USB C: new technology for greater security

As more and more use USB-C for charging but also for data transfer, the need to improve the technology becomes apparent. The USB Implementers Forum announced (PDF) changes to USB C authentication for more security.

This new security feature will allow devices to verify that USB-C connections are legal, both for charging and for data transfers.USB-C

With the upcoming technology the it will immediately verify that a USB-C connection is indeed legitimate, and block or allow the connection accordingly.

For example, suppose you want to charge your device to a public charger. At the moment the risks are great. No one can know if the public charger has been "tampered with" and your data is compromised.
However, with USB C authentication, the connected device could verify that the charging source is secure and block access to your data if it is not.

Features of the upcoming USB-C:

A standardized one to certify USB Type-C chargers, devices, cables and power sources
Support for authentication via either USB data channel or USB Power Delivery communication channels
Products using the authentication protocol have control over the security policies that need to be implemented and applied
Depending on 128-bit security for all encrypted methods
The specifications report existing internationally accepted cryptographic methods for certificate format, digital signing, hash and random number generation

Naturally, device manufacturers and operating system developers should include support for the new USB-C authentication.

Hopefully, most manufacturers/developers will recognize the value of the technology and include it in their devices or operating system .

___________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).