Systems and Methods for Authenticating Mobile Devices
First Claim
1. A computer-implemented method for authenticating mobile devices, the method comprising:
- receiving, from a mobile device, device identifying information for the mobile device;
communicating, to the mobile device, a base level key utilized by the mobile device to derive unique transaction specific keys to encrypt subsequent communications output by the mobile device;
receiving, from the mobile device, a communication encrypted with a unique transaction specific key;
generating, based at least in part upon the device identifying information and the base level key, a derived key; and
utilizing the derived key to decrypt the received communication and authenticate the mobile device,wherein the above operations are performed by one or more computers associated with a service provider.
6 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide systems and methods for authenticating mobile devices. Device identifying information may be received for a mobile device. A base level key may also be communicated to the mobile device. The base level key may be utilized by the mobile device to derive unique transaction specific keys to encrypt subsequent communications output by the mobile device. A communication encrypted with a unique transaction specific key may be received from the mobile device. Based at least in part upon the device identifying information and the base level key, a derived key may be generated, and the derived key may be utilized to decrypt the received communication and authenticate the mobile device. In certain embodiments, the above operations may be performed by one or more computers associated with a service provider.
-
Citations
24 Claims
-
1. A computer-implemented method for authenticating mobile devices, the method comprising:
-
receiving, from a mobile device, device identifying information for the mobile device; communicating, to the mobile device, a base level key utilized by the mobile device to derive unique transaction specific keys to encrypt subsequent communications output by the mobile device; receiving, from the mobile device, a communication encrypted with a unique transaction specific key; generating, based at least in part upon the device identifying information and the base level key, a derived key; and utilizing the derived key to decrypt the received communication and authenticate the mobile device, wherein the above operations are performed by one or more computers associated with a service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authenticating mobile devices, the system comprising:
-
at least one memory configured to store computer-executable instructions; and at least one processor configured to access the at least one memory and execute the computer-executable instructions to; receive, from a mobile device, device identifying information for the mobile device; direct communication, to the mobile device, of a base level key utilized by the mobile device to derive unique transaction specific keys to encrypt subsequent communications output by the mobile device; receive, from the mobile device, a communication encrypted with a unique transaction specific key; generate, based at least in part upon the device identifying information and the base level key, a derived key; and utilize the derived key to decrypt the received communication and authenticate the mobile device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method for authenticating a mobile device, the method comprising:
-
communicating, by a mobile device to a service provider, device identifying information for the mobile device; receiving, by the mobile device from the service provider, a base level key; utilizing, by the mobile device, the base level key to derive a unique transaction specific key; encrypting, by the mobile device utilizing the derived unique transaction specific key, a communication; and outputting, by the mobile device to the service provider, the encrypted communication, wherein the service provider utilizes the device identifying information and the base level key to generate a key to decrypt the communication and authenticate the mobile device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification