Encrypted response smart battery

ABSTRACT

In a method and system for authenticating a smart battery for charging, the smart battery receives an encrypted random string. The smart battery is operable to provide power to a device. The encrypted random string is generated by a controller of the device by generating a random string and encrypting the random string with an encryption key. The smart battery decrypts the encrypted random string with the encryption key to recover the random string and transfer the random string to the device. The device verifies that the random string is unchanged to authenticate the smart battery for the charging. If the random string has been modified then the smart battery is disabled from the charging.

BACKGROUND

The present disclosure relates generally to information handlingsystems, and more particularly to techniques for authenticatingrechargeable smart batteries commonly used to provide power to portableinformation handling system components such as notebook computers,personal digital assistants, cellular phones and gaming consoles.

As the value and use of information continues to increase, individualsand businesses seek additional ways to process and store information.One option available to users is information handling systems. Aninformation handling system generally processes, compiles, stores,and/or communicates information or data for business, personal, or otherpurposes thereby allowing users to take advantage of the value of theinformation. Because technology and information handling needs andrequirements vary between different users or applications, informationhandling systems may also vary regarding what information is handled,how the information is handled, how much information is processed,stored, or communicated, and how quickly and efficiently the informationmay be processed, stored, or communicated. The variations in informationhandling systems allow for information handling systems to be general orconfigured for a specific user or specific use such as financialtransaction processing, airline reservations, enterprise data storage,or global communications. In addition, information handling systems mayinclude a variety of hardware and software components that may beconfigured to process, store, and communicate information and mayinclude one or more computer systems, data storage systems, andnetworking systems.

A battery converts chemical energy within its material constituents intoelectrical energy in the process of discharging. A rechargeable batteryis generally returned to its original charged state (or substantiallyclose to it) by passing an electrical current in the opposite directionto that of the discharge. Presently well known rechargeable batterytechnologies include Lithium Ion (LiON), Nickel Cadmium (NiCd), andNickel Metal Hydride (NiMH). In the past, the rechargeable batteries(also known as “dumb” batteries) provided an unpredictable source ofpower for the portable devices, since typically, a user of the devicepowered by the battery had no reliable advance warning that the energysupplied by the rechargeable battery was about to run out.

Today, through the development of “smart” or “intelligent” batterypacks, batteries have become a more reliable source of power byproviding information to a device of the information handling system andeventually to a user as to the state of charge, as well as a wealth ofother information. The smart rechargeable battery, which is well known,is typically equipped with electronic circuitry to monitor and controlthe operation of the battery. The information is typically communicatedusing a well-known System Management Bus (SMBus), which is widely usedin the industry. Information pertaining to the smart battery and beingcommunicated via the SMBus connection may include data elements such assmart battery status, manufacturer name, serial and model number,voltage, temperature and charge status.

Smart batteries, which may be original equipment manufactured (OEM) orin-house manufactured, typically undergo extensive testing andvalidation procedures before they are approved and qualified to beincluded in a portable information handling system device by themanufacturer of the portable device. The portable device powered by thesmart battery may also undergo additional testing prior to being shippedto a customer. The high cost of many smart batteries has attracted anincreasing number of counterfeit smart battery vendors to(re)manufacture and sell genuine-like smart batteries at lower prices tounsuspecting customers. The counterfeit batteries are typically able toemulate virtually any genuine smart battery by emulating theirmanufacturer, model name, and serial number. An authentication processto identify the genuine smart batteries is almost non-existent. Thesecounterfeit batteries, which often go through very minimal testing andvalidation procedures, may pose as a serious hazard to the unsuspectingcustomers. For example, if the counterfeit smart battery does notproperly safeguard the charging process then excessive heating causedduring the charging process may cause an explosion. This may result in asignificant liability problem for the manufacturers of the informationhandling system device and/or the OEM smart battery.

Therefore a need exists to properly safeguard the charging process of asmart battery. More specifically, a need exists to develop tools andtechniques for disabling the charging process for counterfeit smartbatteries. Accordingly, it would be desirable to provide tools andtechniques for charging authenticated smart batteries included in aninformation handling system absent the disadvantages found in the priormethods discussed above.

SUMMARY

The foregoing need is addressed by the teachings of the presentdisclosure, which relates to a system and method for authenticating asmart battery to ensure a safe charging process. According to oneembodiment, in a method and system for authenticating a smart batteryfor charging, the smart battery receives an encrypted random string. Thesmart battery is operable to provide power to an information handlingsystem device. In this embodiment, the device performs the encryptionfunction and the smart battery performs the decryption function. Acontroller of the device generates the encrypted random string bygenerating a random string and encrypting the random string with anencryption key. The smart battery decrypts the encrypted random stringwith the encryption key to recover the random string and transfer therandom string to the device. The device verifies that the random stringis unchanged to authenticate the smart battery for the charging. If therandom string has been modified then the smart battery is disabled fromthe charging.

In one embodiment, the encryption/decryption function is performed bythe device and the smart battery. In this embodiment, the smart batteryencrypts the recovered random string with another encryption key. Theencrypted random string is transferred to the device. The devicedecrypts the encrypted random string with the another encryption key torecover the random string. The device verifies that the random string isunchanged to authenticate the smart battery for the charging. If therandom string has been modified then the smart battery is disabled fromthe charging. The use of two encryption keys advantageously providesadditional security in the authentication process.

Several advantages are achieved by the method and system according tothe illustrative embodiments presented herein. The embodimentsadvantageously provide for a reduced occurrence of operating conflictsand improved reliability while reducing the number of components.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a diagrammatic representation of a smart batteryauthentication system for authenticating a smart battery, according toan embodiment;

FIG. 2 illustrates a diagrammatic representation of the smart batterysystem of FIG. 1 having a processor and smart electronics, according toan embodiment;

FIG. 3 is a flow chart illustrating a method for authenticating thesmart battery, according to an embodiment; and

FIG. 4 illustrates a block diagram of an information handling system toimplement method or apparatus aspects of the present disclosure,according to an embodiment.

DETAILED DESCRIPTION

Novel features believed characteristic of the present disclosure are setforth in the appended claims. The disclosure itself, however, as well asa preferred mode of use, various objectives and advantages thereof, willbest be understood by reference to the following detailed description ofan illustrative embodiment when read in conjunction with theaccompanying drawings. The functionality of various devices orcomponents described herein may be implemented as hardware (includingcircuits) and/or software, depending on the application requirements.

The following terminology may be useful in understanding the presentdisclosure. It is to be understood that the terminology described hereinis for the purpose of description and should not be regarded aslimiting.

Cryptography—A technique of protecting information by transforming apiece of information (encrypting it) with a secret encryption key intoan unintelligible format. Only users who possess the secret key may beable to decipher (or decrypt, or recover) the message into the originalpiece of information. Cryptography systems are broadly classified intosymmetric-key systems that use a single private key that both the senderand recipient have, and public-key systems that use two keys, a publickey known to everyone and a private key that is only known to therecipient of the message.

Encryption and decryption—Encryption is the process of transforminginformation so it is unintelligible to anyone but the intendedrecipient. Decryption is the process of transforming encryptedinformation so that it is intelligible again.

Cryptographic algorithm and key—A cryptographic algorithm is amathematical function used for encryption or decryption. In most cases,the ability to keep encrypted information confidential is based not onthe cryptographic algorithm, which is widely known, but on a numbercalled a ‘key’ that is used with the algorithm to produce an encryptedresult or to decrypt previously encrypted information. Decryption withthe correct key is simple. Decryption without the correct key isvirtually impossible. Encryption strength is often described in terms ofthe size of the keys used to perform the encryption: in general, longerkeys provide stronger protection of information.

Authentication—It is the process of confirming an identity. In thecontext of smart batteries, authentication involves the confidentidentification of a genuine smart battery by another device external tothe smart battery.

Counterfeit smart batteries may not provide adequate safeguards toprotect the occurrence of unsafe conditions such as over heating duringthe charging process. In some instances the over heating condition maycause an explosion. There is a need to ensure the safe and secureoperation of information system device and the smart battery, especiallyduring the charging phase of the smart battery. According to oneembodiment, in a method and system for authenticating a smart batteryfor charging, the smart battery receives an encrypted random string. Inthis embodiment, the device performs the encryption function and thesmart battery performs the decryption function. A controller of thedevice generates the encrypted random string by generating a randomstring and encrypting the random string with an encryption key. Thesmart battery decrypts the encrypted random string with the encryptionkey to recover the random string and transfer the random string to thecontroller. The controller verifies that the random string is unchangedto authenticate the smart battery for the charging. If the random stringhas been modified then the smart battery is disabled from the charging.

FIG. 1 illustrates a diagrammatic representation of a smart batteryauthentication system 100 for authenticating a smart battery 110,according to an embodiment. The smart battery 110 and/or an AC powersource 140 provides power to a portable information handling systemdevice 101. The smart battery authentication system 100 includes: 1) thesmart battery 110 having a smart electronics 112 device and at least onerechargeable cell 116, 2) a controller 170 included in the portabledevice 101 for controlling the operation of power sources such as thebattery 110 via control line 172 and the AC power source 140, 3) the ACpower source 140, 4) an AC/DC adaptor device 130 for converting the ACvoltage/power to DC voltage/power, 5) a charger device 120 providing thecharge to the smart batteries 110 via a charge line 152, 6) an AC powersource switch 132 for controlling the flow of power from the AC/DCadaptor 130 to the portable device 101 by control line 164, 7) a primarydischarge switch 134 for controlling the flow of power from the smartbattery 110 to the portable device 101 by control line 166, and 8) aprimary charge switch 144 for controlling the flow of power from thecharger 120 to the smart battery 110 by control line 162.

In one embodiment, items 1-2, and 5-8 may be included in the device 101,while items 3 and 4 are external to the device 101. In one embodiment, apower supply system (not shown) includes items 1, and 4-8. In oneembodiment, the device 101 includes an electrical circuit (not shown)operable to provide a charge to the smart battery 110.

In one embodiment, each of the switches 132, 134 and 144 are implementedusing MOSFET body diode devices. The MOSFET body diodes areadvantageously used to minimize the impact of an accidental reverseconnection of the battery 110 or other over-current causing conditions.The MOSFET body diodes are also useful to maximize the availability ofpower to the device 101.

The controller 170 included in the portable device 101 is operable tocontrol various inputs and outputs of the device 101. For example, thecontroller 170 may be used to control inputs and outputs of a keyboard(not shown) of the device 101 via a bus (not shown) such as the SMBus(not shown). In this embodiment, the controller 170 is operable toauthenticate the smart battery 110. The controller 170 advantageouslysafeguards the charging process by enabling authenticated smartbatteries to receive the charge from the charger device 120 anddisabling counterfeit smart batteries from receiving the charge. Asdescribed herein any smart battery, which has failed the authenticationprocess, is identified as a counterfeit smart battery.

The controller 170 is operable to receive inputs from various powersources and loads to control the flow of power from the various sourcesof power such as the smart battery 110 and the AC power source 140 tothe various loads such as the portable device 101. The controller 170controls the charger 120 by a control line 161. In one embodiment, aBasic Input Output System (BIOS) program (not shown) may be used toreceive inputs and generate outputs.

In one embodiment, the battery charge line 152 and the control lines162, 172, 164, 166 may be implemented using the SMBus (not shown). Inone embodiment, the battery charge line 152 and the control lines 162,172, 164, 166 may be implemented using dedicated, electricallyconducting lines or paths.

The smart battery 110 includes the smart electronics 112 to control theoperating condition of the battery 110 and monitor various batteryvariables such as voltage, current, temperature, and charge level. Thesmart battery 110 includes at least one rechargeable cell 116. Othercells may be present but are not shown. The smart electronics 112 iselectrically coupled to the battery charge line 152 and the control line172 for interfacing with external devices such as the charger device 120and the controller 170 respectively. Another embodiment of the smartbattery 110 is described in FIG. 2.

The smart electronics 112 and the controller 170 jointly control: a) theoperating condition of the smart battery 110 such as the charging ordischarging operation, and b) the authentication process of the smartbattery 110 to enable the charging operation. More specifically, thesmart electronics 112 monitors the energy level of the rechargeable cell116. When requested by the controller 170, the smart electronics 112 isoperable to provide energy stored in the rechargeable cell 116 to theportable device 101 during a discharge operating condition. The smartelectronics 112 is operable to notify the controller 170 when the energylevel of the rechargeable cell 105 falls below a predefined thresholdlevel. During a charge operating condition, the smart electronics 112 isoperable to receive a charge from the charger 120 via the charge line152 and transfer the charge to the rechargeable cell 116 when required.

In one embodiment, the controller 170 generating a random stringinitiates the authentication process. Additional details of theauthentication process are described in FIG. 3. The random stringincludes alphanumeric characters. In one embodiment, the random stringis a random number. The controller 170 also includes encryption hardwareor software to encrypt the random string with an encryption key. In oneembodiment, the encryption key is of a predefined length and is private.The output of the encryption process performed by the controller 170 isan encrypted random string. In one embodiment, a processor (not shown)of the device 101 performs the generation of the random string and theencrypted random string.

The smart electronics 112 of the smart battery 110 is operable toreceive the encrypted random string generated by the controller 170. Thesmart electronics 112 decrypts the encrypted random string with the sameencryption key used by the controller 170 for the encryption process. Asa result of the decryption process the smart electronics 112 recoversthe random string. The random string, which has been recovered by thesmart battery 110, is transferred to the controller 170 forauthentication. The controller 170 authenticates the smart battery 110by determining if the random string has changed compared to theoriginal. If there is no change in the random string then the smartbattery 110 is authentic. However, if the random string has changed thenthe smart battery 110 is identified as a counterfeit.

FIG. 2 illustrates a diagrammatic representation of the smart battery110 having a processor 210 and the smart electronics 112, according toan embodiment. In this embodiment, the functions associated with theauthentication process are performed by the processor 210, while thesmart electronics 112 is operable to control the operating condition ofthe battery 110 and monitor various battery variables as describedearlier.

The authentication process is implemented using a single encryption stepand a single decryption step described earlier in FIG. 1. In oneembodiment, to further improve the authentication process, a two-stepencryption/decryption process is implemented, as described in furtherdetail in FIG. 3. In the two-step authentication process the smartbattery 110 performs the decryption as well as the encryption step.Thus, the processor 210 is operable to advantageously perform theencryption and/or decryption functions described earlier. In addition,the processor 210 also handles communications with the controller 170through the control line 172, and with the smart electronics 112 througha control line 274. In one embodiment, control lines 172 and 274 use theSMBus. The addition of the processor 210 advantageously reduces thecomplexity of the smart electronics 112.

FIG. 3 is a flow chart illustrating a method for authenticating thesmart battery 110, according to one embodiment. In this embodiment, atwo-step authentication process for authenticating the smart battery 110is described. In step 310, the controller 170 generates a first randomstring. The first random string includes alphanumeric characters. In oneembodiment, the first random string is a random number. In step 320, thecontroller 170 includes encryption hardware or software to encrypt thefirst random string with a first encryption key. In one embodiment, thefirst encryption key is of a predefined length and is private. Theoutput of the encryption process performed by the controller 170 is afirst encrypted random string. In step 330, the controller 170 (actingas the master device) transfers the first encrypted random string to thesmart battery 110 (acting as the slave device). In step 340, the smartbattery 110 decrypts the encrypted first random string with the firstencryption key to recover a second random string. The second randomstring may or may not be the same as the first random string dependingon the authenticity of the smart battery 110. In step 350, the smartbattery 110 encrypts the second random string with a second encryptionkey to generate the encrypted second random string. In step 360, theencrypted second random string is transferred from the smart battery 110to the controller 170. In step 370, the controller 170 decrypts theencrypted second random string with the second encryption key to recoverthe second random string. In step 380, authentication of the smartbattery 110 includes verifying the first random string and the secondrandom string match. In step 390, if the smart battery 110 is identifiedto be authentic then the charging operation is enabled. In step 395, ifthe smart battery 110 is identified to be a counterfeit then thecharging operation is disabled.

Various steps described above may be added, omitted, combined, altered,or performed in different orders. For example, steps 310, 320 and 330may be combined into a single step 335 in which the smart battery 110receives the encrypted first random string.

FIG. 4 illustrates a block diagram of an information handling system toimplement method or apparatus aspects of the present disclosure,according to an embodiment. For purposes of this disclosure, aninformation handling system 400 may include any instrumentality oraggregate of instrumentalities operable to compute, classify, process,transmit, receive, retrieve, originate, switch, store, display,manifest, detect, record, reproduce, handle, or utilize any form ofinformation, intelligence, or data for business, scientific, control, orother purposes. For example, the information handling system 400 may bea personal computer, a network storage device, or any other suitabledevice and may vary in size, shape, performance, functionality, andprice.

The information handling system 400 may include random access memory(RAM), one or more processing resources such as a central processingunit (CPU) or hardware or software control logic, ROM, and/or othertypes of nonvolatile memory. Additional components of the informationhandling system may include one or more disk drives, one or more networkports for communicating with external devices as well as various inputand output (I/O) devices, such as a keyboard, a mouse, and a videodisplay. The information handling system may also include one or morebuses operable to transmit communications between the various hardwarecomponents.

Referring to FIG. 4, the information handling system 400 includes aprocessor 410, a system random access memory (RAM) 420, a system ROM422, a display device 405, a keyboard 425 and various other input/outputdevices 440. It should be understood that the term “information handlingsystem” is intended to encompass any device having a processor thatexecutes instructions from a memory medium. The information handlingsystem 400 is shown to include a hard disk drive 430 connected to theprocessor 410 although some embodiments may not include the hard diskdrive 430. The processor 410 communicates with the system components viaa bus 450, which includes data, address and control lines. Acommunications device (not shown) may also be connected to the bus 450to enable information exchange between the system 400 and other devices.

In one embodiment, the information handling system 400 may be used toimplement the portable information handling system device 101 describedin FIG. 1. The smart battery system 110 (not shown) may be configured toprovide power to the information handling system 400. In one embodiment,the processor 210 and processor 410 may be similar.

The processor 410 is operable to execute the computing instructionsand/or operations of the information handling system 400. The memorymedium, e.g., RAM 420, preferably stores instructions (also known as a“software program”) for implementing various embodiments of a method inaccordance with the present disclosure. In various embodiments the oneor more software programs are implemented in various ways, includingprocedure-based techniques, component-based techniques, and/orobject-oriented techniques, among others. Specific examples includeassembler, C, XML, C++ objects, Java and Microsoft Foundation Classes(MFC). For example, in one embodiment, the BIOS program described may beimplemented using an assembler language code.

Although illustrative embodiments have been shown and described, a widerange of modification, change and substitution is contemplated in theforegoing disclosure and in some instances, some features of theembodiments may be employed without a corresponding use of otherfeatures. Accordingly, it is appropriate that the appended claims beconstrued broadly and in a manner consistent with the scope of theembodiments disclosed herein.

1. A method for charging a smart battery, the method comprising:receiving an encrypted random string, wherein the encrypted randomstring includes a random string in an encrypted form; decrypting theencrypted random string to recover the random string; and transferringthe random string to a device to authenticate the smart battery for thecharging, the device being electrically coupled to the smart battery. 2.The method of claim 1, wherein the receiving comprises: generating arandom string, the random string being generated by the device;encrypting the random string, the random string being encrypted with anencryption key included in the device to generate the encrypted randomstring; and transferring the encrypted random string, the encryptedrandom string being transferred from the device to the smart battery. 3.The method of claim 2, wherein the decrypting requires the encryptionkey.
 4. The method of claim 2, wherein the encryption key is a privatekey.
 5. The method of claim 2, wherein the encrypted form is defined bythe device and includes the encryption key to encrypt the random string.6. The method of claim 2, wherein the encryption key is at least 8 bits.7. The method of claim 2, wherein the generating, encrypting andtransferring are performed by a controller included in the device,wherein the device is included in an information handling system.
 8. Themethod of claim 1, wherein the device authenticates the smart battery byverifying the random string is unchanged.
 9. The method of claim 8,wherein the device identifies the smart battery as a counterfeit whenthe random string is changed and disables the charging of thecounterfeit.
 10. The method of claim 1, wherein the encrypted form isdefined by the device and includes an encryption key to encrypt therandom string.
 11. The method of claim 1, wherein the random string isalpha numeric.
 12. The method of claim 1, wherein the random string is arandom number.
 13. The method of claim 1, wherein the transferring ofthe random string is via an SMBus.
 14. A method for authenticating asmart battery, the method comprising: generating a first random string,the first random string being generated by a device electrically coupledto the smart battery; encrypting the first random string, the firstrandom string being encrypted with a first encryption key included inthe device to generate the encrypted first random string; transferringthe encrypted first random string, the encrypted first random stringbeing transferred from the device to the smart battery; decrypting theencrypted first random string with the first encryption key to recover asecond random string; encrypting the second random string, the secondrandom string being encrypted with a second encryption key included inthe smart battery to generate the encrypted second random string;transferring the encrypted second random string, the encrypted secondrandom string being transferred from the smart battery to the device;decrypting the encrypted second random string with the second encryptionkey to recover the second random string; and verifying the first randomstring and the second random string match to authenticate the smartbattery.
 15. The method of claim 14, wherein each of the first andsecond encryption keys is a private key.
 16. The method of claim 14,wherein each of the first and second encryption keys is at least 8 bits.17. The method of claim 14, wherein each of the first and second randomstrings is a random number.
 18. A smart battery authentication systemcomprising: a smart battery, wherein the smart battery includes: a smartelectronics device operable to: receive an encrypted random string,wherein the encrypted random string includes a random string in anencrypted form; decrypt the encrypted random string to recover therandom string; and transfer the random string to a controller toauthenticate the smart battery; a communications bus for electricallycoupling the smart electronics to the controller; and the controlleroperable to authenticate the smart battery by generating the randomstring, generating the encrypted random string and verifying the randomstring is unchanged.
 19. The system of claim 18, wherein the encryptedform is defined by the controller and includes an encryption key toencrypt the random string.
 20. The system of claim 18, wherein therandom string is a random number.
 21. An information handling systemcomprising: a processor; a system bus; a memory coupled to the processorthrough the system bus; a power supply system operable to provide powerto the processor, the bus and the memory, the power supply system beingconnectable to an AC adapter for deriving power from an AC power source;a controller coupled to the processor and memory through the system bus,the controller operable to control the power supply system; and whereinthe power supply system includes: a smart battery having a smartelectronics, the smart electronics being operable to: receive anencrypted random string, wherein the encrypted random string includes arandom string in an encrypted form; decrypt the encrypted random stringto recover the random string; and transfer the random string to thecontroller to authenticate the smart battery.
 22. The system of claim21, wherein the controller is operable to authenticate the smart batteryby generating the random string, generating the encrypted random stringand verifying the random string is unchanged.