Network invitation arrangement and method
First Claim
1. A method, comprising:
- sending a first message from a first user to an entity informing the entity of identification information of a second user, wherein the identification information includes a subscriber phone number of a mobile phone of the second user;
receiving from the entity a second message containing a key to enable the second user to communicate with the entity, wherein the entity transmits the second message upon determining that the first user is authorized to send an invitation to the second user; and
sending, from the first user to the second user, a third message containing the key and instructions, which enables the second user to send a fourth message using the key to the entity, wherein, communications between the second user and the entity are enabled upon verification by the entity that the key contained in the fourth message corresponds to the key provided by the entity to the first user and that the fourth message was received from the subscriber phone number identified by the first message.
3 Assignments
0 Petitions
Accused Products
Abstract
Method and arrangement for enabling communications between an entity operating a network including a first user, and a second user includes sending a message from the first user to the entity informing the entity of identification information of the second user interested in joining the network, sending from the entity to the first user a key to allow the second user to communicate with the entity, providing a message from the first user directly to the second user containing the key, sending a message from the second user to the entity using the key, determining whether the key sent by the second user corresponds to the key provided by the entity to the first user, and if so enabling communications between the second user and the entity. The ability of the first user to obtain a key to enable the second user to join the network is time-limited.
228 Citations
44 Claims
-
1. A method, comprising:
-
sending a first message from a first user to an entity informing the entity of identification information of a second user, wherein the identification information includes a subscriber phone number of a mobile phone of the second user; receiving from the entity a second message containing a key to enable the second user to communicate with the entity, wherein the entity transmits the second message upon determining that the first user is authorized to send an invitation to the second user; and sending, from the first user to the second user, a third message containing the key and instructions, which enables the second user to send a fourth message using the key to the entity, wherein, communications between the second user and the entity are enabled upon verification by the entity that the key contained in the fourth message corresponds to the key provided by the entity to the first user and that the fourth message was received from the subscriber phone number identified by the first message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a processor; and a memory storing instructions for controlling the processor to perform steps comprising; sending a first message from a first user to an entity informing the entity of identification information of a second user, wherein the identification information includes a subscriber phone number of a mobile phone of the second user; receiving from the entity a second message containing a key to enable the second user to communicate with the entity, wherein the entity transmits the second message upon determining that the first user is authorized to send an invitation to the second user; and sending, from the first user to the second user, a third message containing the key, and instructions for the mobile phone of the second user to send a fourth message using the key to the entity, wherein communications between the second user and the entity are enabled upon verification by the entity that the key contained in the fourth message corresponds to the key provided by the entity to the first user and that the fourth message was received from the subscriber phone number identified by the first message. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A non-transitory computer-readable medium storing instructions which, when executed by a computing device, cause the computing device to perform steps comprising:
-
receiving a first message from a first user belonging to a subscriber network, the first message providing identification information of a second user, wherein the identification information includes a subscriber phone number of a mobile phone of the second user; upon a determination that the first user is authorized to invite the second user to join the subscriber network, sending a second message to the first user, the second message including a key to allow the second user to communicate with the computing device; receiving a third message from the second user containing the key, wherein the second user received the key directly from the first user; and upon a determination that the key received from the second user corresponds to the key sent in the second message to the first user and that the message was received from the subscriber phone number identified by the first message, enabling communications between the second user and the computing device. - View Dependent Claims (38, 39, 40)
-
-
41. A system comprising:
-
a processor; and a memory storing instructions for controlling the processor to perform steps comprising; receiving a first message from a first user belonging to a subscriber network, the first message providing identification information of a second user, wherein the identification information includes a subscriber phone number of a mobile phone of the second user; upon a determination that the first user is authorized to invite the second user to join the subscriber network, sending a second message to the first user, the second message including a key; receiving a third message from the second user, the third message containing the key, wherein the second user received the key directly from the first user; and upon a determination that the key received from the second user corresponds to the key sent to the first user in the second message and that the third message was received from the subscriber phone number identified by the first message, enabling communications with the second user. - View Dependent Claims (42, 43, 44)
-
Specification