×

Protecting against counterfeit electronic devices

  • US 9,148,286 B2
  • Filed: 10/14/2008
  • Issued: 09/29/2015
  • Est. Priority Date: 10/15/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method of authenticating a second device connected to a first device, the method comprising:

  • transmitting a first data string from the first device to the second device, the first device including a first encryption key provided to the first device at manufacture of the first device and the second device including a second encryption key provided to the second device at manufacture of the second device, wherein one of the first device and the second device is a first host device and the other one of the first device and the second device is a first optical transceiver having a first edge connector through which the first optical transceiver transmits data to the first host device and through which the first optical transceiver receives data from the first host device;

    generating, at the second device, a second data string by applying the second encryption key to the first data string such that the second data string is a first encrypted copy of the first data string;

    transmitting the second data string from the second device to the first device;

    receiving the second data string at the first device from the second device;

    generating, at the first device, a third data string by applying the first encryption key to the first data string such that the third data string is a second encrypted copy of the first data string;

    comparing, at the first device, the third data string and the second data string;

    authenticating the second device as an authentic device from a reliable manufacturer when the third data string and the second data string match; and

    withholding power from the first optical transceiver by the first host device not transmitting power to the first optical transceiver through the first edge connector to prevent the first optical transceiver from functioning while maintaining power to the first host device when the second device is not authenticated.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×