Transport agnostic authentication of wireless devices
First Claim
1. In a receiving computing system that is configured to communicate with a wireless device over a carrier network, a method for authenticating the wireless device comprising the following:
- an act of receiving a request for service from the wireless device over a first data transport mechanism available over the carrier network;
an act of reading a telephone number from the request for service;
an act of dispatching a response to the request to the wireless device over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and
an act of receiving a communication from the wireless device that evidences that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for service as being associated with the wireless device. However, the authentication key is dispatched over a different data transport mechanism. For example, the request may be submitted using an IP data transport mechanism, while the authentication key is returned using an SMS data transport mechanism. The wireless device then evidences, through appropriate communication, that the wireless device both submitted the request and received the response. Accordingly, the telephone number is verified as being associated with the telephone number.
-
Citations
20 Claims
-
1. In a receiving computing system that is configured to communicate with a wireless device over a carrier network, a method for authenticating the wireless device comprising the following:
-
an act of receiving a request for service from the wireless device over a first data transport mechanism available over the carrier network; an act of reading a telephone number from the request for service; an act of dispatching a response to the request to the wireless device over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and an act of receiving a communication from the wireless device that evidences that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for use in a receiving computing system that is configured to communicate with a wireless device over a carrier network, the computer program product for implementing a method for authenticating the wireless device, the computer program product comprising one or more computer-readable media having thereon the following:
-
computer-executable instructions for detecting receipt of a request for service from the wireless device over a first data transport mechanism available over the carrier network; computer-executable instructions for reading a telephone number from the request for service; computer-executable instructions for causing a response to the request to be dispatched to the wireless device over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and computer-executable instructions for receiving a communication from the wireless device that evidences that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key. - View Dependent Claims (10)
-
-
11. In a wireless device that is configured to communicate with a receiving computing system over a carrier network, a method for the wireless device supporting its own authentication to the receiving computing system comprising the following:
-
an act of dispatching a request for service to the receiving computing system over a first data transport mechanism available over the carrier network, the request for service including a telephone number of the wireless device; an act of receiving a response to the request over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and an act of dispatching a communication to the receiving computing system that evidences that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for use in a wireless device that is configured to communicate with a receiving computing system over a carrier network, the computer program product for implementing a method for the wireless device supporting its own authentication to the receiving computing system, the computer program product comprising one or more computer-readable media having thereon the following:
-
computer-executable instructions for causing a request for service to be dispatched to the receiving computing system over a first data transport mechanism available over the carrier network, the request for service including a telephone number of the wireless device; computer-executable instructions for detecting receipt of a response to the request over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and computer-executable instructions for causing a communication to be dispatched to the receiving computing system, the communication evidencing that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key. - View Dependent Claims (20)
-
Specification