Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HiSilicon MSP V1.0
NSCIB-CC-0138342-CR
Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)
CCEVS-VR-VID-10705-2016
name HiSilicon MSP V1.0 Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme NL US
status active archived
not_valid_after 20.08.2025 24.03.2018
not_valid_before 20.08.2020 24.03.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-0138342.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0138342-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MSP%20V1.0%20on%20Kirin%209000%20Series%20Security%20Target%20V12.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-st.pdf
manufacturer HiSilicon Vertiv
manufacturer_web https://www.hisilicon.com/en/ https://www.vertivco.com
security_level ALC_DVS.2, EAL5+, AVA_VAN.5 {}
dgst 058c4cc41fe321e1 d22e3c1b13290920
heuristics/cert_id NSCIB-CC-0138342-CR CCEVS-VR-VID-10705-2016
heuristics/cert_lab US
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ADV_FSP.1, ALC_CMC.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1
heuristics/extracted_versions 1.0 -
heuristics/report_references/directly_referenced_by NSCIB-CC-0351648-CR {}
heuristics/report_references/indirectly_referenced_by NSCIB-CC-0351648-CR {}
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 24.03.2016
  • evaluation_facility: DXC.technology
  • expiration_date: 24.03.2019
  • id: CCEVS-VR-VID10705
  • product: Vertiv Secure KVM and Matrix (formerly Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10705
  • vendor: Vertiv IT Systems
heuristics/protection_profiles {} da2e45c9b3fbb700
maintenance_updates
  • maintenance_date: 19.03.2018
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-add2.pdf
  • maintenance_st_link: None
  • maintenance_title: Maintenance Update for Vertiv Secure KVM and Matrix Models: SC820, SC820DD, SC820H SCM120, SCM120H, SC920H, SC920D, SC920XD, SC840 ,SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC80H, SC845H, SC940H, SC945H, SC945XD, SCM145, SC1045XD, SC885, SC985, SC8165

protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf
pdf_data/cert_filename CC-20-0138342.pdf st_vid10705-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-20-0138342: 1
  • US:
    • CCEVS-VR-VID10705-2016: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200903132036+01'00'
  • /Creator: C458-M
  • /ModDate: D:20200903131730+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S20090313200
  • pdf_file_size_bytes: 68752
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20160325131240-04'00'
  • /ModDate: D:20160325131320-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 178490
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename NSCIB-CC-0138342-CR.pdf st_vid10705-vr.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0138342-CR
    • cert_item: MSP V1.0
    • cert_lab: Brightsight
    • developer: HiSilicon
  • US:
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID10705-2016
    • cert_item: Emerson Secure KVM (identified 2, 4, 8, 16 port models
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0138342-CR: 12
  • US:
    • CCEVS-VR-VID10705-2016: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_: 2
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 5
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • Secure Execution: 1
  • other:
    • TEE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
pdf_data/st_filename MSP V1.0 on Kirin 9000 Series Security Target V12.pdf st_vid10705-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP: 1
    • ADV_FSP.1: 4
    • ADV_FSP.2: 4
    • ADV_FSP.4: 2
    • ADV_FSP.5: 4
    • ADV_IMP: 1
    • ADV_IMP.1: 5
    • ADV_INT: 1
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 3
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 5
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 4
    • ALC_LCD: 1
    • ALC_LCD.1: 3
    • ALC_TAT: 1
    • ALC_TAT.1: 4
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 5
    • ASE_INT: 1
    • ASE_INT.1: 2
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 4
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 2
    • ASE_TSS: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 3
    • ATE_COV.2: 3
    • ATE_DPT: 1
    • ATE_DPT.3: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 7
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 16
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 20
    • FCS_CKM.1: 9
    • FCS_CKM.2: 4
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP: 56
    • FCS_COP.1: 8
    • FCS_RNG: 4
    • FCS_RNG.1: 10
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 29
    • FDP_ACC.1: 7
    • FDP_ACF: 26
    • FDP_ACF.1: 15
    • FDP_DAU: 5
    • FDP_DAU.1: 2
    • FDP_IFC: 11
    • FDP_IFC.1: 3
    • FDP_IFC.2: 2
    • FDP_IFF: 9
    • FDP_IFF.1: 7
    • FDP_ITC.1: 10
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 2
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 11
    • FDP_SDC.1.1: 2
    • FDP_SDI: 13
    • FDP_SDI.2: 4
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 2
    • FIA_UAU.1: 2
    • FIA_UID: 4
    • FIA_UID.1: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 15
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 2
    • FMT_MSA: 39
    • FMT_MSA.1: 8
    • FMT_MSA.3: 17
    • FMT_SMR.1: 8
  • FPT:
    • FPT_FLS: 9
    • FPT_FLS.1: 6
    • FPT_INI: 5
    • FPT_INI.1: 11
    • FPT_INI.1.1: 2
    • FPT_INI.1.2: 2
    • FPT_INI.1.3: 2
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 1
    • FPT_STM: 6
    • FPT_STM.1: 1
    • FPT_TUD: 5
    • FPT_TUD.1: 11
  • FRU:
    • FRU_FLT.2: 6
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_FLS: 3
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 79
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 85
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 13
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 4
    • O.RNG: 1
    • O.SA: 45
  • OP:
    • OP.CALL_API: 3
    • OP.CREATE_COUNTER: 2
    • OP.EXTRACT_COUNTER: 3
    • OP.LOAD: 3
    • OP.SSSA_CREATE: 2
    • OP.SSSA_DELETE: 2
    • OP.SSSA_LOAD: 2
    • OP.STEP_COUNTER: 2
    • OP.STORE: 3
  • SA:
    • SA: 4
  • T:
    • T.RAM: 5
    • T.RND: 3
    • T.SPY: 5
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 11
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 2
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 9
    • O.PERIPHERAL_PORTS_ISOLATION: 12
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 9
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 8
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 7
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 6
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
      • AES-256: 4
      • AES128: 2
  • constructions:
    • MAC:
      • CMAC: 8
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
    • RSA-OAEP: 1
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 3
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 8
  • PKE:
    • PKE: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 7
    • RNG: 18
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 2
  • SCA:
    • Leak-Inherent: 17
    • Physical Probing: 1
    • Side-channel: 1
    • physical probing: 4
    • side-channel: 1
  • other:
    • cold boot: 1
  • FI:
    • physical tampering: 14
pdf_data/st_keywords/tee_name
  • IBM:
    • Secure Execution: 1
  • other:
    • TEE: 19
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38B: 2
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP03: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_metadata
  • /Author: Huawei Technologies Co.,Ltd.
  • /CreationDate: D:20200813194745+08'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20200813194745+08'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: Technical Document
  • /Title: MSP V1.0 on Kirin 9000 Series Security Target
  • pdf_file_size_bytes: 1393685
  • pdf_hyperlinks: http://www.hisilicon.com/cn/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different