Patent hints at better iOS/accessory authentication
TweetFollow Us on Twitter

Patent hints at better iOS/accessory authentication

Improved techniques to control utilization of accessory devices with electronic devices are disclosed in a new Apple patent (number 20110061113) at the US Patent & Trademark. The invention relates to electrical devices and, more particularly, to electrical devices, such as media players, that receive accessory devices.

Per the patent, the improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host).

The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets). The inventors are Jonathan Jake Rubenstein, Anthony M. Fadell, Jesse L. Dorogusker, Mitchell Adler and John Wesley Archibald.

Here's Apple's background and summary of the invention: "A media player stores media assets, such as audio tracks or photos, that can be played or displayed on the media player. One example of a media player is the iPod. media player, which is available from Apple Computer, Inc. of Cupertino, Calif. Often, a media player acquires its media assets from a host computer that serves to enable a user to manage media assets. As an example, the host computer can execute a media management application to manage media assets. One example of a media management application is iTunes, version 4.2, produced by Apple Computer, Inc.

"A media player typically includes one or more connectors or ports that can be used to interface to the media player. For example, the connector or port can enable the media player to couple to a host computer, be inserted into a docking system, or receive an accessory device. There are today many different types of accessory devices that can interconnect to the media player. For example, a remote control can be connected to the connector or port to allow the user to remotely control the media player. As another example, an automobile can include a connector and the media player can be inserted onto the connector such that an automobile media system can interact with the media player, thereby allowing the media content on the media player to be played within the automobile.

"Currently, the connectors or ports of a media player are open for use so long as a compatible connector or port is utilized. Consequently, numerous third-parties have developed accessory devices for use with other manufacturers' media players. One difficulty is that the manufacturer of a media player has no control over the various different accessory devices that can be connected to the media player. This is problematic because third-party accessory devices may be inferior, error-prone, disruptive (e.g., resource draining), or even damaging to the media player itself. Another problem is that third-party accessory devices which are unauthorized by the manufacturer of the media device may attempt to utilize features of the media device in an inappropriate or undesired manner.

"Thus, there is a need for improved techniques to enable manufacturers of electronic devices to control the nature and extent to which accessory devices can be utilized with their electronic devices.

"Broadly speaking, the invention pertains to improved techniques to control utilization of accessory devices with electronic devices. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another.

"One aspect of the invention pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect of the invention pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect of the invention pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). Embodiments of the invention may pertain to one or more of these aspects or other aspects disclosed herein.

"The invention can be implemented in numerous ways, including as a method, system, device, apparatus (including graphical user interface), or computer readable medium. Several embodiments of the invention are discussed below.

"As a portable electronic device, one embodiment of the invention includes at least: a media storage device that stores media content for one or more media items; a media presentation module that retrieves media content for at least one of the media items from the media storage and causes the media content to be presented for a user of the portable electronic device; an authentication table that stores authentication information for various accessory devices that are authorized to couple to and interact with the portable electronic device; and an authentication module that determines whether a particular accessory device that is coupled to the portable media device is authorized to interoperate with the portable electronic device based on at least a portion of the authentication information stored in the authentication table.

"As an accessory device for a portable electronic device, one embodiment of the invention includes at least: an input/output port for interacting with the portable electronic device; an authentication algorithm; an authentication key associated with the accessory device; an authentication controller, operatively connected to the input/output port, for performing authentication operations using at least the authentication algorithm and the authentication key; and accessory circuitry that performs operations associated with the accessory device.

"As a connector for connecting an accessory device to a media player, one embodiment of the invention includes at least: a connector body; a plurality of electrical contacts attached within the connector body and serving to provide electrical connections between the accessory device and the media player; and a controller disposed in the connector body and providing an authentication key that allows the accessory device to be authenticated by the media player.

"As a method for authorizing an accessory device for use with an electronic device, one embodiment of the invention includes at least the acts of: receiving a device identifier from the accessory device; receiving an authentication value from the accessory device; determining whether the accessory device is authentic based on the authentication value; and authorizing usage of the accessory device with the electronic device when it is determined that the accessory device is authentic.

"As a method for authorizing an accessory device for use with an electronic device, another embodiment of the invention includes at least the acts of: detecting attachment of the accessory device with the electronic device; sending a random number to the accessory device after attachment of the accessory device has been detected; subsequently receiving an encoded value from the accessory device; receiving a device identifier from the accessory device; obtaining a cryptographic key based on the device identifier; decoding the encoded value using the cryptographic key to produce a decoded value; determining whether the decoded value corresponds to the random number; and authorizing usage of the accessory device with the electronic device when it is determined that the decoded value corresponds to the random number.

"As a method for authorizing an accessory device for use with an electronic device, still another embodiment of the invention includes at least the acts of: detecting attachment of the accessory device with the electronic device; sending an authentication request, including at least a random number, to the accessory device after attachment of the accessory device has been detected; subsequently receiving an authentication response from the accessory device, the authentication response being in response to the authentication request, and the authentication response including at least an encoded value and a device identifier for the accessory device; obtaining a cryptographic key based on the device identifier; decoding the encoded value using the cryptographic key to produce a decoded value; and authorizing usage of the accessory device with the electronic device based on a correspondence between the decoded value and the random number.

"As a method for authorizing an accessory device for use with an electronic device, still yet another embodiment of the invention includes at least the acts of: receiving a random number from the electronic device; encoding the random number using a cryptographic key provided within the accessory device, thereby producing an encoded value; and sending the encoded value and a device identifier to the electronic device.

"As a method for controlling interaction between a media player and an accessory device, one embodiment of the invention includes at least the acts of: determining a classification of the accessory device; identifying an authorization level for the accessory device; and selectively activating features of the media device that are available to be used in conjunction with the accessory device based on the classification and authorization level of the accessory device.

"As a media player system, one embodiment of the invention includes at least: a media player storing media content and supporting a plurality of predetermined functions, and an accessory device capable of connecting to the media player. The media player and the accessory device interact to perform an authentication process and, based on the authentication process, specific functions of the media device are selectively activated and thus available for use by the accessory device.

"Other aspects and advantages of the invention will become apparent from the following detailed description taken in conjunction with the accompanying drawings which illustrate, by way of example, the principles of the invention."

-- Dennis Sellers

 

Community Search:
MacTech Search:

Software Updates via MacUpdate

Apple Remote Desktop 3.8 - Remotely cont...
Apple Remote Desktop is the best way to manage the Mac computers on your network. Distribute software, provide real-time online help to end users, create detailed software and hardware reports, and... Read more
NeoOffice 2014.7 - Mac-tailored, OpenOff...
NeoOffice is a complete office suite for OS X. With NeoOffice, users can view, edit, and save OpenOffice documents, PDF files, and most Microsoft Word, Excel, and PowerPoint documents. NeoOffice 3.x... Read more
DesktopLyrics 2.6.6 - Displays current i...
DesktopLyrics is an application that displays the lyrics of the song currently playing in "iTunes" right on your desktop. The lyrics for the song have to be set in iTunes; DesktopLyrics does nothing... Read more
Ember 1.8.3 - Versatile digital scrapboo...
Ember (formerly LittleSnapper) is your digital scrapbook of things that inspire you: websites, photos, apps or other things. Just drag in images that you want to keep, organize them into relevant... Read more
Apple iTunes 12.1 - Manage your music, m...
Apple iTunes lets you organize and play digital music and video on your computer. It can automatically download new music, app, and book purchases across all your devices and computers. And it's a... Read more
LibreOffice 4.4.3 - Free, open-source of...
LibreOffice is an office suite (word processor, spreadsheet, presentations, drawing tool) compatible with other major office suites. The Document Foundation is coordinating development and... Read more
FoldersSynchronizer 4.2.1 - Synchronize...
FoldersSynchronizer is a popular and useful utility that synchronizes and backs-up files, folders, disks and boot disks. On each session you can apply special options like Timers, Multiple Folders,... Read more
Simon 4.0.2 - Monitor changes and crashe...
Simon monitors websites and alerts you of crashes and changes. Select pages to monitor, choose your alert options, and customize your settings. Simon does the rest. Keep a watchful eye on your... Read more
Cocktail 8.1.2 - General maintenance and...
Cocktail is a general purpose utility for OS X that lets you clean, repair and optimize your Mac. It is a powerful digital toolset that helps hundreds of thousands of Mac users around the world get... Read more
Cyberduck 4.6.4 - FTP and SFTP browser....
Cyberduck is a robust FTP/FTP-TLS/SFTP browser for the Mac whose lack of visual clutter and cleverly intuitive features make it easy to use. Support for external editors and system technologies such... Read more

Playworld Superheroes Review
Playworld Superheroes Review By Tre Lawrence on January 30th, 2015 Our Rating: :: HERO CRAFTINGUniversal App - Designed for iPhone and iPad It’s all about the imagination, fighting bad creatures — and looking good while doing so.   | Read more »
Join the SpongeBob Bubble Party in this...
Join the SpongeBob Bubble Party in this New Match 3 Bubble Poppin’ Frenzy Posted by Jessica Fisher on January 30th, 2015 [ permalink ] | Read more »
Handpick Review
Handpick Review By Jennifer Allen on January 30th, 2015 Our Rating: :: TANTALIZING SUGGESTIONSiPhone App - Designed for the iPhone, compatible with the iPad Handpick will make you hungry, as well as inspire you to cook something... | Read more »
Storm the Halls of Echo Base in First St...
Storm the Halls of Echo Base in First Star Wars: Galactic Defense Event Posted by Jessica Fisher on January 30th, 2015 [ permalink ] Universal App - Designed for iPhone and iPad | Read more »
Contradiction Review
Contradiction Review By Tre Lawrence on January 30th, 2015 Our Rating: :: SPOT THE LIEiPad Only App - Designed for the iPad Contradiction is a live action point and click adventure that’s pretty engaging.   Developer: Tim Follin... | Read more »
Unlock Sunshine Girl in Ironkill with th...
Unlock Sunshine Girl in Ironkill with this special 148Apps code Posted by Rob Rich on January 29th, 2015 [ permalink ] Robo-fighter Ironkill has been out on iOS a | Read more »
Crossroad Zombies Review
Crossroad Zombies Review By Jordan Minor on January 29th, 2015 Our Rating: :: CROSSWALKING DEADiPad Only App - Designed for the iPad Crossroad Zombies is a rough draft of a cool genre mash-up.   | Read more »
Blood Brothers 2 – Tips, Cheats, and Str...
War is hell: Is it the kind of hell you want to check out? Read our Blood Brothers 2 review to find out! Blood Brothers 2, DeNA’s follow-up to the original Blood Brothers, is an intriguing card collecting / role-playing / strategy hybrid. There’s... | Read more »
Blood Brothers 2 Review
Blood Brothers 2 Review By Nadia Oxford on January 29th, 2015 Our Rating: :: AN AGGRAVATING RELATIVEUniversal App - Designed for iPhone and iPad Blood Brothers 2 is built on a simple, solid foundation, but its free-to-play system... | Read more »
I AM BREAD, the Toast of the Town, is Ro...
Have you ever dreamt of being deliciously gluten-y? Do you feel passionate about Rye and Wheat? The guys at Bossa Studios do and that is why they are bringing I AM BREAD to iOS soon. The loafy app will feature all the new content that is being... | Read more »

Price Scanner via MacPrices.net

Intel Aims to Transform Workplace With 5th-Ge...
Intel Corporation today announced the availability of its 5th generation Intel Core vPro processor family that provides cutting-edge features to enable a new and rapidly shifting workplace. To meet... Read more
iOS App Sharalike Introduces New Instant Smar...
Sharalike slideshow and photo management software for iOS, is making it easier than ever to create shareable meaningful moments with its new instant SmartShow technology. Staying organized is a goal... Read more
Apple Becomes World’s Largest Smartphone Vend...
According to the latest research data from Strategy Analytics, as global smartphone shipments grew 31 percent annually to reach a record 380 million units in the fourth quarter of 2014. Apple became... Read more
Cut the Cord: OtterBox Resurgence Power Case...
Dead batteries and broken phones are two of the biggest issues for smartphone users today. Otterbox addresses both with the new Resurgence Power Case for Apple iPhone 6, promising to make those panic... Read more
13-inch Retina MacBook Pros on sale for up to...
B&H Photo has 13″ Retina MacBook Pros on sale for $200 off MSRP. Shipping is free, and B&H charges NY sales tax only: - 13″ 2.6GHz/128GB Retina MacBook Pro: $1199.99 save $100 - 13″ 2.6GHz/... Read more
15-inch 2.5GHz Retina MacBook Pro on sale for...
 B&H Photo has the 15″ 2.5GHz Retina MacBook Pro on sale for $2319.99 including free shipping plus NY sales tax only. Their price is $180 off MSRP, and it’s the lowest price available for this... Read more
Back in stock: Refurbished iPod nanos for $99...
The Apple Store has Apple Certified Refurbished 16GB iPod nanos available for $99 including free shipping and Apple’s standard one-year warranty. That’s $50 off the cost of new nanos. Most colors are... Read more
Apple lowers price on refurbished 256GB MacBo...
The Apple Store has lowered prices on Apple Certified Refurbished 2014 MacBook Airs with 256GB SSDs, now available for up to $200 off the cost of new models. An Apple one-year warranty is included... Read more
New Good Management Suite Simplifies Enterpri...
Good Technology has announced the availability of the Good Management Suite, a comprehensive cross-platform solution for organizations getting started with mobile business initiatives. Built on the... Read more
15-inch 2.0GHz Retina MacBook Pro (refurbishe...
The Apple Store has Apple Certified Refurbished previous-generation 15″ 2.0GHz Retina MacBook Pros available for $1489 including free shipping plus Apple’s standard one-year warranty. Their price is... Read more

Jobs Board

Sr. Mac Expert- *Apple* Online Store - Apple...
**Job Summary** The World Wide Apple Online Store (AOS) Sales and Service team is looking for motivated, outgoing, and tech savvy individuals who want to offer Apple Read more
*Apple* Solutions Consultant- Retail Sales (...
**Job Summary** The ASC is an Apple employee who serves as an Apple brand ambassador and influencer in a Reseller's store. The ASC's role is to grow Apple Read more
Event Director, *Apple* Retail Marketing -...
…This senior level position is responsible for leading and imagining the Apple Retail Team's global engagement strategy and team. Delivering an overarching brand Read more
At-Home Chat Specialist- *Apple* Online Stor...
**Job Summary** At Apple , we believe in hard work, a fun environment, and the kind of creativity and innovation that only comes about when talented people from diverse Read more
SW QA Engineer - *Apple* TV - Apple (United...
**Job Summary** The Apple TV team is looking for experienced Quality Assurance Engineers with a passion for delivering first in class home entertainment solutions. **Key Read more
All contents are Copyright 1984-2011 by Xplain Corporation. All rights reserved. Theme designed by Icreon.