Interface and communication protocol for a mobile device with a smart battery
First Claim
1. A method of communicating according to a battery communication protocol between a main processor of a mobile communication device and a battery used by the mobile communication device, wherein the method comprises:
- providing a communication interface between the main processor and the battery to provide communication therebetween;
sending a protocol version request packet from the main processor to the battery;
initiating authentication of the battery by the main processor based on a cryptographic algorithm executed by the battery and the main processor, if the battery provides a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet; and
performing an action for a non-authentic battery, if the battery does not provide a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet.
4 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments are described herein for a mobile communication device that utilizes a smart battery. The mobile device includes a main processor for controlling the operation of the mobile communication device. The smart battery is coupled to the main processor and provides supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor, and a battery module having one or more batteries for providing the supply power. A battery interface is provided for coupling between the main processor and the battery processor for providing communication therebetween. The battery interface comprises a data communication line and protection circuitry for protecting the main processor from electrostatic discharge. A communication protocol is also provided for communication between the main processor and the battery processor.
74 Citations
36 Claims
-
1. A method of communicating according to a battery communication protocol between a main processor of a mobile communication device and a battery used by the mobile communication device, wherein the method comprises:
-
providing a communication interface between the main processor and the battery to provide communication therebetween; sending a protocol version request packet from the main processor to the battery; initiating authentication of the battery by the main processor based on a cryptographic algorithm executed by the battery and the main processor, if the battery provides a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet; and performing an action for a non-authentic battery, if the battery does not provide a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium on which are stored program instructions for a method of communicating according to a battery communication protocol between a main processor of a mobile communication device and a battery used by the mobile communication device, wherein the program instructions are executable by the main processor, and wherein the program instructions are for:
-
sending a protocol version request packet from the main processor to the battery; initiating authentication of the battery by the main processor based on a cryptographic algorithm executed by the battery and the main processor, if the battery provides a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet; and performing an action for a non-authentic battery, if the battery does not provide a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An electronic device comprising:
-
a main processor for controlling operation of the electronic device, the main processor comprising a transmit pin for transmitting data and a receive pin for receiving data; a second device coupled to the main processor, the second device comprising a second processor for controlling operation of the second device and communicating with the main processor, and an input/output pin for sending and receiving data; and an interface coupled between the main processor and the second processor for providing communication therebetween according to a communication protocol, wherein the main processor is configured to send a protocol version request packet to the second processor, to initiate authentication of the second device based on a cryptographic algorithm executed by the second processor and the main processor when the second processor provides a protocol version response packet to the main processor in response to the protocol version request packet; and to read an ID resistor of the second device to identify a type of the second device when the second processor does not provide a protocol version response packet to the main processor in response to the protocol version request packet. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. An electronic device comprising:
-
a main processor for controlling operation of the electronic device, the main processor comprising a transmit pin for transmitting data and a receive pin for receiving data; a second device coupled to the main processor, the second device comprising a second processor for controlling operation of the second device and communicating with the main processor, and an input/output pin for sending and receiving data; and an interface coupled between the main processor and the second processor for providing communication therebetween according to a communication protocol, wherein the main processor is configured to send a protocol version request packet to the second processor, to initiate authentication of the second device based on a cryptographic algorithm executed by the second processor and the main processor when the second processor provides a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet, and to perform an action for a non-authentic second device when the second processor does not provide a protocol version response packet with a valid protocol version to the main processor in response to the protocol version request packet. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
Specification