Browse Prior Art Database

Identity dependent Application Accounts auto-detection and auto-change method

IP.com Disclosure Number: IPCOM000249013D
Publication Date: 2017-Jan-26
Document File: 3 page(s) / 76K

Publishing Venue

The IP.com Prior Art Database

Abstract

Multiple applications use phone number registered as authentication method (pin code) or account name. When the phone number is changed or expired, this invention provides a method to use the real phone number / virtual number mappings to update the applications with new phone number in a timely way.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

1

Identity dependent Application Accounts auto-detection and auto-change method

1. Background Multiple applications use phone number registered as authentication method (pin code) or account name. Two-step calibration (like password and pin code) is commonly used in applications. It is highly possible that phone number is changed or expired. Each application’s dependency on the phone number needs to be updated to the new number manually and one-by-one, which takes too much effort. Here are a list of key problems:

It is hard to remember all the applications associated with the phone number. When phone number is changed, some dependent applications are not updated with the new number timely. As a result, when you a) log in the relevant  application and it requires two-step-calibration, or b) forget the password of the application and try to reset it, the pin code is sent to the old phone number which is invalid.

2. Summary of Invention There are five main points of this invention:

Virtual number is generated to be used for text message purpose. - Virtual number can be personal ID + MD5. - Telecommunication vendors maintain the mappings between real phone number and the virtual number in their repositories. Application vendor keeps mapping between Virtual number and real phone number Telecom Companies also keep the mapping Virtual Number and Phone number Application vendor uses the Virtual Number to get the phone number from Telecom Companies Application vendor updates the Virtual Number and phone number

3. Description of Invention

2

3

The work flow of this invention can be described as below:

Step 1: Telecommunication vendors maintain the mappings between real phone number and its virtual number in their repositories. Step 2: When an end user registers a new application, he(she) provides the user account, virtual number and real phone to the application in order to  receive a SMS containing pin code. Step 3: The application vendor receives the virtual number and real phone number pair, and sends the SMS containing pin code to the real phone number. Step 4: If application vendor receives the correct pin code from end user, it stores the relationship among end user account, real phone number and virtual...