System and method for authenticating a power source
First Claim
1. A system, comprising:
- a battery including a first encryption engine storing a first key; and
a computing device including a microcontroller and a second encryption engine storing a second key, wherein, when the microcontroller detects a coupling of the battery to the computing device, the microcontroller issues a challenge to the first encryption engine and the second encryption engine, wherein the first encryption engine generates the first response as a function of the challenge, the first key and a predefined algorithm, and the second encryption engine generates the second response as a function of the challenge, the second key and the predefined algorithm, and wherein the microcontroller compares the first and second responses to authenticate the battery.
1 Assignment
0 Petitions
Accused Products
Abstract
Described is a system and method for authenticating a power source. The system comprises a battery including a first encryption engine storing a first key and a computing device including a microcontroller and a second encryption engine storing a second key. When the microcontroller detects a coupling of the battery to the computing device, the microcontroller issues a challenge to the first encryption engine and the second encryption engine. The first encryption engine generates the first response as a function of the challenge, the first key and a predefined algorithm, and the second encryption engine generates the second response as a function of the challenge, the second key and the predefined algorithm. The microcontroller compares the first and second responses to authenticate the battery.
143 Citations
21 Claims
-
1. A system, comprising:
-
a battery including a first encryption engine storing a first key; and
a computing device including a microcontroller and a second encryption engine storing a second key, wherein, when the microcontroller detects a coupling of the battery to the computing device, the microcontroller issues a challenge to the first encryption engine and the second encryption engine, wherein the first encryption engine generates the first response as a function of the challenge, the first key and a predefined algorithm, and the second encryption engine generates the second response as a function of the challenge, the second key and the predefined algorithm, and wherein the microcontroller compares the first and second responses to authenticate the battery. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device, comprising:
-
an encryption engine storing a first key; and
a microcontroller detecting a coupling of a battery to the device, the microcontroller issuing a challenge to the encryption engine to obtain a first response and to a further encryption engine on the battery to obtain a second response, the further encryption engine storing a second key, wherein the encryption engine generates the first response using a predefined algorithm, the challenge and the first key, and the further encryption engine generates the second response using the predefined algorithm, the challenge and the second key, and wherein the microcontroller compares the first and second responses to authenticate the battery. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
detecting a coupling of a battery to a computing device, the computing device including a first encryption engine storing a first key, the battery including a second encryption engine storing a second key;
issuing a challenge to the first encryption engine to obtain a first response, the first response being generated as a function of the challenge, the first key and a predefined algorithm;
issuing the challenge to the second encryption engine to obtain a second response, the second response being generated as a function of the challenge, the second key and the predefined algorithm; and
comparing the first and second responses to authenticate the battery. - View Dependent Claims (16, 17, 18)
-
-
19. A battery, comprising:
-
a communications arrangement interfacing with a computing device; and
an encryption engine receiving an authentication challenge from the computing device, the encryption engine storing a key, the encryption engine generating an authentication response as a function of the authentication challenge, a predefined algorithm and the key, wherein the communications arrangement transmits the response to the computing device to be authenticated thereby. - View Dependent Claims (20)
-
-
21. A device, comprising:
-
an encryption means storing a first key; and
a processing means detecting a coupling of a battery to the device, the processing means issuing a challenge to the encryption means to obtain a first response and to a further encryption means on the battery to obtain a response, the further encryption means storing a second key, wherein the encryption means generates the response using a predefined algorithm, the challenge and the first key, and the further encryption means generates the response using the predefined algorithm, the challenge and the second key, and wherein the processing means compares the first and second responses to authenticate the battery.
-
Specification