Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

New Protocol Authenticates USB Type-C Chargers, Devices

New USB Type-C Authentication specification launched

New USB Type-C Authentication specification launched

The USB Implementers Forum (USB-IF) on Wednesday announced the launch of the USB Type-C Authentication Program, which aims to protect host systems against non-compliant chargers and potentially malicious devices.

The USB Type-C Authentication specification, unveiled by the USB-IF and the USB 3.0 Promoter Group in 2016, provides the cryptographic mechanisms needed for authenticating various types of USB Type-C devices, including chargers, cables, storage drives and power sources.

This optional security protocol allows OEMs to confirm the authenticity of USB chargers, cables and devices. Using certificates, companies can protect their products against both non-compliant chargers that can deliver damaging power surges and USB devices that may carry a malicious payload.

The authentication process takes place immediately after a wired connection is made, before any power or data exchange.

The use case examples described by the USB-IF and USB 3.0 Promoter Group when they unveiled the new specification included travelers concerned about charging their phones at a public terminal and enterprises protecting corporate assets by ensuring that only verified USB storage devices can be connected to their PCs.

The USB Type-C Authentication protocol provides support for authenticating over either the USB Power Delivery or USB data bus channels, it offers 128-bit security, and gives products control over security policies.

DigiCert has been selected to operate registration and certificate authority services for the new specification. The company will work with the over 1,000 member companies of the USB-IF.

“USB-IF is excited to launch the USB Type-C Authentication Program, providing OEMs with the flexibility to implement a security framework that best fits their specific product requirements,” said USB-IF President and COO Jeff Ravencraft. “As the USB Type-C ecosystem continues to grow, companies can further provide the security that consumers have come to expect from certified USB devices.”

Advertisement. Scroll to continue reading.

Related: Malware Found on USB Drives Shipped With Schneider Solar Products

Related: USB Drives Deliver Dangerous Malware to Industrial Facilities

Related: Symantec Unveils USB Scanning Station for ICS, IoT Environments

Related: Apple Rolls-Out USB Restricted Mode in iOS

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...