USB Type-C Authentication empowers host systems to protect against non-compliant USB
chargers and to mitigate risks from malicious firmware/hardware in USB devices attempting
to exploit a USB connection. Using this protocol, host systems can confirm the authenticity
of a USB device, USB cable or USB charger, including such product aspects as the
capabilities and certification status. All of this happens right at the moment a connection is
made – before inappropriate power or data can be transferred.