×

Battery pack authentication for a mobile communication device

  • US 8,639,219 B2
  • Filed: 10/28/2011
  • Issued: 01/28/2014
  • Est. Priority Date: 10/14/2005
  • Status: Active Grant
First Claim
Patent Images

1. A mobile communication device comprising:

  • a main processor for controlling operation of the mobile communication device;

    a device memory coupled to the main processor, the device memory being adapted for storing several sets of first and second portions of security information used for authentication; and

    a smart battery coupled to the main processor, the smart battery being adapted to provide supply power to the mobile communication device, the smart battery comprising;

    a battery processor for controlling operation of the smart battery and communicating with the main processor; and

    a battery memory coupled to the battery processor, the battery memory being adapted for storing information including a third portion of security information used for authentication;

    wherein the main processor is configured to send an authentication request including a selected first portion of security information to the battery processor, the selected first portion of security information being selected from one of the several sets of first portions of security information,wherein the battery processor is configured to generate a response based on the selected first portion of security information and the third portion of security information and send the generated response to the main processor,wherein the smart battery is authenticated if the generated response matches a corresponding second portion of security information that corresponds to the selected first portion of security information, andwherein the main processor is configured to perform authentication on the smart battery using any one of the several sets of first and second portions of security information, andwherein the several sets of first and second portions of security information stored in the device memory are unique compared to the several sets of first and second portions of security information stored on all other similar mobile communication devices.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×