name |
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230 |
Certes TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE Running CEP v2.1.1 Firmware |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
ES |
CA |
status |
active |
archived |
not_valid_after |
21.09.2028 |
19.04.2018 |
not_valid_before |
21.06.2023 |
14.12.2012 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certes-v34-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certes-v34-sec-eng.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
Certes Network, Inc. |
manufacturer_web |
https://www.huawei.com |
https://www.certesnetworks.com/ |
security_level |
EAL4+, ALC_FLR.1 |
EAL4+, ALC_FLR.3 |
dgst |
0e8a25a9fbdc32c5 |
2176819e07cf12a3 |
heuristics/cert_id |
2019-7-INF-4068 |
383-4-165 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, ADV_IMP.1, ASE_CCL.1, AVA_VAN.3, ASE_REQ.2 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
2.1.1, 3.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Others
- certification_date: 21.06.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
- certification_date: 21.06.2023
- description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL4 + ALC_FLR.1
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2019-07_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL4: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 934591
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-07-INF-4068.pdf |
certes-v34-cert-eng.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-165-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 8
- ITSEC:
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 2
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.4: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 20
- Huawei Technologies Co: 3
- Microsoft:
|
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 186-2: 1
- FIPS 197: 1
- FIPS 198: 1
- FIPS 46-3: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: User
- /CCEF: CGI Security Evaluation and Test Facility
- /CR date: dd month yyyy
- /CR version: 0.9
- /Certificate date: dd month yyyy
- /Company:
- /CreationDate: D:20130122090600-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: Certes Networks, Inc
- /Document number: 383-4-165-CR
- /ETR title, version, date: Certes Networks, Inc TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware Common Criteria EAL4+ Evaluation Technical Report version 1.3, 14 December 2012
- /Evaluation completion date: 22 November 2012
- /Manager:
- /ModDate: D:20130122090713-05'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ST Title: Certes Networks, Inc. TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware
- /ST date: 21 November 2012
- /ST version: 1.3
- /Sponsor: Certes Networks, Inc
- /Subject:
- /TOE Version: 5.0
- /TOE name and version: TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware
- /TOE short name: Certes TNM v3.4 and CEP v2.1.1
- /Title: EAL 4+ Evaluation of TNM v3.4 Software with CEP 10 VSE, CEP 100 VSE, CEP 1000 VSE, and CEP 10G VSE running CEP v2.1.1 Firmware
- pdf_file_size_bytes: 61059
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
2019-07_ST.pdf |
certes-v34-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL4+: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SAE.1: 3
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 2
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS: 10
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECU: 1
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.COMPONENTS_RUNNING: 3
- A.ENVIRONMENT_ACL: 3
- A.LIMITED_FUNCTIONALITY: 3
- A.NETWORK_SEGREGATION: 3
- A.PHYSICAL_PROTECTION: 3
- A.RESIDUAL_INFORMATION: 3
- A.TIME: 3
- A.TRUSTED_ADMINISTRATOR: 3
- O:
- O.AUDIT: 5
- O.COMMUNICA: 1
- O.COMMUNICATI: 1
- O.COMMUNICATION: 5
- O.IDAUTH: 8
- OE:
- OE.ADMIN_CRE: 1
- OE.ADMIN_CREDENTI: 2
- OE.ADMIN_CREDENTIALS_SEC: 2
- OE.COMPONEN: 1
- OE.COMPONENTS_RU: 1
- OE.COMPONENTS_RUNNING: 1
- OE.ENVIRONM: 1
- OE.ENVIRONMENT_AC: 1
- OE.ENVIRONMENT_ACL: 1
- OE.LIMITED_FU: 1
- OE.LIMITED_FUNCTIO: 1
- OE.LIMITED_FUNCTIONALITY: 1
- OE.NETWORK_: 1
- OE.NETWORK_SEGRE: 1
- OE.NETWORK_SEGREGATION: 1
- OE.NETWOR_SEGREG: 1
- OE.NETWOR_SEGREGATION: 1
- OE.PHYSICAL: 4
- OE.RESIDUAL_I: 1
- OE.RESIDUAL_INFOR: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.TIME: 7
- OE.TRUSTED_A: 1
- OE.TRUSTED_ADMIN: 4
- OSP:
- T:
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ADMINISTR: 1
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.WEAK_AUTHENTICATION_E: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 3
|
- A:
- A.INSTALL: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.NETCON: 2
- A.NOEVIL: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 4
- O.AUDIT: 7
- O.AUTHENTICATE: 6
- O.ENCRYPT: 4
- O.INTEGRITY: 6
- O.KEYMAN: 4
- O.SECURE_COMM: 8
- OE:
- OE.PHYCAL: 1
- OE.PHYSICAL: 2
- OE.SECURE_NETWORK: 3
- OE.TIMESTAMP: 3
- OE.TRAFFIC: 3
- OE.TRUSTED_ADMIN: 7
- T:
- T.DISCLOSE: 2
- T.MODIFY: 2
- T.NO_AUDIT: 2
- T.SPOOF: 2
- T.UNATH: 2
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 23
- Huawei Technologies Co: 3
- Microsoft:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- AES:
- AES: 6
- AES-: 1
- AES-128: 2
- AES-192: 2
- AES-256: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 9
- FIPS 180-3: 1
- FIPS 186-2: 2
- FIPS 186-3: 2
- FIPS 197: 1
- FIPS 198: 1
- FIPS 46-3: 1
- FIPS PUB 140-2: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Ian Hall
- /CreationDate: D:20121121113155-05'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130102114301-05'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: TNM v3.4 with CEP 10, CEP 100, CEP 1000, and CEP 10G VSEs Running CEP v2.1.1 Firmware
- /Title: Security Target Certes Networks, Inc. TNM v3.4 with CEP 10, CEP 100, CEP 1000, and CEP 10G VSEs Running CEP v2.1.1 Firmware
- pdf_file_size_bytes: 989970
- pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.cipheroptics.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |