ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES
0 Assignments
0 Petitions
Accused Products
Abstract
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
16 Citations
25 Claims
-
1-5. -5. (canceled)
-
6. An electronic system comprising:
-
an accessory comprising; a first memory to store a device identifier and to provide the device identifier; a processor coupled to the memory to receive the device identifier from the first memory and to provide the device identifier to a communication bus; and a connector to provide a path for the communication bus; and a mobile computing device comprising; a connector to provide a path for the communication bus; a port interface coupled to the connector to receive the device identifier from the accessory over the communication bus; an authorization table comprising a list of device identifiers and corresponding sets of authorized features; and an authentication module coupled to the port interface to receive the device identifier from the accessory, the authorization module further coupled to the authorization table to find a match for the device identifier from the accessory in the list of device identifiers and to find a corresponding set of authorized features, and then to allow the accessory to access features of the mobile computing device identified by the corresponding set of authorized features. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. An accessory comprising:
-
a first memory to store a device identifier and to provide the device identifier; a processor coupled to the memory to receive the device identifier from the first memory and to provide the device identifier to a communication bus; and a connector to provide a path for the communication bus to provide the device identifier from the accessory to a mobile computing device, the device identifier from the accessory usable by an authorization module in the mobile computing device to find a match for the device identifier from the accessory in a list of device identifiers in an authorization table and to find a corresponding set of authorized features in the authorization table, and then to allow the accessory to access the corresponding set of authorized features. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A mobile computing device comprising:
-
a connector to provide a path for the communication bus; a port interface coupled to the connector to receive a device identifier from the accessory over the communication bus; an authorization table comprising a list of device identifiers and a corresponding set of authorized features; and an authentication module coupled to the port interface to receive the device identifier from the accessory, the authorization module further coupled to the authorization table to find a match for the device identifier from the accessory in the list of device identifiers and to find a corresponding set of authorized features, and then to allow the accessory to access the corresponding set of authorized features. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification