主权项 |
1. A computer-implemented method for authenticating mobile devices, the method comprising:
receiving, by a service manager computer comprising one or more processors, from a mobile device, a registration request and identifying information for the mobile device, the identifying information comprising information for a secure element associated with the mobile device, wherein the service manager computer is in communication with a plurality of network operators and a plurality of service provider computers; determining, by the service manager computer based upon the received identifying information and a base level key, a rotated key for the mobile device; providing, by the service manager computer, the determined rotated key to the mobile device; receiving, by the service manager computer, from the mobile device after providing the rotated key to the mobile device, a subsequent provisioning request to provision an application to the mobile device, wherein the subsequent provisioning request is encrypted with the rotated key, and the application is provided by a service provider; authenticating, by the service manager computer in response to the subsequent provisioning request, the mobile device based at least in part on the rotated key; and provisioning, by the service manager computer upon authentication of the mobile device, the application to the mobile device. |