Accessory device authentication
First Claim
1. A method for authenticating an accessory, the method comprising:
- determining, by a portable media device, that an authentication device is coupled to a first port of the portable media device;
determining, by the portable media device, that the accessory is coupled to a second port of the portable media device;
receiving, by the portable media device, an authentication request from the authentication device, the authentication request being for authenticating the second port;
exchanging, by the portable media device, authentication information with the authentication device; and
authenticating, by portable media device, the second port based on the authentication information.
0 Assignments
0 Petitions
Accused Products
Abstract
An authentication controller coupled to a first communication port of a portable computing device is allowed to provide authentication on behalf of an accessory device coupled to a second communication port of the portable computing device. In one embodiment, a dongle that includes an authentication controller can be coupled with the portable computing device. Accessory devices can also be coupled with the portable computing device through other ports, including wireless ports. The dongle can provide cross-transport authentication for accessories that do not include authentication controllers. Once the dongle had been properly authenticated, the permissions granted to the dongle port can be transferred to a communication port coupled with an accessory.
-
Citations
21 Claims
-
1. A method for authenticating an accessory, the method comprising:
-
determining, by a portable media device, that an authentication device is coupled to a first port of the portable media device; determining, by the portable media device, that the accessory is coupled to a second port of the portable media device; receiving, by the portable media device, an authentication request from the authentication device, the authentication request being for authenticating the second port; exchanging, by the portable media device, authentication information with the authentication device; and authenticating, by portable media device, the second port based on the authentication information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
determining, by an accessory, that the accessory is connected to a first port of a portable media device, wherein an authentication controller is coupled to a second port of the portable media device; sending, by the accessory, a message to the portable media device requesting information on whether the portable media device supports cross transport authentication; receiving, by the accessory, a response that the portable media device supports cross transport authentication; waiting, by the accessory, a predetermined time to allow the authentication controller to be authenticated by the portable media device via the second port; sending, by the accessory to the portable media device, upon expiration of the predetermined time, a request for granting a set of permissions to the first port; receiving, by the accessory from the portable media device, indication that the set of permissions have been granted to the first port, wherein the set of permissions are transferred from the second port; and communicating, by the accessory with the portable media device, using the set of permissions. - View Dependent Claims (7, 8)
-
-
9. A portable media device comprising:
-
a first port; a second port; and control logic coupled to the first port and the second port, wherein the control logic is configured to; determine that an authentication device is coupled to the first port; determine that an accessory is coupled to the second port; receive an authentication request from the authentication device, the authentication request being for authenticating the second port; exchange authentication information with the authentication device via the first port; and authenticate the second port based on the authentication information. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
detecting, by a portable media device, connection of an authentication device to a first port of the portable media device; detecting, by the portable media device, coupling of a first accessory with a second port of the portable media device; receiving, by the portable media device, a cross-transport authentication request from the authentication device, the cross-transport authentication request including a first identifier for the authentication device; authenticating, by the portable media device, the authentication device; granting, by the portable media device, a set of permissions to the first port; receiving, by the portable media device from the accessory, a second identifier associated with the accessory; determining, by the portable media device, whether the second identifier matches the first identifier; and if the second identifier matches the first identifier, transferring, by the portable media device, at least a sub-set of permissions from the set of permissions to the second port. - View Dependent Claims (17, 18)
-
-
19. An authentication device comprising:
-
a processor; a storage device configured to store a private key associated with the authentication device; a communication interface coupled to the processor and the storage device, wherein the authentication device is configured to; couple with a portable media device via a first port of the portable media device; send a device identifier associated with the authentication controller to the portable media device; communicate with the portable media device to determine that the portable media device supports cross-transport authentication; send a cross-transport authentication request to the portable media device to authenticate an accessory coupled to a second port of the portable media device; and communicate with the portable media device to authenticate itself. - View Dependent Claims (20, 21)
-
Specification