Method and system for authenticating an accessory
First Claim
1. A method for authenticating a device, the method comprising:
- performing a first authentication operation on one of an accessory and a media player by one of the respective media player and accessory, wherein a certificate is validated; and
performing a second authentication operation on one of the accessory and the media player by one of the respective media player and accessory, wherein an authentication signature is validated.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and connector interface for authenticating an accessory. The method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands utilized in a variety of environments such as within a connector interface system environment to control access to the media player.
271 Citations
36 Claims
-
1. A method for authenticating a device, the method comprising:
-
performing a first authentication operation on one of an accessory and a media player by one of the respective media player and accessory, wherein a certificate is validated; and performing a second authentication operation on one of the accessory and the media player by one of the respective media player and accessory, wherein an authentication signature is validated. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A protocol for authenticating an accessory, the protocol comprising:
-
a first plurality of commands for performing, by at least one of the media player and an accessory, a first authentication operation, wherein authentication information is validated; and a second plurality of commands for performing, by at least one of the media player and the accessory, a second authentication operation, wherein an authentication signature is validated. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A portable device comprising:
-
a media player; an interface coupled to the media player; and a command set in communication with the interface, wherein the command set controls access to the media player, the command set comprising; a first plurality of commands for performing, by at least one of the media player and an accessory, a first authentication operation, wherein authentication information is validated; and a second plurality of commands for performing, by at least one of the media player and the accessory, a second authentication operation, wherein an authentication signature is validated. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. An accessory comprising:
-
a device for transferring data; an interface coupled to the device; and a command set in communication with the interface, wherein the command set controls access to the media player, the command set comprising; a first plurality of commands for performing, by at least one of the media player and an accessory, a first authentication operation, wherein authentication information is validated; and a second plurality of commands for performing, by at least one of the media player and the accessory, a second authentication operation, wherein an authentication signature is validated. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A computer-readable medium containing program instructions for authenticating an accessory, the program instructions which when executed by a computer system cause the computer system to execute a method comprising:
-
performing a first authentication operation on the accessory by the media player, wherein a certificate is validated; and performing a second authentication operation on the accessory by the media player, wherein an authentication signature is validated. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A method for authenticating a media player, the method comprising:
-
performing a first authentication operation on the media player by the accessory, wherein a certificate is validated; and performing a second authentication operation on the media player by the accessory, wherein an authentication signature is validated. - View Dependent Claims (32, 33, 34, 35, 36)
-
Specification