The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 13, 2015
Filed:
May. 14, 2012
Jim Tom Belesiu, Mill Creek, WA (US);
Gene Robert Obie, Clinton, WA (US);
James Charles Marshall, Puyallup, WA (US);
Robert D. Young, Kirkland, WA (US);
Nathan C. Sherman, Bellevue, WA (US);
Edward C. Giaimo, Iii, Bellevue, WA (US);
David Neff, Bothell, WA (US);
Jose R. Sousa, Redmond, WA (US);
Jim Tom Belesiu, Mill Creek, WA (US);
Gene Robert Obie, Clinton, WA (US);
James Charles Marshall, Puyallup, WA (US);
Robert D. Young, Kirkland, WA (US);
Nathan C. Sherman, Bellevue, WA (US);
Edward C. Giaimo, III, Bellevue, WA (US);
David Neff, Bothell, WA (US);
Jose R. Sousa, Redmond, WA (US);
Microsoft Corporation, Redmond, WA (US);
Abstract
Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.