SW Security Statement

FCC ID: 2AFZZ-XMSF9SH

Cover Letter(s)

Download: PDF
FCCID_4345062

FCC ID:2AFZZ-XMSF9SH
This device compliance with the latest revision of KDB publication 594280 D02 U-NII Device
Security v01r03:
The information within this section of the Operational Description is to show compliance
against the Software Security Requirements laid out within M1906F9SH Security.
The information below describes how we maintain the overall security measures and
systems so that only:
    1. Authenticated software is loaded and operating on the device
    2. The device is not easily modified to operate with RF parameters outside of the
       authorization


  General Description
  1. Describe how any software/firmware               OTA upgrade
     updates for elements than can affect
     the device’s RF parameters will be
     obtained, downloaded, validated and
     installed. For software that is
     accessed through manufacturer’s
     website or device’s management
     system, describe the different levels
     of security as appropriate.

  2. Describe the RF parameters that are              RF para will not be modifed
     modified by any software/firmware
     without any hardware changes. Are
     these parameters in some way limited
     such that any other software/firmware
     changes will not allow the device to
     exceed the authorized RF
     characteristics?
  3. Describe in detail the authentication            Use xiaomi effuse security mechanism
     protocols that are in place to ensure
     that the source of the RF-related
     software/firmware is valid. Describe in
     detail how the RF-related software is
     protected against modification.

  4. Describe in detail any encryption                Use Qualcomm effuse security mechanism
     methods used to support the use of
     legitimate RF-related
     software/firmware.

  5. For a device that can be configured              Follow Qualcomm original wifi design
     as a master and client (with active or
     passive scanning), explain how the
     device ensures compliance for each
     mode? In particular if the device acts
     as master in some band of operation
     and client in another; how is
     compliance ensured in each band of
     operation?




KDB 594280 D02 U-NII Device Security v01r01 Information                                        Page 1 of 3


  3rd Party Access Control
  1. Explain if any third parties have the            NO
     capability to operate a U.S.-sold
     device on any other regulatory
     domain, frequencies, or in any
     manner that may allow the device to
     operate in violation of the device’s
     authorization if activated in the U.S.

  2. Describe, if the device permits third-           RF parameters can’t be changed by third-party software
     party software or firmware                       or firmware installation
     installation, what mechanisms are
     provided by the manufacturer to
     permit integration of such functions
     while ensuring that the RF parameters
     of the device cannot be operated
     outside its authorization for operation
     in the U.S. In the description include
     what controls and/or agreements are
     in place with providers of third-party
     functionality to ensure the devices’
     underlying RF parameters are
     unchanged and how the manufacturer
     verifies the functionality.

  3. For Certified Transmitter modular                Not applicable,this device is not a module
     devices, describe how the module
     grantee ensures that host
     manufacturers fully comply with these
     software security requirements for U-
     NII devices. If the module is controlled
     through driver software loaded in the
     host, describe how the drivers are
     controlled and managed such that the
     modular transmitter RF parameters
     are not modified outside the grant of
     authorization.




  SOFTWARE CONFIGURATION DESCRIPTION GUIDE – USER CONFIGURATION GUIDE 1
  1. Describe the user configurations permitted
     through the UI. If different levels of access
     are permitted for professional installers,
     system integrators or end-users, describe the
     differences.
     a) What parameters are viewable and                      Basic wifi para
       configurable by different parties?



1 This section is required for devices which have a “User Interfaces” (UI) to configure the device in a manner that

may impact the operational parameter. Supporting information is required in the operational description. The
operational description must address if the device supports any of the country code configurations or peer-peer
mode communications discussed in KDB 594280 Publication D01.


  SOFTWARE CONFIGURATION DESCRIPTION GUIDE – USER CONFIGURATION GUIDE 1
     b) What parameters are accessible or                  Basic wifi para
        modifiable by the professional
        installer or system integrators?
        i) Are the parameters in some way limited,         No
           so that the installers will not enter
           parameters that exceed those
           authorized?
        ii) What controls exist that the user cannot       No
           operate the device outside its
           authorization in the U.S.?
     c) What parameters are accessible or                  No
        modifiable by the end-user?
        i) Are the parameters in some way limited,         Can’t be changed
           so that the user or installers will not enter
           parameters that exceed those
           authorized?
        ii) What controls exist so that the user           No
           cannot operate the device outside its
           authorization in the U.S.?
       d) Is the country code factory set? Can it be       Country code will be set in factory.Can;t be changed in
   changed in the UI?                                      UI
        i) If it can be changed, what controls exist       In OOBE user can choose anywhere region
           to ensure that the device can only              If user insert anywhere sim card when register network,
           operate within its authorization in the         Will changed to anywhere
           U.S.?
     e) What are the default parameters when the           No
        device is restarted?
   2. Can the radio be configured in bridge or             No
      mesh mode? If yes, an attestation may be
      required. Further information is available in
      KDB Publication 905462 D02.
  3. For a device that can be configured as a              No
     master and client (with active or passive
     scanning), if this is user configurable,
     describe what controls exist, within the UI, to
     ensure compliance for each mode. If the
     device acts as a master in some bands and
     client in others, how is this configured
     to ensure compliance?
  4. For a device that can be configured as                Qualcomm implements compatibility in Non-hlos.like wifi
     different types of access points, such as             and Bluetooth use the same antenna.
     point-to-point or point-to-multipoint, and use
     different types of antennas, describe what
     controls exist to ensure compliance with
     applicable limits and the proper antenna is
     used for each mode of operation. (See
     Section 15.407(a))




KDB 594280 D02 U-NII Device Security v01r01 Information                                         Page 3 of 3



Document Created: 2019-06-27 09:47:06
Document Modified: 2019-06-27 09:47:06

© 2024 FCC.report
This site is not affiliated with or endorsed by the FCC