US 12,407,512 B2
Securing a computing device accessory
Mahima Choudhary, Huntington Beach, CA (US); Ankur Choudhary, Redmond, WA (US); and Chong He, Redmond, WA (US)
Assigned to Microsoft Technology Licensing, LLC, Redmond, WA (US)
Filed by Microsoft Technology Licensing, LLC, Redmond, WA (US)
Filed on Dec. 21, 2022, as Appl. No. 18/069,876.
Prior Publication US 2024/0214202 A1, Jun. 27, 2024
Int. Cl. H04L 9/32 (2006.01)
CPC H04L 9/3213 (2013.01) [H04L 9/3234 (2013.01); H04L 9/3263 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, implemented at a computer system that includes a processor, comprising:
establishing an encrypted communication channel with a remote accessory device that is connected to a host device;
receiving a first device token from the remote accessory device;
determining that the first device token exists within a token history associated with a device certificate of the remote accessory device;
determining that the remote accessory device is an authentic device, based on the first device token existing within the token history;
sending an indication, to the host device, that the remote accessory device is authentic, based on the first device token existing within the token history;
generating a second device token for the remote accessory device;
storing the second device token in the token history associated with the device certificate of the remote accessory device; and
sending the second device token to the remote accessory device.