Methods and apparatus for power source authentication
First Claim
Patent Images
1. A method of preventing the use of an inappropriate power source in conjunction with a device, said method comprising the steps of:
- performing an authentication procedure wherein the device determines whether the power source is an approved power source;
reducing a functionality of the device in the event that said authentication procedure determines that the power source is not an approved power source.
1 Assignment
0 Petitions
Accused Products
Abstract
A power source management system disposed within a device is configured to communicate with a power source and perform an authentication procedure to determine whether the power source is an approved power source. The authentication procedure may involve the use of a challenge-response procedure using keys resident in the device and the power source. If it is determined that the power source is not an approved power source, the power source management system prevents use of or disables certain functionality of the device.
60 Citations
16 Claims
-
1. A method of preventing the use of an inappropriate power source in conjunction with a device, said method comprising the steps of:
-
performing an authentication procedure wherein the device determines whether the power source is an approved power source;
reducing a functionality of the device in the event that said authentication procedure determines that the power source is not an approved power source. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
- 8. A power source management system disposed within a device, said power source management system configured to communicate with a power source and perform an authentication procedure wherein the power source management system determines whether said power source is an approved power source and prevents full operation of said device in the event that said authentication procedure determines that the power source is not an approved power source.
-
16. A power source comprising:
-
a processor;
a memory coupled to said processor;
a communication link coupled to said processor, wherein said processor is configured to receive a challenge number via said communication link, encrypt said challenge number utilizing a key resident in said memory to form a response, and transmit said response via said communication link.
-
Specification