throbber
USOO8302175B2
`
`(12) United States Patent
`Thoursie et a].
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 8,302,175 B2
`Oct. 30, 2012
`
`(54) METHOD AND SYSTEM FOR ELECTRONIC
`REAUTHENTICATION OF A
`COMMUNICATION PARTY
`
`(58) Field of Classi?cation Search ..................... .. 726/9
`See application ?le for complete search history.
`R f
`C, d
`e erences lte
`
`56
`
`(75) Inventors: Anders Thoursie, Nacka (SE); Peter
`HOhn’ SOHemuna (SE); sven-Hékan
`Olsson’ StOCkh°1m(SE)
`
`_
`(73) ASSlgneei D0¢A¢¢01111t AB, Nacka (SE)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term ofthis
`
`379/243
`ZofUll/IEIFTS
`5 588 051
`er 0W1 Z c a .
`.......... ..
`,
`,
`380/271
`9/1997 Falk et a1. ............ ..
`5,668,876 A *
`6,175,831 B1* 1/2001 Weinreich et a1. .................. .. 1/1
`7,239,688 B1 *
`7/2007 Sayko et a1. ............. .. 379/9302
`2002/0004831 A1
`1/2002 Woodhill
`*
`Rl/I?nciifgeistlet 31~ ~~~~~~~ ~~ 713/201
`
`'
`
`'
`
`ue er 6 a .
`
`Patent 15 mended or adluswd under 35
`U-S-C- 154(1)) by 914 days-
`
`2004/0243832 A1 * 12/2004 Wilf et a1. ................... .. 713/200
`2005/0215306 A1* 9/2005 O’Donnell et a1. ........... .. 463/17
`
`(21) Appl_ No;
`
`11/918,877
`
`(22) PCT Filed:
`
`Apr. 20, 2005
`
`86 PCT No.:
`§ 371 (0X1),
`(2), (4) Date:
`
`PCT/SE2005/000568
`
`Oct. 19, 2007
`
`(87) PCT Pub. No.: WO2006/112761
`
`PCT Pub. Date: Oct. 26, 2006
`
`(65)
`
`PriOl‘ PublicatiOIl Data
`Us 2009/0106829 A1
`A r 23 2009
`p '
`’
`
`(51) Int. Cl.
`G06F 7/04
`
`(2006 01)
`
`FOREIGN PATENT DOCUMENTS
`1 102 150
`5/2001
`EP
`* Cited by examiner
`
`ABSTRACT
`
`Primar Examiner i Cordelia Zecher
`y
`(74) Attorney, Agent, or Firm * Harness, Dickey & Pierce,
`P'L'C'
`57
`.
`.
`.
`(
`)
`The present 1nventlon relates to a method for electromc reau
`thentication of a communication party (12, 22). The method
`further relates to a device for electronic reauthentication of a
`communication party. A basic idea of the present invention is
`to have a communication party, Which employs a service,
`state two different communication addresses, one being a
`telephone number, via Which the communicating party may
`.
`.
`.
`authent1cate herself to a prowder (11, 21) of the serV1ce.
`
`(52) US. Cl. ......................................................... .. 726/9
`
`41 Claims, 2 Drawing Sheets
`
`29
`
`K
`
`28
`
`(23’) (23")
`
`(23 )
`
`I"
`
`,
`
`21
`
`(24)
`(25)
`
`(27)
`<—_————
`
`[L1—
`
`(30)
`(31)
`
`(32)
`(33)
`
`TWILIO, INC. EX. 1007
`Page 1
`
`

`
`US. Patent
`
`Oct. 30, 2012
`
`Sheet 1 0f 2
`
`US 8,302,175 B2
`
`(14)
`(15)
`
`(16)
`(11)
`
`4
`
`<
`
`12
`
`w
`
`A
`
`(13’)
`(13”)
`(13”!)
`
`11
`
`FIG. 1
`
`TWILIO, INC. EX. 1007
`Page 2
`
`

`
`US. Patent
`
`0a. 30, 2012
`
`Sheet 2 0f2
`
`US 8,302,175 B2
`
`29
`
`/
`\
`
`28
`\
`
`‘
`
`4
`
`(23’)
`(23")
`23”!
`(
`) j 4
`
`21
`
`‘
`
`22
`\
`~22
`A
`
`(24)
`(25)
`
`(26)
`(27)
`
`(30)
`(31)
`
`(32)
`
`(33)
`
`>
`
`>
`
`>
`
`>
`
`FIG. 2
`
`TWILIO, INC. EX. 1007
`Page 3
`
`

`
`US 8,302,175 B2
`
`1
`METHOD AND SYSTEM FOR ELECTRONIC
`REAUTHENTICATION OF A
`COMMUNICATION PARTY
`
`This application is a National Phase of PCT Application
`No. PCT/SE2005/000568 ?led on Apr. 20, 2005, which
`claims priority under 35 U.S.C. §365(c).
`
`TECHNICAL FIELD OF THE INVENTION
`
`The present invention relates to a method for electronic
`reauthentication of a communication party. The method fur
`ther relates to a device for electronic reauthentication of a
`communication party.
`
`BACKGROUND ART
`
`Today companies and organizations communicate with
`their customers and other parties via the Internet to an ever
`increasing extent. In these situations, the companies and orga
`nizations need to ensure that a speci?c party is the same party
`they communicated with at an earlier occasion.
`One way to ensure this is to provide the communication
`party with a code or a user name and password. Ifa person is
`able to replicate the code at a later occasion, this replication is
`considered to be an indication that it is the same person who
`previously received the code.
`The use of codes or passwords as authenticating means has
`the disadvantage that there is a risk that an unauthorized
`person acquires these authenticating means. In today’s soci
`ety, people also need to learn and memorize codes to an
`ever-increasing extent, e. g. to use various services on the
`Internet or to use credit cards. This fact increases the risk that
`people will start to write down codes, making them easier for
`other people to acquire. It also makes these solutions less
`user-friendly, since it becomes considerably harder for people
`to remember all the codes. There is also a risk that so called
`brute force attacks or dictionary based attacks are used to ?nd
`out and acquire passwords.
`In many situations, code- or password-based solutions are
`hence considered insuf?cient. Instead, there is a need to intro
`duce another mechanism which the communication party can
`controliwhich is more secure yet easy-to-use. Hence, the
`following features are desirable for such a mechanism:
`The user is able to protect authenticating means, e.g. pass
`words, from being stolen.
`A possible theft of authentication means is easily discov
`ered.
`The effect of a possible theft of authenticating means can
`be reduced, e.g. through a procedure of revoking the
`authenticating means.
`It should be easy for companies to start using the mecha
`nism on a wide basis, e.g. as a means for administering
`the communication with a great number of communica
`tion parties.
`The mechanism should be easy-to-use and straightforward
`from a user perspective.
`There are currently available solutions that meet these
`requirements to some degree. One example is the usage of
`card-based certi?cates, based on Public Key Infrastructure,
`PKI, as a tool for identi?cation. A card-based certi?cate can
`be protected. A stolen certi?cate may easily be identi?ed. If it
`is stolen, it may be revoked. However, the card-based tech
`nology requires an infrastructure that is not yet widely spread,
`as well as being relatively complex to implement to any
`greater extent.
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`An alternative is to use ?le-based certi?cates based on
`Public Key Infrastructure. These are more widely spread than
`card-based certi?cates, but are still by many considered not
`suf?ciently spread and available to citizens and consumers.
`
`SUMMARY OF THE INVENTION
`
`An object of the invention is to alleviate the problems of
`prior art through providing a straightforward and easy-to-use
`method for electronic reauthentication.
`This object is accomplished by a method of electronic
`reauthentication of a communication party in accordance
`with claim 1, and a device for electronic reauthentication of a
`communication party in accordance with claim 21.
`According to a ?rst aspect of the present invention, a
`method is provided of electronically reauthenticating a com
`munication party. First, an association between a telephone
`communication address of the communication party, an addi
`tional communication address of the communication party
`and the communication party itself, which association serves
`as a basis for future authentication of the communication
`party, is created. Then, a request is received from a requesting
`communication party and it is veri?ed that an association
`exists for the requesting communication party. A ?rst con?r
`mation token is distributed to the requesting communication
`party over a ?rst communication channel and a second con
`?rmation token is received from the requesting communica
`tion party over a second communication channel, wherein at
`least one of the ?rst and the second channel is established by
`using the telephone communication address of the associa
`tion for the requesting communication party. Thereafter, cor
`respondence is veri?ed between the ?rst con?rmation token
`and the second con?rmation token. A third con?rmation
`token is distributed over a third communication channel to the
`requesting communication party and a fourth con?rmation
`token is received from the communication party over a fourth
`communication channel, wherein at least one of the third and
`the fourth channel is established by using the additional com
`munication address of the association for the requesting com
`munication party. Further, correspondence is veri?ed
`between the third con?rmation token and the fourth con?r
`mation token, wherein the requesting communication party is
`considered to be authenticated.
`If the request comprises a request to create an association
`for a further telephone communication address, a ?fth con
`?rmation token is distributed to the requesting communica
`tion party over a ?fth communication channel and a sixth
`con?rmation token is received from the requesting commu
`nication party over a sixth communication channel, wherein
`at least one of the ?fth and the sixth channel is established by
`using said further telephone communication address of the
`request. Then, correspondence is veri?ed between the ?fth
`con?rmation token and the sixth con?rmation token and an
`association between said further telephone communication
`address of the requesting communication party, said addi
`tional communication address and the requesting communi
`cation party itself is created, which association serves as a
`basis for future authentication of the requesting communica
`tion party.
`If the request comprises a request to create an association
`for a further additional communication address, a seventh
`con?rmation token is distributed to the requesting communi
`cation party over a seventh communication channel and an
`eighth con?rmation token is received from the requesting
`communication party receiving over an eighth communica
`tion channel, wherein at least one of the seventh and the
`eighth channel is established by using said further additional
`
`TWILIO, INC. EX. 1007
`Page 4
`
`

`
`US 8,302,l75 B2
`
`3
`communication address of the request. Correspondence is
`veri?ed between the seventh con?rmation token and the
`eighth con?rmation token and an association between said
`further additional communication address of the requesting
`communication party, said telephone communication address
`and the requesting communication party itself is created,
`which association serves as a basis for future authentication
`of the requesting communication party.
`According to a second aspect of the present invention, a
`device is provided for electronic reauthentication of a com
`munication party comprising means for creating an associa
`tion between a telephone communication address of the com
`munication party, an additional communication address of
`the communication party and the communication party itself,
`which association serves as a basis for future authentication
`of the communication party and means for storing the asso
`ciation. Further, the device comprises means for receiving a
`request from a requesting communication party, means for
`verifying that an association exists for the requesting com
`munication party, means for distributing, over a ?rst commu
`nication channel, a ?rst con?rmation token to the requesting
`communication party and means for receiving, over a second
`communication channel, a second con?rmation token from
`the requesting communication party, wherein at least one of
`the ?rst and the second channel is established by using the
`telephone communication address of the association for the
`requesting communication party. Moreover, the device com
`prises means for verifying correspondence between the ?rst
`con?rmation token and the second con?rmation token, means
`for distributing, over a third communication channel, a third
`con?rmation token to the requesting communication party,
`means for receiving, over a fourth communication channel, a
`fourth con?rmation token from the communication party,
`wherein at least one of the third and the fourth channel is
`established by using the additional communication address of
`the association for the requesting communication party and
`means for verifying correspondence between the third con
`?rmation token and the fourth con?rmation token, wherein
`the requesting communication party is considered to be
`authenticated.
`Further, the device comprises means for distributing, if the
`request comprises a request to create an association for a
`further telephone communication address, over a ?fth com
`munication channel, a ?fth con?rmation token to the request
`ing communication party, means for receiving, over a sixth
`communication channel, a sixth con?rmation token from the
`requesting communication party, wherein at least one of the
`?fth and the sixth channel is established by using said further
`telephone communication address of the request, means for
`verifying correspondence between the ?fth con?rmation
`token and the sixth con?rmation token, means for creating an
`association between said further telephone communication
`ad-dress of the requesting communication party, said addi
`tional communication address and the requesting communi
`cation party itself, which association serves as a basis for
`future authentication of the requesting communication party.
`Finally, the device comprises means for distributing, if the
`request comprises a request to create an association for a
`further additional communication address, over a seventh
`communication channel, a seventh con?rmation token to the
`requesting communication party, means for receiving, over
`an eighth communication channel, an eighth con?rmation
`token from the requesting communication party, wherein at
`least one of the seventh and the eighth channel is established
`by using said further additional communication address of the
`request, means for verifying correspondence between the
`seventh con?rmation token and the eighth con?rmation
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`token, means for creating an association between said further
`additional communication address of the requesting commu
`nication party, said telephone communication address and the
`requesting communication party itself, which association
`serves as a basis for future authentication of the requesting
`communication party.
`A basic idea of the present invention is to have a commu
`nication party, which employs a service, state two different
`communication addresses, one being a telephone number, via
`which the communicating party may authenticate herself to a
`provider of the service.
`A relation with the communication party, in the following
`referred to as a user, is established by con?rming user control
`of the telephone communication address and an additional
`communication address. Initially, an association between the
`telephone communication address of the user, the additional
`communication address of the user and the user herself are
`created. When receiving a request from a user, which user not
`necessarily is the same as the user for which an association is
`created, it must be veri?ed that an association exists for this
`requesting user. The con?rmation of the requesting user’s
`control of the telephone communication address of the asso
`ciation is made by distributing a ?rst con?rmation token over
`a ?rst communication channel to the requesting user, receiv
`ing a second con?rmation token over a second communica
`tion channel from the requesting user and then verifying that
`the two tokens are the same. At least one of the two commu
`nication channels should be established by means of using the
`telephone communication address of the association of the
`requesting user. In this way it is ensured that the requesting
`user is in control of the device which is designated by the
`telephone communication address. For instance, in case the
`telephone communication address is a telephone number, the
`requesting user shows, by sending a second token that is
`identical to the ?rst token, that she actually is in possession of
`the telephone linked to the telephone number to which the
`?rst token was sent, and authentication of the requesting user
`is hence made.
`To further strengthen authentication validity, con?rmation
`of the requesting user’s control of the additional communi
`cation address of the association is made by distributing a
`third con?rmation token over a third communication channel
`to the requesting user, receiving a fourth con?rmation token
`over a fourth communication channel from the requesting
`user and then verifying that the two tokens are the same. At
`least one of the two communication channels shouldbe estab
`lished by means of using the additional communication
`address of the association of the requesting user. In this way,
`it is ensured that the requesting user is in control of the means
`which is designated by the additional communication
`address. For instance, in case the additional communication
`address is an e-mail address, the requesting user shows, by
`sending a fourth token that is identical to the third token, that
`she actually is in possession of the e-mail account linked to
`the e-mail address to which the third token was sent, and
`authentication of the requesting user is hence made again.
`The request of the user may for instance be to access an
`account which the user has at the service provider. The
`request may also be to create an association for a further
`telephone communication address and/ or a further additional
`communication address. Alternatively, the request may com
`prise both an access request and an association request.
`If the user request comprises a request to create an asso
`ciation for a further telephone communication address, a ?fth
`con?rmation token is distributed to the requesting user over a
`?fth communication channel and a sixth con?rmation token
`is received from the requesting user over a sixth communica
`
`TWILIO, INC. EX. 1007
`Page 5
`
`

`
`US 8,302,175 B2
`
`5
`tion channel. Then, it is veri?ed that the two tokens are the
`same. At least one of the two communication channels should
`be established by means of using the further telephone com
`munication address of the request. In analogy with the
`description above, authentication is made, and an association
`between the further telephone communication address of the
`requesting communication party, the additional communica
`tion address and the requesting communication party itself is
`created, which association serves as a basis for future authen
`tication of the requesting communication party.
`Moreover, if the user request comprises a request to create
`an association for a further additional communication
`address, a seventh con?rmation token is distributed to the
`requesting user over a seventh communication channel and an
`eighth con?rmation token is received from the requesting
`user over an eighth communication channel. Then, it is veri
`?ed that the two tokens are the same. At least one of the two
`communication channels should be established by means of
`using the further additional communication address of the
`request. Again, authentication is made and an association is
`created between the further additional communication
`address of the requesting communication party, the telephone
`communication address and the requesting communication
`party itself, which association serves as a basis for future
`authentication of the requesting communication party.
`Note that the pair of communication channels, i.e. the ?rst
`and second channel for the telephone communication
`address, the third and fourth channel for the additional com
`munication address, etc., may comprise the same physical
`channel, but the two channels of each pair may also be sepa
`rate. Typically, separated channels imply a higher level of
`security (with respect to e.g. eavesdropping) in transferring
`the respective tokens across the corresponding channel. Also
`note that the tokens delivered to the communication party, i.e.
`the ?rst con?rmation token, the third con?rmation token, the
`?fth con?rmation token, etc., preferably differ from each
`other such that con?rmation tokens cannot be reused by any
`malicious party.
`In accordance with an embodiment of the present inven
`tion, the initial measure to create an association between the
`telephone communication address of the user, the additional
`communication address of the user and the user herself is
`preceded by authenticating the user in conformity with the
`authentication method described in the above. First, the tele
`phone communication address and the additional communi
`cation address of the user are received. Then, tokens are
`delivered to and received from the user in a manner as previ
`ously described, wherein the user is authenticated by means
`of using the telephone communication address and the addi
`tional communication address for which the association is
`created. Note that the communication channels used in this
`embodiment may be the same as the communication channels
`used after the association has been made. For example, a
`mobile telephone channel may be employed one day for
`establishing contact with the user by using the user’s tele
`phone communication address and an IP telephony channel
`may be used another day for establishing contact with the
`same user via the telephone communication address.
`In another embodiment of the invention, the user is pro
`vided with the possibility of revoking a telephone communi
`cation address and/or a stored additional communication
`address. This is performed by disassociating the concerned
`communication address with the association in which it is
`comprised.
`In another embodiment of the invention, the users are made
`aware of the telephone communication address of the party
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`administering and managing the authentication of the user, to
`further increase the security of the authentication.
`In yet an embodiment of the invention, the ?rst con?rma
`tion token is distributed over a communication channel that is
`established using the telephone communication address. If
`so, the second con?rmation token could either be distributed
`over the same telephone communication channel or over a
`digital network, which in a further embodiment is the Inter
`net.
`A communication channel that is established using the
`telephone communication address could for instance be an IP
`telephone communication channel, a “regular” voice tele
`phone communication channel using for example PSTN or
`GSM (or some other type of mobile phone system) or a
`combination of the two. The con?rmation tokens could then
`be comprised in e.g. voice messages, SMS, MMS or instant
`messaging messages. Con?rmation tokens may be generated
`by means of using touch-tone signaling.
`Note that the steps of electronically reauthenticating a
`communication party need not be performed in the order
`given in the method de?ned by the claims.
`Further features of, and advantages with, the pre-sent
`invention will become apparent when studying the appended
`claims and the following description. Those skilled in the art
`realize that different features of the present invention can be
`combined to create embodiments other than those described
`in the following.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`A detailed description of preferred embodiments of the
`present invention will be given with reference made to the
`accompanying drawing, in which:
`FIG. 1 illustrates the method and device in accordance with
`an embodiment of the present invention; and
`FIG. 2 illustrates the method and device in accordance with
`another embodiment of the present invention.
`Corresponding elements are denoted with corresponding
`reference numbers in the drawings.
`
`DETAILED DESCRIPTION OF PREFERRED
`EMBODIMENTS OF THE INVENTION
`
`FIG. 1 illustrates how a company, an organization or other
`party 11 maintains and manages an electronic authentication
`of a user 12 over time. This is performed by associating a
`telephone communication address (13') with an additional
`communication address (13") and the user (13"') and storing
`the association in a storage 18. Then, it is veri?ed that the user
`is in control of the telephone communication address by
`distributing, over a ?rst communication channel, a ?rst con
`?rmation token (14) and receiving, over a second communi
`cation channel, a second con?rmation token (15), where at
`least one of the two communication channels are established
`using the telephone communication address. Finally, it is
`analogously veri?ed that the user is in control also of the
`additional communication address by distributing, over a
`third communication channel, a third con?rmation token (1 6)
`and receiving, over a fourth communication channel, a fourth
`con?rmation token (17), where at least one of the two com
`munication channels is established using said additional com
`munication address.
`The steps de?ned in the method of the present invention is
`typically performed by a computer 19 at the company 11,
`which computer executes appropriate software for perform
`ing these steps. The customer 12 is typically remotely located
`from the company 11.
`
`TWILIO, INC. EX. 1007
`Page 6
`
`

`
`US 8,302,175 B2
`
`7
`An example of the environment in which the present inven
`tion may be applied is given in the following.
`Consider a company 11 providing a service to customers
`12 over the Internet. When a customer 12 signs up for the
`service, the customer registers a telephone number, i.e. a
`telephone communication address, and an email address, i.e.
`an additional communication address, in a form on the Inter
`net home page of the company. The customer is then called on
`the telephone number and a voice reads a code to the cus
`tomer. The customer enters the code in another form on the
`Internet. The customer receives an e-mail with a further code,
`which the customer enters, which is denoted by the code, in
`yet another form on the lntemet. Thus, in analogy with the
`description of FIG. 1, an initial authentication of the customer
`has been performed. An association between the telephone
`communication address, the additional communication
`address and the customer is created and possibly stored,
`which association serves as a basis for future authentication
`of the customer.
`Now, reference is made to FIG. 2. Subsequently, i.e. after
`initial authentication has been undertaken, when the cus
`tomer 22 needs to access the service and use resources that
`should only be available to the customer at the company 21,
`i.e. through using his user account, the procedure is repeated
`using new codes. The customer requests to access the account
`(and/or to create a new association comprising new commu
`nication addresses). The customer is then called on the tele
`phone number associated with the account, a voice reads a
`code 24, and the customer enters the code 25 on the lntemet.
`The customer receives an e-mail with a further code 26 and
`enters this further code 27 in a form on the lntemet. If the
`codes are found to match in the two cases, the customer is
`granted access to the account. Consequently, an authentica
`tion of the customer has been undertaken.
`The customer may also add an alternative telephone num
`ber to be used to access the account. The customer is then
`called on the telephone number currently used to access the
`account, a voice reads a code 30 and the customer enters the
`code 31 on the lntemet. The customer receives an e-mail with
`a further code 32 to the e-mail address currently associated
`with the account and enters it 33 in a form on the lntemet. If
`the distributed code is found to match the received code in
`each of the previous rounds of authentication as well as in this
`round of authentication, the new telephone number is
`accepted and associated with the user account. An additional
`e-mail address may be added in an analog manner.
`Even though the invention has been described with refer
`ence to speci?c exemplifying embodiments thereof, many
`different alterations, modi?cations and the like will become
`apparent for those skilled in the art. The described embodi
`ments are therefore not intended to limit the scope of the
`invention, as de?ned by the appended claims.
`The invention claimed is:
`1. A method for electronic reauthentication of a communi
`cation party, said method comprising:
`creating and storing an association between a telephone
`communication address of the communication party, an
`additional communication address of the communica
`tion party and the communication party itself;
`receiving a request, which includes a request to create an
`association for a further additional communication
`address, from a requesting communication party;
`verifying that a stored association exists for the requesting
`communication party;
`distributing, over a ?rst communication channel, a ?rst
`con?rmation token to the requesting communication
`Party;
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`receiving, over a second communication channel, a second
`con?rmation token from the requesting communication
`party, wherein at least one of the ?rst and the second
`channel is established by using the telephone communi
`cation address of the association for the requesting com
`munication party;
`verifying correspondence between the ?rst con?rmation
`token and the second con?rmation token;
`distributing, over a third communication channel, a third
`con?rmation token to the requesting communication
`Party;
`receiving, over a fourth communication channel, a fourth
`con?rmation token from the communication party,
`wherein at least one of the third and the fourth channel is
`established by using an additional communication
`address of the association for the requesting communi
`cation party;
`verifying correspondence between the third con?rmation
`token and the fourth con?rmation token, wherein the
`requesting communication party is considered to be
`authenticated if one of the correspondence between the
`?rst con?rmation token and the second con?rmation
`token and the correspondence between the third con?r
`mation token and the fourth con?rmation token is found
`to match;
`distributing, over a ?fth communication channel, a ?fth
`con?rmation token to the requesting communication
`Party;
`receiving, over a sixth communication channel, which is
`separate from the ?fth communication channel, a sixth
`con?rmation token from the requesting communication
`party, wherein one of the ?fth and the sixth channel is
`established by using said further additional communica
`tion address included in the request;
`verifying correspondence between the ?fth con?rmation
`token and the sixth con?rmation token; and
`if the correspondence between the ?fth con?rmation token
`and the sixth con?rmation token is found to match,
`creating and storing an association between said further
`additional communication address of the requesting
`communication party, said telephone communication
`address and the requesting communication party itself.
`2. The method according to claim 1, wherein creating an
`association between said further telephone communication
`address of the requesting communication party, said addi
`tional communication address and the requesting communi
`cation party itself is preceded by:
`receiving the telephone communication address and the
`additional communication address of the communica
`tion party;
`distributing, over a seventh communication channel, a sev
`enth con?rmation token to the communication party;
`receiving, over an eighth communication channel, an
`eighth con?rmation token from the communication
`party, wherein at least one of the seventh and the eighth
`channel is established by using the telephone communi
`cation address;
`verifying correspondence between the seventh con?rma
`tion token and the eighth con?rmation token;
`distributing, over a ninth communication channel, a ninth
`con?rmation token to the communication party;
`receiving, over a tenth communication channel, a tenth
`con?rmation token from the communication party,
`wherein at least one of the ninth and the tenth channel is
`established by using the additional communication
`address; and
`
`TWILIO, INC. EX. 1007
`Page 7
`
`

`
`US 8,302,l75 B2
`
`verifying correspondence between the ninth con?rmation
`token and the tenth con?rmation token.
`3. The method according to claim 1, further comprising:
`revoking a telephone communication address by disasso
`ciating the telephone communication address with the
`association thereof.
`4. The method according to claim 1, further comprising:
`revoking an additional communication address by disasso
`ciating the additional communication address with the
`association thereof.
`5. The method according to cl

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket