Manual
Table Of Contents
- Title
- Contents
- 1 Integration manual structure
- 2 System description
- 3 Receiver functionality- 3.1 Receiver configuration- 3.1.1 Changing the receiver configuration
- 3.1.2 Default GNSS configuration
- 3.1.3 Default interface settings
- 3.1.4 Basic receiver configuration
- 3.1.5 Differential timing mode configuration
- 3.1.6 Legacy configuration interface compatibility
- 3.1.7 Navigation configuration
 
- 3.2 Geofencing
- 3.3 Logging
- 3.4 Communication interfaces
- 3.5 Predefined PIOs
- 3.6 Antenna supervisor
- 3.7 Multiple GNSS assistance (MGA)
- 3.8 Clocks and time
- 3.9 Timing functionality
- 3.10 Security
- 3.11 u-blox protocol feature descriptions
- 3.12 Forcing a receiver reset
- 3.13 Firmware upload
 
- 3.1 Receiver configuration
- 4 Design
- 5 Product handling
- Appendix
- Related documents
- Revision history
- Contact
ZED-F9T-Integration manual
Figure 22: Timemark
3.10 Security
The  security  concept  of  ZED-F9T  covers  the  air  interface  between  the  receiver  and  the  GNSS
satellites and the integrity of the receiver itself.
There are functions to monitor/detect certain security threads and report it  to the  host system.
Other functions try to mitigate the thread and allow the receiver to operate normally.
The table below  gives an overview about possible  threads and  which functionality is  available to
detect and/or mitigate it.
Threat u-blox solution
Over air signal integrity Spoofing detection/mitigation
Jamming detection/mitigation
GNSS receiver integrity Secure boot
Secure firmware update
Table 22: u-blox security options
3.10.1 Spoofing detection / monitoring
Spoofing is the process whereby someone tries to forge a GNSS signal with the intention of fooling
the receiver into calculating a different user position than the true one.
UBX-19005590 - R05
3 Receiver functionality Page 50 of 87
C1-Public Early production information










