Systems and methods for authenticating mobile devices
First Claim
Patent Images
1. A computer-implemented method for authenticating mobile devices, the method comprising:
- receiving, by a service manager computer comprising one or more processors, from a mobile device, a registration request and identifying information for the mobile device, the identifying information comprising information for a secure element associated with the mobile device, wherein the service manager computer is in communication with a plurality of network operators and a plurality of service provider computers;
determining, by the service manager computer based upon the received identifying information and a base level key, a rotated key for the mobile device;
providing, by the service manager computer, the determined rotated key to the mobile device;
receiving, by the service manager computer, from the mobile device after providing the rotated key to the mobile device, a subsequent provisioning request to provision an application to the mobile device, wherein the subsequent provisioning request is encrypted with the rotated key, and the application is provided by a service provider;
authenticating, by the service manager computer in response to the subsequent provisioning request, the mobile device based at least in part on the rotated key; and
provisioning, by the service manager computer upon authentication of the mobile device, the application to the mobile device.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide systems and methods for authenticating mobile devices. A registration request and identifying information for a mobile device or a secure element associated with the mobile device may be received. Based upon the received identifying information and a base level key, a rotated key for the mobile device may be determined. The determined rotated key may then be provided to the mobile device, and the rotated key may be utilized for subsequent authentication of the mobile device.
54 Citations
18 Claims
-
1. A computer-implemented method for authenticating mobile devices, the method comprising:
-
receiving, by a service manager computer comprising one or more processors, from a mobile device, a registration request and identifying information for the mobile device, the identifying information comprising information for a secure element associated with the mobile device, wherein the service manager computer is in communication with a plurality of network operators and a plurality of service provider computers; determining, by the service manager computer based upon the received identifying information and a base level key, a rotated key for the mobile device; providing, by the service manager computer, the determined rotated key to the mobile device; receiving, by the service manager computer, from the mobile device after providing the rotated key to the mobile device, a subsequent provisioning request to provision an application to the mobile device, wherein the subsequent provisioning request is encrypted with the rotated key, and the application is provided by a service provider; authenticating, by the service manager computer in response to the subsequent provisioning request, the mobile device based at least in part on the rotated key; and provisioning, by the service manager computer upon authentication of the mobile device, the application to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
at least one memory operable to store computer-executable instructions; and at least one processor configured to access the at least one memory and execute the computer-executable instructions to; receive communication from a plurality of network operators and a plurality of service provider computers; receive, from a mobile device, a registration request and identifying information for the mobile device, the identifying information comprising information for a secure element associated with the mobile device; determine, based upon the received identifying information and a base level key, a rotated key for the device; provide the determined rotated key to the mobile device; receive, from the mobile device after providing the rotated key to the mobile device, a subsequent provisioning request to provision an application to the mobile device, wherein the subsequent provisioning request is encrypted with the rotated key, and the application is provided by a service provider; authenticate, in response to the subsequent provisioning request, the mobile device based at least in part on the rotated key; and provision, upon authentication of the mobile device, the application to the mobile device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification