Authenticating, Tracking, and Using a Peripheral
First Claim
Patent Images
1. A method, comprising:
- determining, based on information read or received from a peripheral in communication with a host device, that the peripheral is capable of authentication;
configuring data lines to perform an authentication protocol;
performing the authentication protocol using the authentication-configured data lines effective to authenticate the peripheral;
responsive to the peripheral being authenticated, configuring the authentication-configured data lines for full use, orresponsive to the peripheral not being authenticated, configuring the authentication-configured data lines for limited use or no use; and
transmitting, over a communication network and to a remote entity, a time stamp and the information read or received from the peripheral.
3 Assignments
0 Petitions
Accused Products
Abstract
This document describes techniques (300, 600) and apparatuses (102, 106, 700, 800, 900) for peripheral authentication. These techniques (300, 600) and apparatuses (102, 106, 700, 800, 900) may configure data lines for authentication between host device (102) and peripheral (106), use these configured data lines to authenticate the peripheral (106), and then reconfigure the data lines for use. These techniques (300, 600) may also or instead transmit time stamps to a remote entity (402) for tracking peripheral use and/or present home screens (122) responsive to connection to a peripheral (106).
44 Citations
20 Claims
-
1. A method, comprising:
-
determining, based on information read or received from a peripheral in communication with a host device, that the peripheral is capable of authentication; configuring data lines to perform an authentication protocol; performing the authentication protocol using the authentication-configured data lines effective to authenticate the peripheral; responsive to the peripheral being authenticated, configuring the authentication-configured data lines for full use, or responsive to the peripheral not being authenticated, configuring the authentication-configured data lines for limited use or no use; and transmitting, over a communication network and to a remote entity, a time stamp and the information read or received from the peripheral. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
making information available to a host device, the information indicating that a peripheral to the host device is capable of authentication; receiving an authentication command from the host device, the authentication command effective to configure the peripheral to determine a cryptographic response to an authentication challenge; receiving the authentication challenge from the host device; communicating the cryptographic response to the host device; receiving a use command from the host device, the use command effective to configure the peripheral for use; and transmitting, over a communication network and to a remote entity, a time stamp. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification