Accessory authentication for electronic devices
First Claim
1. An accessory device for a portable electronic device, comprising:
- an input/output port for interacting with the portable electronic device;
an authentication controller operatively connected to said input/output port, the authentication controller being implemented within a single integrated circuit chip, wherein the authentication controller is configured to;
receive a random number from the portable electronic device;
encrypt the random number with a first key associated with the accessory device to generate an encrypted random number;
communicate the encrypted random number to the portable electronic device; and
receive indication from the portable electronic device of whether the accessory device is authenticated or not based at least in part on the encrypted random number; and
accessory circuitry configured to;
access a limited set of functions of the portable electronic device through the input/output port in response to a failed authentication; and
access a full set of functions of the portable electronic device through the input/output port in response to a successful authentication, wherein the limited set of functions includes fewer functions than the full set of functions, and wherein the limited set of functions includes at least one function.
0 Assignments
0 Petitions
Accused Products
Abstract
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
Citations
9 Claims
-
1. An accessory device for a portable electronic device, comprising:
-
an input/output port for interacting with the portable electronic device; an authentication controller operatively connected to said input/output port, the authentication controller being implemented within a single integrated circuit chip, wherein the authentication controller is configured to; receive a random number from the portable electronic device; encrypt the random number with a first key associated with the accessory device to generate an encrypted random number; communicate the encrypted random number to the portable electronic device; and receive indication from the portable electronic device of whether the accessory device is authenticated or not based at least in part on the encrypted random number; and accessory circuitry configured to; access a limited set of functions of the portable electronic device through the input/output port in response to a failed authentication; and access a full set of functions of the portable electronic device through the input/output port in response to a successful authentication, wherein the limited set of functions includes fewer functions than the full set of functions, and wherein the limited set of functions includes at least one function. - View Dependent Claims (2, 3, 4)
-
-
5. An accessory device comprising:
-
communication means for communicating with a portable media player; authentication means for authenticating the accessory device with the portable media player through the communication means;
wherein the authentication means is implemented within a single integrated circuit chip and is configured to;receive a random number from the portable media player; encrypt the random number using a first key associated with the accessory device to generate an encrypted random number; send the encrypted random number to the portable media player; and receive notification from the portable media player on whether the accessory device is authenticated based at least in part on the encrypted random number; and operation means for; executing a limited set of functions at the portable media player through the communication means, if the authentication fails and executing a full set of functions at the portable media player through the communication means if the authentication is successful, wherein the limited set of functions includes at least one function. - View Dependent Claims (6, 7, 8, 9)
-
Specification