PERIPHERAL AUTHENTICATION
First Claim
Patent Images
1. A method, comprising:
- determining, based on information read or received from a peripheral in communication with a host device, that the peripheral is capable of authentication;
configuring data lines to perform an authentication protocol;
performing the authentication protocol using the authentication-configured data lines effective to authenticate the peripheral; and
responsive to the peripheral being authenticated, configuring the authentication-configured data lines for full use, orresponsive to the peripheral not being authenticated, configuring the authentication-configured data lines for limited use or no use.
3 Assignments
0 Petitions
Accused Products
Abstract
This document describes techniques (300, 400) and apparatuses (100, 500, 600, 700) for peripheral authentication. These techniques (300, 400) and apparatuses (100, 500, 600, 700) may configure data lines for authentication between host device (102) and peripheral (106), use these configured data lines to authenticate the peripheral (106), and then reconfigure the data lines for use.
-
Citations
20 Claims
-
1. A method, comprising:
-
determining, based on information read or received from a peripheral in communication with a host device, that the peripheral is capable of authentication; configuring data lines to perform an authentication protocol; performing the authentication protocol using the authentication-configured data lines effective to authenticate the peripheral; and responsive to the peripheral being authenticated, configuring the authentication-configured data lines for full use, or responsive to the peripheral not being authenticated, configuring the authentication-configured data lines for limited use or no use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
making information available to a host device via an identification line of a universal serial bus (USB) connector, the information indicating that a peripheral to the host device is capable of authentication; receiving an authentication command from the host device via the identification line, the authentication command effective to configure the peripheral to determine a cryptographic response to an authentication challenge; receiving the authentication challenge from the host device via data lines of the USB connector; communicating the cryptographic response to the host device via the data lines of the USB connector; and receiving a use command from the host device via the identification line of the USB connector, the use command effective to configure the peripheral for use. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A peripheral to a host device, the peripheral comprising:
-
a configuration switch configured to switch one or more data lines of a universal serial bus (USB) connector responsive to a command received via an identification line of the USB connector, the one or more data lines configured to switch between an authentication module of the peripheral and a service module of the peripheral, wherein the authentication module is configured to determine a cryptographic response to a challenge received from the host device via the one or more data lines, the cryptographic response usable to authenticate the peripheral. - View Dependent Claims (19, 20)
-
Specification