Method and system for phone-number discovery and phone-number authentication for mobile communications devices
First Claim
1. A method for obtaining, by a local computational entity running on a mobile communications device, information associated with a mobile communications device that is not directly available to the local computational entity, the method comprising:
- sending a request message by the computational entity to a remote computational entity; and
receiving, by the local computational, the information associated with the mobile communications device from the remote computational entity in a response message.
6 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention are directed to methods and systems by which a client application program running on a mobile communications device can determine the telephone number associated with the mobile communications device and communicate the telephone number to a remote computing entity in a secure and verifiable fashion. In one embodiment of the present invention, a client application program running on a mobile communications device sends an SMS message to a remote server, allowing the remote server to determine the telephone number associated with the mobile communications device and return the determined telephone number to the client application program in a SMS response message. In another embodiment of the present invention, a client application program running on a mobile communications device can prove to a remote computing entity that the client application'"'"'s program is running on a mobile communications device associated with a particular telephone number. The client application'"'"'s program and remote computing entity exchange information in SMS messages, and the client application program finally transmits secret information obtained from the remote computing entity back to the remote server via WAP-based communications.
64 Citations
20 Claims
-
1. A method for obtaining, by a local computational entity running on a mobile communications device, information associated with a mobile communications device that is not directly available to the local computational entity, the method comprising:
-
sending a request message by the computational entity to a remote computational entity; and
receiving, by the local computational, the information associated with the mobile communications device from the remote computational entity in a response message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for securely authenticating, to a remote computational entity, information associated with a mobile communications device by a local computational entity running on the mobile communications device, the method comprising:
-
sending a local public encryption key by the local computational entity to the remote computational entity in a first message via a first communications medium;
receiving, from the remote computational entity, a second message encrypted using the local public encryption key that contains secret information provided by the remote computational entity via the first communications medium;
decrypting the second message using a private local decryption key; and
sending the secret information by the local computational entity to the remote computational entity via a second communications medium. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification