Method and system for authenticating an accessory
First Claim
1. A method usable by a media player to communicate with an accessory configured to interact with the media player according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, the method comprising:
- initiating an authentication operation to authenticate the accessory;
sending a request to the accessory requesting first authentication information;
receiving the first authentication information from the accessory;
validating the first authentication information;
during the authentication operation, receiving one of the plurality of application commands of the media player accessory protocol from the accessory based on validation of the first authentication information and, in response to the received application command, invoking one of the plurality of media player application functions;
receiving second authentication information from the accessory, the second authentication information being different from the first authentication information;
determining whether the authentication operation completed successfully or failed based on validation of the second authentication information;
in the event that the authentication operation completed successfully, receiving a subsequent one of the plurality of application commands from the accessory and, in response to the subsequent application command, invoking a subsequent one of the plurality of media player application functions; and
in the event that the authentication operation failed, ignoring any subsequent application command received from the accessory.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and connector interface for authenticating an accessory. The method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands in a variety of environments such as within a connector interface system environment to control access to the media player.
415 Citations
20 Claims
-
1. A method usable by a media player to communicate with an accessory configured to interact with the media player according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, the method comprising:
-
initiating an authentication operation to authenticate the accessory; sending a request to the accessory requesting first authentication information; receiving the first authentication information from the accessory; validating the first authentication information; during the authentication operation, receiving one of the plurality of application commands of the media player accessory protocol from the accessory based on validation of the first authentication information and, in response to the received application command, invoking one of the plurality of media player application functions; receiving second authentication information from the accessory, the second authentication information being different from the first authentication information; determining whether the authentication operation completed successfully or failed based on validation of the second authentication information; in the event that the authentication operation completed successfully, receiving a subsequent one of the plurality of application commands from the accessory and, in response to the subsequent application command, invoking a subsequent one of the plurality of media player application functions; and in the event that the authentication operation failed, ignoring any subsequent application command received from the accessory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method usable by an accessory to interact with a media player according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, the method comprising:
-
receiving an authentication request from the media player, the authentication request initiating an authentication operation; transmitting first authentication information to the media player in response to the authentication request, the first authentication information being usable by the media player in the authentication operation; sending at least one of the plurality of application commands to the media player based on validation of the first authentication information and prior to completion of the authentication operation, wherein the media player processes the at least one application command, thereby allowing the accessory to invoke at least one of the plurality of media player application functions during the authentication operation; and transmitting second authentication information different from the first authentication information to the media player for validation, wherein the authentication operation completes upon validation of the second authentication information, and wherein if the authentication operation fails, any subsequent application commands sent by the accessory are not processed by the media player. - View Dependent Claims (13, 14)
-
-
15. A method usable by an accessory to interact with a media player according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, the plurality of media player application functions including a first function associated with a risky behavior and a second function associated with a non-risky behavior, the method comprising:
-
receiving an authentication request from the media player, the authentication request initiating an authentication operation; transmitting first authentication information to the media player in response to the authentication request, the first authentication information being usable by the media player in the authentication operation; sending at least one of the plurality of application commands to the media player prior to completion of the authentication operation based on validation of the first authentication information, wherein in response to the at least one application command, the media player invokes an associated one of the plurality of media player application functions if the associated one of the plurality of media player application functions is the second function but does not invoke the associated one of the plurality of media player application functions if the associated one of the plurality of media player application functions is the first function; and transmitting an second authentication signature to the media player for validation, wherein the authentication operation completes upon validation of the authentication signature, the authentication signature being different from the first authentication information; and wherein if the authentication operation fails, any subsequent commands sent by the accessory are ignored by the media player. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification