Peripheral authentication
First Claim
Patent Images
1. A method, comprising:
- determining, based on information read or received from a peripheral in communication with a host device, that the peripheral is capable of authentication;
configuring data lines for non-differential signaling;
performing an authentication protocol using the non-differential signaling data lines effective to authenticate the peripheral; and
responsive to the peripheral being authenticated, re-configuring the non-differential signaling, data lines back to differential signaling for full use, orresponsive to the peripheral not being authenticated, configuring the non-differential signaling, data lines for limited use or no use.
3 Assignments
0 Petitions
Accused Products
Abstract
This document describes techniques (300, 400) and apparatuses (100, 500, 600, 700) for peripheral authentication. These techniques (300, 400) and apparatuses (100, 500, 600, 700) may configure data lines for authentication between host device (102) and peripheral (106), use these configured data lines to authenticate the peripheral (106), and then reconfigure the data lines for use.
-
Citations
20 Claims
-
1. A method, comprising:
-
determining, based on information read or received from a peripheral in communication with a host device, that the peripheral is capable of authentication; configuring data lines for non-differential signaling; performing an authentication protocol using the non-differential signaling data lines effective to authenticate the peripheral; and responsive to the peripheral being authenticated, re-configuring the non-differential signaling, data lines back to differential signaling for full use, or responsive to the peripheral not being authenticated, configuring the non-differential signaling, data lines for limited use or no use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
making information available to a host device via an identification line of a universal serial bus (USB) connector, the information indicating that a peripheral to the host device is capable of authentication; receiving an authentication command from the host device via the identification line, the authentication command effective to configure the peripheral to determine a cryptographic response to an authentication challenge; receiving the authentication challenge from the host device via data lines of the USB connector, wherein the data lines are configured for non-differential signaling; communicating the cryptographic response to the host device via the data lines of the USB connector; and receiving a use command from the host device via the identification line of the USB connector, the use command effective to re-configure the data lines for differential signaling. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A peripheral to a host device, the peripheral comprising:
-
a configuration switch configured to switch one or more data lines of a universal serial bus (USB) connector responsive to a command received via an identification line of the USB connector, the one or more data lines configured to switch between an authentication module of the peripheral using non-differential signaling and a service module of the peripheral using differential signaling, wherein the authentication module is configured to determine a cryptographic response to a challenge received from the host device via the one or more data lines, the cryptographic response usable to authenticate the peripheral. - View Dependent Claims (19, 20)
-
Specification