COMMUNICATION PROTOCOL FOR DEVICE AUTHENTICATION
First Claim
1. A method for a device to authenticate an accessory having at least one communication port connected to the device, the method comprising:
- driving the at least one communication port to a first voltage level to maintain the accessory in a sleep mode;
transitioning the at least one communication port to a second voltage level to initiate a wake up condition in the accessory;
transmitting a wake up command to the accessory via the at least one communication port;
transmitting an information request command via the at least one communication port to the accessory;
receiving an information request response via the at least one communication port from the accessory;
authenticating the accessory when at least a portion of the received information request response matches a pre-stored expected information request response.
5 Assignments
0 Petitions
Accused Products
Abstract
A communication protocol between a master device, such as a mobile phone, and a peripheral device facilitates authentication of the peripheral device. When a peripheral device is detected, the master device initiates a wake-up command to the peripheral device, transmits an authentication request command followed by challenge data to the peripheral device, and awaits responses from the peripheral device. The accessory receives the challenge data, performs a hash function on the challenge data, and generates response data. An authentication response type byte is sent to the handset followed by the response data. The handset compares the response data to pre-stored data that is associated with the challenge data. A match indicates that the accessory is authentic. The challenge/response data, also referred to as a plaintext/cyphertext pair, is pre-generated external to the handset using the hash function, then pre-stored in the handset.
80 Citations
19 Claims
-
1. A method for a device to authenticate an accessory having at least one communication port connected to the device, the method comprising:
-
driving the at least one communication port to a first voltage level to maintain the accessory in a sleep mode; transitioning the at least one communication port to a second voltage level to initiate a wake up condition in the accessory; transmitting a wake up command to the accessory via the at least one communication port; transmitting an information request command via the at least one communication port to the accessory; receiving an information request response via the at least one communication port from the accessory; authenticating the accessory when at least a portion of the received information request response matches a pre-stored expected information request response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for authenticating an accessory, comprising:
-
a device comprising; at least one communication port for connection to the accessory; a memory for storing at least one information request command and at least one expected information request response; and a processor coupled to the memory and the at least one communication port, the processor driving the at least one communication port to a first voltage level to maintain the accessory in a sleep mode, transitioning the at least one communication port to a second voltage level to initiate a wake up condition in the accessory, transmitting a wake up command to the accessory via the at least one communication port, transmitting the at least one information request command via the at least one communication port to the accessory, receiving an information request response via the at least one communication port from the accessory, and authenticating the accessory when at least a portion of the received information request response matches the at least one expected information request response; and the accessory for attachment to the device through the at least one communication port, the accessory comprising; a secure authentication image file; and a accessory processor for detecting a voltage level transition, entering a command listen mode, detecting the wake up command, receiving the at least one information request command, generating an information request response, and transmitting the information request response to the device through the at least one communication port. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification