摘要 |
<p>A communication protocol between a master device (102), such as a mobile phone, and a peripheral device (104) facilitates authentication of the peripheral device. When a peripheral device is detected, the master device initiates a wake-up command to the peripheral device, transmits an authentication request command followed by challenge data to the peripheral device, and awaits responses from the peripheral device. The accessory receives the challenge data, performs a hash function on the challenge data, performs a hash function on the challenge data, and generates response data. An authentication response type byte is sent to the mobile phone followed by the response data. The mobile phone compares the response data to pre-stored data that is associated with the challenge data. A match indicates that the accessory is authentic. The challenge / response data, also referred to as a plaintext / cyphertext pair, is pre-generated external to the mobile phone using the hash function, then pre-stored in the mobile phone.</p> |