USB C: new technology for greater security

As more and more use USB-C for charging but also for data transfer, the need to improve the technology becomes apparent. The USB Implementers Forum announced (PDF) changes in control of USB C for more security.

This new security feature will allow devices to certify that USB-C connections are legitimate, both for charging and data.USB-C

With the upcoming technology, the device will immediately verify that a USB-C connection is indeed legal, and will prevent or allow the connection accordingly.

For example, suppose you want to charge your device to a public charger. At the moment the risks are great. No one can know if the public charger has been "tampered with" and your data is compromised.
However, with USB C authentication, the connected device could verify that the charging source is secure and block access to your data if it is not.

Features of the upcoming USB-C:

A standardized protocol for certifying chargers, devices, cables and sources s USB Type-C
Support for authentication via either USB data channel or USB Power Delivery communication channels
Products using the authentication protocol have control over the security policies that need to be implemented and applied
Depending on 128-bit security for all encrypted methods
The specifications refer to existing internationally accepted cryptographic methods for certificate format, signing, hash and random number generation

Naturally, device manufacturers and operating system developers should include support for the new USB-C authentication.

Let us hope that most developers / developers will recognize the value of technology and incorporate it into their devices or their operating system.

___________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).