ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES
First Claim
1. A portable electronic device, comprising:
- a media storage device that stores media content for one or more media items;
a media presentation module that retrieves media content for at least one of the media items from said media storage and causes the media content to be presented for a user of said portable electronic device;
an authentication table that stores authentication information for various accessory devices that are authorized to interact with said portable electronic device, wherein the authentication information includes information that indicates an extent to which each accessory device is authorized to interoperate with the portable electronic device; and
an authentication module that determines whether a particular accessory device that is coupled to said portable media device is authorized to interoperate with said portable electronic device based on at least a portion of the authentication information stored in said authentication table.
0 Assignments
0 Petitions
Accused Products
Abstract
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
Citations
35 Claims
-
1. A portable electronic device, comprising:
-
a media storage device that stores media content for one or more media items; a media presentation module that retrieves media content for at least one of the media items from said media storage and causes the media content to be presented for a user of said portable electronic device; an authentication table that stores authentication information for various accessory devices that are authorized to interact with said portable electronic device, wherein the authentication information includes information that indicates an extent to which each accessory device is authorized to interoperate with the portable electronic device; and an authentication module that determines whether a particular accessory device that is coupled to said portable media device is authorized to interoperate with said portable electronic device based on at least a portion of the authentication information stored in said authentication table. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
12. A connector for connecting an accessory device to a media player, comprising:
-
a connector body; a plurality of electrical contacts attached within the connector body and serving to provide electrical connections between the accessory device and the media player; and a controller disposed in said connector body and providing an authentication key that allows the accessory device to be authenticated by the media player. - View Dependent Claims (11)
-
-
14. A method for authorizing an accessory device for use with an electronic device, said method comprising:
-
(a) receiving a device identifier from the accessory device; (b) receiving an authentication value from the accessory device; (c) determining whether the accessory device is authentic based on the authentication value; and (d) authorizing usage of one or more authorized features of the electronic device with the accessory device when said determining (c) determines that the accessory device is authentic.
-
-
21. A method for authorizing an accessory device for use with an electronic device, said method comprising:
-
(a) detecting attachment of the accessory device with the electronic device; (b) sending a random number to the accessory device after said detecting (a) detects attachment of the accessory device; (c) subsequently receiving an encoded value from the accessory device; (d) receiving a device identifier from the accessory device; (e) obtaining a cryptographic key based on the device identifier; (f) decoding the encoded value using the cryptographic key to produce a decoded value; (g) determining whether the decoded value corresponds to the random number; and (h) authorizing usage of one or more authorized features of the electronic device with the accessory device when said determining (g) indicates that the decoded value corresponds to the random number.
-
-
26. A method for authorizing an accessory device for use with an electronic device, said method comprising:
-
(a) detecting attachment of the accessory device with the electronic device; (b) sending an authentication request to the accessory device after said detecting (a) detects attachment of the accessory device, the authentication request including at least a random number; (c) subsequently receiving an authentication response from the accessory device, the authentication response being in response to the authentication request, and the authentication response including at least an encoded value and a device identifier for the accessory device; (d) obtaining a cryptographic key based on the device identifier; (e) decoding the encoded value using the cryptographic key to produce a decoded value; and (f) authorizing usage of one or more authorized features of the electronic device with the accessory device based on a correspondence between the decoded value and the random number. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
27. The method as recited in claim 38, wherein said authorizing (f) comprises:
-
(f1) comparing the decoded value to the random number; (f2) authorizing usage of one or more authorized features of the electronic device with the accessory device when said comparing (f1) indicates that the decoded value matches the random number.
-
-
28. The method as recited in claim 38, wherein said authorizing (g) authorizes the accessory device for usage of a determined set of features of the electronic device.
-
29. The method as recited in claim 38, wherein at least one of the one or more authorized features are authorized for usage over only a certain interface mechanism.
-
30. The method as recited in claim 40, wherein the one or more authorized features of the electronic device are determined based on the device identifier.
-
31. The method as recited in claim 40, wherein said method further comprises:
-
(h) subsequently determining whether the accessory device is detached from the electronic device; and (i) disabling usage of the accessory device with the electronic device when said determining (h) determines that the accessory device is detached from the electronic device.
-
-
32. A method for controlling interaction between a media player and an accessory device, comprising:
-
determining a classification of the accessory device; identifying an authorization level for the accessory device; and selectively activating features of the media device that are available to be used in conjunction with the accessory device based on the classification and authorization level of the accessory device.
-
-
33. A media player system, comprising:
-
a media player storing media content and supporting a plurality of predetermined functions; and an accessory device capable of connecting to said media player, wherein said media player and said accessory device interact to perform an authentication process, wherein, based on the authentication process, specific functions of said media device are selectively activated and thus available for use by said accessory device. - View Dependent Claims (22, 23)
-
-
34. The media player system as recited in claim 50, wherein said media process provides a cryptographic key to said media player, and said media player determines an activation level of said accessory device using the cryptographic key.
- 35. The media player system as recited in claim 51, wherein the specific functions of said media device being activated are based on the authorization level of the accessory device.
Specification