Accessory device authentication

A kind of accessory equipment and equipment technology, applied in digital data authentication, digital data processing parts, internal/peripheral computer component protection, etc., can solve problems such as inefficiency, danger, and reduced battery life

Active Publication Date: 2014-11-19
MICROSOFT TECH LICENSING LLC
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, enabling the device to give / receive power to any connected accessory device (e.g., an unauthorized device) may reduce battery life in unintended ways, and / or if power transfer is allowed to occur arbitrarily, can be inefficient and even dangerous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Accessory device authentication
  • Accessory device authentication
  • Accessory device authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] overview

[0012] Enabling an accessory device to arbitrarily exchange power with a host device may reduce battery life in unintended ways, and / or may be inefficient and even dangerous if power transfer occurs between the host and an incompatible device.

[0013] Accessory device verification techniques are described. In one or more embodiments, a connection of the accessory device to the host computing device is detected. In response to detection, an authentication sequence may occur to verify the identity and / or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device can authorize the accessory device for power exchange interactions with the host device. The host device can then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. In some scenarios, the host device can also enable the accessory device to obtain and use power suppli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and / or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.

Description

Background technique [0001] Mobile computing devices have evolved to add functionality that makes them available to users in a mobile environment. For example, a user may interact with a mobile phone, tablet computer, or other mobile computing device to check email, surf the World Wide Web, write text, interact with applications, and so forth. One challenge faced by developers of mobile computing devices is efficient power management and battery life extension. For example, in various scenarios, the host device can supply power to and / or draw power from the accessory device. However, enabling the device to give / receive power to any connected accessory device (e.g., an unauthorized device) may reduce battery life in unintended ways, and / or if power transfer is allowed to occur arbitrarily, It may be inefficient and even dangerous. Contents of the invention [0002] Accessory device verification techniques are described. In one or more embodiments, a connection of the acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/81G06F21/44G06F1/26
CPCG06F1/1632G06F1/1683G06F21/44G06F1/1654G06F1/1626G06F1/26
Inventor J.T.贝勒休G.R.奥比J.C.马莎尔R.D.杨N.C.谢尔曼E.C.吉埃莫三世D.内夫J.R.索萨
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products