name |
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230 |
SOMA-c007 Machine Readable Electronic Document SSCD Application version 4 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
ES |
status |
active |
active |
not_valid_after |
21.09.2028 |
15.09.2028 |
not_valid_before |
21.06.2023 |
15.09.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20INF-4155.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20ST_LITE.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
HID Global |
manufacturer_web |
https://www.huawei.com |
https://www.hidglobal.com/ |
security_level |
EAL4+, ALC_FLR.1 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
0e8a25a9fbdc32c5 |
1e59c2d790653fcf |
heuristics/cert_id |
2019-7-INF-4068 |
2018-20-INF-4155 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, ADV_IMP.1, ASE_CCL.1, AVA_VAN.3, ASE_REQ.2 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
- category: Others
- certification_date: 21.06.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
- certification_date: 21.06.2023
- description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL4 + ALC_FLR.1
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
|
- category: QSCD/SSCD
- certification_date: 15.09.2023
- enhanced:
- category: QSCD/SSCD
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1820
- certification_date: 15.09.2023
- description: The TOE is a combination of hardware and software configured to securely create, use, and manage Signature Creation Data (SCD). The SSCD protects the SCD during its whole life cycle as to be used in a signature creation process solely by its Signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. The TOE provides the following functions: to generate Signature Creation Data (SCD) and the corresponding Signature Verification Data (SVD), to export the SVD for certification to the CGA over a trusted channel, to prove the identity as SSCD to external entities, to, optionally, receive and store certificate info, to switch the SSCD from a non-operational state to an operational state, and if in an operational state, to create digital signatures for data with the following steps: select an SCD if multiple are present in the SSCD, authenticate the Signatory and determine its intent to sign, receive data to be signed or a unique representation thereof (DTBS/R) from the SCA over a trusted channel, apply an appropriate cryptographic signature creation function to the DTBS/R using the selected SCD.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Hid Global
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1821
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1819
- type: Product
- manufacturer: Hid Global
- product: SOMA-c007 Machine Readable Electronic Document SSCD Application version 4
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/991-soma-c007-machine-readable-electronic-document-sscd-application-version-4
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/protection_profiles |
{} |
d9553e7194783182, 1f7ea2e05de5b88b, d918b28fd7bb5d79 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf |
pdf_data/cert_filename |
2019-07_Certificado.pdf |
2018-20_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL4: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 934591
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20230904142226+02'00'
- /ModDate: D:20230904142226+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 903551
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
2019-07-INF-4068.pdf |
2018-20 INF-4155.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V6-2021: 1
- ES:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 3
- BSI-CC-PP-0071-2012: 3
- BSI-CC-PP-0072-2012: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 8
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.4: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 20
- Huawei Technologies Co: 3
- Microsoft:
|
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: 9308
- /CreationDate: D:20230918162101+02'00'
- /Creator: Microsoft® Word LTSC
- /ModDate: D:20230918162101+02'00'
- /Producer: Microsoft® Word LTSC
- pdf_file_size_bytes: 509192
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
2019-07_ST.pdf |
2018-20 ST_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V6-2021: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0071-2012: 2
- BSI-CC-PP-0072-2012: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 12
- EAL5 augmented: 5
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SAE.1: 3
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 2
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS: 10
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_COP.1: 11
- FDP:
- FDP_ACC: 27
- FDP_ACC.1: 19
- FDP_ACF: 31
- FDP_ACF.1: 18
- FDP_AFC: 1
- FDP_DAU: 8
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 10
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_RIP.1: 8
- FDP_SDI: 19
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 40
- FIA_AFL.1: 12
- FIA_API: 4
- FIA_API.1: 13
- FIA_UAU.1: 28
- FIA_UAU.1.1: 3
- FIA_UID.1: 26
- FIA_UID.1.1: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 25
- FMT_LIM.2: 19
- FMT_MOF.1: 9
- FMT_MSA: 23
- FMT_MSA.1: 5
- FMT_MSA.2: 10
- FMT_MSA.3: 18
- FMT_MSA.4: 10
- FMT_MTD: 41
- FMT_MTD.1: 5
- FMT_SMF.1: 29
- FMT_SMR: 37
- FMT_SMR.1: 28
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 16
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 9
- FPT_PHP.1: 10
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 14
- FTP:
- FTP_ITC: 61
- FTP_ITC.1: 20
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECU: 1
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.COMPONENTS_RUNNING: 3
- A.ENVIRONMENT_ACL: 3
- A.LIMITED_FUNCTIONALITY: 3
- A.NETWORK_SEGREGATION: 3
- A.PHYSICAL_PROTECTION: 3
- A.RESIDUAL_INFORMATION: 3
- A.TIME: 3
- A.TRUSTED_ADMINISTRATOR: 3
- O:
- O.AUDIT: 5
- O.COMMUNICA: 1
- O.COMMUNICATI: 1
- O.COMMUNICATION: 5
- O.IDAUTH: 8
- OE:
- OE.ADMIN_CRE: 1
- OE.ADMIN_CREDENTI: 2
- OE.ADMIN_CREDENTIALS_SEC: 2
- OE.COMPONEN: 1
- OE.COMPONENTS_RU: 1
- OE.COMPONENTS_RUNNING: 1
- OE.ENVIRONM: 1
- OE.ENVIRONMENT_AC: 1
- OE.ENVIRONMENT_ACL: 1
- OE.LIMITED_FU: 1
- OE.LIMITED_FUNCTIO: 1
- OE.LIMITED_FUNCTIONALITY: 1
- OE.NETWORK_: 1
- OE.NETWORK_SEGRE: 1
- OE.NETWORK_SEGREGATION: 1
- OE.NETWOR_SEGREG: 1
- OE.NETWOR_SEGREGATION: 1
- OE.PHYSICAL: 4
- OE.RESIDUAL_I: 1
- OE.RESIDUAL_INFOR: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.TIME: 7
- OE.TRUSTED_A: 1
- OE.TRUSTED_ADMIN: 4
- OSP:
- T:
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ADMINISTR: 1
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.WEAK_AUTHENTICATION_E: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 3
|
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 23
- Huawei Technologies Co: 3
- Microsoft:
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library v2.02.010: 2
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- fault injection: 1
- physical tampering: 10
- SCA:
- DPA: 2
- SPA: 3
- side channels: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- FIPS:
- FIPS PUB 180-4: 3
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-9: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Giovanni LICCARDO, Roberta SODANO
- /CreationDate: D:20230308150403+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230308150403+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: SOMA-c007 Machine Readable Electronic Document
- /Title: SOMA-c007 Machine Readable Electronic Document - Security Target SSCD Application - Recertification
- pdf_file_size_bytes: 1875447
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |