04 | Aruba Networks, Inc. | Authentication survivability for assigning role and vlan based on cached radius attributes |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130166450A1 (en) * | 2010-04-23 | 2013-06-27 | Thandisizwe Ezwenilethu Pama | Identity Verification System Using Network Initiated USSD |
GB2499360B8 (en) * | 2011-10-12 | 2016-01-27 | Technology Business Man Ltd | Secure ID authentication |
CN102882853A (en) * | 2012-09-05 | 2013-01-16 | 孙银海 | System and method for internet user authentication |
CN103428699A (en) * | 2013-07-16 | 2013-12-04 | 李锦风 | Registration binding and identity authentication method based on mobile phone hardware feature information |
CN103415014B (en) * | 2013-08-28 | 2016-12-28 | 北京网秦天下科技有限公司 | The method and apparatus authenticated is carried out for mobile terminal |
-
2018
- 2018-03-08 GB GB1803719.2A patent/GB2573262B/en active Active
- 2018-03-22 US US15/928,348 patent/US10390226B1/en active Active
- 2018-05-02 HK HK18105684A patent/HK1248463A2/en unknown
- 2018-07-13 CN CN201810775056.2A patent/CN108924818A/en not_active Withdrawn
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050039050A1 (en) * | 2003-02-10 | 2005-02-17 | Lionel Morand | Method and a system for authenticating a user at a network access while the user is making a connection to the Internet |
US20120256725A1 (en) * | 2005-03-23 | 2012-10-11 | Ihc Corporation | Authentication system |
US20070174904A1 (en) * | 2006-01-24 | 2007-07-26 | Samsung Electronics Co., Ltd. | One-time password service system using mobile phone and authentication method using the same |
US20070180503A1 (en) * | 2006-01-25 | 2007-08-02 | Chia-Hsin Li | IMX session control and authentication |
US20080184349A1 (en) * | 2007-01-30 | 2008-07-31 | Ting David M T | System and method for identity consolidation |
US20130067552A1 (en) * | 2010-11-06 | 2013-03-14 | Qualcomm Incorporated | Authentication in secure user plane location (supl) systems |
US20160087957A1 (en) * | 2013-04-26 | 2016-03-24 | Interdigital Patent Holdings, Inc. | Multi-factor authentication to achieve required authentication assurance level |
US20160226848A1 (en) * | 2015-01-30 | 2016-08-04 | Aruba Networks, Inc. | Authentication survivability for assigning role and vlan based on cached radius attributes |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113207117A (en) * | 2021-04-14 | 2021-08-03 | 东智安通(北京)科技有限公司 | Shared reduction optimization method and device based on IMEI reduction success rate |
CN113271584A (en) * | 2021-04-14 | 2021-08-17 | 东智安通(北京)科技有限公司 | IMEI time-sharing restoration method and device |
RU2780029C1 (en) * | 2021-06-24 | 2022-09-19 | Николай Сергеевич Лагуткин | Method for identification of an online user and his device |
US12101314B1 (en) * | 2023-08-07 | 2024-09-24 | Stodge Inc. | Low latency and redundant proof of possession for content subscription |
Also Published As
Publication number | Publication date |
---|---|
GB2573262A (en) | 2019-11-06 |
GB201803719D0 (en) | 2018-04-25 |
HK1248463A2 (en) | 2018-10-12 |
CN108924818A (en) | 2018-11-30 |
GB2573262B (en) | 2022-04-13 |
US10390226B1 (en) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10390226B1 (en) | Mobile identification method based on SIM card and device-related parameters | |
CN110800331B (en) | Network verification method, related equipment and system | |
US10063377B2 (en) | Network-based authentication for third party content | |
CN112566050B (en) | Cellular service account transfer for an accessory wireless device | |
US11082838B2 (en) | Extensible authentication protocol with mobile device identification | |
CN108476223B (en) | Method and apparatus for SIM-based authentication of non-SIM devices | |
US9225706B2 (en) | Multiple access point zero sign-on | |
US9300474B2 (en) | Enhanced authentication and/or enhanced identification of a secure element of a communication device | |
US11917404B2 (en) | Cellular network authentication utilizing unlinkable anonymous credentials | |
US20110302643A1 (en) | Mechanism for authentication and authorization for network and service access | |
US11271922B2 (en) | Method for authenticating a user and corresponding device, first and second servers and system | |
KR20090036562A (en) | Method and system for controlling access to networks | |
TWI598762B (en) | A network system, method and mobile device based on remote user authentication | |
US20130183934A1 (en) | Methods for initializing and/or activating at least one user account for carrying out a transaction, as well as terminal device | |
US11968531B2 (en) | Token, particularly OTP, based authentication system and method | |
GB2547231A (en) | Apparatus, method and computer program product for use in authenticating a user | |
US20220353260A1 (en) | Systems and methods for multi-level authentication | |
EP2961208A1 (en) | Method for accessing a service and corresponding application server, device and system | |
US20230010440A1 (en) | System and Method for Performing Identity Management | |
CN116868609A (en) | User equipment authentication and authorization procedure for edge data networks | |
EP3402238A1 (en) | Efficient user authentications | |
CN117678255A (en) | Edge enabler client identification authentication procedure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BENEFIT VANTAGE LIMITED, HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHEUNG, HARRY LUP SUN;REEL/FRAME:045314/0816 Effective date: 20180313 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |