Method to authenticate an accessory

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S170000, C713S150000

Reexamination Certificate

active

07900045

ABSTRACT:
An apparatus (100) used by a plurality of devices to authenticate an accessory (120) is configured to operate with a device (110) of the plurality of devices. The accessory (120) applies an authentication algorithm to a key and a challenge (130) received from the device (110) and generates a response (132) thereto. A challenge and response memory (114) stores a subset of a set of challenges (232) and pre-computed responses (230). The enabling circuit transmits a challenge (130) to the accessory (120) and receives a received response (132) therefrom. The enabling circuit (112) also compares the received response (132) to the stored response (230) corresponding to the stored challenge (232) sent to the accessory (120). The enabling circuit (112) is configured to generate a normal operation enabling signal that enables normal operation of the device when the received response (132) matches the stored response and is configured not to generate the normal operation enabling signal when the received response (132) does not match the stored response.

REFERENCES:
patent: 2005/0010782 (2005-01-01), Ohkubo
patent: 2005/0149740 (2005-07-01), Kotzin et al.
patent: 2005/0188206 (2005-08-01), Kwok
patent: 2005086158 (2005-09-01), None
Rubinstein (Pub. No. US 200610156415 A1).
A model for battery lifetime analysis for organizing applications on a pocket computer ; Rakhmatov, D.; Vrudhula, S.; Wallach, D.A.; Very Large Scale Integration (VLSI) Systems, IEEE Transactions on; vol. 11 , Issue: 6 Publication Year: 2003 , pp. 1019-1030.
A round robin algorithm for an embedded electronic battery equalizer ; Hande, A.; Stuart, T.A.; Electro/Information Technology Conference, 2004. EIT 2004. IEEE Publication Year: 2004 , pp. 199-206.
A microprocessor based intelligent battery charger; Dahlman, J.; Girard, S.; Miller, G.; Beede, D.; Curatolo, T.; Battery Conference on Applications and Advances, 1994., Proceedings of the Ninth Annual Publication Year: 1994 , pp. 185-190.
N.M. Haller, “The S/Key One-Time Password”, Symposium on Network and Distributed System Security, Dec. 30, 2004, USA.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method to authenticate an accessory does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method to authenticate an accessory, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to authenticate an accessory will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2695629

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.