US 11,907,382 B2
Secure access to accessory device resources
Ravi Kiran Chivukula, Saratoga, CA (US); Robert D. Young, Kirkland, WA (US); Nathan C. Sherman, Bellevue, WA (US); Chirag Shah, San Jose, CA (US); Brandon Records, Issaquah, WA (US); Astha Keshan, San Jose, CA (US); Eric Kotz, Seattle, WA (US); and M. Nashaat Soliman, Redmond, WA (US)
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC, Redmond, WA (US)
Filed by Microsoft Technology Licensing, LLC, Redmond, WA (US)
Filed on Sep. 2, 2022, as Appl. No. 17/929,489.
Application 17/929,489 is a continuation of application No. 16/854,793, filed on Apr. 21, 2020, granted, now 11,468,181.
Prior Publication US 2022/0414238 A1, Dec. 29, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); H04L 9/30 (2006.01); G06F 21/60 (2013.01); G06F 21/44 (2013.01)
CPC G06F 21/604 (2013.01) [G06F 21/44 (2013.01); H04L 9/30 (2013.01); H04L 9/3226 (2013.01); H04L 9/3247 (2013.01); H04L 9/3268 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method performed by an accessory device, comprising:
receiving a host access policy management command and authentication information from a host computing device that is connected to the accessory device, the host access policy management command indicating that a host access policy be set on, modified on, or removed from the accessory device, the host access policy specifying whether a host computing device that is subsequently connected to the accessory device is to be provided access to each of one or more computing resources accessible to the accessory device;
determining whether the authentication information is valid;
in response to at least determining that the authentication information is valid, executing the host access policy management command; and
in response to at least determining that the authentication information is not valid, denying execution of the host access policy management command.