摘要 |
<p>A virtual identifier is established for a first user equipment (100), after which the identifier is linked with the characteristic identifier of the equipment. The virtual identifier is then used for communication between the first user equipment and second user equipment (102). An independent claim is also included for an arrangement for concealing the true identity of a user.</p> |