METHOD TO AUTHENTICATE AND ACCESSORY
First Claim
1. An apparatus used by a plurality of devices to authenticate an accessory configured to operate with a device of the plurality of devices, the accessory storing a first key and employing an authentication circuit that applies an authentication algorithm to the first key and a challenge received from the device thereby generating a response corresponding to the challenge, the apparatus comprising:
- a. a challenge and response memory in each device of the plurality of devices that stores a subset of a set of stored challenges and stored responses, each stored response corresponding to a different one of the stored challenges and pre-computed by applying the corresponding stored challenge and a second key to the authentication algorithm, the subset stored in the challenge and response memory of a first device of the plurality of devices being different from the subset stored in the challenge and response memory of a second device of the plurality of devices; and
b. an enabling circuit in each device of the plurality of devices that transmits a stored challenge to the accessory and that receives a received response therefrom and that compares the received response to the stored response corresponding to the stored challenge sent to the accessory, wherein the enabling circuit is configured to generate a normal operation enabling signal that enables normal operation of the device when the received response matches the stored response and is configured to not generate the normal operation enabling signal when the received response does not match the stored response.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus (100) used by a plurality of devices to authenticate an accessory (120) is configured to operate with a device (110) of the plurality of devices. The accessory (120) applies an authentication algorithm to a key and a challenge (130) received from the device (110) and generates a response (132) thereto. A challenge and response memory (114) stores a subset of a set of challenges (232) and pre-computed responses (230). The enabling circuit transmits a challenge (130) to the accessory (120) and receives a received response (132) therefrom. The enabling circuit (112) also compares the received response (132) to the stored response (230) corresponding to the stored challenge (232) sent to the accessory (120). The enabling circuit (112) is configured to generate a normal operation enabling signal that enables normal operation of the device when the received response (132) matches the stored response and is configured not to generate the normal operation enabling signal when the received response (132) does not match the stored response.
-
Citations
21 Claims
-
1. An apparatus used by a plurality of devices to authenticate an accessory configured to operate with a device of the plurality of devices, the accessory storing a first key and employing an authentication circuit that applies an authentication algorithm to the first key and a challenge received from the device thereby generating a response corresponding to the challenge, the apparatus comprising:
-
a. a challenge and response memory in each device of the plurality of devices that stores a subset of a set of stored challenges and stored responses, each stored response corresponding to a different one of the stored challenges and pre-computed by applying the corresponding stored challenge and a second key to the authentication algorithm, the subset stored in the challenge and response memory of a first device of the plurality of devices being different from the subset stored in the challenge and response memory of a second device of the plurality of devices; and b. an enabling circuit in each device of the plurality of devices that transmits a stored challenge to the accessory and that receives a received response therefrom and that compares the received response to the stored response corresponding to the stored challenge sent to the accessory, wherein the enabling circuit is configured to generate a normal operation enabling signal that enables normal operation of the device when the received response matches the stored response and is configured to not generate the normal operation enabling signal when the received response does not match the stored response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A wireless telephone, comprising:
-
a. a wireless telephone communication circuit; b. a battery that powers the wireless telephone communication circuit, the battery storing a key and employing an authentication circuit that applies an authentication algorithm to the key and to a challenge received from the telephone thereby generating a response corresponding to the challenge; c. a memory that stores a set of challenges and a set of pre-computed responses, each response corresponding to a different challenge of the set of challenges; and d. a processor that transmits a selected challenge of the set of challenges to the battery and that receives a response from the battery, wherein the processor also compares the response received from the battery to a response stored in the memory corresponding to the challenge sent to the battery and wherein the processor causes a selected one of the battery and the wireless telephone communication circuit to operate in an other than normal operating state when the response received from the battery does not correspond to the response corresponding to the challenge stored in the memory. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method of authenticating accessories configured to work with a device, comprising the actions of:
-
a. applying an authentication algorithm to a set of challenges and a key, thereby generating a corresponding set of responses; b. storing the set of challenges and the corresponding set of responses, without storing the key, in a memory associated with the device; c. transmitting a challenge from the set of challenges to an accessory having circuitry that applies the challenge and the key to the authentication algorithm and that generates a response based on the challenge and the key; d. receiving the response from the accessory; e. comparing the response received from the accessory to the response stored in the memory that corresponds to the challenge sent to the accessory; and f. if the response received from the accessory matches the response corresponding to the challenge sent to the accessory, then enabling normal operation of the device, otherwise not enabling normal operation of the device. - View Dependent Claims (19, 20, 21)
-
Specification