Shopping Cart

No products in the cart.

BS EN IEC 62680-1-4:2018

$198.66

Universal Serial Bus interfaces for data and power – Common components. USB Type-CTM Authentication Specification

Published By Publication Date Number of Pages
BSI 2018 64
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 62680-1-4:2018 provides a means for authenticating Products with regard to identification and configuration. Authentication is performed via USB Power Delivery message communications and/or via USB data bus control transactions. This specification defines the architecture and methodology for unilateral Product Authentication. It is intended to be fully compatible with and extend existing PD and USB infrastructure. Information is provided to allow for Policy enforcement, but individual Policy decisions are not specified.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 CONTENTS
13 1 Introduction
1.1 Scope
1.2 Overview
14 1.3 Related Documents
16 1.4 Terms and Abbreviations
Tables
Table 1-1: Terms and Abbreviations
17 1.5 Conventions
1.5.1 Precedence
1.5.2 Keywords
18 1.5.3 Numbering
1.5.4 Byte Ordering
2 Overview
2.1 Topology
19 2.2 Cryptographic Methods
2.2.1 Random Numbers
Figures
Figure 2-1 Sample Topology
Table 2-1: Summary of Cryptographic Methods
20 2.3 Security Overview
2.3.1 Periodic Re-Authentication
2.3.2 Secret Key Storage and Protection
2.3.3 Security Evaluation Criteria
2.4 Impact to Existing Ecosystem
21 2.4.1 Proxy Capabilities (PD traversing the Hub topology)
3 Authentication Architecture
3.1 Certificates
3.1.1 Format
3.1.2 Textual Format
3.1.3 Attributes and Extensions
23 3.2 Certificate Chains
3.2.1 Provisioning
Table 3-1: Certificate Chain Format
24 3.3 Private Keys
4 Authentication Protocol
4.1 Digest Query
4.2 Certificate Chain Read
25 4.3 Authentication Challenge
4.4 Errors and Alerts
4.4.1 Invalid Request
4.4.2 Unsupported Protocol Version
4.4.3 Busy
4.4.4 Unspecified
5 Authentication Messages
26 5.1 Header
5.1.1 USB Type-C Authentication Protocol Version
5.1.2 Message Type
5.1.3 Param1
5.1.4 Param2
5.2 Authentication Requests
Table 5-1: Authentication Message Header
Table 5-2: USB Type-C Authentication Protocol Version
27 5.2.1 GET_DIGESTS
5.2.2 GET_CERTIFICATE
Table 5-3: Authentication Request Types
Table 5-4: GET_DIGESTS Request Header
Table 5-5: GET_CERTIFICATE Request Header
28 5.2.3 CHALLENGE
5.3 Authentication Responses
Table 5-6: GET_CERTIFICATE Request Payload
Table 5-7: CHALLENGE Request Header
Table 5-8: CHALLENGE Request Payload
Table 5-9: Authentication Response Types
29 5.3.1 DIGESTS
5.3.2 CERTIFICATE
Table 5-10: DIGESTS Response Header
Table 5-11: DIGESTS Response Payload
Table 5-12: CERTIFICATE Response Header
30 5.3.3 CHALLENGE_AUTH
Table 5-13: CERTIFICATE Response Payload
Table 5-14: CHALLENGE_AUTH Response Header
31 5.3.4 ERROR
Table 5-15: CHALLENGE_AUTH Response Payload
Table 5-16: Message Contents for ECDSA Digital Signature
32 6 Authentication of PD Products
6.1 Transfers less than or equal to MaxExtendedMsgLen
Table 5-17: ERROR Response Header
Table 5-18: ERROR Codes
33 6.2 Transfers greater than MaxExtendedMsgLen
34 Figure 6-1 Example Security Transfer Process for an Authentication Initiator
35 Figure 6-2 Example Security Transfer Process for an Authentication Responder
36 6.3 Timing Requirements for PD Security Extended Messages
6.3.1 Authentication Initiator
Figure 6-3 Example 612-Byte Certificate Chain Read
Table 6-1: Timeout Values for a PD Authentication Initiator
37 6.3.2 Authentication Responder
Table 6-2: Timing Requirements for PD Authentication Responder
38 6.4 Context Hash
7 Authentication of USB Products
7.1 Descriptors
7.1.1 Authentication Capability Descriptor
Table 7-1: Authentication Capability Descriptor
39 7.2 Mapping Authentication Messages to USB
7.2.1 Authentication IN
Table 7-2: Authentication Capability Descriptor Types
Table 7-3: Authentication Message bRequest Values
Table 7-4: Authentication IN Control Request Fields
Table 7-5: Authentication Message Header Mapping
40 7.2.2 Authentication OUT
7.3 Authentication Protocol
7.3.1 Digest Query
Table 7-6: Authentication OUT Control Request Fields
Table 7-7: GET_DIGESTS Authentication IN Control Request Fields
41 7.3.2 Certificate Read
7.3.3 Authentication Challenge
Table 7-8: GET_CERTIFICATE Authentication OUT Control Request Fields
Table 7-9: CERTIFICATE Authentication IN Control Request Fields
Table 7-10: CHALLENGE Authentication OUT Control Request Fields
42 7.3.4 Errors
7.4 Timing Requirements for USB
7.4.1 USB Host Timing Requirements
Table 7-11: CHALLENGE_AUTH Authentication IN Control Request Fields
Table 7-12: Authentication Initiator Timeout Values
43 7.4.2 USB Device Timing Requirements
Table 7-13: Authentication Responder Response Times
44 7.5 Context Hash
8 Protocol Constants
Table 8-1: Protocol Constants
45 A ACD
A.1. ACD Formatting
Table A-1: TLV General Format
Table A-2: TLV Types
Table A-3: Version TLV Fields
46 Figure A-1: Bitmap of Version TLV Data
Figure A-1: Bitmap of Version TLV Data
Table A-4: ACD Version Encoding
Table A-5: XID TLV Fields
Table A-6: Power Source Capabilities TLV Fields
47 Table A-7: Power Source Capabilities TLV Data
Table A-8: Power Source Certifications TLV Fields
48 Table A-9: Cable Capabilities TLV Fields
Table A-10: Cable Capabilities TLV Data
Table A-11: Security Description TLV Fields
Table A-12: Security Data
49 Figure A-2: Bitmap of the Common Criteria Identifier
Table A-13: FIPS/ISO Level Identifiers
Table A-14: Vulnerability Assessment
50 Table A-15: EAL Encodings
Table A-16: Protection Profile Encoding
51 Figure A-3: Bitmap of the Security Analysis Identifier
Table A-17: Development Security
Table A-18: Certification Maintenance
52 Table A-19: Testing Method Encoding
Table A-20: Vulnerability Assessment
53 A.2. ACD for a PD Product
Table A-21: Playpen TLV Fields
Table A-22: Vendor Extension TLV Fields
Table A-23: Vendor Extension TLV Data
Table A-24: Extension TLV Fields
54 A.3. ACD for a USB Product
Table A-25: PD Product ACD TLVs
Table A-26: USB Product ACD TLVs
55 B Cryptographic Examples
B.1. Example Authentication Sequence
B.2. Example Certificate Chain Topology
59 Table B-1: Version TLV Fields
Table B-2: XID TLV Fields
Table B-3: Power Source Capabilities TLV Fields
Table B-4: Security Description TLV Fields
60 Table B-5: Playpen TLV Fields
Table B-6: Vendor Extension TLV Fields
62 B.3. Example Authentication Signature Verification
63 C Potential Attack Vectors
BS EN IEC 62680-1-4:2018
$198.66