发明名称 Accessory authentication for electronic devices
摘要 Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
申请公布号 US9223958(B2) 申请公布日期 2015.12.29
申请号 US201414312672 申请日期 2014.06.23
申请人 APPLE INC. 发明人 Rubinstein Jonathan J.;Fadell Anthony M.;Dorogusker Jesse Lee;Mitchell Adler;Archibald John Wesley
分类号 G06F21/40;G06F21/60;G06F21/44 主分类号 G06F21/40
代理机构 Kilpatrick Townsend & Stockton LLP 代理人 Kilpatrick Townsend & Stockton LLP
主权项 1. An electronic system comprising: an accessory comprising: a first memory to store a device identifier and to provide the device identifier;a processor coupled to the memory to receive the device identifier from the first memory and to provide the device identifier to a communication bus; anda connector to provide a path for the communication bus; and a mobile computing device comprising: a connector to provide a path for the communication bus;a port interface coupled to the connector to receive the device identifier from the accessory over the communication bus;an authorization table comprising a list of device identifiers and corresponding sets of authorized features; andan authentication module coupled to the port interface to receive the device identifier from the accessory, the authorization module further coupled to the authorization table to find a match for the device identifier from the accessory in the list of device identifiers and to find a corresponding set of authorized features, and then to allow the accessory to access features of the mobile computing device identified by the corresponding set of authorized features.
地址 Cupertino CA US