{"id":229353,"date":"2024-10-19T14:55:14","date_gmt":"2024-10-19T14:55:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62680-1-42018\/"},"modified":"2024-10-25T09:03:47","modified_gmt":"2024-10-25T09:03:47","slug":"bs-en-iec-62680-1-42018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62680-1-42018\/","title":{"rendered":"BS EN IEC 62680-1-4:2018"},"content":{"rendered":"

IEC 62680-1-4:2018 provides a means for authenticating Products with regard to identification and configuration. Authentication is performed via USB Power Delivery message communications and\/or via USB data bus control transactions. This specification defines the architecture and methodology for unilateral Product Authentication. It is intended to be fully compatible with and extend existing PD and USB infrastructure. Information is provided to allow for Policy enforcement, but individual Policy decisions are not specified.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nCONTENTS <\/td>\n<\/tr>\n
13<\/td>\n1 Introduction
1.1 Scope
1.2 Overview <\/td>\n<\/tr>\n
14<\/td>\n1.3 Related Documents <\/td>\n<\/tr>\n
16<\/td>\n1.4 Terms and Abbreviations
Tables
Table 1-1: Terms and Abbreviations <\/td>\n<\/tr>\n
17<\/td>\n1.5 Conventions
1.5.1 Precedence
1.5.2 Keywords <\/td>\n<\/tr>\n
18<\/td>\n1.5.3 Numbering
1.5.4 Byte Ordering
2 Overview
2.1 Topology <\/td>\n<\/tr>\n
19<\/td>\n2.2 Cryptographic Methods
2.2.1 Random Numbers
Figures
Figure 2-1 Sample Topology
Table 2-1: Summary of Cryptographic Methods <\/td>\n<\/tr>\n
20<\/td>\n2.3 Security Overview
2.3.1 Periodic Re-Authentication
2.3.2 Secret Key Storage and Protection
2.3.3 Security Evaluation Criteria
2.4 Impact to Existing Ecosystem <\/td>\n<\/tr>\n
21<\/td>\n2.4.1 Proxy Capabilities (PD traversing the Hub topology)
3 Authentication Architecture
3.1 Certificates
3.1.1 Format
3.1.2 Textual Format
3.1.3 Attributes and Extensions <\/td>\n<\/tr>\n
23<\/td>\n3.2 Certificate Chains
3.2.1 Provisioning
Table 3-1: Certificate Chain Format <\/td>\n<\/tr>\n
24<\/td>\n3.3 Private Keys
4 Authentication Protocol
4.1 Digest Query
4.2 Certificate Chain Read <\/td>\n<\/tr>\n
25<\/td>\n4.3 Authentication Challenge
4.4 Errors and Alerts
4.4.1 Invalid Request
4.4.2 Unsupported Protocol Version
4.4.3 Busy
4.4.4 Unspecified
5 Authentication Messages <\/td>\n<\/tr>\n
26<\/td>\n5.1 Header
5.1.1 USB Type-C Authentication Protocol Version
5.1.2 Message Type
5.1.3 Param1
5.1.4 Param2
5.2 Authentication Requests
Table 5-1: Authentication Message Header
Table 5-2: USB Type-C Authentication Protocol Version <\/td>\n<\/tr>\n
27<\/td>\n5.2.1 GET_DIGESTS
5.2.2 GET_CERTIFICATE
Table 5-3: Authentication Request Types
Table 5-4: GET_DIGESTS Request Header
Table 5-5: GET_CERTIFICATE Request Header <\/td>\n<\/tr>\n
28<\/td>\n5.2.3 CHALLENGE
5.3 Authentication Responses
Table 5-6: GET_CERTIFICATE Request Payload
Table 5-7: CHALLENGE Request Header
Table 5-8: CHALLENGE Request Payload
Table 5-9: Authentication Response Types <\/td>\n<\/tr>\n
29<\/td>\n5.3.1 DIGESTS
5.3.2 CERTIFICATE
Table 5-10: DIGESTS Response Header
Table 5-11: DIGESTS Response Payload
Table 5-12: CERTIFICATE Response Header <\/td>\n<\/tr>\n
30<\/td>\n5.3.3 CHALLENGE_AUTH
Table 5-13: CERTIFICATE Response Payload
Table 5-14: CHALLENGE_AUTH Response Header <\/td>\n<\/tr>\n
31<\/td>\n5.3.4 ERROR
Table 5-15: CHALLENGE_AUTH Response Payload
Table 5-16: Message Contents for ECDSA Digital Signature <\/td>\n<\/tr>\n
32<\/td>\n6 Authentication of PD Products
6.1 Transfers less than or equal to MaxExtendedMsgLen
Table 5-17: ERROR Response Header
Table 5-18: ERROR Codes <\/td>\n<\/tr>\n
33<\/td>\n6.2 Transfers greater than MaxExtendedMsgLen <\/td>\n<\/tr>\n
34<\/td>\nFigure 6-1 Example Security Transfer Process for an Authentication Initiator <\/td>\n<\/tr>\n
35<\/td>\nFigure 6-2 Example Security Transfer Process for an Authentication Responder <\/td>\n<\/tr>\n
36<\/td>\n6.3 Timing Requirements for PD Security Extended Messages
6.3.1 Authentication Initiator
Figure 6-3 Example 612-Byte Certificate Chain Read
Table 6-1: Timeout Values for a PD Authentication Initiator <\/td>\n<\/tr>\n
37<\/td>\n6.3.2 Authentication Responder
Table 6-2: Timing Requirements for PD Authentication Responder <\/td>\n<\/tr>\n
38<\/td>\n6.4 Context Hash
7 Authentication of USB Products
7.1 Descriptors
7.1.1 Authentication Capability Descriptor
Table 7-1: Authentication Capability Descriptor <\/td>\n<\/tr>\n
39<\/td>\n7.2 Mapping Authentication Messages to USB
7.2.1 Authentication IN
Table 7-2: Authentication Capability Descriptor Types
Table 7-3: Authentication Message bRequest Values
Table 7-4: Authentication IN Control Request Fields
Table 7-5: Authentication Message Header Mapping <\/td>\n<\/tr>\n
40<\/td>\n7.2.2 Authentication OUT
7.3 Authentication Protocol
7.3.1 Digest Query
Table 7-6: Authentication OUT Control Request Fields
Table 7-7: GET_DIGESTS Authentication IN Control Request Fields <\/td>\n<\/tr>\n
41<\/td>\n7.3.2 Certificate Read
7.3.3 Authentication Challenge
Table 7-8: GET_CERTIFICATE Authentication OUT Control Request Fields
Table 7-9: CERTIFICATE Authentication IN Control Request Fields
Table 7-10: CHALLENGE Authentication OUT Control Request Fields <\/td>\n<\/tr>\n
42<\/td>\n7.3.4 Errors
7.4 Timing Requirements for USB
7.4.1 USB Host Timing Requirements
Table 7-11: CHALLENGE_AUTH Authentication IN Control Request Fields
Table 7-12: Authentication Initiator Timeout Values <\/td>\n<\/tr>\n
43<\/td>\n7.4.2 USB Device Timing Requirements
Table 7-13: Authentication Responder Response Times <\/td>\n<\/tr>\n
44<\/td>\n7.5 Context Hash
8 Protocol Constants
Table 8-1: Protocol Constants <\/td>\n<\/tr>\n
45<\/td>\nA ACD
A.1. ACD Formatting
Table A-1: TLV General Format
Table A-2: TLV Types
Table A-3: Version TLV Fields <\/td>\n<\/tr>\n
46<\/td>\nFigure A-1: Bitmap of Version TLV Data
Figure A-1: Bitmap of Version TLV Data
Table A-4: ACD Version Encoding
Table A-5: XID TLV Fields
Table A-6: Power Source Capabilities TLV Fields <\/td>\n<\/tr>\n
47<\/td>\nTable A-7: Power Source Capabilities TLV Data
Table A-8: Power Source Certifications TLV Fields <\/td>\n<\/tr>\n
48<\/td>\nTable A-9: Cable Capabilities TLV Fields
Table A-10: Cable Capabilities TLV Data
Table A-11: Security Description TLV Fields
Table A-12: Security Data <\/td>\n<\/tr>\n
49<\/td>\nFigure A-2: Bitmap of the Common Criteria Identifier
Table A-13: FIPS\/ISO Level Identifiers
Table A-14: Vulnerability Assessment <\/td>\n<\/tr>\n
50<\/td>\nTable A-15: EAL Encodings
Table A-16: Protection Profile Encoding <\/td>\n<\/tr>\n
51<\/td>\nFigure A-3: Bitmap of the Security Analysis Identifier
Table A-17: Development Security
Table A-18: Certification Maintenance <\/td>\n<\/tr>\n
52<\/td>\nTable A-19: Testing Method Encoding
Table A-20: Vulnerability Assessment <\/td>\n<\/tr>\n
53<\/td>\nA.2. ACD for a PD Product
Table A-21: Playpen TLV Fields
Table A-22: Vendor Extension TLV Fields
Table A-23: Vendor Extension TLV Data
Table A-24: Extension TLV Fields <\/td>\n<\/tr>\n
54<\/td>\nA.3. ACD for a USB Product
Table A-25: PD Product ACD TLVs
Table A-26: USB Product ACD TLVs <\/td>\n<\/tr>\n
55<\/td>\nB Cryptographic Examples
B.1. Example Authentication Sequence
B.2. Example Certificate Chain Topology <\/td>\n<\/tr>\n
59<\/td>\nTable B-1: Version TLV Fields
Table B-2: XID TLV Fields
Table B-3: Power Source Capabilities TLV Fields
Table B-4: Security Description TLV Fields <\/td>\n<\/tr>\n
60<\/td>\nTable B-5: Playpen TLV Fields
Table B-6: Vendor Extension TLV Fields <\/td>\n<\/tr>\n
62<\/td>\nB.3. Example Authentication Signature Verification <\/td>\n<\/tr>\n
63<\/td>\nC Potential Attack Vectors <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Universal Serial Bus interfaces for data and power – Common components. USB Type-CTM<\/sup> Authentication Specification<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2018<\/td>\n64<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":229357,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-229353","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/229353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/229357"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=229353"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=229353"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=229353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}