CELLUON PICOPRO Pico projector User Manual Software Security Procedures
CELLUON, INC. Pico projector Software Security Procedures
CELLUON >
Contents
- 1. User Manual
- 2. User Manual Software Security Procedures
User Manual Software Security Procedures
Software Security Declaration Model: TCLPICOPRO This device is fully compliant with the requirement of KDB 594280 D02 U‐NII Device Security v01r01. SOFTWARE SECURITY DESCRIPTION 1. Describe how anysoftware/firmware update will be obtained, downloaded, and installed. 2. Describe all the radio frequency parameters that are modified by any software/firmware without any hardware changes. Are these parameters in some way limited, such that, it will not exceed the authorized parameters? General Description 3. Are there any authentication protocols in place to ensure that the source of the software/firmware is legitimate? If so, describe in details; if not, explain how the software is secured from modification. Celluon SW in our product runs a validation during the SW upgrade process to ensure the SW’s legitimate, unaltered, and downloaded correctly by proprietary load validation. 4. Are there any verification protocols in place to ensure that the software/firmware is legitimate? If so, describe in details. Celluon SW contains MD5 signature and contains platform type imbedded in header. 5. Describe, if any, encryption methods used. Third Party Access Control Celluon introduce new SW that has secured sign through Celluon website. Celluon product can only download the code and install. All the radio frequency parameters are Transmit power, operating channel, modulation type but those authorized parameters are fixed. Celluon SWs are not encrypted but are compressed. 6. For a device that can be configured as a master and client (with active or passive scanning), explain how the device ensures compliance for each mode? In particular if the device acts as master in some band of operation and client in another; how is compliance ensured in each band of operation? The device is only a slaver. 1. How are unauthorized software/ firmware changes prevented? The SW has secure signed code that only released by Celluon. Any changes check the secure signed code. SOFTWARE SECURITY DESCRIPTION Third Party Access Control 2. Is it possible for third parties to load device drivers that could modify the RF parameters, country of operation or other parameters which impact device compliance? If so, describe procedures to ensure that only approved drivers are loaded. No, the products are not allow any changes by any user. It is a proprietary system. The memory maps, SW algorithms are not published. 3. Explain if any third parties have the capability to operate a US sold device on any other regulatory domain, frequencies, or in any manner that is in violation of the certification This is locked into the manufacturing data and cannot be changed. 4. What prevents third parties from loading non‐US versions of the software/firmware on the device? The configuration for US is located in secure area, so cannot be changed any loadings non‐US versions of SW/ firmware. This is not a modular device. 5. For modular devices, describe how authentication is achieved when used with different hosts. 1. To whom is the UI accessible? (Professional installer, end user, other.) a) What parameters are viewable to the professional installer/end‐user? b) What parameters are accessible or modifiable to the professional installer? User Configuration Guide i) Are the parameters in some way limited, so that the installers will not enter parameters that exceed those authorized? ii) What controls exist that the user cannot operate the device outside its authorization in the U.S.? c) What configuration options are available to the end‐user? i) Are the parameters in some way limited, so that the installers will not enter parameters that exceed those authorized? ii) What controls exist that the user cannot operate the device outside its authorization in the U.S.? d) Is the country code factory set? Can it be changed in the UI? The UI is not accessible except Celluon. All parameters are hidden. Not support parameters access and modify. Not support parameters access and modify. The radios are configured at manufacturing to be US only and the configuration cannot be changed by any SW update for the product. Not support any configuration option. Not support parameters access and modify. The radios are configured at manufacturing to be US only and the configuration cannot be changed by any SW update for the product. Yes, the country code is factory set. It does not support the UI menu. SOFTWARE SECURITY DESCRIPTION i) If so, what controls exist to ensure that the device can only operate within its authorization in the U.S.? e) What are the default parameters when the device is restarted? User Configuration Guide The radios are configured at manufacturing to be US only and the configuration cannot be changed by any SW update for the product. The product goes to a default(approved) Tx channel and power level based on factory country setting. 2. Can the radio be configured in bridge or mesh mode? If yes, an attestation may be required. Further information is available in KDB Publication 905462 D02. No, can’t configure bridge or mesh mode. 3. For a device that can be configured as a master and client (with active or passive scanning) If this is user configurable, describe what controls exist to ensure compliance. The product is a slave only.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Encryption : Standard V4.4 (128-bit) User Access : Print, Extract, Print high-res Author : Administrator Create Date : 2015:02:03 10:22:21+09:00 Modify Date : 2015:02:03 10:22:33+09:00 XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04 Format : application/pdf Creator : Administrator Title : Microsoft Word - [TCLPICOPRO] Software security procedures Creator Tool : PScript5.dll Version 5.2.2 Metadata Date : 2015:02:03 10:22:33+09:00 Producer : Acrobat Distiller 9.5.5 (Windows) Document ID : uuid:d6d84bf2-ef0a-478a-99b7-a7e33faa214d Instance ID : uuid:ce3e39de-c48f-4f23-ab45-97f7c9b1913a Page Count : 3EXIF Metadata provided by EXIF.tools