Communication protocol and method for authenticating a system
First Claim
1. A method for authenticating a system, the method comprising acts of:
- providing access to a public memory area including a first portion; and
providing access to a private memory area based on a key determined based on the first portion of the public memory area.
2 Assignments
0 Petitions
Accused Products
Abstract
One aspect relates to a communication protocol for communicating between one or more entities, such as devices, hosts or any other system capable of communicating over a network. A protocol is provided that allows communication between entities without a priori knowledge of the communication protocol. In such a protocol, for example, information describing a data structure of the communication protocol is transferred between communicating entities. Further, an authentication protocol is provided for providing bidirectional authentication between communicating entities. In one specific example, the entities include a master device and a slave device coupled by a serial link. In another specific example, the communication protocol may be used for performing unbalanced transmission between communicating entities.
57 Citations
13 Claims
-
1. A method for authenticating a system, the method comprising acts of:
-
providing access to a public memory area including a first portion; and
providing access to a private memory area based on a key determined based on the first portion of the public memory area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification