Accessory authentication for electronic devices
First Claim
1. A media player comprising:
- a processor;
a user interface coupled to the processor;
a storage device coupled to the processor; and
a network interface configured to communicate with an accessory in conjunction with the processor,wherein the processor is configured to;
receive authentication control information from the accessory;
in response to receiving the authentication control information determine whether the accessory supports authentication based on the authentication control information, and if the accessory does not support authentication, then authorizing a restricted set of features, otherwise the processor is further configured to;
send a request to the accessory requesting accessory authentication information;
receive the accessory authentication information from the accessory;
send an authentication request to the accessory, the authentication request including a random number;
receive an authentication response from the accessory, the authentication response including an accessory digital signature and an accessory identifier;
extract the accessory digital signature from the authentication response;
obtain a public key associated with the accessory based on the accessory identifier;
validate the accessory digital signature using the public key; and
authenticate the accessory based on the validation.
0 Assignments
0 Petitions
Accused Products
Abstract
Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
421 Citations
8 Claims
-
1. A media player comprising:
-
a processor; a user interface coupled to the processor; a storage device coupled to the processor; and a network interface configured to communicate with an accessory in conjunction with the processor, wherein the processor is configured to; receive authentication control information from the accessory; in response to receiving the authentication control information determine whether the accessory supports authentication based on the authentication control information, and if the accessory does not support authentication, then authorizing a restricted set of features, otherwise the processor is further configured to; send a request to the accessory requesting accessory authentication information; receive the accessory authentication information from the accessory; send an authentication request to the accessory, the authentication request including a random number; receive an authentication response from the accessory, the authentication response including an accessory digital signature and an accessory identifier; extract the accessory digital signature from the authentication response; obtain a public key associated with the accessory based on the accessory identifier; validate the accessory digital signature using the public key; and authenticate the accessory based on the validation. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
receiving, by a host device, authentication control information from an accessory; resetting, by the host device, an authentication status for the host device corresponding to the accessory; sending, by the host device, host authentication information to the accessory, wherein the host authentication information includes version information and a public key index; receiving, by the host device, an authentication request from the accessory, the authentication request including an accessory random number and a private key number; extracting, by the host device, the accessory random number and the private key number; obtaining, by the host device, a private key based on the private key number; generating, by the host device, a host digital signature using the accessory random number, the private key, and a host random number; sending, by the host device, an authentication response to the accessory including the host digital signature; receiving, by the host device, a new authentication status from the accessory; and storing, by the host device, the new authentication status. - View Dependent Claims (7, 8)
-
Specification