1
|
Which components of the device allow applications to be loaded.
|
2
|
How application updates are differentiated from firmware updates.
|
3
|
What cryptographic algorithms and key sizes are used for application authentication.
|
4
|
The device’s response if the application cannot be authenticated.
|
5
|
How the application is deleted if rejected.
|
6
|
Which components of the device allow software application/configuration updates.
|
7
|
The mechanisms used and the device components affected by the updates.
|
8
|
The cryptographic algorithms and key sizes used for software application/configuration authentication.
|
9
|
The device’s response if software application/configuration to be updated cannot be authenticated.
|
10
|
How the software application/configuration update is deleted if rejected.
|
Comments:
|