Protocol for authenticating functionality in a peripheral device
Abstract:
A protocol provides authentication of peripheral devices by a computing device to which the peripheral device connects. Computing devices include a verifier with a public key that authenticates multiple associated private keys. Private keys are embedded on peripheral devices. When the verifier is able to authenticate a connected peripheral, particular functionality is enabled that may not be enabled for peripherals that do not authenticate.
Public/Granted literature
Information query
Patent Agency Ranking
0/0