Yesterday, the USB Implementers Forum (USB-IF), the organization that supports the adoption of USB technology, launched a USB Type-C Authentication Program. The USB Type-C Authentication specification defines cryptographic-based authentication for USB Type-C chargers and devices.
The USB Type-C has been introduced on leading notebooks, smartphones, and other connected devices as it allows faster data transfer and more power delivery than the widely deployed USB Type-A interface. These USB devices while being extremely helpful in the computing landscape have also introduced new risks that result from simply plugging in a malicious USB device.
With the new authentication program, host systems can protect against non-compliant USB chargers and also mitigate risks from malicious firmware/hardware in USB devices that attempt to exploit a USB connection. The protocol also helps the host systems to confirm the authenticity of a USB device, USB cable or USB charger. All of this happens right at the moment a connection is made before inappropriate power or data can be transferred.
USB-IF President and COO Jeff Ravencraft said, “USB-IF is excited to launch the USB Type-C Authentication Program, providing OEMs with the flexibility to implement a security framework that best fits their specific product requirements. As the USB Type-C ecosystem continues to grow, companies can further provide the security that consumers have come to expect from certified USB devices.”
Characteristics of the USB Type-C Authentication program:
USB-IF selected DigiCert to manage the PKI and certificate authority services for the USB Type-C Authentication Program. Geoffrey Noakes, Vice President, IoT Business Development at DigiCert said, “DigiCert is excited to work with USB-IF and its CA Program Participants from the industry at large to provide the technical expertise and scale needed for the USB Type-C Authentication Program, and we look forward to implementation.”
To know more about this news head over to the USB Type-C Authentication specification.
Apple USB Restricted Mode: Here’s Everything You Need to Know
DragonFly BSD 5.4.1 released with new system compiler in GCC 8 and more
I remember deciding to pursue my first IT certification, the CompTIA A+. I had signed…
Key takeaways The transformer architecture has proved to be revolutionary in outperforming the classical RNN…
Once we learn how to deploy an Ubuntu server, how to manage users, and how…
Key-takeaways: Clean code isn’t just a nice thing to have or a luxury in software projects; it's a necessity. If we…
While developing a web application, or setting dynamic pages and meta tags we need to deal with…
Software architecture is one of the most discussed topics in the software industry today, and…