摘要 |
Disclosed is a method by which a computing device 102 can authenticate an attached accessory 112 by using an authentication device 180 attached to another port. The accessory and the authentication device are coupled to the computing device by separate first 315 and second ports 310. The computing device receives a cross-transport authentication request from the authentication device. The computing device then authenticates the authentication device at the second port, and if successful, grants a set communication permissions, via the second port, to the authentication device. The set of permissions is then transferred to the first port and thus allows the accessory to communicate with the computing device. The computing device may be a mobile or portable device such as a smartphone. The authentication device may be a dongle and the accessory may be coupled wirelessly. The authentication step may include the accessory sending an identifier to the authentication device via the computing device. |