HOST APPARATUS, ACCESSORY APPARATUS, AND AUTHENTICATING AND CONTROLLING METHOD THEREOF
First Claim
Patent Images
1. A method for authenticating an accessory apparatus by a host apparatus, the method comprising, at the host apparatus:
- receiving authentication information from the accessory apparatus;
comparing the received authentication information and pre-stored authentication information and performing authentication with respect to the accessory apparatus according to a result of the comparing;
if the authentication is normally performed, performing a function corresponding to the accessory apparatus; and
if the authentication is not normally performed, transmitting corresponding information regarding the authentication not being normally performed to an external server.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating an accessory apparatus by a host apparatus is provided. The method includes receiving authentication information from the accessory apparatus, comparing the received authentication information and pre-stored authentication information and performing authentication with respect to the accessory apparatus based on a result of the comparing, and, if the authentication is normally performed, performing a function corresponding to the accessory apparatus, and, if the authentication is not normally performed, transmitting corresponding information to an external server.
25 Citations
20 Claims
-
1. A method for authenticating an accessory apparatus by a host apparatus, the method comprising, at the host apparatus:
-
receiving authentication information from the accessory apparatus; comparing the received authentication information and pre-stored authentication information and performing authentication with respect to the accessory apparatus according to a result of the comparing; if the authentication is normally performed, performing a function corresponding to the accessory apparatus; and if the authentication is not normally performed, transmitting corresponding information regarding the authentication not being normally performed to an external server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for controlling an accessory apparatus which performs authentication with a host apparatus, the method comprising:
-
transmitting authentication information to the host apparatus and requesting authentication; and according to a result of the authentication, receiving preset setting information from the host apparatus and setting a function corresponding to the received setting information.
-
-
11. A host apparatus which performs authentication with an accessory apparatus, the host apparatus comprising:
-
a communication unit which receives authentication information from the accessory apparatus; an authentication unit which compares the received authentication information and pre-stored authentication information and performs authentication with respect to the accessory apparatus based on a result of the comparison; and a controller which, if the authentication is normally performed, performs a function corresponding to the accessory apparatus, and, if the authentication is not normally performed, transmits corresponding information regarding the authentication not being normally performed to an external server. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An accessory apparatus which performs authentication with a host apparatus, the accessory apparatus comprising:
-
an authentication request unit which transmits authentication information to the host apparatus and requests authentication by the host; and a controller which, according to a result of the authentication by the host, receives preset setting information from the host apparatus and sets a function corresponding to the received setting information.
-
Specification