In-band peripheral authentication

ABSTRACT

This document describes techniques ( 300, 400 ) and apparatuses ( 100, 500, 600, 700 ) for in-band peripheral authentication. These techniques ( 300, 400 ) and apparatuses ( 100, 500, 600, 700 ) may communicate via a non-media channel allowing host device ( 102 ) to authenticate peripheral ( 106 ), enable an enhanced operational mode of the host device ( 102 ), and/or provide content configured for the peripheral ( 106 ) without the use of out-of-band signaling.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/245,437, filed Sep. 26, 2011, which is hereby incorporated byreference herein in its entirety.

BACKGROUND

Computing devices are often accessorized by their users to enablefeatures of the computing devices. A desktop computer can beaccessorized with various peripherals, such as an external display orspeakers. A tablet computer can be accessorized with a web-camera orvideo-out adapter. A smartphone can be accessorized with a dockingstation, an external keyboard, or an external display. These are just afew of many ways in which users accessorize computing devices withperipherals. Some peripherals, however, are not properly designed tomake use of these features, such as applications or services, resultingin features that are unusable or function incorrectly.

BRIEF DESCRIPTION OF THE DRAWINGS

Techniques and apparatuses for in-band peripheral authentication aredescribed with reference to the following drawings. The same numbers areused throughout the drawings to reference like features and components:

FIG. 1 illustrates an example environment in which techniques forin-band peripheral authentication can be implemented.

FIG. 2 illustrates an example of a communication medium illustrated inFIG. 1, the example being a high definition multimedia interface (HDMI)cable.

FIG. 3. illustrates example method(s) for in-band peripheralauthentication performed at least in part by a host device.

FIG. 4. illustrates example method(s) for in-band peripheralauthentication performed at least in part by a peripheral to a hostdevice.

FIG. 5 illustrates examples of a host device configured forcommunication with a peripheral.

FIG. 6 illustrates examples of a peripheral device configured forcommunication with a host device.

FIG. 7 illustrates various components of an example peripheral that canimplement techniques for in-band peripheral authentication.

DETAILED DESCRIPTION

Host computing devices often fail to authenticate a peripheral beforeuse of that peripheral. Failing to authenticate may result in impairedoperation, or less than full use of, features of the host computingdevice or peripheral. This disclosure describes techniques andapparatuses for in-band peripheral authentication that can protect hostcomputing devices from improperly designed peripherals or permitperipherals to be more-fully used.

The following discussion first describes an operating environment,followed by techniques that may be employed in this environment, andends with example apparatuses.

Operating Environment

FIG. 1 illustrates an example environment 100 in which techniques forin-band peripheral authentication can be implemented. The exampleenvironment 100 includes a host device 102, a communication medium 104,and a peripheral 106. The host device 102 can be, or include, manydifferent types of computing devices, such as a smartphone, a cellularphone having limited computational abilities, a laptop, a tabletcomputer, or a desktop computer.

Host device 102 includes application processor(s) 108, basebandprocessor 110, host computer-readable media 112 (host media 112), awired host port 114, and/or a wireless host port 116. Host media 112includes authenticator 118, which authenticates peripheral 106, alone orin conjunction with other elements of host device 102 or peripheral 106.In this example host device, host media also includes high definitionmultimedia interface (HDMI) module 120 for processing or distributingmultimedia content.

Peripheral 106 can be one of many different types of devices capable ofcommunication with, providing a service to, or extending a functionalityof host device 102. Five example peripherals are shown, though othersare contemplated. These example peripherals include a video graphicsarray (VGA) display adapter 106 1, a liquid crystal display 106-2, alaptop-dock 106-3, a docking station 106-4 having an array ofinput/output ports, and a travel dock 106-5.

Peripheral 106 includes peripheral processor(s) 122, peripheralcomputer-readable media 124 (peripheral media 124), wired peripheralport 126, and/or wireless peripheral port 128. Peripheral media 124includes HDMI receiver 130 and authentication module 132. HDMI receiveris configured to receive and process multimedia content for formatconversion, viewing, output, or relay. Authentication module 132 isconfigured to respond to an authentication request received from hostdevice 102, the response indicating that the peripheral device isauthentic.

Communication medium 104 provides a wired or wireless medium by whichhost device 102 and peripheral 106 may communicate. Examples include awired medium from wired peripheral port 126 to wired host port 114 or awireless medium of a wireless connection communicating via wirelessperipheral port 128 and wireless host port 116. Example wirelessnetworks include wide-area networks (WAN), local-area networks (LAN),and personal-area networks (PAN), each of which may be configured, inpart or entirely, as infrastructure, ad-hoc, or mesh networks. Basebandprocessor 110 may provide a cellular capability via wireless host port116 for communication over one or more wireless WAN networks.

Alternately or additionally, in the case of a wireless medium, wirelessendpoints or dongles (not shown) may be connected to wired ports ofeither host device 102 or peripheral 106 to implement (either in part orwhole) techniques described herein. For example, wireless endpointsconnected to HDMI ports of host device 102 or peripheral 106 can enabledata transactions and/or content delivery described herein to occurwithout the use of a wired medium.

FIG. 2 illustrates an example of communication medium 104, the examplebeing a high definition multimedia interface (HDMI) cable 202. In thisparticular example, HDMI cable 202 is shown as a Type A cable, althoughthe use of other types of HDMI cables are contemplated, such as Type B(mini) and Type C (micro) variants of HDMI cables. HDMI cable 202 isterminated by HDMI connectors 204 and 206, although other custom orproprietary connectors may be used.

The example HDMI cable 202 includes a medium for two in-bandcommunication channels, HDMI communication channel 208 (HDMI channel208) and inter-integrated circuit (I2C) communication channel 210 (I2Cchannel 210). As shown by detailed pin-out 212, HDMI channel 208 isconfigured to communicate video and/or audio information via data andclock signals 214-1 and 214-2. I2C channel 210 is configured tocommunicate non-media data via serial data (SDA) signal line 216 andserial clock (SCL) signal line 218 which can be referenced to ground(GND) signal line 220. Medium for additional handshake and/or detectionpins, such as detect signal line 222, is also present in HDMI cable 202,which may be re-purposed for implementing the techniques describedherein.

I2C channel 210 may implement various industry protocols such asHigh-bandwidth Digital Content Protection (HDCP), Display Data Channel(DDC), or Enhanced Data Display Channel (E-DDC) to communicate withcomponents of peripheral 106. In some implementations, 5 volt power (5VPWR) signal line 224 or other various signal lines of HDMI cable 202 mayalso be used by techniques of in-band authentication. Ways in which HDMIcable 202 can be used are set forth below.

Example Techniques

The following discussion describes techniques for in-band peripheralauthentication, which in many cases enable better use of host devices orperipherals for improved user experience. These techniques can beimplemented utilizing the previously described environment, such asauthenticator 118 and authentication module 132 of FIG. 1. Thesetechniques include example methods illustrated in FIGS. 3 and 4, whichare shown as operations performed by one or more entities. The orders inwhich these method blocks are described are not intended to be construedas a limitation, and any number or combination of the described methodblocks can be combined in any order to implement a method, or analternate method, including those drawing from both FIGS. 3 and 4.

FIG. 3 illustrates example method(s) 300 for in-band peripheralauthentication performed at least in part by a host device.

At block 302, connection of a peripheral to a media interface isdetected by a host device. Connection of the peripheral may be madedirectly to host device 102 (docking) or through a cable, such as HDMIcable 202. This media interface can include media channels forcommunicating video and/or audio information, and non-media channels foridentification, control, and configuration of peripherals. Examples ofmedia interfaces include HDMI, Digital Visual Interface (DVI),DisplayPort, and so on.

This video or audio information can be communicated as analog signals ordigitally encoded data which may or may not be encrypted. The non-mediachannels may implement communication protocols such as I2C, DDC, E-DDC,HDCP, or other proprietary protocols for addressing peripherals.Detection of the connection by host device 102 can be responsive to aphysical connection or a signal connection, such as HDMI cable 202 orlaptop-dock 106-3.

Consider an example manner in which this connection is detected. In thecontext of example environment 100, when wired host port 114 of hostdevice 102 and wired peripheral port 126 of docking station areconnected by HDMI cable 202, host device 102 detects this connection viadetect signal line 222. Alternately or additionally, host device 102 maysense connection when an attached cable or peripheral sinks current from5V PWR signal line 224 and/or changes an impedance of other signallines.

Authenticator 118 may actively monitor various signal lines of wiredhost port 114 to detect this connection, such as by observing voltagelevels of signal lines or observing data transactions. Authenticator 118may do so by detecting an enhanced display identification data (EDID)handshake between host device 102 and peripheral 106 over I2C channel210. Additional examples and details concerning authenticator 118 areset forth elsewhere herein.

At block 304, an address of a non-media channel at which the peripheralcan be authenticated is determined by the host device. Host device 102may do so based on information received, by querying peripheral 106(e.g., using device discovery), or based on a predefined range ofaddresses. Host device 102 may determine the address by usingauthenticator 118 to inspect EDID information or address informationreceived from an entity within peripheral 106 or HDMI cable 202.Alternately or additionally, host device 102, through authenticator 118,can query peripheral 106 for the address or attempt to communicate withone or more predefined addresses.

At block 306, an authentication protocol is performed using the addressto determine if the peripheral is authentic. Various manners ofauthentication can be used. In this ongoing example, authenticator 118requests (or discovers) an identifier from peripheral 106. After anidentifier is received from peripheral 106, authenticator 118 determineswhether the identifier matches one of a set of authentic identifiers todetermine authenticity of peripheral 106. This set of authenticidentifiers is accessible by host device 102, such as by being stored inhost media 112. If the identifier does not initially match,authenticator 118 can re-request an identifier from the peripheraland/or proceed with a challenge-and-response form of authentication,such as those based on a cryptographic algorithm or checksum. Note thatthe identifier received and the authentic identifiers of the set can beunique and/or cryptographically secure, though this is not required.

In one embodiment, authenticator 118 challenges peripheral 106 bysending a random number over the authentication-configured data lines.In response, peripheral 106 computes a response with a secret key andreturns that response. Authenticator 118 receives that response,compares it with an expected response, and if they match, determinesthat peripheral 106 is authentic. To do so, authenticator 118 andperipheral 106 (e.g., using authentication module 132) perform one ormore cryptographic algorithms.

A “Yes” path proceeds from block 308 to block 310 responsive to theperipheral providing the expected identifier and/or response, and a “No”path proceeds from block 308 to block 312 responsive to the peripheralnot being authenticated due to an unexpected identifier and/or responseto the challenge.

At block 310, a full operational mode associated with the mediainterface of the host device is enabled. This operational mode caninclude additional features and configurations, such as additionalinput/output capabilities associated with peripheral 106 or a contextchange of a user interface of host device 102. At the least, however,authenticator 118 enables this full operational mode and enables mediato be provided to peripheral 106 via the media interface.

The media provided to peripheral 106 may be configured based on an EDIDpreviously received or based on a type or class of peripheral 106indicated by the identifier received. After peripheral 106 isauthenticated, authenticator 118 may relinquish access of the non-mediachannel to HDMI module 120 allowing a multimedia communication and/orencryption thereof to be established. Alternately or additionally, theEDID data may include extended information associated with theperipheral, such as information describing capabilities or featuressupported by the peripheral. In such a case, the content of the extendedEDID data may be signed and/or be validated via cryptographic operationsof a handshake or other preliminary data exchange.

Authenticator 118 may also configure ways in which host device 102 mayact and interact with peripheral 106. Consider a case where host device102 is a smartphone physically connected or “docked” with laptop-dock106-3, which provides an external display, keyboard, and additionalports. In such a case, authenticator 118 configures host 102 to make useof these functionalities, such as by configuring the media interface toprovide content for the external display and configuring the non-mediachannel to receive input from the keyboard. In other cases, thenon-media channel can be configured to exchange data between host device102 and peripheral 106, such as general purpose I/O signals, buttonpresses, status updates, short text messages, or tiny user interfacemessages.

Authenticator 118 can also configure host device 102 to automaticallylaunch software applications or change a user interface context inresponse to determining that peripheral 106 is authentic. Examplesinclude: a user interface for manipulating multimedia content for VGAdisplay adapter 106-1 or liquid crystal display 106-2, changing a userinterface from a default non-windowed context to a windowed context forlaptop-dock 106-3, or an audio media-playing application for travel dock106-5 (having speakers).

The content provided to the peripheral may not match content displayedon host device 102. For example, a slide show or presentation displayedvia VGA display adapter 106-1 may not include user interface elementsuseful to control the slide show or presentation, which are presented onhost device 102. As another example, multimedia audio may be routed viaVGA display adapter 106-1, while in-call or voice-control audio may berouted to an audio system of host device 102, such as a speaker phonefor hands-free operation. These are but a few of the many waysauthenticator 118 can configure host device 102 in response todetermining that peripheral 106 is authentic.

At block 312, a limited operational mode associated with the mediainterface of the host device is enabled. Authenticator 118 may disablethe media interface from use, thereby halting communication withperipheral 106, such as when a peripheral is not authenticated. In somecases, however, authenticator 118 may configure the multimedia interfacefor limited use, such as by limiting a resolution or frame-rate ofcontent provided, or disabling interactive features associated with thecontent, though this depends on the type of peripheral 106. At theleast, authenticator 118 disables at least one, and up to all,configurations associated with the full operational mode described inrelation to block 310.

For example, authenticator 118 may allow content to be provided toperipheral 106 via the media interface even when the peripheral is notauthentic, but will limit features of peripheral 106 or of host device102. In such a case, authenticator 118 may forgo automatically launchingan application or limit a resolution of video content provided by themedia interface. Assume, for example, that VGA display adapter 106-1 isnot authenticated. Authenticator 118 limits a resolution of contentprovided to VGA adapter 106-1 and disables configuration(s) associatedwith an authentic VGA adapter 106-1.

Alternately or additionally, authenticator 118 may disable applicationsor features that enhance a user's experience based on an authenticationstatus of peripheral 106. For example, video or touch based gesturerecognition that allows a user to control content (e.g., a slide showpresentation) remotely or via text can be disabled when a peripheral 106is not authenticated or enabled when the peripheral 106 isauthenticated. As another example, consider a 5V supply provided by ahost device 102, which can provide additional current beyond the HDMIspecification of 55 mA when a peripheral 106 is authenticated. In such acase, the additional current may enable a peripheral 106 to more-fullyoperate or provide additional capabilities.

FIG. 4 illustrates example method(s) 400 for in-band peripheralauthentication performed at least in part by a peripheral to a hostdevice. The order in which the method blocks are described are notintended to be construed as a limitation, and any number or combinationof the described method blocks can be combined in any order to implementa method, or an alternate method.

At block 402, an address of a non-media channel is made available to ahost device for authentication of a peripheral. The non-media channelcan be associated with a media interface, which includes a mediachannel, such as HDMI. This address may be made available in variousmanners. For example, an indication of the address can be sent to hostdevice 102 by authentication module 132 or the address may be presentedin place of addresses of other components coupled to the non-mediachannel.

Authentication module 132 may also interrogate other components coupledto the non-media channel such as HDMI receiver 130 to determine anunused address to present to host device 102. This dynamic addressconfiguration may be performed if a preferred static address ofauthentication module 132 is not available or not desirable. Informationrelated to this address may be included in data communicated to hostdevice 102 describing video capabilities of peripheral 106, such as EDIDinformation.

FIG. 5 and FIG. 6 illustrate example configurations of host device 102and peripheral 106, respectively, capable of performing in-bandauthentication through HDMI cable 202. Note, although illustrated hereas communicating through HDMI cable 202, host device 102 and peripheral106 may connect directly via docking (not shown). A docking connectormay provide medium for a media interface, as well as power and/or othercommunication channels. In the context of these example configurations,the media interface is an HDMI interface including HDMI channel 208 andI2C channel 210.

As illustrated by FIG. 5, configuration 502 of host device 102implements HDMI module 120 separate from application processor 108, eachof which are connected to wired host port 114. Here, applicationprocessor 108, using authenticator 118, can receive an indication of theaddress for authentication over I2C channel 210. In some other cases,authenticator 118 and HDMI module 120 may be implemented by applicationprocessor 108 as shown in configuration 504, enabling applicationprocessor 108 to manage both communication channels of the mediainterface. Also consider configuration 506, which implements switch 508to switch communication between HDMI module 120 and applicationprocessor 108. These are but a few host device configurations which mayenable techniques of in-band peripheral authentication.

As illustrated in FIG. 6, from the perspective of peripheral 106,authentication module 132 communicates with components of host device102 (e.g. authenticator 118) over I2C channel 210. As shown inconfiguration 602, authentication module 132 can transmit an indicationof its address directly on I2C channel 210 when shared with HDMIreceiver 130. In other cases, such as configuration 604, microcontroller606 (μController 606) can arbitrate communication of I2C channel 210between authentication module 132 and EDID module 608 during theauthentication and identification process.

In yet other cases, peripheral 106 may not include authenticationmodule, as shown in configuration 610. In such a case, HDMI cable 202can include authentication module 132 and switch 612 presents eitherauthentication module 132 or EDID module 608 to host device 102. As anexample, consider a VGA display adapter 106-1 implemented asconfiguration 610. Here, switch 612 within HDMI cable 202 initiallypresents authentication module 132 to host device 102, enablingauthentication module 132 to communicate address information and/ordevice information.

Returning to FIG. 4, at block 404, an authentication request is receivedfrom the host device at the address of the non-media channel. Variousmanners of authentication can be used. In this ongoing example,authentication module 132 receives a request for an identifier from hostdevice 102 via I2C channel 210 of HDMI cable 202. This request can alsoinclude a cryptographic challenge based on an identifier.

At block 406, an authentication response is communicated to the hostdevice via the non-media channel. This response may include anidentifier, which may identify various aspects of peripheral 106including a peripheral type, a peripheral class, a manufacturer,functionalities made available by peripheral 106, and so on. Thisidentifier is accessible from peripheral 106, such as being stored inperipheral media 124, can be unique and/or cryptographically secure,though this is not required. Authentication module 132 may also encryptthe identifier prior to communicating or include a cryptographicresponse if so requested by host device 102. For the ongoing example,authentication module 132 communicates an identifier to host device 102which identifies VGA display adapter 106-1 by type and manufacturer.

At block 408, content configured based on the authentication response isreceived from the host device via the media interface. This content canbe configured to make use of features made available by peripheral 106,such as increased display resolution, speakers, or additional userinputs. For example, when host device 102 is connected (docked) tolaptop-dock 106-3, a user interface associated with the content may notfeature on-screen controls because a keyboard of laptop-dock 106-3 canbe used for input. As noted above, however, content provided via themedia interface can also be limited or disabled based on theauthentication of peripheral 106. In the ongoing example, content isprovided by the media interface to VGA display adapter 106-1 withoutuser interface elements based on peripheral class. Here, host device 102has associated a media presentation mode with the peripheral class ofdisplay adapters, and provides the content at high resolution withoutuser interface elements which may occlude the media when displayed.

At block 410, a use command is received from the host device via thenon-media channel, the use command effective to configure the peripheralfor media interaction. This use command, when received from host device102 by peripheral 106, affects functions of peripheral 106. For example,when host device 102 is connected to laptop-dock 106-3, a use commandcan enable the external display, speakers, keyboard, and otherfunctionalities of laptop-dock 106-3. Host device 102, however, may alsoor instead limit various functions of peripheral 106 based on theauthenticity of peripheral 106. Concluding the ongoing example, VGAadapter 106-1 receives a use command that enables configuration of HDMImodule 120 for displaying the content provided by the media interface.

Consider another case where peripheral 106 is laptop-dock 106-3, whichis authenticated by host device 102. In such a case, host device 102enters a full operational mode, which enables the media interface,including HDMI channel 208. Host device 102 also launches applicationsassociated with laptop-dock (e.g., printing or productivityapplications) and changes a context of its current user interface to awindowed environment. A use command may also be communicated thatenables features of laptop-dock 106-3 such as a display, keyboard,speakers, status indicators, and so on. In an alternate case, wherelaptop-dock 106-3 is not authenticated, peripheral 106 may not receivethis use command, and host device 102 may disable the media interface(including HDMI channel 208 and I2C channel 210). As shown here,authenticator 118 may limit functions and services of host device 102whether or not authenticator 118 limits peripheral 106. Althoughillustrated in the above figures as a wired medium, communication medium104 may be implemented with a wireless medium, which may include one ormore wireless endpoints or dongles having any combination of componentsdescribed with respect to FIGS. 1-6.

Example Peripheral

FIG. 7 illustrates various components of an example peripheral 700,which is implemented in hardware, firmware, and/or software, or asdescribed with reference to any of the previous FIGS. 1-6 to implementin-band peripheral authentication.

Example peripheral 700 can be implemented in a fixed or mobile devicebeing one or a combination of a media device, computer device,television set-top box, video processing and/or rendering device,appliance device (e.g., a closed-and-sealed computing resource, such assome digital video recorders or global-positioning-satellite devices),gaming device, electronic device, vehicle, workstation, WLAN peerdevice/client station, and/or in any other type of device that maycommunicate through a wired or wireless communication medium to a hostdevice. Examples of some of these are shown in FIG. 1 at 106.

Example peripheral 700 can be integrated with electronic circuitry, amicroprocessor, memory, input-output (I/O) logic control, communicationinterfaces and components, other hardware, firmware, and/or softwareneeded to run an entire device. Example peripheral 700 can also includean integrated data bus (not shown) that couples the various componentsof the peripheral for data communication between the components.

Example peripheral 700 includes various components such as aninput-output (I/O) logic control 702 (e.g., to include electroniccircuitry) and a microprocessor 704 (e.g., any of a microcontroller ordigital signal processor). Example peripheral 700 also includes a memory706, which can be any type of random access memory (RAM), a low-latencynonvolatile memory (e.g., flash memory), read only memory (ROM), and/orother suitable electronic data storage. Example peripheral 700 can alsoinclude various firmware and/or software, such as an operating system708, which can be computer-executable instructions maintained by memory706 and executed by microprocessor 704. Example peripheral 700 can alsoinclude other various communication interfaces and components, wirelessLAN (WLAN) or PAN (WPAN) components, other hardware, firmware, and/orsoftware.

Example peripheral 700 includes HDMI receiver 130, authentication module132, and EDID module 608. Examples of these components and theirfunctions are described with reference to the respective components asshown in FIGS. 1, 5, and/or 6.

Authentication module 132 in example peripheral 700, eitherindependently or in combination with other entities, can be implementedas computer-executable instructions maintained by memory 706 andexecuted by microprocessor 704 to implement various embodiments and/orfeatures described herein. Authentication module 132 may also beprovided integral with other entities of the peripheral, such asintegrated with configuration switch 508. Alternatively or additionally,authentication module 132 and the other components can be implemented ashardware, firmware, fixed logic circuitry, or any combination thereofthat is implemented in connection with the I/O logic control 702 and/orother signal processing and control circuits of example peripheral 700.

Although the invention has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the invention defined in the appended claims is not necessarilylimited to the specific features or acts described. Rather, the specificfeatures and acts are disclosed as example forms of implementing theclaimed invention.

What is claimed is:
 1. A method, comprising: determining an address of anon-media channel at which a peripheral can be authenticated by a hostdevice; performing an authentication protocol using the address at whichthe peripheral can be authenticated; responsive to the peripheral beingauthenticated, enabling a full operational mode between the host deviceand a media interface, wherein the full operational mode includes:causing first content that includes a user interface to be presented onthe host device and causing second content to be presented by theperipheral via a media channel of the media interface, wherein the userinterface receives user inputs from a user of the host device forinteracting with the second content presented by the peripheral; andtransmitting control signals to the peripheral via the non-media channelof the media interface based on the user inputs received by the userinterface; and responsive to the peripheral not being authenticated,enabling a limited operational mode between the host device and themedia interface, wherein the limited operational mode includes limitingthe quality of media provided via the media channel of the mediainterface.
 2. The method of claim 1, wherein the determining includesreceiving address information from the peripheral via the non-mediachannel.
 3. The method of claim 1, wherein the full operational modeincludes: a windowed user interface context that is different from anon-windowed user interface context enabled when the peripheral is notconnected to the host device.
 4. The method of claim 1, wherein arepresentation of graphic elements of the user interface is not providedto the peripheral via the media interface.
 5. The method of claim 1,wherein the full operational mode includes a capability to receivegeneral purpose input/output signals, status information, or shortmessages from the peripheral via the non-media channel.
 6. The method ofclaim 1, wherein the enabling the limited operational mode includes:disabling one or more capabilities of the host device.
 7. The method ofclaim 1, wherein performing the authentication protocol includes:receiving an identifier from the peripheral; determining whether theidentifier matches one of a set of authentic identifiers; andchallenging the peripheral through the non-media channel responsive tothe identifier matching one of the set of authentic identifiers.
 8. Themethod of claim 1, further comprising: causing the host device toincrease an amount of current output to a connector of the non-mediachannel, or re-route an audio channel, in response to the peripheralbeing authenticated.
 9. The method of claim 1, further comprising:configuring the full operational mode based on digitally signed enhanceddisplay identification data (EDID) that includes address information,capabilities, or features of the peripheral.
 10. A method, comprising:making available an address of a non-media channel to a host device forauthentication of a peripheral; receiving an authentication request fromthe host device at the address of the non-media channel; communicatingan authentication response to the host device via the non-media channel;receiving, via a media interface of the host device, content configuredfor the peripheral based on the authentication response communicated tothe host device, wherein the received content is of limited mediaquality if the peripheral is not authenticated; and causing the contentconfigured for the peripheral to be presented by the peripheral via amedia channel of the media interface, wherein the content is differentthan a user interface presented on the host device that receives userinputs from a user of the host device for interacting with the contentpresented by the peripheral if the peripheral is authenticated; andreceiving control signals via the non-media channel based on the userinputs received by the user interface if the peripheral isauthenticated.
 11. The method of claim 10, further comprising: receivinga use command effective to configure the peripheral for mediainteraction, the use command based on the authentication responsecommunicated to the host device.
 12. The method of claim 10, whereinmaking available the address includes: presenting the address for theauthentication of the peripheral instead of another address foridentifying or authenticating a media interface component of theperipheral.
 13. The method of claim 10, wherein making available theaddress includes: determining an unused address of the non-media channeland presenting the unused address to the host device.
 14. The method ofclaim 10, wherein other addresses of the non-media channel identify acomponent capable of indicating media capabilities of the peripheral ora component for encrypting contents of the media interface.
 15. Themethod of claim 10, further comprising: communicating informationidentifying media capabilities of the peripheral to the host device. 16.The method of claim 10, wherein the content configured for theperipheral includes: a windowed user interface context that ismanipulable via inputs of the peripheral.
 17. The method of claim 10,wherein the content configured for the peripheral includes: multimediacontent without user interface elements for manipulating the multimediacontent.
 18. A peripheral comprising: an authentication moduleconfigured to communicate a response to an authentication requestreceived from a host device via a non-media channel; a communicationswitch configured to, responsive to connection to the host device,switch the non-media channel from a media interface module of theperipheral to the authentication module of the peripheral to enableauthentication of the peripheral; and a processor that, responsive tothe peripheral being authenticated: causes content configured for theperipheral to be presented via a media channel of the media interface,wherein the content is different than a user interface presented on thehost device that receives user inputs from a user of the host device forinteracting with the content presented by the peripheral; and receivescontrol signals via the non-media channel based on the user inputsreceived by the user interface.
 19. A peripheral comprising: anauthentication module configured to communicate a response to anauthentication request received from a host device via a non-mediachannel; a communication switch configured to, responsive to connectionto the host device, switch the non-media channel from a media interfacemodule of the peripheral to the authentication module of the peripheralto enable authentication of the peripheral; and a processor that,responsive to the peripheral being authenticated, causes contentconfigured for the peripheral to be presented via a media channel of themedia interface, wherein the content is different than content presentedon the host device; and a cable coupled to the peripheral, wherein thecommunication switch is located within the cable.
 20. The peripheral asrecited in claim 18, wherein the non-media channel is compliant with aninter-integrated circuit (I2C) or a display data channel (DDC) protocol.