Samsung Color MFP SL-X5230NR, Samsung Color MFP SL-X5280NR, Samsung Color MFP SL-X6350ZX, Samsung Color MFP SL-G306X, Samsung Color MFP SL-G256X, Samsung Color MFP SL-X6350LX, Samsung Color MFP SL-X6300LX, Samsung Color MFP SL-X6250LX, Samsung Color MFP SL-X9700LX, Samsung Color MFP SL-X9600LX, Samsung Color MFP SL-X9500LX, Samsung Color MFP SL-X9400LX, Samsung Color MFP SL-G509X, Samsung Color MFP SL-G409X, Samsung Mono MFP SL- K9700LX, Samsung Mono MFP SL-K9600LX, Samsung Mono MFP SL-K9500LX, Samsung Mono MFP SL-G609K, Samsung Mono MFP SL-G509K, Samsung Mono MFP SL-K5300NR, Samsung Mono MFP SL-K5250NR, Samsung Mono MFP SL-K6400ZX, Samsung Mono MFP SL-G356K, Samsung Mono MFP SL-G306K, Samsung Mono MFP SL-K6400LX, Samsung Mono MFP SL-K6350LX, and Samsung Mono MFP SL-K6300LX multifunction printers (MFPs) with 5.3.2 Firmware

CSV information

Status active
Valid from 10.11.2022
Valid until 10.11.2027
Scheme 🇸🇪 SE
Manufacturer HP Inc.
Category Multi-Function Devices
Security level
Protection profiles

Heuristics summary

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

certification report file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-, AES-128, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, RSA-2048, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2, SHA3
Schemes
Key Exchange, Key Agreement
Protocols
SSH, TLS, IKEv1, IKE, IKEv2, IPsec, VPN
Randomness
DRBG, RBG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
ECB, CBC, CTR

Trusted Execution Environments
SSC
Vendor
Samsung, Microsoft Corporation, Microsoft

Claims
D.USER, D.TSF, O.IMAGE_OVERWRITE, O.ACCESS_CONTROL, O.USER_AUTHORIZATION, O.ADMIN_ROLES, O.UPDATE_VERIFICATION, O.TSF_SELF_TEST, O.COMMS_PROTECTION, O.AUDIT, O.STORAGE_ENCRYPTION, O.KEY_MATERIAL, O.FAX_NET_SEPARATION, O.PURGE_DATA, O.USER, T.UNAUTHORIZED_ACCESS, T.TSF_COMPROMISE, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.NET_COMPROMISE, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRAINED_USERS, A.NETWORK, OE.PHYSICAL_PROTECTION, OE.NETWORK_PROTECTION, OE.ADMIN_TRUST, OE.USER_TRAINING, OE.ADMIN_TRAINING
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_STG, FAU_STG_EXT.1, FAU_GEN.1, FAU_GEN.2, FAU_STG_EXT.1.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FCS_CKM, FCS_CKM_EXT.4, FCS_KYC, FCS_KYC_EXT.1, FCS_RBG, FCS_RBG_EXT.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_TLS_EXT.1, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.5, FCS_CKM.1.1, FCS_COP.1.1, FCS_CKM_EXT.4.1, FCS_KYC_EXT, FCS_KDF_EXT.1, FCS_SMC_EXT.1, FCS_KYC_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM.4.1, FCS_CKM.2, FCS_PCC_EXT.1, FCS_SNI_EXT.1, FCS_SSH_EXT.1, FDP_DSK, FDP_DSK_EXT.1, FDP_FXS, FDP_FXS_EXT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_DSK_EXT.1.2, FDP_DSK_EXT.1.1, FDP_FXS_EXT.1.1, FDP_FXS_EXT.1.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_PMG, FIA_PMG_EXT.1, FIA_PSK, FIA_PSK_EXT.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.7, FIA_UID.1, FIA_USB.1, FIA_PMG_EXT.1.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_KYP, FPT_KYP_EXT.1, FPT_SKP, FPT_SKP_EXT.1, FPT_TST, FPT_TST_EXT.1, FPT_TUD, FPT_TUD_EXT.1, FPT_STM.1, FPT_KYP_EXT.1.1, FPT_SKP_EXT.1.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT, FPT_STM.1.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Certificates
CSEC2022009

Side-channel analysis
physical tampering, malfunction

Standards
FIPS PUB 186-4, FIPS PUB 197, FIPS PUB 180-3, FIPS186-4, FIPS197, FIPS 180-3, FIPS198-1, FIPS180-4, NIST SP 800-90A, NIST SP 800-38A, PKCS#1, PKCS1, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 5282, RFC3526, RFC3602, RFC4301, RFC4303, RFC4304, RFC2407, RFC2408, RFC2409, RFC4109, RFC4868, ISO/IEC 18031:2011

File metadata

Title HP G2.0 Samsung HCDPP Security Target
Author Anthony J Peterson;[email protected]
Creation date D:20221012114957-06'00'
Modification date D:20221114202654+01'00'
Pages 160
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1

Similar certificates

Name Certificate ID
HP LaserJet Enterprise MFP M430/M431, HP Color LaserJetEnterprise MFP M480, HP LaserJet Managed MFP E42540, and HPColor LaserJet Managed MFP E47528 multifunction printers (MFPs)with HP FutureSmart 5.3.2 Firmware OCSI/CERT/ATS/18/2022/RC Compare
HP Color LaserJet MFP E78625/E78630/E78635, HP Color LaserJet Flow E78625/E78630/E78635,HP LaserJet MFP E73130/E73135/E73140, and HP LaserJet Flow E73130/E73135/E73140 multifunction printers (MFPs) with HP FutureSmart 5.3.2 Firmware None Compare
HP Color LaserJet MFP E87740/E87750/E87760/E87770, HP Color LaserJet Flow E87740/ E87750/E87760/E87770, HP LaserJet MFP E82650/E82660/E82670, and HP LaserJet Flow E82650/E82660/ E82670 multifunction printers (MFPs) with HP FutureSmart 5.3.2 Firmware None Compare
HP Color LaserJet Managed MFP E78523/E78528 and HP LaserJet Managed MFP E73025/E73030 multifunction printers (MFPs) with HP FutureSmart 5.3.2 Firmware None Compare
HP Color LaserJet Enterprise MFP M776, HP Color LaserJet Enterprise Flow MFP M776, HP LaserJet Enterprise MFP M632/M633/M634/M635/M636, HP LaserJet Enterprise Flow MFP M634/M635/M636, HP LaserJet Managed MFP E62655/E62665, and HP LaserJet Managed MFP Flow E62665/E62675 multifunction printers (MFPs) with HP FutureSmart 4.11.2.2 Firmware OCSI/CERT/ATS/04/2022/RC Compare
HP Color LaserJet Managed MFP E78523/E78528, HP LaserJet Managed MFP E73025/E73030, HP Color LaserJet MFP E78625/E78630/E78635, HP Color LaserJet Flow MFP E78625/E78630/E78635, HP LaserJet MFP E73130/E73135/E73140, HP LaserJet Flow MFP E73130/E73135/E73140, HP Color LaserJet MFP E87740/E87750/E87760/E87770, HP Color LaserJet Flow MFP E87740/E87750/E87760/E87770, HP LaserJet MFP E82650/E82660/E82670, and HP LaserJet Flow MFP E82650/E82660/E82670 multifunction printers (MFPs) with HP FutureSmart 5.7.1.1 Firmware OCSI/CERT/ATS/04/2024/RC Compare
HP Color LaserJet Enterprise MFP M776, HP Color LaserJet Enterprise Flow MFP M776, HP LaserJet Enterprise MFP M632/M633/M634/M635/M636, HP LaserJet Enterprise Flow MFP M634/M635/M636, HP LaserJet Managed MFP E62655/E62665 and HP LaserJet Managed Flow MFP E62665/E62675 multifunction printers (MFPs) with HP FutureSmart 5.7.1.1 Firmware OCSI/CERT/ATS/03/2024/RC Compare
HP PageWide Enterprise Color Flow MFP 785, HP PageWide Enterprise Color MFP 586, HP LaserJet Enterprise MFP M528, HP PageWide Managed Color Flow MFP E77650, HP PageWide Managed Color Flow MFP E77660, HP Color LaserJet Managed MFP E57540, HP LaserJet Managed MFP E52545, and HP LaserJet Managed MFP E52645 multifunction printers (MFPs) with HP FutureSmart 4.11.0.1 Firmware OCSI/CERT/ATS/11/2020/RC Compare
HP Color LaserJet Enterprise MFP M776, HP LaserJet Enterprise MFP M632/M633/M634/M635/M636, HP LaserJet Managed MFP E62655/E62665/E62675, HP Color LaserJet Enterprise MFP M681/M682, and HP Color LaserJet Managed MFP E67650/E67660 multifunction printers (MFPs) with HP FutureSmart 4.10 Firmware OCSI/CERT/ATS/06/2019/RC Compare
Showing 5 out of 9.

References

No references are available for this certificate as its ID was not successfully extracted.

Updates

  • 21.04.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': {'_type': 'Set', 'elements': ['b2cfec7a92fa2940']}, 'eal': None}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Hardcopy Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/c0553_pp.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_HCD_V1.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fa8fc4f758188be3a126a7e700d270625f336c4a2f7645f745abd4b586de9503', 'txt_hash': 'e985662614915b1244b1ba75a4ba95df9cc5e0cbb10787657f7a01f8c3b3841b'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd3b7adf67ff528f2b2fe27559e567934edc0aca6fda1f96a47ab3bc44733015a', 'txt_hash': '25187528eb1f4e42d9881f32fec061e606d9e6cfa9a2bf54c15b32fcd3aa1c9c'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1661888, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 160, '/Author': 'Anthony J Peterson;[email protected]', '/CreationDate': "D:20221012114957-06'00'", '/Creator': 'Microsoft® Word for Microsoft 365', '/ModDate': "D:20221114202654+01'00'", '/Producer': 'Microsoft® Word for Microsoft 365', '/Title': 'HP G2.0 Samsung HCDPP Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34660', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34658', 'https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11209', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34659']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 1808922, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20221115105239+01'00'", '/Creator': 'RICOH MP C4504ex', '/ModDate': "D:20221115161726+01'00'", '/Producer': 'RICOH MP C4504ex', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2022009': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.1': 2, 'ALC_CMS.1': 2}, 'ATE': {'ATE_IND.1': 2}, 'AVA': {'AVA_VAN.1': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.1': 2, 'ASE_REQ.1': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG': 2, 'FAU_STG_EXT.1': 11, 'FAU_GEN.1': 19, 'FAU_GEN.2': 8, 'FAU_STG_EXT.1.1': 3, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 1, 'FAU_SAR.2': 1, 'FAU_STG.1': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_CKM': 2, 'FCS_CKM_EXT.4': 20, 'FCS_KYC': 2, 'FCS_KYC_EXT.1': 25, 'FCS_RBG': 2, 'FCS_RBG_EXT.1': 37, 'FCS_CKM.1': 50, 'FCS_CKM.4': 24, 'FCS_COP.1': 120, 'FCS_TLS_EXT.1': 4, 'FCS_SSH_EXT.1.7': 1, 'FCS_SSH_EXT.1.5': 1, 'FCS_CKM.1.1': 3, 'FCS_COP.1.1': 5, 'FCS_CKM_EXT.4.1': 2, 'FCS_KYC_EXT': 1, 'FCS_KDF_EXT.1': 4, 'FCS_SMC_EXT.1': 4, 'FCS_KYC_EXT.1.1': 2, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 3, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 2, 'FCS_PCC_EXT.1': 2, 'FCS_SNI_EXT.1': 2, 'FCS_SSH_EXT.1': 1}, 'FDP': {'FDP_DSK': 2, 'FDP_DSK_EXT.1': 15, 'FDP_FXS': 2, 'FDP_FXS_EXT.1': 14, 'FDP_ACC.1': 13, 'FDP_ACF.1': 17, 'FDP_RIP.1': 13, 'FDP_DSK_EXT.1.2': 4, 'FDP_DSK_EXT.1.1': 2, 'FDP_FXS_EXT.1.1': 2, 'FDP_FXS_EXT.1.2': 1, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_IFC.1': 1}, 'FIA': {'FIA_PMG': 2, 'FIA_PMG_EXT.1': 20, 'FIA_PSK': 2, 'FIA_PSK_EXT.1': 23, 'FIA_AFL.1': 17, 'FIA_ATD.1': 15, 'FIA_UAU.1': 16, 'FIA_UAU.7': 8, 'FIA_UID.1': 16, 'FIA_USB.1': 18, 'FIA_PMG_EXT.1.1': 2, 'FIA_PSK_EXT.1.1': 2, 'FIA_PSK_EXT.1.2': 2, 'FIA_PSK_EXT.1.3': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MOF.1': 19, 'FMT_MSA.1': 20, 'FMT_MSA.3': 11, 'FMT_MTD.1': 22, 'FMT_SMF.1': 16, 'FMT_SMR.1': 20, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_KYP': 2, 'FPT_KYP_EXT.1': 13, 'FPT_SKP': 2, 'FPT_SKP_EXT.1': 13, 'FPT_TST': 2, 'FPT_TST_EXT.1': 19, 'FPT_TUD': 2, 'FPT_TUD_EXT.1': 18, 'FPT_STM.1': 16, 'FPT_KYP_EXT.1.1': 2, 'FPT_SKP_EXT.1.1': 2, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_TUD_EXT': 1, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_SSL.3': 11, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 16, 'FTP_TRP.1': 24, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 2, 'FTP_TRP.1.2': 2, 'FTP_TRP.1.3': 2}}, 'cc_claims': {'D': {'D.USER': 31, 'D.TSF': 2}, 'O': {'O.IMAGE_OVERWRITE': 9, 'O.ACCESS_CONTROL': 21, 'O.USER_AUTHORIZATION': 18, 'O.ADMIN_ROLES': 15, 'O.UPDATE_VERIFICATION': 11, 'O.TSF_SELF_TEST': 7, 'O.COMMS_PROTECTION': 39, 'O.AUDIT': 16, 'O.STORAGE_ENCRYPTION': 17, 'O.KEY_MATERIAL': 7, 'O.FAX_NET_SEPARATION': 7, 'O.PURGE_DATA': 1, 'O.USER': 4}, 'T': {'T.UNAUTHORIZED_ACCESS': 5, 'T.TSF_COMPROMISE': 2, 'T.TSF_FAILURE': 3, 'T.UNAUTHORIZED_UPDATE': 3, 'T.NET_COMPROMISE': 3}, 'A': {'A.PHYSICAL': 3, 'A.TRUSTED_ADMIN': 3, 'A.TRAINED_USERS': 4, 'A.NETWORK': 3}, 'OE': {'OE.PHYSICAL_PROTECTION': 3, 'OE.NETWORK_PROTECTION': 3, 'OE.ADMIN_TRUST': 3, 'OE.USER_TRAINING': 3, 'OE.ADMIN_TRAINING': 3}}, 'vendor': {'Samsung': {'Samsung': 255}, 'Microsoft': {'Microsoft Corporation': 1, 'Microsoft': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 55, 'AES-256': 5, 'AES-': 1, 'AES-128': 1}}, 'constructions': {'MAC': {'HMAC': 30, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 3, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 12}, 'ECDSA': {'ECDSA': 12}, 'ECC': {'ECC': 19}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 41}, 'DSA': {'DSA': 13}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 22}, 'SHA2': {'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1, 'SHA-2': 1}, 'SHA3': {'SHA3': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 7}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'TLS': {'TLS': 1}}, 'IKE': {'IKEv1': 43, 'IKE': 49, 'IKEv2': 5}, 'IPsec': {'IPsec': 188}, 'VPN': {'VPN': 2}}, 'randomness': {'PRNG': {'DRBG': 25}, 'RNG': {'RBG': 5}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 8}, 'CTR': {'CTR': 4}}, 'ecc_curve': {'NIST': {'P-256': 22, 'P-384': 24, 'P-521': 22}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 27}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 2, 'FIPS PUB 197': 1, 'FIPS PUB 180-3': 1, 'FIPS186-4': 8, 'FIPS197': 6, 'FIPS 180-3': 2, 'FIPS198-1': 5, 'FIPS180-4': 5}, 'NIST': {'NIST SP 800-90A': 2, 'NIST SP 800-38A': 1}, 'PKCS': {'PKCS#1': 14, 'PKCS1': 3}, 'RFC': {'RFC 4301': 3, 'RFC 4303': 2, 'RFC 3602': 6, 'RFC 4106': 2, 'RFC 4109': 2, 'RFC 4304': 1, 'RFC 4868': 3, 'RFC 5282': 1, 'RFC3526': 3, 'RFC3602': 2, 'RFC4301': 3, 'RFC4303': 2, 'RFC4304': 2, 'RFC2407': 2, 'RFC2408': 2, 'RFC2409': 2, 'RFC4109': 2, 'RFC4868': 2}, 'ISO': {'ISO/IEC 18031:2011': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2022009': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_TSS.1': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 14}}, 'eval_facility': {'atsec': {'atsec': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to HP_G2_Samsung-HCDPP_ST_v1.6.pdf.
    • The cert_filename property was set to CCRA Certificate- HP G2 Samsung HCDPP.pdf.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'dbc65301de099f68278e3e5e865a89d43898ca4772ec9ffdf6e6c101c8f28b7c', 'txt_hash': '23eafae9ff549c1a8de938da9848a83b401c70d708d4a7780c4d4425d0fd9f67'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 891862, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Author': 'hesve', '/CreationDate': "D:20221110154311+01'00'", '/ModDate': "D:20221114202602+01'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - Certification Report- HP G2 Samsung HCDPP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'SE': {'CSEC2022009': 26}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 1': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.1': 2, 'ALC_CMS.1': 2}, 'ATE': {'ATE_IND.1': 2}, 'AVA': {'AVA_VAN.1': 2}, 'ASE': {'ASE_SPD.1': 4, 'ASE_INT.1': 2, 'ASE_CCL.1': 2, 'ASE_OBJ.1': 2, 'ASE_ECD.1': 2, 'ASE_REQ.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FDP': {'FDP_ACF.1': 1, 'FDP_FXS_EXT.1': 1}, 'FPT': {'FPT_TUD_EXT.1': 1, 'FPT_TST_EXT.1': 1}}, 'cc_claims': {'O': {'O.IMAGE_OVERWRITE': 1}, 'T': {'T.UNAUTHORIZED_ACCESS': 1, 'T.TSF_COMPROMISE': 1, 'T.TSF_FAILURE': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.NET_COMPROMISE': 1}, 'A': {'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 1, 'A.TRAINED_USERS': 1, 'A.NETWORK': 1}}, 'vendor': {'Samsung': {'Samsung': 79}, 'Microsoft': {'Microsoft': 4}}, 'eval_facility': {'atsec': {'atsec': 5}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3, 'AES-256': 2}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 3}, 'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KEX': {'Key Exchange': 3}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'IKE': {'IKEv1': 3, 'IKE': 2}, 'IPsec': {'IPsec': 24}}, 'randomness': {'PRNG': {'DRBG': 3}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 3}, 'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to Certification Report- HP G2 Samsung HCDPP.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CSEC2022009.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report-%20HP%20G2%20Samsung%20HCDPP.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HP_G2_Samsung-HCDPP_ST_v1.6.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Samsung Color MFP SL-X5230NR, Samsung Color MFP SL-X5280NR, Samsung Color MFP SL-X6350ZX, Samsung Color MFP SL-G306X, Samsung Color MFP SL-G256X, Samsung Color MFP SL-X6350LX, Samsung Color MFP SL-X6300LX, Samsung Color MFP SL-X6250LX, Samsung Color MFP SL-X9700LX, Samsung Color MFP SL-X9600LX, Samsung Color MFP SL-X9500LX, Samsung Color MFP SL-X9400LX, Samsung Color MFP SL-G509X, Samsung Color MFP SL-G409X, Samsung Mono MFP SL- K9700LX, Samsung Mono MFP SL-K9600LX, Samsung Mono MFP SL-K9500LX, Samsung Mono MFP SL-G609K, Samsung Mono MFP SL-G509K, Samsung Mono MFP SL-K5300NR, Samsung Mono MFP SL-K5250NR, Samsung Mono MFP SL-K6400ZX, Samsung Mono MFP SL-G356K, Samsung Mono MFP SL-G306K, Samsung Mono MFP SL-K6400LX, Samsung Mono MFP SL-K6350LX, and Samsung Mono MFP SL-K6300LX multifunction printers (MFPs) with 5.3.2 Firmware was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20Certificate-%20HP%20G2%20Samsung%20HCDPP.pdf",
  "dgst": "c71e829b77a4dc01",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.3.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "b2cfec7a92fa2940"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "HP Inc.",
  "manufacturer_web": "https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g",
  "name": "Samsung Color MFP SL-X5230NR, Samsung Color MFP SL-X5280NR, Samsung Color MFP SL-X6350ZX, Samsung Color MFP SL-G306X, Samsung Color MFP SL-G256X, Samsung Color MFP SL-X6350LX, Samsung Color MFP SL-X6300LX, Samsung Color MFP SL-X6250LX, Samsung Color MFP SL-X9700LX, Samsung Color MFP SL-X9600LX, Samsung Color MFP SL-X9500LX, Samsung Color MFP SL-X9400LX, Samsung Color MFP SL-G509X, Samsung Color MFP SL-G409X, Samsung Mono MFP SL- K9700LX, Samsung Mono MFP SL-K9600LX, Samsung Mono MFP SL-K9500LX, Samsung Mono MFP SL-G609K, Samsung Mono MFP SL-G509K, Samsung Mono MFP SL-K5300NR, Samsung Mono MFP SL-K5250NR, Samsung Mono MFP SL-K6400ZX, Samsung Mono MFP SL-G356K, Samsung Mono MFP SL-G306K, Samsung Mono MFP SL-K6400LX, Samsung Mono MFP SL-K6350LX, and Samsung Mono MFP SL-K6300LX multifunction printers (MFPs) with 5.3.2 Firmware",
  "not_valid_after": "2027-11-10",
  "not_valid_before": "2022-11-10",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": "HP_G2_Samsung-HCDPP_ST_v1.6.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 19
          },
          "ECDH": {
            "ECDH": 12
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "DH": 41,
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 13
          }
        },
        "RSA": {
          "RSA 2048": 3,
          "RSA-2048": 1
        }
      },
      "cc_cert_id": {
        "SE": {
          "CSEC2022009": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.NETWORK": 3,
          "A.PHYSICAL": 3,
          "A.TRAINED_USERS": 4,
          "A.TRUSTED_ADMIN": 3
        },
        "D": {
          "D.TSF": 2,
          "D.USER": 31
        },
        "O": {
          "O.ACCESS_CONTROL": 21,
          "O.ADMIN_ROLES": 15,
          "O.AUDIT": 16,
          "O.COMMS_PROTECTION": 39,
          "O.FAX_NET_SEPARATION": 7,
          "O.IMAGE_OVERWRITE": 9,
          "O.KEY_MATERIAL": 7,
          "O.PURGE_DATA": 1,
          "O.STORAGE_ENCRYPTION": 17,
          "O.TSF_SELF_TEST": 7,
          "O.UPDATE_VERIFICATION": 11,
          "O.USER": 4,
          "O.USER_AUTHORIZATION": 18
        },
        "OE": {
          "OE.ADMIN_TRAINING": 3,
          "OE.ADMIN_TRUST": 3,
          "OE.NETWORK_PROTECTION": 3,
          "OE.PHYSICAL_PROTECTION": 3,
          "OE.USER_TRAINING": 3
        },
        "T": {
          "T.NET_COMPROMISE": 3,
          "T.TSF_COMPROMISE": 2,
          "T.TSF_FAILURE": 3,
          "T.UNAUTHORIZED_ACCESS": 5,
          "T.UNAUTHORIZED_UPDATE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.1": 2,
          "ALC_CMS.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ.1": 2,
          "ASE_REQ.1": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_IND.1": 2
        },
        "AVA": {
          "AVA_VAN.1": 2
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 19,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 1,
          "FAU_SAR.2": 1,
          "FAU_STG": 2,
          "FAU_STG.1": 1,
          "FAU_STG.4": 1,
          "FAU_STG_EXT.1": 11,
          "FAU_STG_EXT.1.1": 3
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 50,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 24,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT.4": 20,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_COP.1": 120,
          "FCS_COP.1.1": 5,
          "FCS_KDF_EXT.1": 4,
          "FCS_KYC": 2,
          "FCS_KYC_EXT": 1,
          "FCS_KYC_EXT.1": 25,
          "FCS_KYC_EXT.1.1": 2,
          "FCS_PCC_EXT.1": 2,
          "FCS_RBG": 2,
          "FCS_RBG_EXT.1": 37,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 3,
          "FCS_SMC_EXT.1": 4,
          "FCS_SNI_EXT.1": 2,
          "FCS_SSH_EXT.1": 1,
          "FCS_SSH_EXT.1.5": 1,
          "FCS_SSH_EXT.1.7": 1,
          "FCS_TLS_EXT.1": 4
        },
        "FDP": {
          "FDP_ACC.1": 13,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 17,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DSK": 2,
          "FDP_DSK_EXT.1": 15,
          "FDP_DSK_EXT.1.1": 2,
          "FDP_DSK_EXT.1.2": 4,
          "FDP_FXS": 2,
          "FDP_FXS_EXT.1": 14,
          "FDP_FXS_EXT.1.1": 2,
          "FDP_FXS_EXT.1.2": 1,
          "FDP_IFC.1": 1,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_RIP.1": 13,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 17,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 15,
          "FIA_ATD.1.1": 1,
          "FIA_PMG": 2,
          "FIA_PMG_EXT.1": 20,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_PSK": 2,
          "FIA_PSK_EXT.1": 23,
          "FIA_PSK_EXT.1.1": 2,
          "FIA_PSK_EXT.1.2": 2,
          "FIA_PSK_EXT.1.3": 3,
          "FIA_UAU.1": 16,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.7": 8,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 16,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 18,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 19,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 20,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 22,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 20,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_KYP": 2,
          "FPT_KYP_EXT.1": 13,
          "FPT_KYP_EXT.1.1": 2,
          "FPT_SKP": 2,
          "FPT_SKP_EXT.1": 13,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM.1": 16,
          "FPT_STM.1.1": 1,
          "FPT_TST": 2,
          "FPT_TST_EXT.1": 19,
          "FPT_TST_EXT.1.1": 2,
          "FPT_TUD": 2,
          "FPT_TUD_EXT": 1,
          "FPT_TUD_EXT.1": 18,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL.3": 11,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 16,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 24,
          "FTP_TRP.1.1": 2,
          "FTP_TRP.1.2": 2,
          "FTP_TRP.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "CTR": {
          "CTR": 4
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 27
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 49,
          "IKEv1": 43,
          "IKEv2": 5
        },
        "IPsec": {
          "IPsec": 188
        },
        "SSH": {
          "SSH": 3
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 7
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 22,
          "P-384": 24,
          "P-521": 22
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 22
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          },
          "SHA3": {
            "SHA3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 25
        },
        "RNG": {
          "RBG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2,
          "physical tampering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 180-3": 2,
          "FIPS PUB 180-3": 1,
          "FIPS PUB 186-4": 2,
          "FIPS PUB 197": 1,
          "FIPS180-4": 5,
          "FIPS186-4": 8,
          "FIPS197": 6,
          "FIPS198-1": 5
        },
        "ISO": {
          "ISO/IEC 18031:2011": 3
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-90A": 2
        },
        "PKCS": {
          "PKCS#1": 14,
          "PKCS1": 3
        },
        "RFC": {
          "RFC 3602": 6,
          "RFC 4106": 2,
          "RFC 4109": 2,
          "RFC 4301": 3,
          "RFC 4303": 2,
          "RFC 4304": 1,
          "RFC 4868": 3,
          "RFC 5282": 1,
          "RFC2407": 2,
          "RFC2408": 2,
          "RFC2409": 2,
          "RFC3526": 3,
          "RFC3602": 2,
          "RFC4109": 2,
          "RFC4301": 3,
          "RFC4303": 2,
          "RFC4304": 2,
          "RFC4868": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 55,
            "AES-": 1,
            "AES-128": 1,
            "AES-256": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 30,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 5,
          "Microsoft Corporation": 1
        },
        "Samsung": {
          "Samsung": 255
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Anthony J Peterson;[email protected]",
      "/CreationDate": "D:20221012114957-06\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20221114202654+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "HP G2.0 Samsung HCDPP Security Target",
      "pdf_file_size_bytes": 1661888,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11209",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34660",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34659",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34658"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 160
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report-%20HP%20G2%20Samsung%20HCDPP.pdf",
  "scheme": "SE",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HP_G2_Samsung-HCDPP_ST_v1.6.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fa8fc4f758188be3a126a7e700d270625f336c4a2f7645f745abd4b586de9503",
      "txt_hash": "e985662614915b1244b1ba75a4ba95df9cc5e0cbb10787657f7a01f8c3b3841b"
    }
  },
  "status": "active"
}