-
公开(公告)号:JP2014053966A
公开(公告)日:2014-03-20
申请号:JP2013252930
申请日:2013-12-06
Applicant: Apple Inc , アップル インコーポレイテッド
Inventor: RUBINSTEIN JONATHAN JAKE , FADELL ANTHONY M , DOROGUSKER JESSE L , ADLER MITCHELL , ARCHIBALD JOHN WESLEY
CPC classification number: G06F21/44 , G06F21/445 , G06F21/602 , G06F2221/2129
Abstract: PROBLEM TO BE SOLVED: To provide improved techniques to control utilization of accessory devices with electronic devices using cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another.SOLUTION: Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on a manufacturer or product basis by authenticating encrypted authentication information. Another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices that can receive accessory devices. One example of a media device is a media player, such as a music player that can present (e.g., play) media items (or media assets).
Abstract translation: 要解决的问题:提供改进的技术来控制使用电子设备的附件设备的利用,所述设备使用密码方式认证电子设备,即彼此互连和通信的电子设备。解决方案:例如可以提供不同的电子设备 取决于不同的认证程度或级别,或者通过认证加密的认证信息,取决于制造商或产品。 另一方面涉及使用附件(或适配器)将外围设备(例如,USB设备)转换为主机设备(例如,USB主机)。 改进的技术特别适用于电子设备,例如可以接收附件设备的媒体设备。 媒体设备的一个示例是媒体播放器,例如可以呈现(例如,播放)媒体项目(或媒体资产)的音乐播放器。
-
公开(公告)号:JP2010183571A
公开(公告)日:2010-08-19
申请号:JP2010011810
申请日:2010-01-22
Applicant: Apple Inc , アップル インコーポレイテッド
Inventor: RUBINSTEIN JONATHAN JAKE , FADELL ANTHONY M , DOROGUSKER JESSE L , ADLER MITCHELL , ARCHIBALD JOHN WESLEY
CPC classification number: G06F21/44 , G06F21/445 , G06F21/602 , G06F2221/2129
Abstract: PROBLEM TO BE SOLVED: To provide improved techniques to control utilization of accessory devices with electronic devices by using cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. SOLUTION: By authenticating encrypted authentication information, different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a music player, that can present (e.g., play) media items (or media assets). COPYRIGHT: (C)2010,JPO&INPIT
Abstract translation: 要解决的问题:提供改进的技术,通过使用密码方法来认证电子设备,即彼此互连和通信的电子设备来控制具有电子设备的附件设备的利用。 解决方案:通过认证加密的认证信息,不同的电子设备例如可以根据不同程度或认证级别,或根据制造商或产品的不同而不同地进行配置。 另一方面涉及使用附件(或适配器)将外围设备(例如,USB设备)转换为主机设备(例如,USB主机)。 改进的技术特别适用于可以接收附件设备的电子设备,例如媒体设备。 媒体设备的一个示例是可以呈现(例如,播放)媒体项目(或媒体资产)的媒体播放器,诸如音乐播放器。 版权所有(C)2010,JPO&INPIT
-
公开(公告)号:AU2009100547B4
公开(公告)日:2010-03-18
申请号:AU2009100547
申请日:2009-06-05
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , DOROGUSKER JESSE L , ARCHIBALD JOHN WESLEY , RUBINSTEIN JONATHAN JAKE , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2008101148B4
公开(公告)日:2009-08-20
申请号:AU2008101148
申请日:2008-11-26
Applicant: APPLE INC
Inventor: DOROGUSKER JESSE L , RUBINSTEIN JONATHAN JAKE , ARCHIBALD JOHN WESLEY , ADLER MITCHELL , FADELL ANTHONY M
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2009100547A4
公开(公告)日:2009-07-16
申请号:AU2009100547
申请日:2009-06-05
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , DOROGUSKER JESSE L , ARCHIBALD JOHN WESLEY , RUBINSTEIN JONATHON JAKE , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2009100547A8
公开(公告)日:2009-10-01
申请号:AU2009100547
申请日:2009-06-05
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , DOROGUSKER JESSE L , ARCHIBALD JOHN WESLEY , RUBINSTEIN JONATHAN JAKE , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2009100547A6
公开(公告)日:2009-09-24
申请号:AU2009100547
申请日:2009-06-05
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , DOROGUSKER JESSE L , ARCHIBALD JOHN WESLEY , RUBINSTEIN JONATHAN JAKE , ADLER MITCHELL
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2005323229A1
公开(公告)日:2006-07-13
申请号:AU2005323229
申请日:2005-12-13
Applicant: APPLE INC
Inventor: ARCHIBALD JOHN WESLEY , DOROGUSKER JESSE L , ADLER MITCHELL , RUBINSTEIN JONATHAN JAKE , FADELL ANTHONY M
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2009100749A4
公开(公告)日:2009-09-24
申请号:AU2009100749
申请日:2009-08-03
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , ADLER MITCHELL , ARCHIBALD JOHN WESLEY , DOROGUSKER JESSE L , RUBINSTEIN JONATHAN JAKE
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
公开(公告)号:AU2008101150B4
公开(公告)日:2009-07-23
申请号:AU2008101150
申请日:2008-11-26
Applicant: APPLE INC
Inventor: FADELL ANTHONY M , ADLER MITCHELL , RUBINSTEIN JONATHAN JAKE , DOROGUSKER JESSE L , ARCHIBALD JOHN WESLEY
IPC: G06F21/20
Abstract: Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets).
-
-
-
-
-
-
-
-
-