ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES

Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to te...

Full description

Saved in:
Bibliographic Details
Main Authors RUBINSTEIN JONATHAN J, ARCHIBALD JOHN WESLEY, ADLER MITCHELL, FADELL ANTHONY M, DOROGUSKER JESSE LEE
Format Patent
LanguageEnglish
Published 21.04.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
Bibliography:Application Number: US201514979456