Method and system for phone-number discovery and phone-number authentication for mobile communications devices
First Claim
1. A method for obtaining, by a local computational entity running on a mobile communications device, information associated with said mobile communications device that is not directly available to the local computational entity, the method comprising:
- sending a request message by the local computational entity to a remote computational entity requesting specific information previously associated with said mobile communications device; and
receiving, by the local computational entity, said requested information previously associated with the mobile communications device from the remote computational entity in a response message.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems by which a client application program running on a mobile communications device can determine the telephone number associated with the mobile device and communicate the telephone number to a remote computing entity in a secure and verifiable fashion are presented herein. In one embodiment, a client application program running on a mobile device sends an SMS message to a remote server, allowing the remote server to determine the telephone number associated with the mobile device and return the determined number to the client application program in a SMS response message. A client application program running on a mobile device may also prove to a remote computing entity that the program is running on the device. The client program and remote entity may exchange information in SMS messages, and the client program may transmit information obtained from the remote entity to the remote server via WAP-based communications.
-
Citations
26 Claims
-
1. A method for obtaining, by a local computational entity running on a mobile communications device, information associated with said mobile communications device that is not directly available to the local computational entity, the method comprising:
-
sending a request message by the local computational entity to a remote computational entity requesting specific information previously associated with said mobile communications device; and receiving, by the local computational entity, said requested information previously associated with the mobile communications device from the remote computational entity in a response message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for securely authenticating, to a remote computational entity, information associated with a mobile communications device by a local computational entity running on the mobile communications device, the method comprising:
-
sending a local public encryption key by the local computational entity to the remote computational entity in a first message via a first communications medium; receiving, from the remote computational entity, a second message encrypted using the local public encryption key that contains secret information provided by the remote computational entity via the first communications medium; decrypting the second message using a private local decryption key; and sending the secret information by the local computational entity to the remote computational entity via a second communications medium. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A mobile communications device comprising:
a computational entity local to said mobile communications device, configured to obtain information associated with said mobile communications device that is not directly available to said local computational entity; means for sending a request message to a remote computational entity to request specific information previously associated with said mobile communications device; and means for receiving said requested information previously associated with said mobile communications device from said remote computational entity in a response message. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
25. A mobile communications device comprising:
a locally based application configured to securely authenticate, to a remote computational entity, information associated with said mobile communications device; apparatus for sending a local public encryption key by said local computational entity to said remote computational entity in a first message via a first communications medium; apparatus for receiving, from said remote computational entity, a second message encrypted using the local public encryption key that contains secret information provided by said remote computational entity via said first communications medium; apparatus for decrypting said second message using a private local decryption key; and apparatus for sending said secret information by said local computational entity to said remote computational entity via a second communications medium. - View Dependent Claims (26)
Specification