Apple Ios 13 on Iphone and Apple Ipados 13 on Ipad Mobile Devices

Total Page:16

File Type:pdf, Size:1020Kb

Apple Ios 13 on Iphone and Apple Ipados 13 on Ipad Mobile Devices Apple Inc. Apple iOS 13 on iPhone and Apple iPadOS 13 on iPad Mobile Devices Security Target PP_MD_V3.1 with MOD_MDM_AGENT_V1.0, MOD_VPN_CLI_V2.1, PP_WLAN_CLI_EP_V1.0 Version 1.7 2020-11-10 VID: 11036 Prepared for: Prepared by: Apple Inc. atsec information security Corp. One Apple Park Way 9130 Jollyville Road, Suite 260 MS 927-1CPS Austin, TX 78759 Cupertino, CA 95014 www.atsec.com www.apple.com © 2020 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision VID: 11036 Table of Contents Revision History ........................................................................................................................... 8 1 Security Target Introduction .............................................................................................. 10 1.1 Security Target Reference ........................................................................................... 10 1.2 TOE Reference ............................................................................................................. 10 1.3 TOE Overview ............................................................................................................... 10 1.4 TOE Description ............................................................................................................ 11 1.4.1 General information .......................................................................................... 11 1.4.2 Obtaining the mobile devices .......................................................................... 11 1.4.3 Obtaining software updates ............................................................................. 12 1.4.4 Supervising and configuring the mobile devices............................................ 12 1.4.5 Mobile devices covered by this evaluation ..................................................... 12 1.5 TOE Architecture ........................................................................................................... 33 1.5.1 Physical Boundaries ......................................................................................... 34 1.5.2 Security Functions provided by the TOE ........................................................ 34 1.5.3 TOE Documentation ......................................................................................... 39 1.5.4 Other References ............................................................................................. 41 2 Conformance Claims ........................................................................................................... 44 2.1 CC Conformance .......................................................................................................... 44 2.2 Protection Profile (PP) Conformance .......................................................................... 44 2.2.1 Technical Decisions (TDs) ............................................................................... 44 2.3 Conformance Rationale ................................................................................................ 47 3 Security Problem Definition ............................................................................................... 48 3.1 Threats ........................................................................................................................... 48 3.2 Assumptions .................................................................................................................. 50 3.3 Organizational Security Policies .................................................................................. 51 4 Security Objectives .............................................................................................................. 53 4.1 Security Objectives for the TOE .................................................................................. 53 4.2 Security Objectives for the TOE Environment ............................................................ 55 5 Extended Components Definition ..................................................................................... 56 6 Security Functional Requirements ................................................................................... 57 6.1 Security Audit (FAU) ..................................................................................................... 58 Agent Alerts (FAU_ALT) ........................................................................................................ 58 FAU_ALT_EXT.2 Extended: Agent Alerts .................................................................. 58 Audit Data Generation (FAU_GEN) ...................................................................................... 58 FAU_GEN.1(1) Audit Data Generation ....................................................................... 58 FAU_GEN.1(2) Audit Data Generation ....................................................................... 60 Security Audit Event Selection (FAU_SEL).......................................................................... 61 FAU_SEL.1(2) Security Audit Event Selection ........................................................... 61 Security Audit Event Storage (FAU_STG) ........................................................................... 62 FAU_STG.1 Audit Storage Protection ......................................................................... 62 FAU_STG.4 Prevention of Audit Data Loss ............................................................... 62 6.2 Cryptographic Support (FCS) ...................................................................................... 63 Cryptographic Key Management (FCS_CKM) ..................................................................... 63 FCS_CKM.1(1) Cryptographic Key Generation ......................................................... 63 Page 2 of 185 © 2020 Apple Inc. Version: 1.7 VID: 11036 FCS_CKM.1/WLAN Cryptographic Key Generation (Symmetric Keys for WPA2 Connections) ..................................................................................................... 63 FCS_CKM.1/VPN VPN Cryptographic Key Generation (IKE) .................................. 63 FCS_CKM.2(1) Cryptographic Key Establishment .................................................... 63 FCS_CKM.2(2) Cryptographic Key Establishment (While device is locked) ........... 64 FCS_CKM.2/WLAN WLAN Cryptographic Key Distribution (GTK) .......................... 64 FCS_CKM_EXT.1 Extended: Cryptographic Key Support (REK) ............................ 64 FCS_CKM_EXT.2 Extended: Cryptographic Key Random Generation ................... 64 FCS_CKM_EXT.3 Extended: Cryptographic Key Generation .................................. 64 FCS_CKM_EXT.4 Extended: Key Destruction ........................................................... 65 FCS_CKM_EXT.5 Extended: TSF Wipe ..................................................................... 65 FCS_CKM_EXT.6 Extended: Salt Generation ........................................................... 66 FCS_CKM_EXT.7 Extended: Cryptographic Key Support (REK) ............................ 66 Cryptographic Operations (FCS_COP) ................................................................................ 67 FCS_COP.1(1) Confidentiality Algorithms .................................................................. 67 FCS_COP.1(2) Hashing Algorithms ............................................................................ 67 FCS_COP.1(3) Signature Algorithms ......................................................................... 67 FCS_COP.1(4) Keyed Hash Algorithms ..................................................................... 67 FCS_COP.1(5) Password-Based Key Derivation Functions..................................... 67 HTTPS Protocol (FCS_HTTPS) ............................................................................................ 68 FCS_HTTPS_EXT.1 Extended: HTTPS Protocol ...................................................... 68 IPsec Protocol (FCS_IPSEC) ................................................................................................ 68 FCS_IPSEC_EXT.1 Extended: IPsec ......................................................................... 68 Initialization Vector Generation (FCS_IV) ............................................................................ 69 FCS_IV_EXT.1 Extended: Initialization Vector Generation ...................................... 69 Random Bit Generation (FCS_RBG) .................................................................................... 70 FCS_RBG_EXT.1(Kernel and User space) Extended: Cryptographic Operation (Random Bit Generation) ................................................................................. 70 FCS_RBG_EXT.1(SEP) Extended: Cryptographic Operation (Random Bit Generation) ....................................................................................................... 70 Cryptographic Algorithm Services (FCS_SRV) ................................................................... 70 FCS_SRV_EXT.1 Extended: Cryptographic Algorithm Services.............................. 70 Cryptographic Key Storage (FCS_STG) .............................................................................. 71 FCS_STG_EXT.1 Extended: Secure Key Storage .................................................... 71 FCS_STG_EXT.2 Extended: Encrypted Cryptographic Key Storage ...................... 71 FCS_STG_EXT.3 Extended: Integrity of Encrypted Key Storage ............................ 72 FCS_STG_EXT.4 Extended: Cryptographic Key Storage .......................................
Recommended publications
  • Second Generation of TSMC's Integrated Fan-Out (Info
    Apple A11 Application Processor Second generation of TSMC’s inFO packaging PACKAGING report by Stéphane ELISABETH February 2018 – version 1 ©2017 by System Plus Consulting | Apple A11 with TSMC inFO Packaging 1 Table of Contents Overview / Introduction 4 o Application Processor 87 o Executive Summary Die Views, Marking & Dimensions o Reverse Costing Methodology Die Cross-Section Company Profile 8 Die Process Characteristics o Apple Physical Comparison 94 o Apple APE Portfolio o Apple’s APE Series: A9, A10, A11 o Fan-Out Packaging o APE’s PoP Technology: Standard PoP, MCeP, inFO o TSMC inFO Technology Manufacturing Process 98 o Apple iPhone 8 & X Teardown o APE Die Front-End Process & Fabrication Unit o Fan-Out Market o Deep Trench Capacitor Die Front-End Process Flow Physical Analysis 22 & Fabrication Unit o Summary of the Physical Analysis 23 o inFO Packaging Process Flow & Fabrication unit o Packaging 25 Cost Analysis 117 Package Views, Marking & Dimensions o Summary of the cost analysis 118 o Yields Explanation & Hypotheses 119 Package X-Ray o APE die 122 Package RDL Deprocessing Wafer & Die Front-End Cost Package Memory: X-Ray view & Opening Preparation Wafer Cost Package Opening o LSC die 126 Board Cross-Section: Via Frame, PCB, Dimensions Wafer & Die Front-End Cost Package Cross-Section: TiV, Adhesive, RDLs Frond-End cost per Process Steps Package Process o inFO Packaging 131 Summary of Physical Data inFO Wafer Cost o Land-Side Capacitor 65 inFO Front-End Cost per Process Steps Die Views & Dimensions Component Cost Die Deprocessing & Delayering Company services 136 Die Process Die Cross-Section Die Process Characteristics ©2017 by System Plus Consulting | Apple A11 with TSMC inFO Packaging 2 Executive Summary Overview / Introduction o Executive Summary • This full reverse costing study has been conducted to provide insight on technology data, manufacturing cost and selling price of o Reverse Costing Methodology the Apple A11.
    [Show full text]
  • Deploying Ios and Tvos Devices Using Apple Configurator 2 and Jamf Pro
    Deploying iOS and tvOS Devices Using Apple Configurator 2 and Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 7 October 2020 © copyright 2002-2020 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 Jamf, the Jamf Logo, JAMF SOFTWARE®, and the JAMF SOFTWARE Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Apple, Apple Configurator 2, the Apple logo, Apple TV, iTunes, Mac, macOS, OS X, and tvOS are trademarks of Apple Inc., registered in the United States and other countries. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies. Contents Contents 4 Introduction 4 What's in This Guide 4 Additional Resources 5 Choosing a Deployment Method 6 Supervision Identities 6 Use a Supervision Identity from Apple Configurator 2 7 Create and Use a Supervision Identity from Jamf Pro 8 Automated Enrollment 8 Requirements 8 Deploying Devices Using Automated Enrollment 11 Manual Enrollment with an Enrollment URL 11 Requirements 11 Deploy Devices Using Manual Enrollment with an Enrollment URL 13 Further Considerations 14 Manual Enrollment with an Enrollment Profile 14 Requirements 14 Create an Enrollment Profile 14 Create and Upload the Supervision Identity 14 Create the "Prepare" Blueprint 15 Create the "Enroll" Blueprint 15 Deploy Devices Using Manual Enrollment with an Enrollment Profile 3 Introduction What's in This Guide This guide provides step-by-step instructions for deploying iOS and tvOS devices using Apple Configurator 2 and Jamf Pro.
    [Show full text]
  • Initial Setup of Your IOS Device
    1. When you first turn on your iOS device, you'll see a screen displaying Hello in different languages. Slide from left to right anywhere on this screen. 2. Select the language you want your iOS device to use, and then the region in which you'll be using your iOS device. This will affect things such as date, time, and contact formatting. 3. Your iOS device requires an Internet connection to set up. Tap the name of your desired Wi-Fi network to begin device activation. § If you're activating an iPhone or iPad (Wi-Fi + Cellular) with active cellular service, you can instead choose cellular activation. 4. Choose whether to enable Location Services. 5. Set up your iPhone as a new device, from an iCloud backup, or from an iTunes backup. § If restoring from backup, you can learn how to restore your content. 6. Sign in with your Apple ID, which you've created previously, or create a free Apple ID. § Alternatively, you can tap Skip This Step to sign in or create an Apple ID later. § If necessary, learn how to create a free Apple ID: 1. Select your birthday, then tap Next: 2. Enter your first and last name, then tap Next: 3. You can then use either your current email address, or choose to get a free iCloud email address. Select the option you'd like, then tap Next. 4. Enter your current email address, or what you'd like for your iCloud email, then tap Next. 5. Enter what you'd like for your password and tap Next.
    [Show full text]
  • Cocoa Touch & Iphone
    Music Appreciation 243: Introduction to Rick Astley Evan Doll [email protected] Alan Cannistraro [email protected] Thursday, April 2, 2009 Thursday, April 2, 2009 Welcome to CS193P: iPhone Application Development Evan Doll [email protected] Alan Cannistraro [email protected] Thursday, April 2, 2009 Staff • Lecturers ■ Evan Doll [email protected] ■ Alan Cannistraro [email protected] • Student TAs ■ Troy Brant [email protected] ■ Paul Salzman [email protected] • “Professor Emeritus” ■ Paul Marcos [email protected] Thursday, April 2, 2009 How many of you... • Are familiar with object-oriented programming? • Have developed software with Mac OS X? • Have developed apps for the iPhone? Thursday, April 2, 2009 Lectures, Sections, Office Hours • Lectures ■ 320-105, Monday & Wednesday 3:15 – 4:30 PM • Optional Section ■ 200-205, Friday 3:15 – 4:05 PM as announced ■ Guest speakers, additional topics ■ First one will be next Friday 4/10 • Office Hours ■ Troy and Paul will be holding office hours ■ Time & location TBD, check website for details Thursday, April 2, 2009 Requirements • Prerequisite: CS 106B/X • Recommended Book: None, we’ll use Apple documentation • You must have access to an Intel-based Macintosh ■ Running Mac OS X 10.5 Leopard ■ iPhone SDK (Not available on cluster computers!) • Owning an iPhone or iPod Touch is not required ■ Assignments may be done with the iPhone Simulator ■ Loaner iPod Touches should be available, more details to come Thursday, April 2, 2009 Enrollment • Response has been phenomenal again
    [Show full text]
  • Protect Yourself and Your Personal Information*
    CYBER SAFETY Protect yourself and your personal information * Cybercrime is a growing and serious threat, making it essential that fraud prevention is part of our daily activities. Put these safeguards in place as soon as possible—if you haven’t already. Email Public Wi-Fi/hotspots Key Use separate email accounts: one each Minimize the use of unsecured, public networks CYBER SAFETY for work, personal use, user IDs, alerts Turn oF auto connect to non-preferred networks 10 notifications, other interests Tips Turn oF file sharing Choose a reputable email provider that oFers spam filtering and multi-factor authentication When public Wi-Fi cannot be avoided, use a 1 Create separate email accounts virtual private network (VPN) to help secure your for work, personal use, alert Use secure messaging tools when replying session to verified requests for financial or personal notifications and other interests information Disable ad hoc networking, which allows direct computer-to-computer transmissions Encrypt important files before emailing them 2 Be cautious of clicking on links or Never use public Wi-Fi to enter personal attachments sent to you in emails Do not open emails from unknown senders credentials on a website; hackers can capture Passwords your keystrokes 3 Use secure messaging tools when Create complex passwords that are at least 10 Home networks transmitting sensitive information characters; use a mix of numbers, upper- and Create one network for you, another for guests via email or text message lowercase letters and special characters and children
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • App Frameworks #WWDC16
    App Frameworks #WWDC16 Improving Existing Apps Using modern best practices Session 213 Woody L., � to the Knowledge © 2016 Apple Inc. All rights reserved. Redistribution or public display not permitted without written permission from Apple. Agenda Reduce Technical Debt Asset Catalogs Dependency Injection Live Playgrounds Cycle of Development You down with ‘Dub-DC? Yeah, you know me. Lots of Requests Your boss More Requests Your customers Technical Debt //TODO: Write and clean up Customer’s Perspective Actuality Duarte requesting hi-res photo AppStore New API zsh AppKit CF AirPortUtility PreferencesApp iCal Foundation AVFoundation AirPortAssistant AirPortSettings AirPortAssistant OpenCL GameKit Dock Mail MapKit MobileMusicPlayer xnu AppKit AppStore MobileSafari zsh QuickTime udf WebKit BlueToothSettings cups Messages Dock ActivityMonitor MobileSafari bash Mail AccessibilitySettings GameKit GameKitServices MediaPlayerUI MediaPlayer MediaStream MobileMail Swift 3 Source code compatibility New and Updated Platforms A Dev’s Run Loop Bug Fixes Technical Debt New and Platforms ♽Updated APIs Customer Roadmap A Dev’s Run Loop Bug Fixes Technical Debt New and Platforms ♽Updated APIs Customer Roadmap A Dev’s Run Loop Bug Fixes Technical Debt New and Platforms ♽Updated APIs Customer Roadmap The Essentials A very good place to start Earlier iOS 8 5% 11% Minimum Deployment of iOS 8 • 95% of Devices iOS 9 84% As measured by the App Store on May 9, 2016 Pick a Deployment Target Latest update of previous release Deprecated API Deprecated API Treat Warnings
    [Show full text]
  • Overview Guide SAP Mobile Cards for Ios Company
    PUBLIC Document Version: 1.0 – 2020-01-28 Overview Guide SAP Mobile Cards for iOS company. All rights reserved. All rights company. affiliate THE BEST RUN 2020 SAP SE or an SAP SE or an SAP SAP 2020 © Content 1 Overview.................................................................. 3 2 Managing SAP Mobile Cards................................................... 4 3 SAP Mobile Cards User Guide...................................................5 Overview Guide SAP Mobile Cards for iOS 2 PUBLIC Content 1 Overview This guide provides an overview of SAP Mobile Cards: from setup and configuration by a system administrator to the end-user experience. Note SAP Mobile Cards is currently available only to iPhones running the latest two versions of iOS. SAP Mobile Cards lets system administrators mobilize SAP Fiori applications so that end users can share data from a desktop computer's SAP Fiori launchpad to an iPhone. This provides end users "any time from anywhere" access to the most up-to-date business data in an easily consumable mobile-friendly format. SAP Mobile Cards displays information in the form of cards that are grouped by card type and stored in a single card deck, with information available on both the front and the back of each card. Using the [[unresolved text-ref: cloud-admin-tooling-name]], system administrators can define and configure the SAP Mobile Cards application, including: ● Defining client-side security policies ● Creating cards using pre-defined or custom templates ● Specifying actions for new and updated cards such as "Allow" and "Reject", and an additional field for user input ● Configuring push and card-specific notifications End users download the SAP Mobile Cards application from the Apple App Store.
    [Show full text]
  • Get Apple TV+ Free When You Buy a New Iphone, Ipad, Ipod Touch, Apple TV, Or Mac
    Get Apple TV+ free when you buy a new iPhone, iPad, iPod touch, Apple TV, or Mac. Terms and conditions • Offer is available for a limited time only. • Eligible devices activated July 1, 2021 or later will qualify for offers of 3 months free Apple TV+, while those activated on June 30, 2021 or earlier will qualify for offers of 1 year free Apple TV+. • Offer cannot be combined with Apple One. • Only one offer per Family, regardless of number of devices purchased. You can share your Apple TV+ subscription with up to 5 other family members via Family Sharing. • The 3 months free Apple TV+ offer is not available if you or your Family have previously accepted the Apple TV+ one year free offer. • Make sure your device is running the latest iOS, iPadOS, tvOS, or macOS. • Offer must be claimed in the Apple TV app within 3 months after first setting up your new device. To see the offer appear, you will need to sign in with your Apple ID on your new device. • Upon claiming the offer, you agree to a SAR 19.99/month subscription that starts immediately after the free offer period and automatically renews until cancelled. You can cancel at any time in Settings at least one day before each renewal date. If you cancel during your free offer period, you and your family members will immediately lose access to Apple TV+ and the remainder of your free trial. You can’t reactivate this trial. Eligible devices • Any new iPhone, iPad, iPod touch, Apple TV, or Mac capable of running the latest iOS, iPadOS, tvOS, or macOS, from Apple or an Apple authorized reseller.
    [Show full text]
  • Compatibility
    Apple at Work Compatibility Compatible with your existing systems. Apple devices work with most enterprise systems and apps that your company already uses—mail and messaging, network connectivity, file sharing, collaboration and more—giving your employees access to everything they need to do their jobs. Connect to your infrastructure iPhone, iPad and Mac support WPA2 Enterprise to provide secure access to your enterprise Wi-Fi network. With the integration of iOS, iPadOS, macOS and the latest technology from Cisco, businesses everywhere can seamlessly connect to networks, optimize the performance of business-critical apps, and collaborate using voice and video—all with the security that businesses need. Secure access to private corporate networks is available in iOS, iPadOS and macOS using established industry-standard virtual private network protocols. Out of the box, iOS, iPadOS and macOS support IKEv2, Cisco IPSec and L2TP over IPSec, as well as on-demand VPN and per-app VPN. Work with your existing enterprise systems Apple devices work with key corporate services including Microsoft Exchange, giving your employees full access to their business email, calendar and contacts, across all their Apple devices. Employees can use the built-in Apple apps like Mail, Calendar, Contacts, Reminders and Notes to collaborate and optionally use apps like Microsoft Outlook for working with Microsoft Exchange. iPhone, iPad and Mac devices support a wide range of connectivity options including standards-based systems like IMAP and CalDAV. Popular productivity and collaboration tools like Microsoft Office, Google G Suite, Slack, Cisco Webex and Zoom deliver the functionality you know and expect. Access all your documents and files The Files app in iOS and iPadOS lets you access your Box, DropBox, OneDrive and Google Drive files all from one place.
    [Show full text]
  • TSMC Integrated Fan-Out (Info) Package Apple A10
    Electronic Costing & Technology Experts 21 rue la Nouë Bras de Fer 44200 Nantes – France Phone : +33 (0) 240 180 916 email : [email protected] www.systemplus.fr September 2016 – Version 1 – Written by Stéphane ELISABETH DISCLAIMER : System Plus Consulting provides cost studies based on its knowledge of the manufacturing and selling prices of electronic components and systems. The given values are realistic estimates which do not bind System Plus Consulting nor the manufacturers quoted in the report. System Plus Consulting is in no case responsible for the consequences related to the use which is made of the contents of this report. The quoted trademarks are property of their owners. © 2016 by SYSTEM PLUS CONSULTING, all rights reserved. 1 Return to TOC Glossary 1. Overview / Introduction 4 – A10 Die Analysis 57 – Executive Summary – A10 Die View, Dimensions & Marking – Reverse Costing Methodology – A10 Die Cross-Section – A10 Die Process Characteristics 2. Company Profile 7 – Comparison with previous generation 65 – Apple Inc. – A9 vs. A10 PoP – Apple Series Application processor – A9 vs. A10 Process – Fan-Out Packaging – TSMC Port-Folio 4. Manufacturing Process Flow 70 – TSMC inFO packaging – Chip Fabrication Unit – Packaging Fabrication Unit 3. Physical Analysis 15 – inFO Reconstitution Flow – Physical Analysis Methodology – iPhone 7 Plus Teardown 17 5. Cost Analysis 81 – A10 Die removal – Synthesis of the cost analysis – A10 Package-on-Package Analysis 23 – Main steps of economic analysis – A10 Package View, Dimensions – Yields Hypotheses – A10 Package XRay View – Die Cost Analysis 86 – A10 Package Opening – Wafer Cost – A10 Package Marking – Die Cost – A10 Package Cross-Section – inFO Packaging Cost Analysis 90 – A10 Package Cross-Section – Adhesive & Passivation – Packaging Wafer Cost – A10 package cross-Section - TIVs – Packaging Cost per process Steps – A10 package cross-Section – Solder Balls – Component Cost – A10 package cross-Section – RDL – Land-Side Decoupling Capacitor Analysis 48 6.
    [Show full text]
  • Kw-V950bw Kw-M855bw
    MONITOR WITH DVD RECEIVER KW-V950BW MONITOR WITH RECEIVER KW-M855BW INSTRUCTION MANUAL • Updated information (the latest Instruction Manual, system updates, new functions, etc.) is available from <http://www.jvc.net/cs/car/>. © 2019 JVC KENWOOD Corporation B5A-2892-00 (K) Contents Before Use 4 APPS 25 Precautions ................................................................... 4 Apple CarPlay Operation .......................................25 How to read this manual ......................................... 5 Android Auto™ Operation .....................................28 Wireless Mirroring Operation ...............................30 Basic Operations 6 Spotify Operation .....................................................31 Pandora® Operation ................................................32 Functions of the Buttons on the Front Panel ... 6 Turning on the Unit ................................................... 7 Initial Settings .............................................................. 7 USB 35 Adjusting the volume .............................................10 Connecting a USB device ......................................35 Touch screen operations .......................................10 USB Basic Operation ................................................35 Popup menu ..............................................................11 Search Operation ......................................................37 HOME screen descriptions ....................................12 Source selection screen description ..................12
    [Show full text]