9462NG Intel Dual Band Wireless-AC 9462 Cover Letter Software Security Letter Intel

Intel Intel Dual Band Wireless-AC 9462

Page 1 of 9462NG Intel Dual Band Wireless-AC 9462 Cover Letter Software Security Letter Intel
Page 2 of 9462NG Intel Dual Band Wireless-AC 9462 Cover Letter Software Security Letter Intel
Page 3 of 9462NG Intel Dual Band Wireless-AC 9462 Cover Letter Software Security Letter Intel

The information provided in this document applies to the following Intel Wireless Adapter Modules.
Model
9462NGW
FCC ID
PD99462NG
Software Security Description – KDB 594280 D02v01r03 Section II
General Description
1. Describe how any software/firmware update will be
obtained, downloaded, and installed. Software that is
accessed through manufacturer’s website or device’s
management system, must describe the different levels
of security as appropriate.
There is no downloadable software provided by the
manufacturer that can modify critical radio transmitter
parameters. All critical parameters are programmed in
OTP memory at the factory and cannot be modified or
overridden by third parties.
2. Describe the rf parameters that are modified by any
software/firmware without any hardware changes. Are
these parameters in some way limited, such that, it will
not exceed the authorized RF characteristics?
There are no rf parameters that can be modified. All rf
parameters are programmed in OTP memory at the
factory and cannot be modified or overridden by third
parties.
3. Describe in detail the authentication protocols that The firmware is programmed at the factory and cannot
are in place to ensure that the source of the RF related be modified by third parties.
software/firmware is legitimate. Describe in detail how
the software is protected against modification.
4. Describe in detail any encryption methods used to
support the use of legitimate RF
relatedsoftware/firmware.
The firmware is programmed at the factory and cannot
be modified by third parties therefore no encryption is
necessary.
5. For a device that can be configured as a master and This is a client module only.
client (with active or passive scanning), explain how the
device ensures compliance for each mode? In particular
if the device acts as master in some band of operation
and client in another; how is compliance ensured in
each band of operation?
Third‐Party Access Control
1. Explain if any third parties have the capability to
operate a US sold device on any other regulatory
domain, frequencies, or in any manner that is in
Third parties do not the capability to operate in any
manner that is violation of the certification in the U.S.
violation of the device’s authorization if activated in the
U.S..
2. Describe, if the device permits third‐party software or RF parameters are programmed into OTP memory at the
firmware installation, what mechanisms are provided by factory and cannot be reprogrammed or re-flashed by
third parties.
the manufacturer to permit integration of such
functions while ensuring that the RF parameters of the
device cannot be operated outside its authorization for
operation in the U.S. In the description include what
controls and/or agreements are in place with providers
of third‐party functionality to ensure the devices’
underlying RF parameters are unchanged and how the
manufacturer verifies the functionality.
3. For Certified Transmitter modular devices, describe
how the module grantee ensures that hosts
manufactures fully comply with these software security
requirements for U‐NII devices. If the module is
controlled through driver software loaded in the host,
describe how the drivers are controlled and managed
such that the modular transmitter parameters are not
modified outside the grant of authorization.
There are no rf parameters that can be modified. All rf
parameters are programmed in OTP memory at the
factory and cannot be modified or overridden by third
parties. The module is not controlled by driver software
on the host and cannot override critical rf parameters
stored in module OTP memory.
SOFTWARE CONFIGURATION DESCRIPTION – KDB 594280 D02v01r02 Section III
USER CONFIGURATION GUIDE
1. Describe the user configurations permitted through No UI provided.
the UI. If different levels of access are permitted for
professional installers, system integrators or end‐users,
describe the differences.
a) What parameters are viewable and configurable by None
different parties?
b) What parameters are accessible or modifiable to
the professional installer or system integrator?
None
i) Are the parameters in some way limited, so that The module micro-code reads the parameters from the
module OTP memory. These parameters cannot be
the installers will not enter parameters that exceed
modified or overridden by sw drivers.
those authorized?
ii) What controls exist that the user cannot operate Default mode is always FCC compliant. Other country
modes cannot be activated without receiving three
the device outside its authorization in the U.S.?
independent country codes from different APs, otherwise
remains in FCC default mode (always FCC compliant)
c) What parameters are accessible or modifiable by
the end‐user?
None
i) Are the parameters in some way limited, so that The module micro-code reads the parameters from the
the installers will not enter parameters that exceed
those authorized?
module OTP memory. These parameters cannot be
modified or overridden by sw drivers.
ii) What controls exist that the user cannot operate Default mode is always FCC compliant. Other country
modes cannot be activated without receiving three
the device outside its authorization in the U.S.?
independent country codes from different APs, otherwise
remains in FCC default mode (always FCC compliant)
d) Is the country code factory set? Can it be changed Default country code is set in the factory and no UI is
provided for modification.
in the UI?
i) If it can be changed, what controls exist to ensure Programmed for default mode which is always FCC
that the device can only operate within its authorization compliant. Always set for default for all start-ups, resets,
timeouts or other host or network events.
in the U.S.?
e) What are the default parameters when the device Always FCC compliant
is restarted?
2. Can the radio be configured in bridge or mesh mode? No
If yes, an attestation may be required. Further
information is available in KDB Publication 905462 D02.
3. For a device that can be configured as a master and This is a client device.
client (with active or passive scanning),if this is user
configurable, describe what controls exist, within the UI,
to ensure compliance for each mode. If the device acts
as a master in some bands and client in others, how is
this configured to ensure compliance?
4. For a device that can be configured as different types This device is not an access point.
of access points, such as point‐to‐point or point‐to‐
multipoint, and use different types of antennas,
describe what controls exist to ensure compliance with
applicable limits and the proper antenna is used for
each mode of operation. (See Section 15.407(a))
Name and surname of applicant (or authorized representative):
Date:
November 10, 2017
Signature:
Steven C. Hackett
Product Regulations Enginee
Intel Mobile Communicationsr
Download: 9462NG Intel Dual Band Wireless-AC 9462 Cover Letter Software Security Letter Intel
Mirror Download [FCC.gov]9462NG Intel Dual Band Wireless-AC 9462 Cover Letter Software Security Letter Intel
Document ID4179335
Application IDX5ImIXijMQZhiHP+P70DMw==
Document DescriptionSoftware Security Letter
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeCover Letter(s)
Display FormatAdobe Acrobat PDF - pdf
Filesize19.49kB (243675 bits)
Date Submitted2019-02-25 00:00:00
Date Available2019-02-25 00:00:00
Creation Date2016-12-02 20:33:45
Producing SoftwareAcrobat Distiller 15.0 (Windows)
Document Lastmod2017-11-28 15:24:01
Document TitleSoftware Security Letter
Document CreatorPScript5.dll Version 5.2.2
Document Author: schacket

Source Exif Data [exif.tools]:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Author                          : schacket
Create Date                     : 2016:12:02 20:33:45-05:00
Modify Date                     : 2017:11:28 15:24:01-05:00
XMP Toolkit                     : Adobe XMP Core 5.6-c015 81.157285, 2014/12/12-00:43:15
Creator Tool                    : PScript5.dll Version 5.2.2
Metadata Date                   : 2017:11:28 15:24:01-05:00
Producer                        : Acrobat Distiller 15.0 (Windows)
Format                          : application/pdf
Title                           : Microsoft Word - Software Security Operational Description rev 3
Creator                         : schacket
Document ID                     : uuid:d5331e21-190c-4730-8c84-fef3590dc3e3
Instance ID                     : uuid:162cbbce-aa74-452d-864e-c7353ff17abd
Page Count                      : 3