IDENTITY REQUEST CONTROL FOR USER EQUIPMENT
摘要:
Techniques are provided for protecting the privacy of user equipment during identity request operations in a communication system. In one example, a method includes receiving a current identity request at given user equipment of a communication system. The method further includes making a determination at the given user equipment whether or not to respond to the current identity request in a manner requested based on a count of previous identity requests received by the given user equipment.
公开/授权文献
信息查询
0/0