CPAC Systems CPAC1054 Charging Interface Control Unit User Manual Declaration software security requirements

CPAC Systems AB Charging Interface Control Unit Declaration software security requirements

Declaration software security requirements

Download: CPAC Systems CPAC1054 Charging Interface Control Unit User Manual Declaration software security requirements
Mirror Download [FCC.gov]CPAC Systems CPAC1054 Charging Interface Control Unit User Manual Declaration software security requirements
Document ID4041213
Application IDaTlUs6TeKzY2vQIAaMlPFA==
Document DescriptionDeclaration software security requirements
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize154.64kB (1932953 bits)
Date Submitted2018-10-19 00:00:00
Date Available2018-10-19 00:00:00
Creation Date0000-00-00 00:00:00
Document Lastmod0000-00-00 00:00:00
Document TitleDeclaration software security requirements

CPAC Systems AB
Software security for UNII Devices
Box 217, SE—401 23 Gothenburg, Sweden
To Whom It May Concern:
Product/Model/HVIN: CPAC—1054 (also known as CICU). (Module: "U—BLOX: ODIN—W2")
FCC ID: AVH—CPAC1054 (Contains: PVHO965)
C ID: 1011 1A—CPAC1054 (Contains: 5325A—0965)
SOFTWARE SECURITY REQUIREMENTS FOR U—NII DEVICES ace. to KDB 594280
SOFTWARE CONFIGURATION DESCRIPTION
General
Description
The CPAC—1054 (CICU) unit is only used [lfiegra[ed in electric busses
and vehicles for controlling the battery charging process
Describe how any software/firmware updates for elements than can
affect the device‘s RF parameters will be obtained, downloaded,
validated and installed. For software that is accessed through
manufacturer‘s website or device‘s management system, describe the
different levels of security as appropriate.
No setting of RF properties in the unit outside the legal can be made
after factory installation. No professional installer or user or end—user
can update or modify the RF properties of the unit.
Io
Describe the RF parameters that are modified by any software/firmware
without any hardware changes. Are these parameters in some way
limited such that any other software/firmware changes will not allow the
device to exceed the authorized RF characteristics?
Legally allowed RF channels are defined in the unit SW. Other
channels cannot be used.
Ico
Describe in detail the authentication protocols that are in place to
ensure that the source of the RF—related software/firmware is valid.
Describe in detail how the RF—related software is protected against
modification.
Unit RF—related SW is factory installed and can‘t be changed
Lt
Describe in detail any encryption methods used to support the use of
legitimate RF—related software/firmware.
No encryption method is used at unit level
in
For a device that can be configured as a master and client (with active
or passive scanning), explain how the device ensures compliance for
each mode? In particular if the device acts as master in some band of
operation and client in another; how is compliance ensured in each
band of operation?
N/A. The unit can only be used as client with approved SW
Third—Party
Access
Control
Explain if any third parties have the capability to operate a U.S.—sold
device on any other regulatory domain, frequencies, or in any manner
that may allow the device to operate in violation of the device‘s
authorization if activated in the U.S.
Not possible.
Io
Describe, if the device permits third—party software or firmware
installation, what mechanisms are provided by the manufacturer to
permit integration of such functions while ensuring that the RF
parameters of the device cannot be operated outside its authorization
for operation in the U.S. In the description include what controls and/or
agreements are in place with providers of third—party functionality to
ensure the devices‘ underlying RF parameters are unchanged and how
the manufacturer verifies the functionality.
No third—party SW can be installed
Ico
For Certified Transmitter modular devices, describe how the module
grantee ensures that host manufacturers fully comply with these
software security requirements for U—NII devices. If the module is
controlled through driver software loaded in the host, describe how the
drivers are controlled and managed such that the modular transmitter
RF parameters are not modified outside the grant of authorization.
NA
SOFTWARE CONFIGURATION DESCRIPTION
USER
CONFIGURATION
GuIDE
1 Describe the user configurations permitted through the UI. If different
levels of access are permitted for professional installers, system
integrators or end—users, describe the differences.
The unit has no UI
1.a What parameters are viewable and configurable by different parties?
None
1.b What parameters are accessible or modifiable by the professional
installer or system integrators?
None
1.b(1) Are the parameters in some way limited, so that the installers will
not enter parameters that exceed those authorized?
NA
1.b(2) What controls exist that the user cannot operate the device outside
its authorization in the U.S.?
See above
As What parameters are accessible or modifiable by the end—user?
None
1.¢(1) Are the parameters in some way limited, so that the user or
installers will not enter parameters that exceed those authorized?
User or installer cannot enter any parameters
1.0(2) What controls exist so that the user cannot operate the device
outside its authorization in the U.S.?
This is controlled by the factory installed unit SW/FW.
1.4 is the country code factory set? Can it be changed in the UI?
The unit does not use county codes. The unit has no UI
1.d(1) If it can be changed, what controls exist to ensure that the device
can only operate within its authorization in the U.S.?
NA
1e What are the default parameters when the device is restarted?
Factory set parameters including allowed channel list.
Io
Can the radio be configured in bridge or mesh mode? If yes, an
attestation may be required. Further information is available in KDB
Publication 905462 DO2.
No
Ito
For a device that can be configured as a master and client (with active
or passive scanning), if this is user configurable, describe what controls
exist, within the UL, to ensure compliance for each mode. If the device
acts as a master in some bands and client in others, how is this
configured to ensure compliance?
The unit can only be configured as client
Lm
For a device that can be configured as different types of access points,
such as point—to—point or point—to—multipoint, and use different types of
antennas, describe what controls exist to ensure compliance with
applicable limits and the proper antenna is used for each mode of
operation. (See Section 15.407(a))
The unit can only be used as point—to—point for the specified application.
Only the defined antenna can be used (included with the unit)
 Lars—Gunnar Sundin
 Project Manager Certification
 CPAC Systems AB
Box 217, SE—401 23 Gothenburg, Sweden +4670 306 9736

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Page Count                      : 4
XMP Toolkit                     : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-20:48:00
Format                          : application/pdf
Create Date                     : 2017:03:03 09:15:25+01:00
Creator Tool                    : Hewlett-Packard MFP
EXIF Metadata provided by EXIF.tools
FCC ID Filing: AHV-CPAC1054

Navigation menu