Method and system for authenticating an accessory
First Claim
Patent Images
1. A media player comprising:
- a processor; and
an accessory interface coupled to the processor and configured to communicate with an accessory according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions,wherein the processor in conjunction with the accessory interface is configured to;
initiate an authentication operation to authenticate the accessory;
receive first authentication information from the accessory;
validate the first authentication information;
receive one of the plurality of application commands of the media player accessory protocol from the accessory based on validation of the first authentication information;
in response to the received application command, invoke one of the plurality of media player application functions;
receive second authentication information from the accessory, the second authentication information being different from the first authentication information;
validate the second authentication information to determine that authentication operation completed successfully; and
receive a subsequent one of the plurality of application commands from the accessory and, in response to the subsequent application command, invoke a subsequent one of the plurality of media player application functions.
0 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and connector interface for authenticating an accessory, the method includes performing a first authentication operation on the accessory by the media player, where an authentication certificate is validated; and performing a second authentication operation on the accessory by the media player, where an authentication signature is validated. According to the system and method disclosed herein, the media player and accessory may utilize a plurality of commands utilized in a variety of environments such as within a connector interface system environment to control access to the media player.
-
Citations
25 Claims
-
1. A media player comprising:
-
a processor; and an accessory interface coupled to the processor and configured to communicate with an accessory according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, wherein the processor in conjunction with the accessory interface is configured to; initiate an authentication operation to authenticate the accessory; receive first authentication information from the accessory; validate the first authentication information; receive one of the plurality of application commands of the media player accessory protocol from the accessory based on validation of the first authentication information; in response to the received application command, invoke one of the plurality of media player application functions; receive second authentication information from the accessory, the second authentication information being different from the first authentication information; validate the second authentication information to determine that authentication operation completed successfully; and receive a subsequent one of the plurality of application commands from the accessory and, in response to the subsequent application command, invoke a subsequent one of the plurality of media player application functions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A media player comprising:
-
a processor; and an accessory interface coupled to the processor and configured to communicate with an accessory according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, the plurality of media player application functions including a first function associated with a risky behavior and a second function associated with a non-risky behavior, wherein the processor is configured to; receive first authentication information from the accessory in response to an authentication request, the first authentication information being usable by the media player in the authentication operation; receive at least one of the plurality of application commands from the accessory prior to completion of the authentication operation based on validation of the first authentication information; in response to the at least one application command, invoke an associated one of the plurality of media player application functions if the associated one of the plurality of media player application functions is the second function but not invoke the associated one of the plurality of media player application functions if the associated one of the plurality of media player application functions is the first function; and receive an authentication signature from the accessory for validation, wherein the authentication operation completes upon validation of the authentication signature, the authentication signature being different from the first authentication information. - View Dependent Claims (13, 14, 15, 16)
-
-
17. An accessory comprising:
-
a controller; and a media player interface coupled to the controller and configured to communicate with a media player according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, wherein the controller is configured to; receive an authentication request from the media player, the authentication request initiating an authentication operation; transmit first authentication information to the media player in response to the authentication request, send at least one of the plurality of application commands to the media player based on validation of the first authentication information and prior to completion of the authentication operation, wherein the media player processes the at least one application command, thereby allowing the accessory to invoke at least one of the plurality of media player application functions during the authentication operation; and transmit second authentication information different from the first authentication information to the media player for validation, wherein the authentication operation completes upon validation of the second authentication information, and wherein if the authentication operation fails, any subsequent application commands sent by the accessory are not processed by the media player. - View Dependent Claims (18, 19)
-
-
20. An accessory comprising:
-
a controller; and a media player interface coupled to the controller and configured to communicate with a media player according to a media player accessory protocol that defines a plurality of application commands to invoke a plurality of media player application functions, the plurality of media player application functions including a first function associated with a risky behavior and a second function associated with a non-risky behavior, wherein the controller is configured to; receive an authentication request from the media player, the authentication request initiating an authentication operation; send first authentication information to the media player in response to the authentication request, the first authentication information being usable by the media player in the authentication operation; send at least one of the plurality of application commands to the media player prior to completion of the authentication operation based on validation of the first authentication information, wherein in response to the at least one application command, the media player invokes an associated one of the plurality of media player application functions if the associated one of the plurality of media player application functions is the second function but does not invoke the associated one of the plurality of media player application functions if the associated one of the plurality of media player application functions is the first function; send an authentication signature to the media player for validation, wherein the authentication operation completes upon validation of the authentication signature, the authentication signature being different from the first authentication information; and wherein if the authentication operation fails, any subsequent commands sent by the accessory are ignored by the media player. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification