
Castles Technology Co., Ltd. Confidential • All Right Reserved. Pg. 4
Contents
1. Introduction..................................................................................................................6
2. Hardware Setup............................................................................................................7
2.1. Parts of the UPT1000M.......................................................................................7
3. Basic Operation ...........................................................................................................9
3.1. Program Manager................................................................................................9
3.2. Download AP.....................................................................................................12
3.3. System Info........................................................................................................13
3.4. Memory Status ..................................................................................................15
3.5. System Settings.................................................................................................16
3.6. Test Utility..........................................................................................................21
3.7. Factory Reset....................................................................................................23
3.8. Power Off ..........................................................................................................24
3.9. FK PWD Change...............................................................................................25
3.10. Share Object Management................................................................................26
3.11. Embedded TMS.................................................................................................27
3.12. Font Mng...........................................................................................................28
3.13. Debug Tools......................................................................................................29
3.14. ULD Key Hash...................................................................................................30
3.15. HW Detect.........................................................................................................31
3.16. Bluetooth Setup.................................................................................................32
3.17. Plug-in Mng .......................................................................................................33
3.18. Key Injection......................................................................................................34
3.19. Key Bridge.........................................................................................................35
4. Secure File Loading................................................................................................... 36
4.1. ULD Key System ...............................................................................................36
4.1.1. ULD Manufacturer Key...........................................................................36
4.1.2. ULD User Key........................................................................................38
4.1.3. Key Change...........................................................................................38
4.2. File Signing........................................................................................................39
4.2.1. Signing Kernel Module...........................................................................39
4.2.2. Signing User Files..................................................................................41
4.3. File Loading.......................................................................................................46
4.3.1. Download by User Loader......................................................................46