INTERROGATING AN AUTHENTICATION DEVICE
First Claim
1. A method for authenticating an accessory of a mobile device, the method comprising:
- receiving at a mobile device an authentication request from a mobile device accessory;
selecting an initial challenge value at the mobile device in response to receiving the authentication request, the initial challenge value selected from a plurality of challenge values based on challenge-response distribution data stored on the mobile device, the challenge-response distribution data indicating selection probabilities for the plurality of challenge values; and
sending an interrogation message from the mobile device to the mobile device accessory, the interrogation message comprising the initial challenge value.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for interrogating an authentication device are disclosed. For example, a mobile device can include an interrogator module that interrogates an authentication module in a mobile device accessory, for example, upon installation of the mobile device accessory. In some implementations, challenge-response pairs and a challenge-response distribution are stored in a memory of an interrogator module. The challenge-response distribution defines selection probabilities for the challenge values. In some instances, the interrogator module receives an authentication request from an authentication module, and in response to the authentication request, the interrogator module selects an initial challenge value according to the challenge-response distribution. The interrogator module sends the authentication module an interrogation message that includes the initial challenge value. The interrogator module can modify the challenge-response distribution, for example, based on suspicious behavior.
-
Citations
33 Claims
-
1. A method for authenticating an accessory of a mobile device, the method comprising:
-
receiving at a mobile device an authentication request from a mobile device accessory; selecting an initial challenge value at the mobile device in response to receiving the authentication request, the initial challenge value selected from a plurality of challenge values based on challenge-response distribution data stored on the mobile device, the challenge-response distribution data indicating selection probabilities for the plurality of challenge values; and sending an interrogation message from the mobile device to the mobile device accessory, the interrogation message comprising the initial challenge value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A mobile device comprising:
-
memory storing; challenge-response pair data including a plurality of challenge values; challenge-response distribution data indicating selection probabilities for each of the plurality of challenge values; an interface configured to receive an authentication request from a mobile device accessory; and data processing apparatus operable to execute instructions stored on the mobile device to perform operations comprising; selecting an initial challenge value in response to receiving an authentication request from an accessory of the mobile device, the initial challenge value selected from a plurality of challenge values based on the challenge-response distribution; and sending an interrogation message from the mobile device to the mobile device accessory, the interrogation message comprising the initial challenge value. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium storing instructions that are operable when executed by data processing apparatus to perform operations for authenticating an accessory of a mobile device, the operations comprising:
-
receiving at a mobile device an authentication request from a mobile device accessory; selecting an initial challenge value at the mobile device in response to receiving the authentication request, the initial challenge value selected from a plurality of challenge values based on challenge-response distribution data stored on the mobile device, the challenge-response distribution data indicating selection probabilities for the plurality of challenge values; and sending an interrogation message from the mobile device to the mobile device accessory, the interrogation message comprising the initial challenge value. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A method comprising:
-
receiving at an interrogator device an authentication request from an authentication device; selecting an initial challenge value at the interrogator device in response to receiving the authentication request, the initial challenge value selected from a plurality of challenge values based on challenge-response distribution data stored on the interrogator device, the challenge-response distribution data indicating selection probabilities for the plurality of challenge values; and sending an interrogation message from the interrogator device to the authentication device, the interrogation message comprising the initial challenge value. - View Dependent Claims (29, 30, 31, 32, 33)
-
Specification