U-NII devices declaration letter

FCC ID: 2AC23-WCT6LA2701

Cover Letter(s)

Download: PDF
FCCID_3779309

                  Hui Zhou Gaoshengda Technology Co., LTD


                  U-NII devices declaration letter

We, Hui Zhou Gaoshengda Technology Co.,LTD declare that:

FCC ID: 2AC23-WCT6LA2701
IC: 12290A-WCT6LA2701


                                     SOFTWARE SECURITY DESCRIPTION
General                 1.   Describe     how       any     software/firmware      There is no downloadable software
Description                  updates for elements than can affect the              provided by the manufacturer that can
                             device’s RF parameters will be obtained,              modify      critical    radio    transmitter
                             downloaded, validated and installed. For              parameters. All critical parameters are
                             software     that     is     accessed      through    programmed in OTP memory at the
                             manufacturer’s         website      or     device’s   factory and cannot be modified by third
                             management system, describe the different             parties.
                             levels of security as appropriate.
                        2.   Describe the RF parameters that are                   There are no RF parameters that can by
                             modified by any software/firmware without             modified.    ALL       RF   parameters   are
                             any     hardware       changes.      Are     these    programmed in OTP memory at the
                             parameters in some way limited such that              factory and cannot be modified by third
                             any other software/firmware changes will              parties.
                             not allow the device to exceed the
                             authorized RF characteristics?
                        3.   Describe     in     detail   the    authentication    The NVRAM of the module can only be
                             protocols that are in place to ensure that            written once and cannot be written after
                             the      source        of     the        RF-related   delivery.
                             software/firmware is valid. Describe in
                             detail how the RF-related software is
                             protected against modification.
                        4.   Describe in detail any encryption methods             The NVRAM of the module can only be
                             used to support the use of legitimate                 written once and cannot be written after
                             RF-related software/firmware.                         delivery.
                        5.   For a device that can be configured as a              This is client module only.
                             master and client (with active or passive
                             scanning), explain how the device ensures
                             compliance for each mode? In particular if
                             the device acts as master in some band of
                             operation and client in another; how is
                             compliance ensured in each band of
                             operation?

                                                                                                                     Page 1 of 4
Reference (active link): 594280 D02 U-NII Device Security v01r03


                  Hui Zhou Gaoshengda Technology Co., LTD
Third-Party             1.   Explain if any third parties have the                Third parties do not approved to operate
Access Control               capability to operate a U.S.-sold device on          in any manner that is violation of the
                             any other regulatory domain, frequencies,            certification in the U.S.
                             or in any manner that may allow the device
                             to operate in violation of the device’s
                             authorization if activated in the U.S.
                        2.   Describe, if the device permits third-party          The firmware is programmed at the
                             software or firmware installation, what              factory and cannot be modified by third
                             mechanisms        are      provided     by     the   parties.
                             manufacturer to permit integration of such
                             functions while ensuring that the RF
                             parameters of the device cannot be
                             operated     outside     its   authorization   for
                             operation in the U.S. In the description
                             include what controls and/or agreements
                             are in place with providers of third-party
                             functionality    to     ensure    the   devices’
                             underlying RF parameters are unchanged
                             and how the manufacturer verifies the
                             functionality.
                        3.   For Certified Transmitter modular devices,           There are no RF parameters that can by
                             describe how the module grantee ensures              modified.   ALL RF          parameters   are
                             that host manufacturers fully comply with            programmed in OTP memory at the
                             these software security requirements for             factory and cannot be modified by third
                             U-NII devices. If the module is controlled           parties. The module is not controlled by
                             through driver software loaded in the host,          driver software on the host and cannot
                             describe how the drivers are controlled and          modify any critical RF parameters
                             managed such that the modular transmitter            stored in module OTP memory.
                             RF parameters are not modified outside the
                             grant of authorization.




                                                                                                                    Page 2 of 4
Reference (active link): 594280 D02 U-NII Device Security v01r03


                  Hui Zhou Gaoshengda Technology Co., LTD


                                     SOFTWARE SECURITY DESCRIPTION
USER                    1.   Describe the user configurations permitted          No UI provided.
CONFIGURATION                through the UI. If different levels of access
GUIDE                        are permitted for professional installers,
                             system integrators or end-users, describe
                             the differences.
                             a.    What parameters are viewable and              None
                                   configurable by different parties?
                             b.    What parameters are accessible or             None
                                   modifiable by the professional installer
                                   or system integrators?
                                   1)   Are the parameters in some way           The module micro-code reads the
                                        limited, so that the installers will     parameters from the Module OTP
                                        not enter parameters that exceed         memory. These parameters cannot be
                                        those authorized?                        modified by SW driver.
                                   2)   What controls exist that the user        Default mode is always FCC compliant.
                                        cannot operate the device outside        Other   country    modes     cannot     be
                                        its authorization in the U.S.?           activated without writing in the drive's
                                                                                 bin files. However, bin files can only be
                                                                                 modified at the factory
                             c.    What parameters are accessible or             None
                                   modifiable by the end-user?
                                   1)   Are the parameters in some way           The module micro-code reads the
                                        limited, so that the user or             parameters from the Module OTP
                                        installers    will     not       enter   memory. These parameters cannot be
                                        parameters that exceed those             modified by SW driver.
                                        authorized?
                                   2)   What controls exist so that the          Default mode is always FCC compliant.
                                        user cannot operate the device           Other   country    modes     cannot     be
                                        outside its authorization in the         activated without writing in the drive's
                                        U.S.?                                    bin files. However, bin files can only be
                                                                                 modified at the factory
                             d.    Is the country code factory set? Can it       Default country code is set in the factory
                                   be changed in the UI?                         and no UI is provided for modification.
                                   1)   If it can be changed, what controls      Default mode is always FCC compliant.
                                        exist to ensure that the device can      Other   country    modes     cannot     be
                                        only     operate       within      its   activated without writing in the drive's
                                        authorization in the U.S.?               bin files. However, bin files can only be
                                                                                 modified at the factory
                             e.    What are the default parameters when          Always FCC compliant.
                                   the device is restarted?
                        2.   Can the radio be configured in bridge or            No

                                                                                                                 Page 3 of 4
Reference (active link): 594280 D02 U-NII Device Security v01r03


                  Hui Zhou Gaoshengda Technology Co., LTD
                               mesh mode? If yes, an attestation may be
                               required. Further information is available in
                               KDB Publication 905462 D02.
                        3.     For a device that can be configured as a         This is a client device.
                               master and client (with active or passive
                               scanning), if this is user configurable,
                               describe what controls exist, within the UI,
                               to ensure compliance for each mode. If the
                               device acts as a master in some bands and
                               client in others, how is this configured to
                               ensure compliance?
                        4.     For a device that can be configured as           This device is not an access point.
                               different types of access points, such as
                               point-to-point or point-to-multipoint, and use
                               different types of antennas, describe what
                               controls exist to ensure compliance with
                               applicable limits and the proper antenna is
                               used for each mode of operation. (See
                               Section 15.407(a))


City and Country:      Date:                Name:                    Function:              Signature:
Huizhou, China         2017-07-18           Hui Guan                 Manager




                                                                                                                Page 4 of 4
Reference (active link): 594280 D02 U-NII Device Security v01r03



Document Created: 2017-07-26 10:51:48
Document Modified: 2017-07-26 10:51:48

© 2025 FCC.report
This site is not affiliated with or endorsed by the FCC