Systems and Methods for Authenticating Mobile Devices
First Claim
Patent Images
1. A computer-implemented method for authenticating mobile devices, the method comprising:
- receiving, from a mobile device, a registration request and identifying information for the mobile device or a secure element associated with the mobile device;
determining, based upon the received identifying information and a base level key, a rotated key for the mobile device; and
providing the determined rotated key to the mobile device;
wherein the rotated key is utilized for subsequent authentication of the mobile device, andwherein the above operations are performed by one or more computers associated with a provisioning service provider.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide systems and methods for authenticating mobile devices. A registration request and identifying information for a mobile device or a secure element associated with the mobile device may be received. Based upon the received identifying information and a base level key, a rotated key for the mobile device may be determined. The determined rotated key may then be provided to the mobile device, and the rotated key may be utilized for subsequent authentication of the mobile device.
-
Citations
20 Claims
-
1. A computer-implemented method for authenticating mobile devices, the method comprising:
-
receiving, from a mobile device, a registration request and identifying information for the mobile device or a secure element associated with the mobile device; determining, based upon the received identifying information and a base level key, a rotated key for the mobile device; and providing the determined rotated key to the mobile device; wherein the rotated key is utilized for subsequent authentication of the mobile device, and wherein the above operations are performed by one or more computers associated with a provisioning service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
at least one memory operable to store computer-executable instructions; and at least one processor configured to access the at least one memory and execute the computer-executable instructions to; receive, from a mobile device, a registration request and identifying information for the mobile device or a secure element associated with the mobile device; determine, based upon the received identifying information and a base level key, a rotated key for the device; and provide the determined rotated key to the mobile device, wherein the rotated key is utilized for subsequent authentication of the mobile device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification