name |
Huawei HSM 2.0 Management Firmware version B006 |
ZTE Optical Transmission Equipment Series |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
NL |
NO |
status |
active |
archived |
not_valid_after |
18.11.2028 |
01.09.2019 |
not_valid_before |
18.11.2023 |
25.02.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200028-01-Cert.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200028-01-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-042%20CR%20v%201.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200028-01-STv2.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf |
manufacturer |
Huawei Technologies Co. Ltd. |
ZTE Corporation |
manufacturer_web |
https://www.huawei.com |
https://wwwen.zte.com.cn/global/index.html |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL2+, ALC_FLR.2 |
dgst |
226e9a832dcdfd33 |
a041cccd8254ec7a |
heuristics/cert_id |
NSCIB-CC-2200028-01-CR |
SERTIT-042 |
heuristics/cert_lab |
|
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VAN.5, ADV_FSP.4, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Other Devices and Systems
- certification_date: 25.02.2013
- developer: ZTE Corporation
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-042
- certification_date: 25.02.2013
- description: SERTIT-042 C
- developer: ZTE Corporation
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134824-1607951230/SERTIT/Sertifikater/2013/42/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134821-1607951226/SERTIT/Sertifikater/2013/42/SERTIT-042%20CR%20v%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA
- product: ZXONE 5800 v1.10, ZXMP S325 v2.10, ZXMP S385 v2.60, ZXMP M720 v1.00, ZXMP M820 v2.51, ZXWM M920 V4.20P01, ZXONE 8300 v1.00, ZXONE 8500 v1.00
- sponsor: ZTE Corporation
- product: ZTE Optical Transmission Equipment Series
- url: https://sertit.no/certified-products/product-archive/zte-optical-transmission-equipment-series
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
NSCIB-CC-2200028-01-Cert.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- NL:
- NSCIB-2200028-01: 1
- NSCIB-CC-2200028-01: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL4: 2
- EAL4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 1
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 1
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Wim Ton
- /CreationDate: D:20231204152855+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20231204152855+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 69183
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
NSCIB-CC-2200028-01-CR.pdf |
SERTIT-042 CR v 1.0.pdf |
pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-2200028-01-CR
- cert_item: Huawei HSM 2.0 Management Firmware version B006
- cert_lab: SGS Brightsight B.V.
- developer: Huawei Technologies Co., Ltd
|
|
pdf_data/report_keywords/cc_cert_id |
- NL:
- NSCIB-2200028-01: 1
- NSCIB-CC-2200028-01-CR: 11
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
|
- EAL:
- EAL 2: 5
- EAL 2 augmented: 2
- EAL 2+: 21
- EAL1: 1
- EAL2: 1
- EAL2+: 2
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_GEN.3: 2
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG.4: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FTA:
- FTA_MCS.1: 1
- FTA_SSL.3: 1
|
pdf_data/report_keywords/cc_claims |
|
- O:
- O.AUDITING: 1
- O.AUTHENTICATE: 1
- O.AUTHORISE: 1
- OE:
- OE.CLIENT_SECURITY: 1
- OE.SERVER_SECURITY: 1
- OE.TIME: 1
- OE.TRUSTED_NETWORKS: 1
- T:
- T.AUTHORISED: 1
- T.CONFIDENTIALITY: 1
- T.INTEGRITY: 1
- T.PHYSICAL_ATTACK: 1
- T.UNAUTHORISED: 1
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 24
- Huawei Technologies Co: 4
|
|
pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- malfunction: 1
- SCA:
- other:
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- or replaced. Log&Dfx collects logs and device health status information. The “crypto services” are out of scope for this certification. 2.5 Documentation The following documentation is provided with the product: 1
- out of scope: 2
- remote attestation, secure update, and key management. The actual cryptographic operations are out of scope as these are provided by the underlying hardware. Although the smartcard rating methodology was: 1
|
|
pdf_data/report_metadata |
|
- /Author: Kvassnes, Kjartan Jæger
- /CreationDate: D:20130321125808+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20130321125953+01'00'
- /Producer: Microsoft® Word 2010
- /Title: tittel
- pdf_file_size_bytes: 1423728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
NSCIB-CC-2200028-01-STv2.0.pdf |
ZTE Optical Transmission Equipment Security Target v1.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL4: 7
- EAL4+: 4
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.1.1: 2
- FAU_SAG: 3
- FAU_SAG.1: 11
- FAU_SAG.1.1: 2
- FAU_SAG.1.2: 2
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_COP: 8
- FCS_COP.1: 3
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 14
- FDP_ACF: 20
- FDP_ACF.1: 20
- FDP_ETC: 10
- FDP_ETC.1: 4
- FDP_IFC: 15
- FDP_IFC.1: 12
- FDP_IFF: 15
- FDP_IFF.1: 18
- FDP_IFF.1.3: 1
- FDP_ITC: 10
- FDP_ITC.1: 8
- FDP_ITC.2: 2
- FDP_MSA: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FIA:
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 39
- FMT_MSA.1: 11
- FMT_MSA.3: 21
- FMT_SMF: 5
- FMT_SMF.1: 2
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_RCV.2: 5
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_STM.1: 2
- FPT_TEE: 16
- FPT_TEE.1: 6
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_GEN.3: 8
- FAU_GEN.3.1: 3
- FAU_GEN.3.2: 2
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.2: 5
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_SMF: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS.1: 5
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.HDIM: 7
- O.HRA: 7
- O.HUDI: 3
|
- A:
- O:
- O.ACCESS: 4
- O.AUDITING: 4
- O.AUTHENTICATE: 4
- O.AUTHORISE: 4
- OE:
- OE.CLIENT_SECURITY: 3
- OE.SERVER_SECURITY: 2
- OE.TIME: 3
- OE.TRUSTED_NETWORK: 1
- OE.TRUSTED_NETWORKS: 1
- OSP:
- OSP.FLEXIBLE_MANAGEMENT: 2
- T:
- T.AUTHORISED: 2
- T.CONFIDENTIALITY: 2
- T.INTEGRITY: 2
- T.PHYSICAL_ATTACK: 2
- T.UNAUTHORISED: 2
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 13
- Huawei Technologies Co: 6
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 2
- HMAC-SHA-512: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- malfunction: 1
- SCA:
- Side-channel: 2
- side-channel: 2
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-4: 5
- FIPS186-4: 1
- FIPS198-1: 3
- PKCS:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Operations Operations in the TOE are divided into • Topology: 1
- for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope for this ST. Accounting: The TOE supports flexible logging and auditing of events. General This: 1
- for ZTE maintenance staff that regularly services the TOE using the systems console, but this is out of scope for this ST. Accounting: The EMS supports flexible logging and auditing of security, operation and: 1
- out of scope: 3
|
pdf_data/st_metadata |
- /Author: wtest222
- /CreationDate: D:20230831164842+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230831164842+02'00'
- /Producer: Microsoft® Word 2016
- /Title: XXX Procedure
- pdf_file_size_bytes: 1122771
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /CreationDate: D:20120816120620+02'00'
- /Creator: PDF24 Creator
- /ModDate: D:20120816120620+02'00'
- /Producer: GPL Ghostscript 8.61
- pdf_file_size_bytes: 699350
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |