Transport agnostic authentication of wireless devices
First Claim
1. A receiving computing system that is configured to communicate with a wireless device over a carrier network and for authenticating the wireless device, the computing system comprising:
- a processor for executing computer-executable instructions; and
one or more computer-readable media having computer-executable instructions for implementing a method for authenticating the wireless device stored thereon, wherein the method comprises;
an act of receiving a request for service from the wireless device over a first data transport mechanism available over the carrier network;
an act of reading a telephone number from the request for service;
an act of dispatching a response to the request to the wireless device over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and
an act of receiving a communication from the wireless device that evidences that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for service as being associated with the wireless device. However, the authentication key is dispatched over a different data transport mechanism. For example, the request may be submitted using an IP data transport mechanism, while the authentication key is returned using an SMS data transport mechanism. The wireless device then evidences, through appropriate communication, that the wireless device both submitted the request and received the response. Accordingly, the telephone number is verified as being associated with the telephone number.
24 Citations
19 Claims
-
1. A receiving computing system that is configured to communicate with a wireless device over a carrier network and for authenticating the wireless device, the computing system comprising:
-
a processor for executing computer-executable instructions; and one or more computer-readable media having computer-executable instructions for implementing a method for authenticating the wireless device stored thereon, wherein the method comprises; an act of receiving a request for service from the wireless device over a first data transport mechanism available over the carrier network; an act of reading a telephone number from the request for service; an act of dispatching a response to the request to the wireless device over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and an act of receiving a communication from the wireless device that evidences that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A wireless device that is configured to communicate with a receiving computing system over a carrier network and that is further configured for implementing a method for supporting its own authentication to the receiving computing system, the wireless device comprising:
-
a processor for executing computer-executable instructions; and one or more computer-readable media having stored thereon computer-executable instructions for implementing the method for the wireless device supporting its own authentication to the receiving computing system, wherein the method comprises; an act of dispatching a request for service to the receiving computing system over a first data transport mechanism available over the carrier network, the request for service including a telephone number of the wireless device; an act of receiving a response to the request over a second data transport mechanism available over the carrier network, the response to the request including a security key, the second data transport mechanism using the telephone number to address the wireless device; and an act of dispatching a communication to the receiving computing system that evidences that the wireless device both sent the request and received the response, the communication including data that is at least derived from the security key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification