USB C: new technology for greater security

As more and more devices use USB-C to charge and transfer data, there is a need for improved technology. The USB Implementers Forum announced (PDF) changes to USB C authentication for more .

This new security feature will allow devices to verify that USB-C connections are legal, both for charging and for data transfers.USB-C

With the upcoming technology, the device will immediately verify that a USB-C connection is indeed legal, and will prevent or allow the connection accordingly.

For example, suppose you want to charge your device to a public charger. At the moment the risks are great. No one can know if the public charger has been "tampered with" and your data is compromised.
However, with USB C authentication, the connected device could verify that the charging source is secure and block access to your data if it is not.

Features of the upcoming USB-C:

A standardized one to certify USB chargers, devices, cables and power sources
Support for authentication via either the USB data bus or USB Power communication channels
Products using the authentication protocol have control over the security policies that need to be implemented and applied
Depending on 128-bit security for all encrypted methods
The specifications refer to existing internationally accepted cryptographic methods for certificate format, signing, hash and random number generation

Naturally, device manufacturers and operating system developers should include support for the new USB-C authentication.

Let us hope that most developers / developers will recognize the value of technology and incorporate it into their devices or their operating system.

___________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).