CPAC Systems CPAC1054 Charging Interface Control Unit User Manual Declaration software security requirements
CPAC Systems AB Charging Interface Control Unit Declaration software security requirements
Contents
- 1. UserManual_Safety
- 2. InstallationInstructions
- 3. Installation Instructions
- 4. Safety Precautions - Legal Statements
- 5. Declaration software security requirements
Declaration software security requirements
CPAC Systems AB Software security for UNII Devices Box 217, SE—401 23 Gothenburg, Sweden To Whom It May Concern: Product/Model/HVIN: CPAC—1054 (also known as CICU). (Module: "U—BLOX: ODIN—W2") FCC ID: AVH—CPAC1054 (Contains: PVHO965) C ID: 1011 1A—CPAC1054 (Contains: 5325A—0965) SOFTWARE SECURITY REQUIREMENTS FOR U—NII DEVICES ace. to KDB 594280 SOFTWARE CONFIGURATION DESCRIPTION General Description The CPAC—1054 (CICU) unit is only used [lfiegra[ed in electric busses and vehicles for controlling the battery charging process Describe how any software/firmware updates for elements than can affect the device‘s RF parameters will be obtained, downloaded, validated and installed. For software that is accessed through manufacturer‘s website or device‘s management system, describe the different levels of security as appropriate. No setting of RF properties in the unit outside the legal can be made after factory installation. No professional installer or user or end—user can update or modify the RF properties of the unit. Io Describe the RF parameters that are modified by any software/firmware without any hardware changes. Are these parameters in some way limited such that any other software/firmware changes will not allow the device to exceed the authorized RF characteristics? Legally allowed RF channels are defined in the unit SW. Other channels cannot be used. Ico Describe in detail the authentication protocols that are in place to ensure that the source of the RF—related software/firmware is valid. Describe in detail how the RF—related software is protected against modification. Unit RF—related SW is factory installed and can‘t be changed Lt Describe in detail any encryption methods used to support the use of legitimate RF—related software/firmware. No encryption method is used at unit level in For a device that can be configured as a master and client (with active or passive scanning), explain how the device ensures compliance for each mode? In particular if the device acts as master in some band of operation and client in another; how is compliance ensured in each band of operation? N/A. The unit can only be used as client with approved SW Third—Party Access Control Explain if any third parties have the capability to operate a U.S.—sold device on any other regulatory domain, frequencies, or in any manner that may allow the device to operate in violation of the device‘s authorization if activated in the U.S. Not possible. Io Describe, if the device permits third—party software or firmware installation, what mechanisms are provided by the manufacturer to permit integration of such functions while ensuring that the RF parameters of the device cannot be operated outside its authorization for operation in the U.S. In the description include what controls and/or agreements are in place with providers of third—party functionality to ensure the devices‘ underlying RF parameters are unchanged and how the manufacturer verifies the functionality. No third—party SW can be installed Ico For Certified Transmitter modular devices, describe how the module grantee ensures that host manufacturers fully comply with these software security requirements for U—NII devices. If the module is controlled through driver software loaded in the host, describe how the drivers are controlled and managed such that the modular transmitter RF parameters are not modified outside the grant of authorization. NA SOFTWARE CONFIGURATION DESCRIPTION USER CONFIGURATION GuIDE 1 Describe the user configurations permitted through the UI. If different levels of access are permitted for professional installers, system integrators or end—users, describe the differences. The unit has no UI 1.a What parameters are viewable and configurable by different parties? None 1.b What parameters are accessible or modifiable by the professional installer or system integrators? None 1.b(1) Are the parameters in some way limited, so that the installers will not enter parameters that exceed those authorized? NA 1.b(2) What controls exist that the user cannot operate the device outside its authorization in the U.S.? See above As What parameters are accessible or modifiable by the end—user? None 1.¢(1) Are the parameters in some way limited, so that the user or installers will not enter parameters that exceed those authorized? User or installer cannot enter any parameters 1.0(2) What controls exist so that the user cannot operate the device outside its authorization in the U.S.? This is controlled by the factory installed unit SW/FW. 1.4 is the country code factory set? Can it be changed in the UI? The unit does not use county codes. The unit has no UI 1.d(1) If it can be changed, what controls exist to ensure that the device can only operate within its authorization in the U.S.? NA 1e What are the default parameters when the device is restarted? Factory set parameters including allowed channel list. Io Can the radio be configured in bridge or mesh mode? If yes, an attestation may be required. Further information is available in KDB Publication 905462 DO2. No Ito For a device that can be configured as a master and client (with active or passive scanning), if this is user configurable, describe what controls exist, within the UL, to ensure compliance for each mode. If the device acts as a master in some bands and client in others, how is this configured to ensure compliance? The unit can only be configured as client Lm For a device that can be configured as different types of access points, such as point—to—point or point—to—multipoint, and use different types of antennas, describe what controls exist to ensure compliance with applicable limits and the proper antenna is used for each mode of operation. (See Section 15.407(a)) The unit can only be used as point—to—point for the specified application. Only the defined antenna can be used (included with the unit)Lars—Gunnar Sundin Project Manager Certification CPAC Systems AB Box 217, SE—401 23 Gothenburg, Sweden +4670 306 9736
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Page Count : 4 XMP Toolkit : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-20:48:00 Format : application/pdf Create Date : 2017:03:03 09:15:25+01:00 Creator Tool : Hewlett-Packard MFPEXIF Metadata provided by EXIF.tools