The document discusses using the Nexmo API for various telecom applications. It provides documentation links and sample use cases for sending alerts and invites using SMS, verifying identity with two-factor authentication, proxying SMS for privacy, using SMS as a data pipeline, virtualizing phone numbers, and requesting feedback via SMS. The call to action promotes using the Nexmo API for two-way communication and various industries like healthcare, retail, social media, travel, finance, and more.
5. 1.0 Sending Alerts & Invites
Alerts
1. Suspect activity takes place
2. Alert sent to users phone
Social Invites
1. Sarah Installs your app
2. Selects contacts to invite
3. Effectively and selectively send invites
6. 2.0 Verify Identity During Sign Up/Sign In
Client Side
1. Jack signs onto your site
2. He receives a one time code
on his mobile
3. Provides the code he was
sent to verify his identity with
the server
Server Side
1. Login configured for 2FA
2. Code generated, stored, and
sent via SMS
3. Server verifies Jack’s identity
by checking the code entered
with the stored code
7. 3.0 Proxy SMS for Privacy
User 1: Bob
1. Bob wants to
message Alice
anonymously
2. He is given a
proxied number
3. Sends a message
Server
1. Checks sender to
find that its Bob
2. Queries for Bob’s
conversation
3. Sends Bob’s
message to Alice
User 2: Alice
1. Receives the
message from the
proxied number
2. Replies to Bob
3. Process repeats
8. 4.0 Pipeline Data: Using SMS as a
channel
Device monitoring data inputs
1. An event outside of normal parameters occurs where wireless
internet connection is unavailable
2. The device sends an SMS immediately upon being triggered, or
on a schedule
3. The SMS becomes an HTTP request to a server
4. Data is accessible and near real-time
9. 5.0 Virtualize Numbers
Provide SMS without a phone
1. Sarah needs to send and receive without a phone
2. She’s provided a virtual number
3. She sends a new message from the application
4. Outbound messages are relayed via SMS
5. Tom sends Sarah’s virtual number a message via SMS
6. The message is relayed to the application where Sarah receives
it
Use Case 1
10. 5.1 Virtualize Numbers
Send SMS from a different number e.g. work vs
home
1. Sarah needs to send and receive without using her personal
number
2. She’s provided a virtual number, and can reply, or load her
contacts
3. Tom sends her virtual number an SMS
Use Case 2
11. 5.2 Virtualize Numbers
Have two way SMS conversations virtually
1. Sarah needs to send and receive without using her personal
number
2. She’s provided a virtual number, and can reply, or load her
contacts
3. Tom is assigned a virtual number
4. He sends an SMS
5. Inbound SMS is relayed using Tom’s virtual number
Use Case 3
12. 6.0 Request Feedback
Allow users to send in feedback through SMS
1. Jerry gives a speech
2. He needs a way to gather feedback
3. He provides a number that users can respond to via SMS
4. Feedback is stored in application for analysis