×

Authenticating, Tracking, and Using a Peripheral

  • US 20120131230A1
  • Filed: 12/31/2010
  • Published: 05/24/2012
  • Est. Priority Date: 11/22/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • determining, based on information read or received from a peripheral in communication with a host device, that the peripheral is capable of authentication;

    configuring data lines to perform an authentication protocol;

    performing the authentication protocol using the authentication-configured data lines effective to authenticate the peripheral;

    responsive to the peripheral being authenticated, configuring the authentication-configured data lines for full use, orresponsive to the peripheral not being authenticated, configuring the authentication-configured data lines for limited use or no use; and

    transmitting, over a communication network and to a remote entity, a time stamp and the information read or received from the peripheral.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×