Accessory Device Authentication
First Claim
1. A method implemented by a host computing device comprising:
- detecting connection of an accessory device to the host computing device;
authenticating the accessory device to determine authorization of the accessory device for power exchange with the host computing device; and
upon successful authentication of the accessory device, authorizing power exchange with the accessory device.
2 Assignments
0 Petitions
Accused Products
Abstract
Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
-
Citations
20 Claims
-
1. A method implemented by a host computing device comprising:
-
detecting connection of an accessory device to the host computing device; authenticating the accessory device to determine authorization of the accessory device for power exchange with the host computing device; and upon successful authentication of the accessory device, authorizing power exchange with the accessory device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented by a host computing device comprising:
-
exchanging a restricted amount of power between the host computing device and an accessory device that is not currently authenticated for power exchange with the host computing device, the restricted amount of power sufficient to perform authentication of the accessory device; authenticating the accessory device for power exchange with the host computing device based on credentials supplied by the accessory device; and upon successful authentication of the accessory device, determining that supplemental power is available from the accessory device; and obtaining the supplemental power from the accessory device for operation of the host computing device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A host computing device comprising:
-
an interface configured to enable connection of one or more accessory devices to the host computing device at different times; one or more microcontrollers configured to implement;
a power controller and an authentication module,the authentication module operable to authenticate the one or more accessory devices responsive to connection of the accessory devices to the interface and expose results of the authentication to the power controller for subsequent power management decisions, the power controller operable to control power exchange between the host device and the one or more accessory devices based at least in part upon the results of the authentication including; authorizing power exchange with devices of the one or more accessory devices for which authentication is successful; and restricting power exchange with devices of the one or more accessory devices for which authentication is not successful.
-
- 18. A host computing device as described in claim 18, wherein the power controller is further operable to allow limited exchange of power between the host computing device and the one or more accessory devices prior to authentication of the one or more accessory devices to enable operation of the one or more microcontrollers to perform the authentication.
Specification