Battery pack authentication for a mobile communication device
First Claim
1. A mobile communication device comprising:
- a main processor for controlling operation of the mobile communication device;
a device memory coupled to the main processor, the device memory being adapted for storing several sets of first and second portions of security information used for authentication; and
a smart battery coupled to the main processor, the smart battery being adapted to provide supply power to the mobile communication device, the smart battery comprising;
a battery processor for controlling operation of the smart battery and communicating with the main processor; and
a battery memory coupled to the battery processor, the battery memory being adapted for storing information including a third portion of security information used for authentication;
wherein the main processor is configured to send an authentication request including a selected first portion of security information to the battery processor, the selected first portion of security information being selected from one of the several sets of first portions of security information,wherein the battery processor is configured to generate a response based on the selected first portion of security information and the third portion of security information and send the generated response to the main processor,wherein the smart battery is authenticated if the generated response matches a corresponding second portion of security information that corresponds to the selected first portion of security information, andwherein the main processor is configured to perform authentication on the smart battery using any one of the several sets of first and second portions of security information, andwherein the several sets of first and second portions of security information stored in the device memory are unique compared to the several sets of first and second portions of security information stored on all other similar mobile communication devices.
4 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments are described herein for a mobile communication device that authenticates a smart battery prior to use. The mobile device includes a main processor and a device memory. The device memory stores first and second portions of security information used for authentication. The smart battery includes a battery processor and a battery memory. The battery memory stores a third portion of security information used for authentication. The main processor sends an authentication request including the first portion of security information to the battery processor, and the battery processor generates a response based on the first and third portions of security information and sends the generated response to the main processor. The smart battery is authenticated if the generated response matches the second portion of security information.
71 Citations
22 Claims
-
1. A mobile communication device comprising:
-
a main processor for controlling operation of the mobile communication device; a device memory coupled to the main processor, the device memory being adapted for storing several sets of first and second portions of security information used for authentication; and a smart battery coupled to the main processor, the smart battery being adapted to provide supply power to the mobile communication device, the smart battery comprising; a battery processor for controlling operation of the smart battery and communicating with the main processor; and a battery memory coupled to the battery processor, the battery memory being adapted for storing information including a third portion of security information used for authentication; wherein the main processor is configured to send an authentication request including a selected first portion of security information to the battery processor, the selected first portion of security information being selected from one of the several sets of first portions of security information, wherein the battery processor is configured to generate a response based on the selected first portion of security information and the third portion of security information and send the generated response to the main processor, wherein the smart battery is authenticated if the generated response matches a corresponding second portion of security information that corresponds to the selected first portion of security information, and wherein the main processor is configured to perform authentication on the smart battery using any one of the several sets of first and second portions of security information, and wherein the several sets of first and second portions of security information stored in the device memory are unique compared to the several sets of first and second portions of security information stored on all other similar mobile communication devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
wherein the first portions of security information comprise pre-computed challenges, wherein the second portions of security information comprise corresponding pre-computed responses that correspond to the pre-computed challenges and are generated by operating on the pre-computed challenges with a cryptographic method and a private key, wherein the third portion of security information includes the cryptographic method and the private key, and wherein the cryptographic method and the private key are stored in the smart battery and not on the mobile communication device. -
3. The mobile communication device of claim 2,
wherein after the authentication request is made by the main processor, the battery processor is configured to generate a response based on the pre-computed challenge of the selected first portion of security information, the private key and the cryptographic method, and wherein the smart battery is authenticated if the generated response matches the corresponding pre-computed response that corresponds to the selected first portion of security information stored on the device memory. -
4. The mobile communication device of claim 1, wherein the several sets of first and second portions of security information provide several challenge and response pairs and authentication of the smart battery is performed using at least one of the several challenge and response pairs.
-
5. The mobile communication device of claim 1, wherein if the smart battery fails authentication, the main processor is configured to allow the mobile communication device to continue operating for a limited time duration.
-
6. The mobile communication device of claim 1, wherein if the smart battery fails authentication, the main processor is configured to control radio access of the mobile communication device.
-
7. The mobile communication device of claim 1, wherein if the smart battery fails authentication, the main processor is configured to allow charging of the smart battery to a pre-determined charge capacity if the smart battery is in an under-voltage condition.
-
8. The mobile communication device of claim 7, wherein the under-voltage condition occurs when a termination voltage of the smart battery is approximately 2.5 V, and wherein the pre-determined charge capacity of the smart battery is approximately 3.0 V.
-
9. The mobile communication device of claim 1, wherein the main processor and the smart battery are coupled via a data line with a maximum data rate of approximately 300 bits per second.
-
-
10. A method for authenticating a smart battery for use with a mobile communication device that includes a main processor, a device memory and the smart battery including a battery processor and a battery memory, the method comprising:
-
storing several sets of first and second portions of security information used for authentication on the device memory; storing a third portion of security information used for authentication on the battery memory but not on the mobile communication device; sending an authentication request and a selected first portion of security information from the main processor to the smart battery, the selected first portion of security information being selected from one of the several sets of first portions of security information; generating a response at the smart battery based on the selected first portion of security information and the third portion of security information and sending the generated response to the main processor; comparing the generated response with a corresponding second portion of security information that corresponds to the selected first portion of security information at the main processor and authenticating the smart battery if the generated response matches the corresponding second portion of security information; and wherein, authentication of the smart battery can be performed using any one of the several sets of first and second portions of security information; and wherein the several sets of first and second portions of security information stored in the device memory are unique compared to the several sets of first and second portions of security information stored on all other similar mobile communication devices. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
wherein the first portions of security information comprise pre-computed challenges, wherein the second portions of security information comprise corresponding pre-computed responses that correspond to the pre-computed challenges and are generated by operating on the pre-computed challenges with a cryptographic method and a private key, and wherein the third portion of security information includes the cryptographic method and the private key. -
12. The method of claim 10, wherein the several sets of first and second portions of security information provide several challenge and response pairs and authentication of the smart battery is performed using at least one of the several challenge and response pairs.
-
13. The method of claim 10, further comprising, in the case of non-authentication, repeating authentication several times to determine that non-authentication is not due to a data transmission error for data transmission between the main processor and the battery processor.
-
14. The method of claim 10, further comprising, if the smart battery fails authentication, allowing operation of the mobile communication device to continue for a limited time duration.
-
15. The method of claim 10, further comprising, if the smart battery fails authentication, controlling radio access of the mobile communication device.
-
16. The method of claim 10, further comprising coupling the main processor and the smart battery via a data line having a maximum data rate of approximately 300 bits per second.
-
17. The method of claim 10, wherein if the smart battery fails authentication, the method comprises allowing charging of the smart battery to a pre-determined charge capacity if the smart battery is in an under-voltage condition.
-
18. The method of claim 17, wherein the under-voltage condition occurs when a termination voltage of the smart battery is approximately 2.5 V, and wherein the minimum charge capacity of the smart battery is approximately 3.0 V.
-
19. The method of claim 10, further comprising encrypting the pre-computed challenge.
-
20. The method of claim 10, further comprising generating a random number for the pre-computed challenge.
-
21. The method of claim 10, further comprising authenticating the smart battery each time the mobile communication device is turned on.
-
-
22. A mobile communication device comprising:
-
a main processor for controlling operation of the mobile communication device; a device memory coupled to the main processor, the device memory being adapted for storing several sets of first and second portions of security information used for authentication; and a smart battery coupled to the main processor, the smart battery being adapted to provide supply power to the mobile communication device, the smart battery comprising; a battery processor for controlling operation of the smart battery and communicating with the main processor; a battery memory coupled to the battery processor, the battery memory being adapted for storing information including a third portion of security information used for authentication; and battery authentication means for authenticating the smart battery by sending an authentication request including a selected first portion of security information to the battery processor, the selected first portion of security information being selected from one of the several sets of first portions of security information, receiving from the battery processor a response generated based on the selected first portion of security information and the third portion of security information, and determining that the smart battery is authenticated if the generated response matches a corresponding second portion of security information that corresponds to the selected first portion of security information and wherein the battery authentication means is configured to perform authentication on the smart battery using any one of the several sets of first and second portions of security information; and
wherein the several sets of first and second portions of security information stored in the device memory are unique compared to the several sets of first and second portions of security information stored on all other similar mobile communication devices.
-
Specification