Many electronic devices accommodate exchange of electrical power both with a line power source (supplied by an electrical utility) and with a supporting battery. Such devices include telephones such as cell phones and so-called smartphones, computer systems, recording devices and others known to persons of skill in the applicable arts. In the discussion which follows, the term electronic device is used as a generic identifier, while other more system specific identifiers are used in a non-limiting way for purposes of clarity only. For the manufacturers of such devices, it is important that the interaction of a device with a battery meet the original specifications in the design of the device. This is significant for purposes of safety (as an improper battery presents known hazards) as well as product performance and customer satisfaction.
Many battery manufacturers produce batteries which meet the physical interface requirement to be fitted to various electronic devices manufactured by others, as there is a significant aftermarket for such batteries. That is, such a device may be sold by a device manufacturer with a battery which meets design specifications and which may ultimately lose usefulness. In such an event, the user of the electronic device will seek a replacement battery, either from the device manufacturer or from an aftermarket battery supplier. In making such a choice, there is a risk that the replacement battery will not meet specifications or will present hazards if used.
Provision has been made heretofore for controlling device and battery interaction by having a “handshake” or recognition function which enables an electronic device to recognize an acceptable battery and enable exchange of electrical power with such a battery while blocking such an exchange with an unrecognized battery. The exchange of electrical power may be discharging the battery to power the device or charging the battery or both. It is common for electrical devices of the types here discussed to have provisions for battery discharge and charge control, as will be known to persons of skill in the applicable arts.
The technology here described facilitates improved handling of battery recognition tasks in an electronic device of the types described. As will be described more fully hereinafter, what is here contemplated are arrangements in which a plurality of specific batteries may be equally given recognition qualities by the electronic device to which they may be fitted. Control over battery authentication as here described enables a device manufacturer to assure that third party aftermarket batteries may be given recognition qualities. Other and further arrangements are described in the specification which follows.
Some of the characteristics of the technology having been described, others will appear as the description proceeds, when taken in connection with the accompanying drawings, in which:
While the present technology will be described more fully hereinafter with reference to the accompanying drawings, in which a preferred embodiment of the present technology is shown, it is to be understood at the outset of the description which follows that persons of skill in the appropriate arts may modify what is here described while still achieving the favorable results desired. Accordingly, the description which follows is to be understood as being a broad, teaching disclosure directed to persons of skill in the appropriate arts, and not as limiting upon the protection sought.
The term “circuit” or “circuitry” may be used in the summary, description, and/or claims. As is well known in the art, the term “circuitry” includes all levels of available integration, e.g., from discrete logic circuits to the highest level of circuit integration such as VLSI, and includes programmable logic components programmed to perform the functions of an embodiment as well as general-purpose or special-purpose processors programmed with instructions to perform those functions.
While various exemplary circuits or circuitry are discussed,
The system 100 of
In
In
The system 100, upon power on, may be configured to execute boot code 190 for the BIOS 168, as stored within the SPI Flash 166, and thereafter processes data under the control of one or more operating systems and application software (e.g., stored in system memory 140). An operating system may be stored in any of a variety of locations and accessed, for example, according to instructions of the BIOS 168. As described herein, a device may include fewer or more features than shown in the system 100 of
It is known that a computer system as illustrated in
The technology which is the focus of this description contemplates operation of the computer system in accordance with a process in which the system accommodates line and battery power, has a first cryptographic element and stores a plurality of digitally encoded binary/hex or number strings. As will be made more clear hereinafter, these strings are stored within memory of the system accessible to the system processor and code stored in the system which manipulates the string in a particular manner. The technology anticipates the coupling to the computer system of a battery which has a second cryptographic element. While the battery is coupled, there is an exchange of encrypted messages derived from one of the strings between cooperating first and second cryptographic elements wherein a matched exchange enables the computer system to recognize the battery and exchange electrical power with the recognized battery.
It will be understood that a battery is only one type of device which may be coupled to an electronic device of the types addressed here. By way of examples only, where the electronic device is a computer system, then a variety of devices offered by various manufacturers may be coupled to the system, such as network interface cards, additional memory of various types, video driver cards and the like. Similar capabilities exist for other electronic devices as well. What is here described as an exchange of messages between cooperating first and second cryptographic elements may enable or disable (in the event of a failed match) functionality of such coupled devices. That is, to continue the example of a computer system and a network interface card, such the addition of such a card to the system result in a failed match (as here described) then the card would not be recognized by the computer system and interfacing to a network through the card blocked. Should the addition result in a matched exchange, then interfacing to a network would be enabled.
As used herein, the phrase “matched exchange” has a particular meaning. A matched exchange occurs when a binary/hex string originating from one of the system and the battery is transmitted to the other in an encrypted form, decrypted where received and returned for comparison to he original string. Such encryption is asymmetrical, using paired public and private keys. Public-key cryptography refers to a method for transforming a message, including a binary/hex or string, into a form that can be read only by an intended recipient. This cryptographic approach involves the use of asymmetric key algorithms. The non-message information (the public key) needed to transform the message to a secure form is different from the information needed to reverse the process (the private key).
Preferably, a public key is stored in the computer system and a private key is stored in a battery which can be coupled to the computer system, about which more will be said later. The plurality of strings stored in the computer system are encrypted using the public key and may be communicated to the battery as an encrypted string. The encrypted string is then decrypted in the battery using the private key and the unencrypted string returned to the system. If the returned number matches a string stored in the system, then a matched exchange has occurred and the battery is recognized. In the event that there is no returned string or the returned string does not match, then the matched exchange fails and the electronic device will block the exchange of power with the unrecognized battery. The electronic device responds to a transition from one power state to another power state by initiating an exchange of encrypted messages and selects from among a plurality of stored encrypted strings differing ones of the encrypted strings to be used in exchanges initiated on successive transitions from one power state to another power state.
Referring now to
A battery 203 to be coupled to the system has cells 204, a battery management unit 205 and a semiconductor component 207 which stores the private key. When a challenge arrives at the battery, the semiconductor component supplies the private key used to decrypt the challenge. The challenge is communicated to the battery management unit 205 through the system management bus 208, the response (the decrypted original string) is generated using the private key stored in the semiconductor component 207, and returned through the bus 208.
In the event that the response matches the original string, the battery is recognized and enabled for power exchange, discharging, charging or both. In the event there is no response or the response fails to match the original string, the match fails, the battery is not recognized, and the exchange of power with the battery is blocked.
The sequences are illustrated in
In this process, the public key stored in the system functions as a first encryption element, with the private key stored in the semiconductor device 207 functions as a second encryption element. The first encryption element is exercised by code stored in the system accessibly to the processor and causing the processor when executing the code to perform the encryption and storing described.
Referring now to
Batteries to be recognized are provided from a plurality of sources and in all instances incorporate one of the semiconductor components which will enter into the encryption/decryption/recognition process described above. As will be understood, batteries which lack the component which is particularly configured to enter into the recognition exchange will fail the matched exchange test. In accordance with what is here contemplated, distinctions are drawn among a plurality of models of the semiconductor components which have sets of public and private keys which differ one from another. Manufacturers are supplied with differing models of the semiconductor components. Manufacturers are charged differing prices for the semiconductor components depending upon whether the manufacturer produces the electronic devices or manufactures batteries for sale solely to an electronic device manufacturer (a licensed OEM manufacturer 404) or manufactures batteries for aftermarket sales (a licensed aftermarket manufacturer 405). It is contemplated that the lowest price would be charged to a electronic device manufacturer 401, enabling that manufacturer to pass on the semiconductor components to authorized battery manufacturers 404 producing for delivery of batteries with the electronic devices. A higher price would be charged by the semiconductor manufacturer to battery manufacturers 405 licensed by the electronic device manufacturer to make authorized aftermarket batteries, with a portion of that price being paid by the semiconductor manufacturer to the electronic device manufacturer as consideration for the license granted to the battery manufacturers 405.
As will be appreciated, the public/private key pairs instantiated in the semiconductor component and electronic device may be different for the components sold to the electronic device manufacturer 401 and the components sold to the authorized aftermarket battery manufacturers 405. Thus, licensed battery manufacturers 404, 405 are allowed access to selected models or types of the semiconductor components, by permitting controlled purchase from a third party semiconductor manufacturer 402 of the semiconductor component. This controlled purchase distinguishes between manufacturers producing batteries for a computer system manufacturer and manufacturers producing batteries for aftermarket sale apart from computer system sales. Unlicensed battery manufacturers are denied access to the semiconductor components.
In the drawings and specifications there has been set forth a preferred embodiment of the technology and, although specific terms are used, the description thus given uses terminology in a generic and descriptive sense only and not for purposes of limitation.
Number | Name | Date | Kind |
---|---|---|---|
5544246 | Mandelbaum et al. | Aug 1996 | A |
5633573 | Van Phuoc et al. | May 1997 | A |
5692204 | Rawson et al. | Nov 1997 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5905486 | Brittenham et al. | May 1999 | A |
5905900 | Combs et al. | May 1999 | A |
6189108 | Cromer et al. | Feb 2001 | B1 |
6291966 | Wendelrup et al. | Sep 2001 | B1 |
6975092 | Edington et al. | Dec 2005 | B2 |
7424740 | Bear et al. | Sep 2008 | B2 |
7613924 | Shankar et al. | Nov 2009 | B2 |
7617395 | Sasaki | Nov 2009 | B2 |
7667429 | Little | Feb 2010 | B2 |
7683571 | Takamatsu | Mar 2010 | B2 |
7779220 | Pione | Aug 2010 | B1 |
7877815 | Yoo | Jan 2011 | B2 |
8898461 | Seethaler | Nov 2014 | B2 |
20010025225 | Ota et al. | Sep 2001 | A1 |
20020009059 | Abutaleb et al. | Jan 2002 | A1 |
20020012541 | Takemoto et al. | Jan 2002 | A1 |
20020082891 | McKay et al. | Jun 2002 | A1 |
20020107809 | Biddle et al. | Aug 2002 | A1 |
20030088448 | Tan | May 2003 | A1 |
20040006544 | Gulett | Jan 2004 | A1 |
20040066278 | Hughes et al. | Apr 2004 | A1 |
20040111304 | Meka et al. | Jun 2004 | A1 |
20040157555 | Richenstein et al. | Aug 2004 | A1 |
20050001589 | Edington et al. | Jan 2005 | A1 |
20050010782 | Ohkubo | Jan 2005 | A1 |
20050035738 | Patino | Feb 2005 | A1 |
20050108309 | Tsuboka | May 2005 | A1 |
20050138470 | Cromer et al. | Jun 2005 | A1 |
20050254650 | Sakurai et al. | Nov 2005 | A1 |
20060002383 | Jeong et al. | Jan 2006 | A1 |
20060149673 | Delefevre | Jul 2006 | A1 |
20060149966 | Buskey et al. | Jul 2006 | A1 |
20060178170 | Chung | Aug 2006 | A1 |
20060204004 | Shankar et al. | Sep 2006 | A1 |
20060230276 | Nochta | Oct 2006 | A1 |
20060291660 | Gehrmann et al. | Dec 2006 | A1 |
20070019349 | Daio | Jan 2007 | A1 |
20070050627 | Chiku | Mar 2007 | A1 |
20070123303 | Book et al. | May 2007 | A1 |
20070123304 | Pattenden et al. | May 2007 | A1 |
20070123316 | Little | May 2007 | A1 |
20070145945 | McGinley et al. | Jun 2007 | A1 |
20070189516 | Lee | Aug 2007 | A1 |
20080024268 | Wong | Jan 2008 | A1 |
20080037779 | Seman et al. | Feb 2008 | A1 |
20080057894 | Aleksic et al. | Mar 2008 | A1 |
20080126815 | Cantwell et al. | May 2008 | A1 |
20080141069 | Iwamura | Jun 2008 | A1 |
20080256370 | Campbell et al. | Oct 2008 | A1 |
20080263375 | Sundstrom et al. | Oct 2008 | A1 |
20080307240 | Dahan et al. | Dec 2008 | A1 |
20090204834 | Hendin et al. | Aug 2009 | A1 |
20090259867 | Paniagua, Jr. et al. | Oct 2009 | A1 |
20090271629 | Michaud | Oct 2009 | A1 |
20100056228 | Brown et al. | Mar 2010 | A1 |
20100082998 | Kohavi | Apr 2010 | A1 |
20100250936 | Kusakawa et al. | Sep 2010 | A1 |
20100268946 | Taylor | Oct 2010 | A1 |
20110093714 | Schaecher et al. | Apr 2011 | A1 |
20110138206 | Garcia-Tobin | Jun 2011 | A1 |
20110145608 | Hwang et al. | Jun 2011 | A1 |
20120239555 | Seethaler et al. | Sep 2012 | A1 |
20130212390 | Du et al. | Aug 2013 | A1 |
Number | Date | Country |
---|---|---|
2239567 | Jul 1991 | GB |
Entry |
---|
Infineon, Origa SLE95050 Original Product Authentication and Brand Protection Solution, Version 1.50, Jun. 2009. |
Number | Date | Country | |
---|---|---|---|
20120239555 A1 | Sep 2012 | US |