CELLUON PICOPRO Pico projector User Manual Software Security Procedures

CELLUON, INC. Pico projector Software Security Procedures

Contents

User Manual Software Security Procedures

Download: CELLUON PICOPRO Pico projector User Manual Software Security Procedures
Mirror Download [FCC.gov]CELLUON PICOPRO Pico projector User Manual Software Security Procedures
Document ID2532721
Application IDirebt7Ls6ve/RHtwynXm1g==
Document DescriptionUser Manual Software Security Procedures
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize7.97kB (99672 bits)
Date Submitted2015-02-12 00:00:00
Date Available2015-02-12 00:00:00
Creation Date2017-10-18 21:55:24
Producing SoftwareGPL Ghostscript 9.18
Document Lastmod2017-10-18 21:55:24
Document TitleMicrosoft Word - [TCLPICOPRO] Software security procedures
Document CreatorPScript5.dll Version 5.2.2
Document Author: Administrator

Software Security Declaration
Model: TCLPICOPRO
This device is fully compliant with the requirement of KDB 594280 D02 U‐NII Device Security v01r01.
SOFTWARE SECURITY DESCRIPTION
1. Describe how anysoftware/firmware
update will be obtained, downloaded,
and installed.
2. Describe all the radio frequency
parameters that are modified by any
software/firmware without any
hardware changes. Are these parameters
in some way limited, such that,
it will not exceed the authorized
parameters?
General
Description
3. Are there any authentication protocols
in place to ensure that the source of the
software/firmware is legitimate? If so,
describe in details; if not, explain how
the software is secured from
modification.
Celluon SW in our product runs a
validation during the SW upgrade process
to ensure the SW’s legitimate, unaltered,
and downloaded correctly by proprietary
load validation.
4. Are there any verification protocols in
place to ensure that the
software/firmware is legitimate? If so,
describe in details.
Celluon SW contains MD5 signature and
contains platform type imbedded in
header.
5. Describe, if any, encryption methods
used.
Third Party
Access
Control
Celluon introduce new SW that has
secured sign through Celluon website.
Celluon product can only download the
code and install.
All the radio frequency parameters are
Transmit power, operating channel,
modulation type but those authorized
parameters are fixed.
Celluon SWs are not encrypted but are
compressed.
6. For a device that can be configured as
a master and client (with active or
passive scanning), explain how the
device ensures compliance for each
mode? In particular if the device acts as
master in some band of operation and
client in another; how is compliance
ensured in each band of operation?
The device is only a slaver.
1. How are unauthorized software/
firmware changes prevented?
The SW has secure signed code that only
released by Celluon. Any changes check
the secure signed code.
SOFTWARE SECURITY DESCRIPTION
Third Party
Access
Control
2. Is it possible for third parties to load
device drivers that could modify the RF
parameters, country of operation or
other parameters which impact device
compliance? If so, describe procedures
to ensure that only approved drivers are
loaded.
No, the products are not allow any
changes by any user. It is a proprietary
system. The memory maps, SW
algorithms are not published.
3. Explain if any third parties have the
capability to operate a US sold device on
any other regulatory domain,
frequencies, or in any manner that is in
violation of the certification
This is locked into the manufacturing
data and cannot be changed.
4. What prevents third parties from
loading non‐US versions of the
software/firmware on the device?
The configuration for US is located in
secure area, so cannot be changed any
loadings non‐US versions of SW/
firmware.
This is not a modular device.
5. For modular devices, describe how
authentication is achieved when used
with different hosts.
1. To whom is the UI accessible?
(Professional installer, end user, other.)
a) What parameters are viewable to
the professional installer/end‐user?
b) What parameters are accessible or
modifiable to the professional installer?
User
Configuration
Guide
i) Are the parameters in some way
limited, so that the installers will not
enter parameters that exceed those
authorized?
ii) What controls exist that the user
cannot operate the device outside its
authorization in the U.S.?
c) What configuration options are
available to the end‐user?
i) Are the parameters in some way
limited, so that the installers will not
enter parameters that exceed those
authorized?
ii) What controls exist that the user
cannot operate the device outside its
authorization in the U.S.?
d) Is the country code factory set? Can
it be changed in the UI?
The UI is not accessible except Celluon.
All parameters are hidden.
Not support parameters access and
modify.
Not support parameters access and
modify.
The radios are configured at
manufacturing to be US only and the
configuration cannot be changed by any
SW update for the product.
Not support any configuration option.
Not support parameters access and
modify.
The radios are configured at
manufacturing to be US only and the
configuration cannot be changed by any
SW update for the product.
Yes, the country code is factory set.
It does not support the UI menu.
SOFTWARE SECURITY DESCRIPTION
i) If so, what controls exist to ensure
that the device can only operate
within its authorization in the U.S.?
e) What are the default parameters
when the device is restarted?
User
Configuration
Guide
The radios are configured at
manufacturing to be US only and the
configuration cannot be changed by any
SW update for the product.
The product goes to a default(approved)
Tx channel and power level based on
factory country setting.
2. Can the radio be configured in bridge
or mesh mode? If yes, an attestation
may be required. Further information is
available in KDB Publication 905462 D02.
No, can’t configure bridge or mesh mode.
3. For a device that can be configured as
a master and client (with active or
passive scanning) If this is user
configurable, describe what controls
exist to ensure compliance.
The product is a slave only.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V4.4 (128-bit)
User Access                     : Print, Extract, Print high-res
Author                          : Administrator
Create Date                     : 2015:02:03 10:22:21+09:00
Modify Date                     : 2015:02:03 10:22:33+09:00
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04
Format                          : application/pdf
Creator                         : Administrator
Title                           : Microsoft Word - [TCLPICOPRO] Software security procedures
Creator Tool                    : PScript5.dll Version 5.2.2
Metadata Date                   : 2015:02:03 10:22:33+09:00
Producer                        : Acrobat Distiller 9.5.5 (Windows)
Document ID                     : uuid:d6d84bf2-ef0a-478a-99b7-a7e33faa214d
Instance ID                     : uuid:ce3e39de-c48f-4f23-ab45-97f7c9b1913a
Page Count                      : 3
EXIF Metadata provided by EXIF.tools
FCC ID Filing: TCLPICOPRO

Navigation menu