Accessory device authentication
First Claim
1. A method for authenticating an accessory device at a mobile computing device, the method comprising:
- receiving an indication that the accessory is coupled with a first port of the mobile computing device;
receiving an indication that an authentication device is coupled with a second port of the mobile computing device;
receiving a cross-transport authentication request from the authentication device via the second port;
authenticating the second port with the authentication device, wherein the authentication grants a set of permissions for communication via the second port when the authentication is successful;
transferring at least a subset of the set of permissions granted to the second port during the authentication to the first port; and
thereafter, communicating with the accessory through the first port according to the transferred permissions.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication controller coupled to a first communication port of a portable computing device is allowed to provide authentication on behalf of an accessory device coupled to a second communication port of the portable computing device. In one embodiment, a dongle that includes an authentication controller can be coupled with the portable computing device. Accessory devices can also be coupled with the portable computing device through other ports, including wireless ports. The dongle can provide cross-transport authentication for accessories that do not include authentication controllers. Once the dongle had been properly authenticated, the permissions granted to the dongle port can be transferred to a communication port coupled with an accessory.
-
Citations
24 Claims
-
1. A method for authenticating an accessory device at a mobile computing device, the method comprising:
-
receiving an indication that the accessory is coupled with a first port of the mobile computing device; receiving an indication that an authentication device is coupled with a second port of the mobile computing device; receiving a cross-transport authentication request from the authentication device via the second port; authenticating the second port with the authentication device, wherein the authentication grants a set of permissions for communication via the second port when the authentication is successful; transferring at least a subset of the set of permissions granted to the second port during the authentication to the first port; and thereafter, communicating with the accessory through the first port according to the transferred permissions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A mobile computing device comprising:
-
a multi-transport communication interface configured to exchange commands and data with at least one accessory and an authentication controller, the multi-transport communication interface having a plurality of ports; control logic coupled with the multi-transport communication interface, the control logic being configured to; receive a request for cross-transport authentication from an authentication controller via a first port of the plurality of ports of the multi-transport communication interface, the request specifying a second port of the plurality of ports as a destination port, wherein the second port is a wireless port; perform an authentication operation via the first port; and in the event that the authentication operation is successful, grant a set of permissions to at least the second port. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for authenticating an accessory device at a mobile computing device, the method comprising:
-
receiving an accessory identifier from an accessory coupled with a first port of the mobile computing device; receiving a cross-transport authentication request from an authentication device coupled with a second port of the mobile computing device, the cross-transport authentication request including an authentication device identifier; authenticating the authentication device through the second port, wherein the authentication grants a set of permissions for communication via the second port when the authentication is successful; and transferring at least a subset of the set of permissions granted to the second port during the authentication to the first port in the event that the accessory identifier is associated with the authentication device identifier. - View Dependent Claims (17, 18, 19)
-
-
20. A method for authenticating an accessory device at a mobile computing device, the method comprising:
-
receiving a cross-transport authentication request from an authentication device coupled with a third port of the mobile computing device, wherein the cross-transport authentication request indicates wireless ports as destination ports; authenticating the authentication device through the third port, wherein the authentication grants a set of permissions for communication via the third port when the authentication is successful; transferring at least a subset of the set of permissions granted to the third port during the authentication to a first wireless port and a second wireless port, wherein the first wireless port is coupled with a first accessory and a second wireless port is coupled with a second accessory; and providing a communication path through the mobile computing device allowing the first accessory and the second accessory to communicate. - View Dependent Claims (21, 22)
-
-
23. A dongle comprising:
-
a housing; an input/output communication interface disposed at least partially within the housing and configured to couple with a mobile computing device; and an authentication controller disposed within the housing and communicatively coupled with the input/output communication interface, wherein the authentication controller is configured to communicate a cross-transport authentication request to the mobile computing device and wherein the authentication controller is configured to interact with the mobile computing device to authenticate an accessory communicatively coupled with the mobile computing device through another port. - View Dependent Claims (24)
-
Specification