US20190281454A1 - Mobile identification method based on sim card and device-related parameters - Google Patents

Mobile identification method based on sim card and device-related parameters Download PDF

Info

Publication number
US20190281454A1
US20190281454A1 US15/928,348 US201815928348A US2019281454A1 US 20190281454 A1 US20190281454 A1 US 20190281454A1 US 201815928348 A US201815928348 A US 201815928348A US 2019281454 A1 US2019281454 A1 US 2019281454A1
Authority
US
United States
Prior art keywords
mobile
server
ipification
msisdn
ids
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/928,348
Other versions
US10390226B1 (en
Inventor
Harry Lup Sun Cheung
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Benefit Vantage Ltd
Original Assignee
Benefit Vantage Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Benefit Vantage Ltd filed Critical Benefit Vantage Ltd
Assigned to Benefit Vantage Limited reassignment Benefit Vantage Limited ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHEUNG, HARRY LUP SUN
Application granted granted Critical
Publication of US10390226B1 publication Critical patent/US10390226B1/en
Publication of US20190281454A1 publication Critical patent/US20190281454A1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/106Mapping addresses of different types across networks, e.g. mapping telephone numbers to data network addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4588Network directories; Name-to-address mapping containing mobile subscriber information, e.g. home subscriber server [HSS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Definitions

  • the present invention relates to a new method of mobile user identification by third parties based on the SIM card and device-related parameters available in telecommunication network.
  • the invention is particularly, but not exclusively, applicable to a wide scope of different industry segments: Fintech companies, digital merchants, e-government solutions, enterprises, etc. and provides enhanced platform security features and improved end users experience and transaction processing in interactions with those platforms.
  • Mobile phone number Mobile Station International Subscriber Directory Number or MSISDN
  • MSISDN Mobile Station International Subscriber Directory Number
  • the present invention has recognized Mobile Operators (i.e. the owners of users' SIM card information) as one of the most important players in providing the future of digital mobile identification options.
  • the invention aims to simplify mobile identification and authentication process, thus increasing the level of security in digital ecosystem along with providing more efficient business operations for both mobile application developers and website owners.
  • the aim of the present solution is to overcome the above-mentioned problems, associated with the use of known methods of identifying mobile users for the purposes of authorised access to applications or websites.
  • the object of the invention is a method of a mobile user identification based on SIM card and device-related parameters available in telecommunication network, comprising the following steps:
  • the method according to the present invention uses cloud service in form of the IPification server arranged between application/website developers and global network of Mobile Operators providing queries for up to six SIM card and device-related parameters.
  • the communication between the IPification server and the Mobile Operator server uses at least one of the following security mechanisms: SSL/HTTPS, WSS-SOAP, VPN and PKI, thus providing the highest level of data transfer security.
  • the method according to the invention involves a step of sending Mobile ID queries toward Mobile Operator server with above-mentioned specific parameters included as inputs, expecting to receive response with Mobile ID (unique user identifier) corresponding to these specific parameters.
  • Mobile ID unique user identifier
  • the present method involves the use of hashing algorithm to mask the real MSISDN and alphanumeric reference which will be unique for that specific mobile user (being a subscriber of the mobile communication services provided by the Mobile Operator) to further enhance the user privacy objectives while ensuring the authenticity of the mobile user.
  • the integration with the Mobile Operator servers is comprised of several different Application Programming Interfaces (APIs) thus enabling up to six factors of authentication for application/website providers (e.g. digital merchants) depending on their specific needs. All the APIs required are part of standard Mobile Operator network components and are already a part of their existing infrastructure. Accordingly, in another preferred embodiment of the invention the Mobile Operator network components being used include:
  • GGSN and CGN components are being used to resolve Private IP address and combination of Public IP address and Port into Mobile ID, while HLR is being used to resolve IMSI, ICCID, IMEI and MSISDN into Mobile ID.
  • the IPification server sends up to six parameters to the Mobile Operator server as input parameters (Mobile ID queries) for a single user verification, expecting to receive same value of Mobile ID in response to each of the parameters, thus enabling the specific user identity confirmation beyond any doubt.
  • up to six server-to-server Application Programming Interfaces (APIs Integrations) are provided in between the IPification server and the Mobile Operator server. These include:
  • the APIs listed above are used within the Mobile Operator network to resolve input parameters into unique Mobile ID.
  • the present invention can undoubtedly process successful authentication process, successfully authenticate the mobile user or inform related party (i.e. application/website developer) about unsuccessful authentication.
  • the method according to the invention can provide up to six factor authentications, providing possibility to match up to six Mobile IDs received on the Mobile Operator side, as results of six different API calls. If required number of Mobile IDs is matched, the present invention can undoubtedly authenticate specific device/SIM card and thus confirm the successful user identification. In case some of the required Mobile IDs are not matched (Mobile ID correspond to a different Device/SIM card or Mobile ID is not resolved at all), the present invention can undoubtedly confirm the inability to authenticate specific device/SIM card and thus confirm the unsuccessful identification of the user. Based on the mobile user identification results using present invention, the application/website developers can better adjust their end user experience and customize further interactions with their platforms.
  • FIG. 1 is a scheme of communication between the IPification server and the Mobile Operator server;
  • FIG. 2 is a sequence diagram describing communication flow between the mobile user, the application developer, the IPification server and the Mobile Operator server in case of successful user identification;
  • FIG. 3 is a sequence diagram describing communication flow between the mobile user, the website developer, IPification server and the Mobile Operator server in case of successful identification;
  • FIG. 4 shows an IPification digital ecosystem
  • FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator network when Public IP and Port are received as a Mobile ID query
  • FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query
  • FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator network when IMSI/IMEI/ICCID are received as Mobile ID queries
  • FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched
  • FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched.
  • FIG. 1 A basic scheme of communication between the IPification server and the Mobile Operator server is presented in FIG. 1 .
  • the IPification server generates API calls for Mobile ID based on Public IP: Port and/or Private IP parameters, these are transmitted to the Mobile Operator server and processed within the GGSN/CGN component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server.
  • the IPification server generates API calls for Mobile ID based on at least one of the following parameters: IMEI, ICCID, IMSI, MSISDN, such API calls are also transmitted to the Mobile Operator server, but processed within the HLR component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server.
  • FIG. 2 a sequence diagram is provided illustrating communication flow between the mobile user, the application developer the IPification server and the Mobile Operator server in case of successful user identification.
  • the initial step of mobile user's interaction with the specific application triggers the application developer to generate a Mobile ID request based on up to six input parameters (IMSI, IMEI, ICCID, MSISDN, Private IP, Public IP: Port) which is transmitted to the IPification server, which in turn generates up to six API calls (GET MOBILE ID) corresponding to the number of input parameters used in the Mobile ID request.
  • the API calls are transmitted to the Mobile Operator server and processed within assigned components of the Mobile Operator network, including GGSN, CGN and HLR. Resulting Mobile IDs are transmitted back to the IPification server and after successful mobile user identification a respective Mobile ID is sent to the application developer followed by granting the mobile user access to the application/website or approving transaction selected by the user.
  • FIG. 3 The sequence diagram of FIG. 3 illustrating communication flow between the mobile user, the website developer the IPification server and the Mobile Operator server in case of successful user identification is very similar to that of FIG. 2 .
  • the only difference is at the initial stage, wherein the mobile user's interaction with the specific website triggers the website developer to redirect the user for authentication to a dedicated website directly connected to the IPification server.
  • FIG. 4 illustrates the IPification ecosystem, involving the mobile user, the native application or mobile website developer, the IPification server and Mobile Operator servers.
  • the mobile user initiates the interaction with the native application or attempts to access a website.
  • This triggers the native application or mobile website developer to generate a Mobile ID request transmitted to the IPification server, which in turn communicates with the Mobile Operator servers to obtain the specific Mobile ID based on up to six SIM card and device-related parameters in a method according to the invention already described with respect to FIGS. 2 and 3 above.
  • FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator Network when Public IP and Port are received as a Mobile ID query.
  • the Mobile ID is obtained in response to the Mobile ID query based on Public IP:Port by matching the Public IP:Port parameter with a corresponding Private IP parameter in a lookup table within the CGN component, followed by matching the resulting Private IP with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW, and finally transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server.
  • FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query.
  • the Mobile ID is obtained in response to the Mobile ID query based on Private IP by matching the Private IP parameter with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW component, and transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server.
  • FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator Network when IMSI/IMEI/ICCID are received as Mobile ID queries.
  • the Mobile ID is obtained in response to the Mobile ID query based on IMSI, ICCID and/or IMEI parameter by matching each of these parameters with a corresponding MSISDN parameter in a lookup table within the HLR component, and transmitting such obtained MSISDN parameters as Mobile IDs back to the IPification server
  • FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched.
  • server-to-server (S2S) API requests i.e. Mobile ID queries
  • IMSI, ICCID, IMEI, Private IP, Public IP: Port and MSISDN are transmitted to the Mobile Operator server and in response a respective number (here: six) of Mobile IDs is generated and transmitted back to the IPification server.
  • a respective number here: six
  • the specific mobile user is undoubtedly identified.
  • FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched. This situation differs from the scenario shown in FIG. 8 in that not all of the six Mobile IDs are identical, i.e. some of them point to a different SIM card/device or at least one of the Mobile IDs is not authenticated at all. As a result, the inability to authenticate specific device/SIM card is undoubtedly concluded.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

A new method of mobile user identification by third parties based on the SIM card and device-related parameters available in telecommunication network. Applicable to a wide scope of different industry segments: Fintech companies, digital merchants, e-government solutions and enterprises, provides enhanced platform security features and improved end users experience and transaction processing in interactions with those platforms.

Description

    FIELD
  • The present invention relates to a new method of mobile user identification by third parties based on the SIM card and device-related parameters available in telecommunication network. The invention is particularly, but not exclusively, applicable to a wide scope of different industry segments: Fintech companies, digital merchants, e-government solutions, enterprises, etc. and provides enhanced platform security features and improved end users experience and transaction processing in interactions with those platforms.
  • BACKGROUND
  • In today's rapidly increasing mobile-based ecosystem, a wide number of digital merchants are looking for the best way to adopt “Mobile First” or “Mobile Only” strategy. New generations of users are spending most of their time on-the-go expecting to have a seamless user experience across their mobile access channels. The increased number of different mobile applications installed on user's devices, higher online usage and mobile-based transactions as well as the growing security issues are challenging traditional username (email)-password login and verification models. Looking at those challenges digital merchants, payment providers, online enterprises and application developers are fully recognizing the need for users' security transformations in terms of identity, authentication and authorization methods, considering that changes shouldn't compromise the prominent level of user service/application experience in terms of simplicity, seamlessness and convenience.
  • Mobile phone number (Mobile Station International Subscriber Directory Number or MSISDN) is at present the most widely used unique user identifier. Having that in mind, the present invention has recognized Mobile Operators (i.e. the owners of users' SIM card information) as one of the most important players in providing the future of digital mobile identification options. By leveraging closely on the Mobile Operators' network components, the invention aims to simplify mobile identification and authentication process, thus increasing the level of security in digital ecosystem along with providing more efficient business operations for both mobile application developers and website owners.
  • SUMMARY
  • The aim of the present solution is to overcome the above-mentioned problems, associated with the use of known methods of identifying mobile users for the purposes of authorised access to applications or websites.
  • Therefore, the object of the invention is a method of a mobile user identification based on SIM card and device-related parameters available in telecommunication network, comprising the following steps:
      • once the mobile user is trying to interact with an application or to access a website, the application/website developer transmits a Mobile ID request to an external IPification server;
      • the IPification server transmits up to six Mobile ID queries in form of Application Programming Interface (API) calls to a Mobile Operator server, whereby each Mobile ID query is based on one of the following SIM card/device-related input parameters:
        • IMSI (International Mobile Subscriber Identity),
        • ICCID (Integrated Circuit Card Identifier)
        • IMEI (International Mobile Equipment Identity),
        • MSISDN (Mobile Station International Subscriber Directory Number),
        • Private IP (IP address used by Mobile Operator to internally identify the user in its network), and
        • Public IP: Port (IP address and port used by Mobile Subscribers externally, i.e. when accessing public domain, Internet);
      • the Mobile Operator server transmits Mobile IDs back to the IPification server, whereby each of the Mobile IDs is generated in response to one of the Mobile ID queries sent to Mobile Operator server as input parameters, and whereby each Mobile ID is a unique alphanumeric identifier of the user being a subscriber of the mobile communication services provided by the Mobile Operator;
      • the IPification server verifies whether all the Mobile IDs obtained from the Mobile Operator server are identical, and depending on the verification result reacts in two alternative ways:
        • if the verification result is positive, the IPification server provides the user's single Mobile ID to the application/website developer thereby authenticating the mobile user and thus allowing him to interact with the application or access the website;
        • if the verification result is negative, the IPification server provides the application/website developer with the information about unsuccessful authentication of the user, and as a result the user is not allowed to interact with the application or access the website.
  • There are several different options (combinations of six different parameters listed above) used by the present invention to identify the current application/website user based on his/her SIM card/device information. Specific combination being used largely depends on the network access channel (cellular, Wi-Fi) as well as the application type (Android, iOS, mobile web). These six parameters are used once the user is accessing an application for the first time and during each consecutive time.
  • The method according to the present invention uses cloud service in form of the IPification server arranged between application/website developers and global network of Mobile Operators providing queries for up to six SIM card and device-related parameters. In a preferred embodiment, the communication between the IPification server and the Mobile Operator server uses at least one of the following security mechanisms: SSL/HTTPS, WSS-SOAP, VPN and PKI, thus providing the highest level of data transfer security.
  • The method according to the invention involves a step of sending Mobile ID queries toward Mobile Operator server with above-mentioned specific parameters included as inputs, expecting to receive response with Mobile ID (unique user identifier) corresponding to these specific parameters. In certain countries some of the Mobile Operators are using MSISDN as Mobile ID. In these cases, the present method involves the use of hashing algorithm to mask the real MSISDN and alphanumeric reference which will be unique for that specific mobile user (being a subscriber of the mobile communication services provided by the Mobile Operator) to further enhance the user privacy objectives while ensuring the authenticity of the mobile user.
  • The integration with the Mobile Operator servers is comprised of several different Application Programming Interfaces (APIs) thus enabling up to six factors of authentication for application/website providers (e.g. digital merchants) depending on their specific needs. All the APIs required are part of standard Mobile Operator network components and are already a part of their existing infrastructure. Accordingly, in another preferred embodiment of the invention the Mobile Operator network components being used include:
    • HLR (Home Location Register);
    • GGSN/P-GW (Gateway GPRS Support Node/Packet Data Network Gateway);
    • CGN (Carrier-grade NAT).
  • GGSN and CGN components are being used to resolve Private IP address and combination of Public IP address and Port into Mobile ID, while HLR is being used to resolve IMSI, ICCID, IMEI and MSISDN into Mobile ID.
  • As mentioned above, when the method according to the invention is performed, the IPification server sends up to six parameters to the Mobile Operator server as input parameters (Mobile ID queries) for a single user verification, expecting to receive same value of Mobile ID in response to each of the parameters, thus enabling the specific user identity confirmation beyond any doubt. Up to six server-to-server Application Programming Interfaces (APIs Integrations) are provided in between the IPification server and the Mobile Operator server. These include:
      • PUBLIC IP: PORT to MOBILE ID (MSISDN) API (GGSN & CGN)
      • PRIVATE IP to MOBILE ID (MSISDN) API (GGSN)
      • IMSI to MOBILE ID (MSISDN) API (HLR)
      • IMEI to MOBILE ID (MSISDN) API (HLR/EIR)
      • ICCID to MOBILE (MSISDN) API (HLR)
      • MSISDN to MOBILE ID API
  • The APIs listed above are used within the Mobile Operator network to resolve input parameters into unique Mobile ID.
  • Based on the results from up to six different Mobile ID queries in form of API calls (also called API requests), the present invention can undoubtedly process successful authentication process, successfully authenticate the mobile user or inform related party (i.e. application/website developer) about unsuccessful authentication.
  • Depending on specific needs the method according to the invention can provide up to six factor authentications, providing possibility to match up to six Mobile IDs received on the Mobile Operator side, as results of six different API calls. If required number of Mobile IDs is matched, the present invention can undoubtedly authenticate specific device/SIM card and thus confirm the successful user identification. In case some of the required Mobile IDs are not matched (Mobile ID correspond to a different Device/SIM card or Mobile ID is not resolved at all), the present invention can undoubtedly confirm the inability to authenticate specific device/SIM card and thus confirm the unsuccessful identification of the user. Based on the mobile user identification results using present invention, the application/website developers can better adjust their end user experience and customize further interactions with their platforms.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention will now be further illustrated in the preferred examples, with reference to the accompanying drawings, in which:
  • FIG. 1 is a scheme of communication between the IPification server and the Mobile Operator server;
  • FIG. 2 is a sequence diagram describing communication flow between the mobile user, the application developer, the IPification server and the Mobile Operator server in case of successful user identification;
  • FIG. 3 is a sequence diagram describing communication flow between the mobile user, the website developer, IPification server and the Mobile Operator server in case of successful identification;
  • FIG. 4 shows an IPification digital ecosystem;
  • FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator network when Public IP and Port are received as a Mobile ID query;
  • FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query;
  • FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator network when IMSI/IMEI/ICCID are received as Mobile ID queries;
  • FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched;
  • FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched.
  • DETAILED DESCRIPTION
  • A basic scheme of communication between the IPification server and the Mobile Operator server is presented in FIG. 1. According to this scheme, once the IPification server generates API calls for Mobile ID based on Public IP: Port and/or Private IP parameters, these are transmitted to the Mobile Operator server and processed within the GGSN/CGN component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server. In case the IPification server generates API calls for Mobile ID based on at least one of the following parameters: IMEI, ICCID, IMSI, MSISDN, such API calls are also transmitted to the Mobile Operator server, but processed within the HLR component, and the response in form of respective number of Mobile IDs is transmitted back to the IPification server.
  • In FIG. 2 a sequence diagram is provided illustrating communication flow between the mobile user, the application developer the IPification server and the Mobile Operator server in case of successful user identification. The initial step of mobile user's interaction with the specific application triggers the application developer to generate a Mobile ID request based on up to six input parameters (IMSI, IMEI, ICCID, MSISDN, Private IP, Public IP: Port) which is transmitted to the IPification server, which in turn generates up to six API calls (GET MOBILE ID) corresponding to the number of input parameters used in the Mobile ID request. The API calls are transmitted to the Mobile Operator server and processed within assigned components of the Mobile Operator network, including GGSN, CGN and HLR. Resulting Mobile IDs are transmitted back to the IPification server and after successful mobile user identification a respective Mobile ID is sent to the application developer followed by granting the mobile user access to the application/website or approving transaction selected by the user.
  • The sequence diagram of FIG. 3 illustrating communication flow between the mobile user, the website developer the IPification server and the Mobile Operator server in case of successful user identification is very similar to that of FIG. 2. The only difference is at the initial stage, wherein the mobile user's interaction with the specific website triggers the website developer to redirect the user for authentication to a dedicated website directly connected to the IPification server. In response to the user's authentication request (=Mobile ID request) based on up to six input parameters (IMSI, IMEI, ICCID, MSISDN, Private IP, Public IP: Port) the IPification server generates up to six API calls (GET MOBILE ID) corresponding to the number of input parameters used in the Mobile ID request entered via said dedicated website. Subsequent steps are identical as in the scheme of FIG. 2 described above.
  • FIG. 4 illustrates the IPification ecosystem, involving the mobile user, the native application or mobile website developer, the IPification server and Mobile Operator servers. The mobile user initiates the interaction with the native application or attempts to access a website. This triggers the native application or mobile website developer to generate a Mobile ID request transmitted to the IPification server, which in turn communicates with the Mobile Operator servers to obtain the specific Mobile ID based on up to six SIM card and device-related parameters in a method according to the invention already described with respect to FIGS. 2 and 3 above.
  • FIG. 5 shows an example of Mobile ID resolution inside the Mobile Operator Network when Public IP and Port are received as a Mobile ID query. In this example the Mobile ID is obtained in response to the Mobile ID query based on Public IP:Port by matching the Public IP:Port parameter with a corresponding Private IP parameter in a lookup table within the CGN component, followed by matching the resulting Private IP with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW, and finally transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server.
  • FIG. 6 shows an example of Mobile ID resolution inside the Mobile Operator Network when Private IP address is received as a Mobile ID query. In this example the Mobile ID is obtained in response to the Mobile ID query based on Private IP by matching the Private IP parameter with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW component, and transmitting such obtained MSISDN parameter as the Mobile ID back to the IPification server.
  • FIG. 7 shows an example of Mobile ID resolution inside the Mobile Operator Network when IMSI/IMEI/ICCID are received as Mobile ID queries. In this example the Mobile ID is obtained in response to the Mobile ID query based on IMSI, ICCID and/or IMEI parameter by matching each of these parameters with a corresponding MSISDN parameter in a lookup table within the HLR component, and transmitting such obtained MSISDN parameters as Mobile IDs back to the IPification server
  • FIG. 8 shows a scheme of decision making process if required number of Mobile IDs are matched. In this scenario server-to-server (S2S) API requests (i.e. Mobile ID queries) based on up to six input parameters (IMSI, ICCID, IMEI, Private IP, Public IP: Port and MSISDN) are transmitted to the Mobile Operator server and in response a respective number (here: six) of Mobile IDs is generated and transmitted back to the IPification server. As all six Mobile IDs are identical (i.e. have the same value and point to same device/SIM card), the specific mobile user is undoubtedly identified.
  • FIG. 9 shows a scheme of decision making process in case not all required Mobile IDs are matched. This situation differs from the scenario shown in FIG. 8 in that not all of the six Mobile IDs are identical, i.e. some of them point to a different SIM card/device or at least one of the Mobile IDs is not authenticated at all. As a result, the inability to authenticate specific device/SIM card is undoubtedly concluded.

Claims (8)

1. A method of a mobile user identification and authentication based on Subscriber Identity Module (SIM) card or device-related parameters available in a telecommunication network, comprising the following steps:
transmitting a Mobile ID request to an external IPification server from an application or web development platform once the mobile user attempts to interact with the application or access a website;
communicating from the IPification server up to six Mobile ID queries as Application Programing Interface (API) calls to a Mobile Operator server, wherein each of the up to six Mobile ID queries is based on one of the following SIM card or device-related input parameters, comprising: International Mobile Subscriber Identity (IMSI), Integrated Circuit Card Identifier (ICCID), International Mobile Equipment Identity (IMEI), Mobile Station International Subscriber Directory Number (MSISDN), Private IP address and Public IP address and Port;
communicating a Mobile ID for each of the up to six Mobile ID queries back to the IPification server from the Mobile Operator server, wherein each of the up to six Mobile IDs is generated in response to one of the up to six Mobile ID queries sent to the Mobile Operator server as the SIM card or device-related input parameters, and whereby each of the up to six Mobile IDs is a unique alphanumeric identifier of the mobile user being a subscriber of the mobile communication services provided by the Mobile Operator;
verifying via the IPification server whether all the up to six Mobile IDs obtained from the Mobile Operator server are identical, and depending on the verification result, reacting in two alternative ways:
if the verification result is positive, the IPification server provides the user's single matched Mobile ID to the applications or website developer thereby authenticating the mobile user and thus allowing the mobile user to interact with the application or access the website;
if the verification result is negative, the IPification server provides the application/website development platform with information about an unsuccessful authentication of the user, preventing the mobile user from interacting with the application or accessing the website.
2. The method according to claim 1, wherein the communication between the IPification server and the Mobile Operator server uses at least one of the following security mechanisms: Secure Sockets Layer/Hyper Text Transfer Protocol Secure SSL/HTTPS), Web Services Security-Simple Object Access Protocol (WSS-SOAP), Virtual Private Network (VPN) and Public Key Infrastructure (PKI).
3. The method according to claim 1, further comprising masking the MSISDN and using a masked MSISDN as the SIM card/device related input parameter, wherein the MSISDN is masked using a hashing algorithm, which generates a unique alphanumeric reference of the specific mobile user to be the masked MSISDN.
4. The method according to claim 1, wherein the Mobile Operator network uses at least one of a Home Location Register (HLR), Gateway GPRS Support Node (GGSN)/Packet Data Network Gateway (P-GW) and Carrier-Grade NAT (CGN).
5. The method according to claim 1, wherein the GGSN and the CGN resolve the Private IP address and combination of the Public IP address and Port into at least one of the up to six Mobile IDs, while the HLR is used to resolve IMSI, ICCID, IMEI and MSISDN into at least one of the up to six Mobile IDs.
6. The method according to claim 4, further comprising obtaining at least one of the up to six Mobile IDs in response to at least one of the up to six Mobile ID queries based on the Public IP and Port by matching the Public IP and Port parameter with a corresponding Private IP parameter in a lookup table within the CGN component, and subsequently matching the resulting Private IP with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW, and finally transmitting such obtained MSISDN parameter as at least one of the up to six Mobile IDs back to the IPification server.
7. The method according to claim 4, wherein at least one of the up to six Mobile IDs is obtained in response to at least one of the up to six Mobile ID queries, based on Private IP by matching the Private IP parameter with a corresponding MSISDN parameter in a lookup table within the GGSN/P-GW component, and transmitting such obtained MSISDN parameter as at least one of the up to six Mobile IDs back to the IPification server.
8. The method according to claim 4, wherein the at least one of the up to six Mobile IDs is obtained in response to at least one of the up to six Mobile ID queries based on IMSI, ICCID and/or IMEI parameter by matching each of these parameters with a corresponding MSISDN parameter in a lookup table within the HLR component and transmitting such obtained MSISDN parameters as at least one of the up to six Mobile IDs back to the IPification server.
US15/928,348 2018-03-08 2018-03-22 Mobile identification method based on SIM card and device-related parameters Active US10390226B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1803719.2 2018-03-08
GB1803719.2A GB2573262B (en) 2018-03-08 2018-03-08 Mobile identification method based on SIM card and device-related parameters

Publications (2)

Publication Number Publication Date
US10390226B1 US10390226B1 (en) 2019-08-20
US20190281454A1 true US20190281454A1 (en) 2019-09-12

Family

ID=61972830

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/928,348 Active US10390226B1 (en) 2018-03-08 2018-03-22 Mobile identification method based on SIM card and device-related parameters

Country Status (4)

Country Link
US (1) US10390226B1 (en)
CN (1) CN108924818A (en)
GB (1) GB2573262B (en)
HK (1) HK1248463A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113207117A (en) * 2021-04-14 2021-08-03 东智安通(北京)科技有限公司 Shared reduction optimization method and device based on IMEI reduction success rate
CN113271584A (en) * 2021-04-14 2021-08-17 东智安通(北京)科技有限公司 IMEI time-sharing restoration method and device
RU2780029C1 (en) * 2021-06-24 2022-09-19 Николай Сергеевич Лагуткин Method for identification of an online user and his device
US12101314B1 (en) * 2023-08-07 2024-09-24 Stodge Inc. Low latency and redundant proof of possession for content subscription

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528694A (en) * 2017-08-11 2017-12-29 环球智达科技(北京)有限公司 Business datum identifies code generating method
GB2589093A (en) * 2019-11-15 2021-05-26 Benefit Vantage Ltd Method and system for a two-party Authentication of a mobile phone number
RU2736166C1 (en) * 2020-04-17 2020-11-12 Общество с ограниченной ответственностью "МКС" Method of identifying an online user and device thereof in an application

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050039050A1 (en) * 2003-02-10 2005-02-17 Lionel Morand Method and a system for authenticating a user at a network access while the user is making a connection to the Internet
US20070174904A1 (en) * 2006-01-24 2007-07-26 Samsung Electronics Co., Ltd. One-time password service system using mobile phone and authentication method using the same
US20070180503A1 (en) * 2006-01-25 2007-08-02 Chia-Hsin Li IMX session control and authentication
US20080184349A1 (en) * 2007-01-30 2008-07-31 Ting David M T System and method for identity consolidation
US20120256725A1 (en) * 2005-03-23 2012-10-11 Ihc Corporation Authentication system
US20130067552A1 (en) * 2010-11-06 2013-03-14 Qualcomm Incorporated Authentication in secure user plane location (supl) systems
US20160087957A1 (en) * 2013-04-26 2016-03-24 Interdigital Patent Holdings, Inc. Multi-factor authentication to achieve required authentication assurance level
US20160226848A1 (en) * 2015-01-30 2016-08-04 Aruba Networks, Inc. Authentication survivability for assigning role and vlan based on cached radius attributes

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130166450A1 (en) * 2010-04-23 2013-06-27 Thandisizwe Ezwenilethu Pama Identity Verification System Using Network Initiated USSD
GB2499360B8 (en) * 2011-10-12 2016-01-27 Technology Business Man Ltd Secure ID authentication
CN102882853A (en) * 2012-09-05 2013-01-16 孙银海 System and method for internet user authentication
CN103428699A (en) * 2013-07-16 2013-12-04 李锦风 Registration binding and identity authentication method based on mobile phone hardware feature information
CN103415014B (en) * 2013-08-28 2016-12-28 北京网秦天下科技有限公司 The method and apparatus authenticated is carried out for mobile terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050039050A1 (en) * 2003-02-10 2005-02-17 Lionel Morand Method and a system for authenticating a user at a network access while the user is making a connection to the Internet
US20120256725A1 (en) * 2005-03-23 2012-10-11 Ihc Corporation Authentication system
US20070174904A1 (en) * 2006-01-24 2007-07-26 Samsung Electronics Co., Ltd. One-time password service system using mobile phone and authentication method using the same
US20070180503A1 (en) * 2006-01-25 2007-08-02 Chia-Hsin Li IMX session control and authentication
US20080184349A1 (en) * 2007-01-30 2008-07-31 Ting David M T System and method for identity consolidation
US20130067552A1 (en) * 2010-11-06 2013-03-14 Qualcomm Incorporated Authentication in secure user plane location (supl) systems
US20160087957A1 (en) * 2013-04-26 2016-03-24 Interdigital Patent Holdings, Inc. Multi-factor authentication to achieve required authentication assurance level
US20160226848A1 (en) * 2015-01-30 2016-08-04 Aruba Networks, Inc. Authentication survivability for assigning role and vlan based on cached radius attributes

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113207117A (en) * 2021-04-14 2021-08-03 东智安通(北京)科技有限公司 Shared reduction optimization method and device based on IMEI reduction success rate
CN113271584A (en) * 2021-04-14 2021-08-17 东智安通(北京)科技有限公司 IMEI time-sharing restoration method and device
RU2780029C1 (en) * 2021-06-24 2022-09-19 Николай Сергеевич Лагуткин Method for identification of an online user and his device
US12101314B1 (en) * 2023-08-07 2024-09-24 Stodge Inc. Low latency and redundant proof of possession for content subscription

Also Published As

Publication number Publication date
GB2573262A (en) 2019-11-06
GB201803719D0 (en) 2018-04-25
HK1248463A2 (en) 2018-10-12
CN108924818A (en) 2018-11-30
GB2573262B (en) 2022-04-13
US10390226B1 (en) 2019-08-20

Similar Documents

Publication Publication Date Title
US10390226B1 (en) Mobile identification method based on SIM card and device-related parameters
CN110800331B (en) Network verification method, related equipment and system
US10063377B2 (en) Network-based authentication for third party content
CN112566050B (en) Cellular service account transfer for an accessory wireless device
US11082838B2 (en) Extensible authentication protocol with mobile device identification
CN108476223B (en) Method and apparatus for SIM-based authentication of non-SIM devices
US9225706B2 (en) Multiple access point zero sign-on
US9300474B2 (en) Enhanced authentication and/or enhanced identification of a secure element of a communication device
US11917404B2 (en) Cellular network authentication utilizing unlinkable anonymous credentials
US20110302643A1 (en) Mechanism for authentication and authorization for network and service access
US11271922B2 (en) Method for authenticating a user and corresponding device, first and second servers and system
KR20090036562A (en) Method and system for controlling access to networks
TWI598762B (en) A network system, method and mobile device based on remote user authentication
US20130183934A1 (en) Methods for initializing and/or activating at least one user account for carrying out a transaction, as well as terminal device
US11968531B2 (en) Token, particularly OTP, based authentication system and method
GB2547231A (en) Apparatus, method and computer program product for use in authenticating a user
US20220353260A1 (en) Systems and methods for multi-level authentication
EP2961208A1 (en) Method for accessing a service and corresponding application server, device and system
US20230010440A1 (en) System and Method for Performing Identity Management
CN116868609A (en) User equipment authentication and authorization procedure for edge data networks
EP3402238A1 (en) Efficient user authentications
CN117678255A (en) Edge enabler client identification authentication procedure

Legal Events

Date Code Title Description
AS Assignment

Owner name: BENEFIT VANTAGE LIMITED, HONG KONG

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHEUNG, HARRY LUP SUN;REEL/FRAME:045314/0816

Effective date: 20180313

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4