摘要 |
<p><P>PROBLEM TO BE SOLVED: To provide improved techniques to control utilization of accessory devices with electronic devices by using cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. <P>SOLUTION: By authenticating encrypted authentication information, different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a music player, that can present (e.g., play) media items (or media assets). <P>COPYRIGHT: (C)2010,JPO&INPIT</p> |