QUALCOMM Incorporated
SECURING DEVICES FROM NON-COMPLIANT TYPE-C DEVICES

Last updated:

Abstract:

Techniques and apparatus for authenticating a second device by a first device includes detecting a physical attachment of the second device to the first device. In response to the detection, an indication of one or more capabilities of the second device is received and an authentication procedure with the second device is performed. A determination of whether to allow use of the one or more capabilities of the second device is made based on the authentication procedure. The first device interacts with the second device, in accordance with the determination.

Status:
Application
Type:

Utility

Filling date:

7 Feb 2020

Issue date:

12 Aug 2021