USB C: new technology for greater security

As more and more devices use USB-C for the but also for data transfer, the need to improve it is apparent s. The USB Implementers Forum announced (PDF) changes to USB C authentication for more security.

This new security feature will allow devices to verify that USB-C connections are legal, both for charging and for data transfers.USB-C

With the upcoming technology, the device will immediately verify that a USB-C connection is indeed legal, and will prevent or allow the connection accordingly.

For example, consider wanting to charge your device at a public charging station. At present the risks are great. No one can know if the public charging device has been "hacked" and they are at risk you.
However, with USB C authentication, the connected device could ascertain whether the charging source is and block access to your data if it is not.

Features of the upcoming USB-C:

A standard protocol for certifying chargers, devices, cables and power sources USB Type-C
Support for authentication via either USB data channel or USB Power Delivery communication channels
Products using the authentication protocol have control over the security policies that need to be implemented and applied
Depending on 128-bit security for all encrypted methods
The specifications report existing internationally accepted cryptographic methods for certificate format, digital signing, hash and random number generation

Naturally, device manufacturers and operating system developers should include support for the new USB-C authentication.

Hopefully, most manufacturers/developers will recognize the value of the technology and include it in their devices or their system.

___________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).