Items tagged with usb-if

The USB Implementers Forum (USB-IF) has announced a new authentication standard that can be implemented for USB-C devices and complimenting chargers. USB-C Authentication, as it’s called, uses 128-bit “cryptographic-based authentication” to help mitigate potential security intrusions from USB thumb drives and chargers that could be used to deliver malicious payloads/firmware. The USB-IF says that with its new authentication protocol, the host device would be able to in effect enter in a secure “handshake” with another USB-C device, confirming its identify. At the moment the connection is made, the host would be able to determine “product aspects as the capabilities... Read more...
Are you miffed that the latest iPhone doesn't have a dedicated 1/8" audio jack? Well, Apple likely won't be alone, as other smartphone OEMs may be looking to ditch the venerable headphone jack in order to take advantage of audio over USB-C. This week, the USB-IF (Implementers Forum) announced "USB Audio over USB Type-C", and it's touting it for much the same reasons that Apple does with its latest iPhone. USB-IF expects this standard to be used for headsets, mobile devices, docking stations, gaming setups, VR solutions, and more. Notebooks are not mentioned, but it seems certain they'll all support USB-C in the near-future, which of course will be able to be used for audio. "Device... Read more...
If you’ve been bitten by crappy USB-C cables over the past year (and there are plenty of them out there circulating in the wild), help is on the way. Amazon made a credible first step by banning USB-C cables that aren’t compliant with specifications issued by the USB Implementers Forum (USB-IF). Now, the USB-IF is taking action to stop fly-by-night manufacturers from damaging expensive electronic devices with cables that are woefully out of spec. The USB-IF announced a new USB-C Authentication specification at IDF China that uses a standard protocol to identify cables and chargers that have been fully certified. Host devices like smartphones, laptops or tablets will be able to authenticate a... Read more...