ZTE Mobile Switching Center Server / intelligent Controller Extensive

CSV information ?

Status archived
Valid from 26.09.2011
Valid until 01.09.2019
Scheme 🇳🇴 NO
Manufacturer ZTE Corporation
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.2, EAL2+

Heuristics summary ?

Certificate ID: SERTIT-031

Certificate ?

Certification report ?

Extracted keywords

Security level
EAL2+, EAL 2, EAL2, EAL1, EAL7
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.3, FAU_GEN.1, FAU_GEN, FAU_SAR.1, FAU_STG.1, FAU_STG.4, FDP_ITT.1, FDP_ACC.2, FDP_ACF.1, FIA_UID.2, FIA_UAU.2, FIA_AFL.1, FIA_SOS.1, FMT_SMR.1, FMT_SMF.1, FTA_SSL.3, FTA_MCS.1, FTP_ITC.1
Certificates
SERTIT-031
Evaluation facilities
Brightsight

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Creation date D:20110913105701Z
Modification date D:20110914144300+02'00'
Pages 21

Security target ?

Extracted keywords

Trusted Execution Environments
SE

Security level
EAL 2
Claims
O.AUDITING_LIG, O.AUDITING_OMM, O.AUDITING_CUS, O.SEPARATE_USERS, O.PROTECT_COMMUNICATION, O.PROTECT_COM-, T.UNAUTHORISED, T.AUTHORISED, T.UNKNOWN_, T.PHYSICAL_ATTACK, T.UNKNOWN_USER, A.TRUSTED_SYSTEMS, OE.CLIENT_SECURITY, OE.PROTECT_COMMUNICATION, OE.SERVER_SECURITY, OE.TIME, OE.TRUSTED_SYSTEMS, OE.PROTECT_COM-, OSP.USERS
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_CMC.2, ALC_DEL.1, ALC_FLR.2, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.3, FAU_GEN.1, FAU_GEN, FAU_GEN.3.1, FAU_GEN.3.2, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FAU_STG.4.1, FAU_GEN.3.3, FDP_ACC.2, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC.1, FDP_IFC, FDP_ACF, FDP_ACC, FIA_UID.2, FIA_UAU.2, FIA_AFL.1, FIA_SOS.1, FIA_UID.2.1, FIA_UAU.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_UID, FIA_UAU, FMT_SMR.1, FMT_SMF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MSA, FPT_STM.1, FPT_SMF.1, FPT_ITC.1, FPT_STM, FTA_SSL.3, FTA_MCS.1, FTA_SMR.1, FTA_SSL.3.1, FTA_MCS.1.1, FTA_MCS.1.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Certification process
out of scope, for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Objects: • LI Information: Information that directly relates

Certification process
out of scope, for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Objects: • LI Information: Information that directly relates

File metadata

Title Microsoft Word - ZXWN MSCS ZXUN iCX Security Target V1.1.doc
Author Administrator
Creation date D:20110819155419+02'00'
Modification date D:20110819155419+02'00'
Pages 51
Creator PScript5.dll Version 5.2
Producer Acrobat Distiller 7.0 (Windows)

Heuristics ?

Certificate ID: SERTIT-031

Extracted SARs

ALC_FLR.2, ASE_SPD.1, ASE_REQ.2, ADV_FSP.2, ASE_INT.1, ALC_CMC.2, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1, ALC_CMS.2, ASE_TSS.1, ALC_DEL.1, ATE_FUN.1, ADV_ARC.1, AVA_VAN.2, AGD_PRE.1, ATE_IND.2, ATE_COV.1, ASE_OBJ.2, ASE_ECD.1

Scheme data ?

Product ZTE Mobile Switching Center Server / intelligent Controller Extensive
Url https://sertit.no/certified-products/product-archive/zte-mobile-switching-center-server-intelligent-controller-extensive
Category Network and Network-Related Devices and Systems
Developer ZTE Corporation
Certification Date 26.09.2011
Enhanced
Description SERTIT-031 C
Id SERTIT-031
Mutual Recognition CCRA
Product ZXWN MSCS / ZXUN iCX v4.10.13, ZXUN LIG v3.10.22
Category Network and Network-Related Devices and Systems
Sponsor ZTE Corporation
Developer ZTE Corporation
Evaluation Facility Brightsight B.V.
Certification Date 26.09.2011
Level EAL 2, ALC_FLR.2
Documents frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134758-1607950847/SERTIT/Sertifikater/2011/31/%5BST%5DZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134761-1607950851/SERTIT/Sertifikater/2011/31/SERTIT-031-MSCS-CR_v.1.0.pdf'})]})

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4de7522026695e487fd6264bab41428bca98c856bc96291eb4999163c40364a7', 'txt_hash': 'bcab92bcad8de3e650f1d5f0b9918979f6fc0baede79e7b2df3afcbaf0399ffc'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5057c2c5aa8e7c85a4390b545e44867389716bd492949dbec6d2648e721fd127', 'txt_hash': '3c057035343c488d7815e4570959deec9abd8f6342640fa8158c5f475dc2dabf'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 921683, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/CreationDate': 'D:20110913105701Z', '/ModDate': "D:20110914144300+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 263195, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 51, '/CreationDate': "D:20110819155419+02'00'", '/Author': 'Administrator', '/Creator': 'PScript5.dll Version 5.2', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20110819155419+02'00'", '/Title': 'Microsoft Word - ZXWN MSCS ZXUN iCX Security Target V1.1.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'NO': {'SERTIT-031': 20}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2+': 21, 'EAL 2': 2, 'EAL2': 1, 'EAL1': 1, 'EAL7': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.3': 4, 'FAU_GEN.1': 1, 'FAU_GEN': 1, 'FAU_SAR.1': 3, 'FAU_STG.1': 3, 'FAU_STG.4': 3}, 'FDP': {'FDP_ITT.1': 1, 'FDP_ACC.2': 1, 'FDP_ACF.1': 1}, 'FIA': {'FIA_UID.2': 3, 'FIA_UAU.2': 3, 'FIA_AFL.1': 3, 'FIA_SOS.1': 3}, 'FMT': {'FMT_SMR.1': 3, 'FMT_SMF.1': 3}, 'FTA': {'FTA_SSL.3': 3, 'FTA_MCS.1': 3}, 'FTP': {'FTP_ITC.1': 2}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_DEL.1': 1, 'ALC_FLR.2': 2}, 'ATE': {'ATE_COV.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.3': 14, 'FAU_GEN.1': 5, 'FAU_GEN': 4, 'FAU_GEN.3.1': 4, 'FAU_GEN.3.2': 4, 'FAU_SAR.1': 8, 'FAU_SAR.1.1': 3, 'FAU_SAR.1.2': 3, 'FAU_STG.1': 8, 'FAU_STG.1.1': 3, 'FAU_STG.1.2': 3, 'FAU_STG.4': 8, 'FAU_STG.4.1': 3, 'FAU_GEN.3.3': 1}, 'FDP': {'FDP_ACC.2': 12, 'FDP_ACF.1': 10, 'FDP_ITT.1': 5, 'FDP_ITT.1.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_ACC.1': 1, 'FDP_IFC': 1, 'FDP_ACF': 1, 'FDP_ACC': 1}, 'FIA': {'FIA_UID.2': 20, 'FIA_UAU.2': 12, 'FIA_AFL.1': 22, 'FIA_SOS.1': 17, 'FIA_UID.2.1': 3, 'FIA_UAU.2.1': 3, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_SOS.1.1': 3, 'FIA_UID': 3, 'FIA_UAU': 1}, 'FMT': {'FMT_SMR.1': 16, 'FMT_SMF.1': 19, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_SMF.1.1': 3, 'FMT_MSA': 1}, 'FPT': {'FPT_STM.1': 1, 'FPT_SMF.1': 1, 'FPT_ITC.1': 2, 'FPT_STM': 1}, 'FTA': {'FTA_SSL.3': 17, 'FTA_MCS.1': 11, 'FTA_SMR.1': 1, 'FTA_SSL.3.1': 3, 'FTA_MCS.1.1': 3, 'FTA_MCS.1.2': 3}, 'FTP': {'FTP_ITC.1': 8, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 2, 'FTP_ITC.1.3': 2}}, 'cc_claims': {'O': {'O.AUDITING_LIG': 2, 'O.AUDITING_OMM': 2, 'O.AUDITING_CUS': 2, 'O.SEPARATE_USERS': 3, 'O.PROTECT_COMMUNICATION': 2, 'O.PROTECT_COM-': 1}, 'T': {'T.UNAUTHORISED': 2, 'T.AUTHORISED': 2, 'T.UNKNOWN_': 1, 'T.PHYSICAL_ATTACK': 2, 'T.UNKNOWN_USER': 1}, 'A': {'A.TRUSTED_SYSTEMS': 2}, 'OE': {'OE.CLIENT_SECURITY': 3, 'OE.PROTECT_COMMUNICATION': 2, 'OE.SERVER_SECURITY': 2, 'OE.TIME': 3, 'OE.TRUSTED_SYSTEMS': 2, 'OE.PROTECT_COM-': 3}, 'OSP': {'OSP.USERS': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'com': {'com.cn': 3}}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Objects: • LI Information: Information that directly relates': 1}}}.
    • The report_filename property was set to SERTIT-031-MSCS-CR_v.1.0.pdf.
    • The st_filename property was set to [ST]ZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to SERTIT-031.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-031-MSCS-CR_v.1.0.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]ZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ZTE Mobile Switching Center Server / intelligent Controller Extensive was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "33c4e1b761d69973",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "SERTIT-031",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Network and Network-Related Devices and Systems",
      "certification_date": "26.09.2011",
      "developer": "ZTE Corporation",
      "enhanced": {
        "category": "Network and Network-Related Devices and Systems",
        "certification_date": "26.09.2011",
        "description": "SERTIT-031 C",
        "developer": "ZTE Corporation",
        "documents": {
          "report": [
            {
              "href": "https://sertit.no/getfile.php/134761-1607950851/SERTIT/Sertifikater/2011/31/SERTIT-031-MSCS-CR_v.1.0.pdf"
            }
          ],
          "target": [
            {
              "href": "https://sertit.no/getfile.php/134758-1607950847/SERTIT/Sertifikater/2011/31/%5BST%5DZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf"
            }
          ]
        },
        "evaluation_facility": "Brightsight B.V.",
        "id": "SERTIT-031",
        "level": "EAL 2, ALC_FLR.2",
        "mutual_recognition": "CCRA",
        "product": "ZXWN MSCS / ZXUN iCX v4.10.13, ZXUN LIG v3.10.22",
        "sponsor": "ZTE Corporation"
      },
      "product": "ZTE Mobile Switching Center Server / intelligent Controller Extensive",
      "url": "https://sertit.no/certified-products/product-archive/zte-mobile-switching-center-server-intelligent-controller-extensive"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "ZTE Corporation",
  "manufacturer_web": "https://wwwen.zte.com.cn/en/",
  "name": "ZTE Mobile Switching Center Server / intelligent Controller Extensive",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2011-09-26",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "SERTIT-031-MSCS-CR_v.1.0.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NO": {
          "SERTIT-031": 20
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2,
          "EAL1": 1,
          "EAL2": 1,
          "EAL2+": 21,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 1,
          "FAU_GEN.3": 4,
          "FAU_SAR.1": 3,
          "FAU_STG.1": 3,
          "FAU_STG.4": 3
        },
        "FDP": {
          "FDP_ACC.2": 1,
          "FDP_ACF.1": 1,
          "FDP_ITT.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 3,
          "FIA_SOS.1": 3,
          "FIA_UAU.2": 3,
          "FIA_UID.2": 3
        },
        "FMT": {
          "FMT_SMF.1": 3,
          "FMT_SMR.1": 3
        },
        "FTA": {
          "FTA_MCS.1": 3,
          "FTA_SSL.3": 3
        },
        "FTP": {
          "FTP_ITC.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20110913105701Z",
      "/ModDate": "D:20110914144300+02\u002700\u0027",
      "pdf_file_size_bytes": 921683,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "[ST]ZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.TRUSTED_SYSTEMS": 2
        },
        "O": {
          "O.AUDITING_CUS": 2,
          "O.AUDITING_LIG": 2,
          "O.AUDITING_OMM": 2,
          "O.PROTECT_COM-": 1,
          "O.PROTECT_COMMUNICATION": 2,
          "O.SEPARATE_USERS": 3
        },
        "OE": {
          "OE.CLIENT_SECURITY": 3,
          "OE.PROTECT_COM-": 3,
          "OE.PROTECT_COMMUNICATION": 2,
          "OE.SERVER_SECURITY": 2,
          "OE.TIME": 3,
          "OE.TRUSTED_SYSTEMS": 2
        },
        "OSP": {
          "OSP.USERS": 2
        },
        "T": {
          "T.AUTHORISED": 2,
          "T.PHYSICAL_ATTACK": 2,
          "T.UNAUTHORISED": 2,
          "T.UNKNOWN_": 1,
          "T.UNKNOWN_USER": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 4,
          "FAU_GEN.1": 5,
          "FAU_GEN.3": 14,
          "FAU_GEN.3.1": 4,
          "FAU_GEN.3.2": 4,
          "FAU_GEN.3.3": 1,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 3,
          "FAU_SAR.1.2": 3,
          "FAU_STG.1": 8,
          "FAU_STG.1.1": 3,
          "FAU_STG.1.2": 3,
          "FAU_STG.4": 8,
          "FAU_STG.4.1": 3
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 1,
          "FDP_ACC.2": 12,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 10,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_IFC": 1,
          "FDP_ITT.1": 5,
          "FDP_ITT.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 22,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_SOS.1": 17,
          "FIA_SOS.1.1": 3,
          "FIA_UAU": 1,
          "FIA_UAU.2": 12,
          "FIA_UAU.2.1": 3,
          "FIA_UID": 3,
          "FIA_UID.2": 20,
          "FIA_UID.2.1": 3
        },
        "FMT": {
          "FMT_MSA": 1,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 3,
          "FMT_SMR.1": 16,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 3
        },
        "FPT": {
          "FPT_ITC.1": 2,
          "FPT_SMF.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 1
        },
        "FTA": {
          "FTA_MCS.1": 11,
          "FTA_MCS.1.1": 3,
          "FTA_MCS.1.2": 3,
          "FTA_SMR.1": 1,
          "FTA_SSL.3": 17,
          "FTA_SSL.3.1": 3
        },
        "FTP": {
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 2,
          "FTP_ITC.1.3": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Objects: \u2022 LI Information: Information that directly relates": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "com": {
          "com.cn": 3
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Administrator",
      "/CreationDate": "D:20110819155419+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2",
      "/ModDate": "D:20110819155419+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/Title": "Microsoft Word - ZXWN MSCS ZXUN iCX Security Target V1.1.doc",
      "pdf_file_size_bytes": 263195,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 51
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-031-MSCS-CR_v.1.0.pdf",
  "scheme": "NO",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]ZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4de7522026695e487fd6264bab41428bca98c856bc96291eb4999163c40364a7",
      "txt_hash": "bcab92bcad8de3e650f1d5f0b9918979f6fc0baede79e7b2df3afcbaf0399ffc"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5057c2c5aa8e7c85a4390b545e44867389716bd492949dbec6d2648e721fd127",
      "txt_hash": "3c057035343c488d7815e4570959deec9abd8f6342640fa8158c5f475dc2dabf"
    }
  },
  "status": "archived"
}