Manual
Table Of Contents
- Title
- Contents
- 1 Integration manual structure
- 2 System description
- 3 Receiver functionality
- 3.1 Receiver configuration
- 3.1.1 Changing the receiver configuration
- 3.1.2 Default GNSS configuration
- 3.1.3 Default interface settings
- 3.1.4 Basic receiver configuration
- 3.1.5 Differential timing mode configuration
- 3.1.6 Legacy configuration interface compatibility
- 3.1.7 Navigation configuration
- 3.2 Geofencing
- 3.3 Logging
- 3.4 Communication interfaces
- 3.5 Predefined PIOs
- 3.6 Antenna supervisor
- 3.7 Multiple GNSS assistance (MGA)
- 3.8 Clocks and time
- 3.9 Timing functionality
- 3.10 Security
- 3.11 u-blox protocol feature descriptions
- 3.12 Forcing a receiver reset
- 3.13 Firmware upload
- 3.1 Receiver configuration
- 4 Design
- 5 Product handling
- Appendix
- Related documents
- Revision history
- Contact
ZED-F9T-Integration manual
Figure 22: Timemark
3.10 Security
The security concept of ZED-F9T covers the air interface between the receiver and the GNSS
satellites and the integrity of the receiver itself.
There are functions to monitor/detect certain security threads and report it to the host system.
Other functions try to mitigate the thread and allow the receiver to operate normally.
The table below gives an overview about possible threads and which functionality is available to
detect and/or mitigate it.
Threat u-blox solution
Over air signal integrity Spoofing detection/mitigation
Jamming detection/mitigation
GNSS receiver integrity Secure boot
Secure firmware update
Table 22: u-blox security options
3.10.1 Spoofing detection / monitoring
Spoofing is the process whereby someone tries to forge a GNSS signal with the intention of fooling
the receiver into calculating a different user position than the true one.
UBX-19005590 - R05
3 Receiver functionality Page 50 of 87
C1-Public Early production information