Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2011-03-01
2011-03-01
Jung, David Y (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S170000, C713S150000
Reexamination Certificate
active
07900045
ABSTRACT:
An apparatus (100) used by a plurality of devices to authenticate an accessory (120) is configured to operate with a device (110) of the plurality of devices. The accessory (120) applies an authentication algorithm to a key and a challenge (130) received from the device (110) and generates a response (132) thereto. A challenge and response memory (114) stores a subset of a set of challenges (232) and pre-computed responses (230). The enabling circuit transmits a challenge (130) to the accessory (120) and receives a received response (132) therefrom. The enabling circuit (112) also compares the received response (132) to the stored response (230) corresponding to the stored challenge (232) sent to the accessory (120). The enabling circuit (112) is configured to generate a normal operation enabling signal that enables normal operation of the device when the received response (132) matches the stored response and is configured not to generate the normal operation enabling signal when the received response (132) does not match the stored response.
REFERENCES:
patent: 2005/0010782 (2005-01-01), Ohkubo
patent: 2005/0149740 (2005-07-01), Kotzin et al.
patent: 2005/0188206 (2005-08-01), Kwok
patent: 2005086158 (2005-09-01), None
Rubinstein (Pub. No. US 200610156415 A1).
A model for battery lifetime analysis for organizing applications on a pocket computer ; Rakhmatov, D.; Vrudhula, S.; Wallach, D.A.; Very Large Scale Integration (VLSI) Systems, IEEE Transactions on; vol. 11 , Issue: 6 Publication Year: 2003 , pp. 1019-1030.
A round robin algorithm for an embedded electronic battery equalizer ; Hande, A.; Stuart, T.A.; Electro/Information Technology Conference, 2004. EIT 2004. IEEE Publication Year: 2004 , pp. 199-206.
A microprocessor based intelligent battery charger; Dahlman, J.; Girard, S.; Miller, G.; Beede, D.; Curatolo, T.; Battery Conference on Applications and Advances, 1994., Proceedings of the Ninth Annual Publication Year: 1994 , pp. 185-190.
N.M. Haller, “The S/Key One-Time Password”, Symposium on Network and Distributed System Security, Dec. 30, 2004, USA.
Hansen Joseph M.
Rager Kent D.
Jung David Y
Motorola Mobility, Inc.
Rupert Douglas S.
Watanabe Hisashi D.
LandOfFree
Method to authenticate an accessory does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method to authenticate an accessory, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to authenticate an accessory will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2695629