name |
Tachograph Card Version 1.1 128/64 R1.1 |
Huawei Mate 40 Pro (M40 pro) with EMUI 11.0 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Mobility |
scheme |
DE |
IT |
status |
archived |
active |
not_valid_after |
01.09.2019 |
20.01.2027 |
not_valid_before |
01.05.2004 |
20.01.2022 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0267a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_m40_emui11_v1.0_en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0267b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_m40_emui11_v1.0.pdf |
manufacturer |
ORGA Kartensysteme GMBH |
Huawei Device Co., Ltd. |
manufacturer_web |
https://www.orga.com/ |
https://www.huawei.com/ |
security_level |
ADV_IMP.2, ADO_IGS.2, ATE_DPT.2, AVA_VLA.4, EAL4+ |
{} |
dgst |
2beee12f885db480 |
4646e2bd9bf0b59d |
heuristics/cert_id |
BSI-DSZ-CC-0267-2004 |
OCSI/CERT/ATS/10/2020/RC |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2022-48517, CVE-2021-22347, CVE-2021-40054, CVE-2021-46811, CVE-2021-22486, CVE-2022-44555, CVE-2021-37033, CVE-2021-22325, CVE-2023-39391, CVE-2021-39966, CVE-2021-37027, CVE-2021-22346, CVE-2022-41592, CVE-2021-40020, CVE-2022-38979, CVE-2021-22336, CVE-2022-41582, CVE-2021-37052, CVE-2023-34163, CVE-2022-41588, CVE-2021-40026, CVE-2021-36995, CVE-2021-46882, CVE-2022-34738, CVE-2021-46886, CVE-2022-44563, CVE-2023-41296, CVE-2021-40055, CVE-2021-22429, CVE-2021-46885, CVE-2022-39003, CVE-2022-41585, CVE-2021-22352, CVE-2023-52101, CVE-2021-22313, CVE-2023-49242, CVE-2021-22374, CVE-2021-46814, CVE-2022-41581, CVE-2021-37110, CVE-2021-40037, CVE-2023-46759, CVE-2021-37021, CVE-2022-31756, CVE-2023-39383, CVE-2021-37030, CVE-2021-37037, CVE-2021-40053, CVE-2023-26547, CVE-2023-34156, CVE-2021-22333, CVE-2021-40035, CVE-2021-22447, CVE-2022-46320, CVE-2021-40047, CVE-2023-39401, CVE-2020-9140, CVE-2022-38983, CVE-2022-34739, CVE-2021-40050, CVE-2023-1693, CVE-2022-39001, CVE-2023-52099, CVE-2021-40061, CVE-2021-36990, CVE-2021-36986, CVE-2022-46321, CVE-2021-22485, CVE-2022-48606, CVE-2022-37004, CVE-2023-39403, CVE-2021-40030, CVE-2023-1692, CVE-2022-41601, CVE-2021-37114, CVE-2021-39998, CVE-2022-41602, CVE-2021-22430, CVE-2021-40015, CVE-2023-52108, CVE-2021-37074, CVE-2023-44105, CVE-2022-48296, CVE-2021-22488, CVE-2021-40012, CVE-2021-36987, CVE-2022-22252, CVE-2021-22323, CVE-2022-22256, CVE-2021-22387, CVE-2023-46765, CVE-2021-37020, CVE-2023-41300, CVE-2021-22349, CVE-2023-39388, CVE-2022-41600, CVE-2022-46319, CVE-2021-36988, CVE-2021-22350, CVE-2022-34735, CVE-2023-52112, CVE-2021-22381, CVE-2021-22472, CVE-2023-52098, CVE-2022-41595, CVE-2021-46788, CVE-2020-9158, CVE-2022-48359, CVE-2021-40064, CVE-2022-46318, CVE-2021-22442, CVE-2022-31755, CVE-2021-40016, CVE-2023-6273, CVE-2021-40065, CVE-2023-39400, CVE-2022-31752, CVE-2023-39381, CVE-2023-39395, CVE-2022-31757, CVE-2022-41593, CVE-2022-47974, CVE-2023-44104, CVE-2022-39006, CVE-2023-46758, CVE-2021-22348, CVE-2023-46774, CVE-2021-22317, CVE-2023-39399, CVE-2022-46317, CVE-2021-22308, CVE-2021-22385, CVE-2022-48300, CVE-2021-37032, CVE-2021-39993, CVE-2023-34167, CVE-2021-22490, CVE-2021-22367, CVE-2023-49241, CVE-2021-37111, CVE-2023-1691, CVE-2022-44553, CVE-2022-38997, CVE-2022-44558, CVE-2022-44561, CVE-2021-36998, CVE-2021-40010, CVE-2021-37029, CVE-2023-34166, CVE-2021-46839, CVE-2022-31758, CVE-2022-48508, CVE-2021-22322, CVE-2022-41586, CVE-2021-40039, CVE-2022-34743, CVE-2021-36989, CVE-2021-22487, CVE-2021-22474, CVE-2022-37007, CVE-2023-34161, CVE-2021-22404, CVE-2022-41576, CVE-2021-22372, CVE-2021-37031, CVE-2023-44100, CVE-2022-48357, CVE-2021-46883, CVE-2021-22353, CVE-2021-46887, CVE-2022-37002, CVE-2022-44551, CVE-2021-46789, CVE-2022-39004, CVE-2023-46763, CVE-2022-41594, CVE-2022-44550, CVE-2022-48516, CVE-2022-44559, CVE-2021-22324, CVE-2021-22435, CVE-2020-9149, CVE-2021-22354, CVE-2022-48286, CVE-2023-39387, CVE-2022-48515, CVE-2021-37034, CVE-2022-41578, CVE-2021-22390, CVE-2022-48301, CVE-2022-31760, CVE-2021-22334, CVE-2021-39996, CVE-2021-22446, CVE-2021-22335, CVE-2021-22384, CVE-2021-22491, CVE-2022-22254, CVE-2022-39005, CVE-2021-46881, CVE-2023-44106, CVE-2021-40013, CVE-2023-49245, CVE-2021-22316, CVE-2020-9147, CVE-2023-1694, CVE-2021-22319, CVE-2023-44118, CVE-2022-22258, CVE-2021-37002, CVE-2021-40063, CVE-2021-22375, CVE-2021-22403, CVE-2021-37069, CVE-2021-22415, CVE-2021-22432, CVE-2021-37047, CVE-2023-44093, CVE-2022-31761, CVE-2023-1695, CVE-2021-37051, CVE-2021-22438, CVE-2022-48480, CVE-2021-37039, CVE-2022-41584, CVE-2023-49246, CVE-2022-48513, CVE-2021-36991, CVE-2021-22370, CVE-2022-41580, CVE-2022-34736, CVE-2022-38978, CVE-2022-48295, CVE-2021-22369, CVE-2022-37005, CVE-2021-22386, CVE-2022-41599, CVE-2021-22433, CVE-2022-39000, CVE-2022-41596, CVE-2022-34742, CVE-2023-52107, CVE-2021-22371, CVE-2021-37119, CVE-2022-41591, CVE-2021-22395, CVE-2023-41310, CVE-2022-22253, CVE-2022-48287, CVE-2022-48496, CVE-2021-37040, CVE-2021-22426, CVE-2021-46813, CVE-2022-44560, CVE-2021-36994, CVE-2021-22445, CVE-2023-44103, CVE-2022-48491, CVE-2022-37008, CVE-2022-41598, CVE-2021-40029, CVE-2021-37093, CVE-2022-22257, CVE-2021-46786, CVE-2023-31225, CVE-2021-22443, CVE-2021-22481, CVE-2021-22483, CVE-2021-46840, CVE-2021-22337, CVE-2021-46741, CVE-2021-22373, CVE-2021-40031, CVE-2021-22444, CVE-2021-40051, CVE-2021-22389, CVE-2021-22406, CVE-2021-36992, CVE-2023-41305, CVE-2021-36997, CVE-2022-48292, CVE-2021-37044, CVE-2021-40059, CVE-2022-48293, CVE-2021-40049, CVE-2022-44562, CVE-2023-39408, CVE-2022-34741, CVE-2021-40052, CVE-2021-46884, CVE-2020-9139, CVE-2021-36999, CVE-2021-22473, CVE-2020-9142, CVE-2021-37053, CVE-2021-22344, CVE-2023-39402, CVE-2021-36996, CVE-2022-37003, CVE-2021-22448, CVE-2021-37049, CVE-2021-40017, CVE-2023-49240, CVE-2023-39389, CVE-2023-44098, CVE-2021-40038, CVE-2021-40011, CVE-2021-22394, CVE-2022-44549, CVE-2021-22401, CVE-2021-39969, CVE-2021-22434, CVE-2022-44557, CVE-2022-48302, CVE-2023-46764, CVE-2021-37050, CVE-2022-31753, CVE-2022-34737, CVE-2021-37001, CVE-2023-49243, CVE-2021-22427, CVE-2022-46761, CVE-2021-40009, CVE-2023-4565, CVE-2021-22392, CVE-2021-22407, CVE-2022-44552, CVE-2021-22391, CVE-2023-46756, CVE-2021-22388, CVE-2021-22345, CVE-2022-48488, CVE-2021-22482, CVE-2020-9144, CVE-2021-37043, CVE-2021-40048, CVE-2021-22475, CVE-2021-37103, CVE-2020-36600, CVE-2021-37046, CVE-2023-39382, CVE-2022-48507, CVE-2021-39973, CVE-2021-40044, CVE-2023-26548, CVE-2023-39409, CVE-2021-22431, CVE-2021-22405, CVE-2020-9148, CVE-2023-39398, CVE-2021-37097, CVE-2021-22402, CVE-2023-49248, CVE-2021-22436, CVE-2023-1696, CVE-2021-37117, CVE-2021-22428, CVE-2022-48346, CVE-2021-22379, CVE-2021-22343, CVE-2023-26549, CVE-2021-37035, CVE-2022-31751, CVE-2021-46787, CVE-2022-44548, CVE-2022-41597, CVE-2021-37055, CVE-2021-40034, CVE-2023-39405, CVE-2021-37042, CVE-2022-48349, CVE-2022-41603, CVE-2022-48494, CVE-2023-44119, CVE-2020-9146, CVE-2022-31759, CVE-2021-40040, CVE-2021-36993, CVE-2022-46312, CVE-2021-46742, CVE-2022-31762, CVE-2023-52113, CVE-2023-52102, CVE-2023-52114, CVE-2023-44116, CVE-2021-22412, CVE-2021-36985, CVE-2023-46772, CVE-2021-40045, CVE-2022-34740, CVE-2022-39002, CVE-2022-48294, CVE-2022-48314, CVE-2021-37041, CVE-2021-22351, CVE-2023-44112, CVE-2022-48291, CVE-2023-52116, CVE-2022-41587, CVE-2023-49239 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ALC_DVS.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
1.1 |
11.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0205-2003, BSI-DSZ-CC-0203-2003, BSI-DSZ-CC-0243-2004 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0205-2003, BSI-DSZ-CC-0203-2003, BSI-DSZ-CC-0243-2004 |
{} |
heuristics/scheme_data |
|
- certification_date: 20.01.2022
- level: conforme a PP_MD_V3.1
- report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/huawei/cr_huawei_m40_emui11_v1.0_en.pdf
- report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/huawei/rc_huawei_m40_emui11_v1.0_it.pdf
- supplier: Huawei Device Co., Ltd.
- target_link: https://www.ocsi.gov.it/documenti/certificazioni/huawei/st_huawei_m40_emui11_v1.0.pdf
- title: Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
df09b703c88c665a, c88af12926be2779 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0267a.pdf |
cr_huawei_m40_emui11_v1.0_en.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0267-2004
- cert_item: Tachograph Card Version 1.1 128/64 R1.1
- cert_lab: BSI
- developer: ORGA Kartensysteme GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0203: 1
- BSI-DSZ-CC-0203-2003: 1
- BSI-DSZ-CC-0205-2003: 2
- BSI-DSZ-CC-0243-2004: 1
- BSI-DSZ-CC-0267-2004: 25
|
- IT:
- OCSI/CERT/ATS/10/2020/RC: 25
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002: 1
- BSI-PP-0002-: 1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 13
- EAL4 augmented: 3
- EAL4+: 2
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.2: 5
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.2: 4
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 2
- ALC_TAT.1: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 4
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ALC_FLR: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.1: 3
- ASE_REQ.1: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_SAA.1: 1
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 1
- FCS_COP: 8
- FCS_COP.1: 1
- FCS_RND.1: 1
- FCS_RND.2: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 2
- FDP_ACF: 2
- FDP_ACF.1: 2
- FDP_DAU.1: 1
- FDP_ETC.1: 1
- FDP_ETC.2: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 1
- FDP_ITT.1: 2
- FDP_RIP.1: 2
- FDP_SDI.2: 1
- FIA:
- FIA_AFL: 2
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UAU.3: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FIA_USB.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_SMF.1: 1
- FPR:
- FPT:
- FPT_FLS.1: 3
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_SEP.1: 2
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_VRC.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.DEV_ORG: 1
- A.DLV_AUDIT: 1
- A.DLV_PROTECT: 1
- A.DLV_RESP: 1
- A.PERS: 2
- A.USE_DIAG: 1
- A.USE_PROD: 1
- A.USE_TEST: 1
- T:
- T.CLON: 1
- T.DIS_DEL: 1
- T.DIS_INFO: 1
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_EXE: 1
- T.MOD_LOAD: 1
- T.MOD_SHARE: 1
- T.MOD_SOFT: 1
- T.RND: 1
- T.T_CMD: 1
- T.T_DEL: 1
- T.T_ES: 1
- T.T_TOOLS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 5
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 1
- Side channel: 1
- physical probing: 1
- other:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 3
- AIS 25: 2
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 35: 1
- AIS 36: 5
- ISO:
- ISO/IEC 10373: 2
- ISO/IEC 15408:1999: 1
- ISO/IEC 7810: 2
- ISO/IEC 7816: 4
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-3: 4
- ISO/IEC15408: 1999: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Evaluation Technical Report, Version 3.0, 10 May 2004 for Tachograph Card Version 1.1 128/64 R1.1 (confidential document) [12] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German: 1
- Report [6] Security Target, BSI-DSZ-0267-2004, Version 1.00, 7 May 2004, ORGA Kartensysteme GmbH (confidential document) [7] Security Target Lite, BSI-DSZ-0267-2004, Version 1.00, 12 May 2004, ORGA Kartensysteme GmbH: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20050428052620Z
- /Creator: Acrobat PDFMaker 5.0 für Word
- /Keywords: Certification, Report, Tachograph Card
- /ModDate: D:20060530154947+02'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Subject: Certification Report
- /Title: Certification Report BSI-DSZ-CC-0267-2004
- pdf_file_size_bytes: 972978
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: OCSI
- /CreationDate: D:20220120071420+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20220120071420+00'00'
- /Title: Certification Report "Huawei Mate 40 Pro (M40 pro) with EMUI 11.0"
- pdf_file_size_bytes: 469187
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
0267b.pdf |
st_huawei_m40_emui11_v1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0203: 1
- BSI-DSZ-CC-0267: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0002: 4
- BSI-PP-0002-2001: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 20
- EAL4 augmented: 5
- EAL5: 1
- EAL5 augmented: 1
- ITSEC:
- ITSEC E3 high: 6
- ITSEC E3.32: 1
|
- EAL:
- EAL 1: 2
- EAL 1 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADO_IGS.2: 13
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 12
- ADV_LLD: 1
- ADV_LLD.1: 4
- ADV_RCR: 2
- ADV_RCR.1: 2
- ADV_SPM: 1
- ADV_SPM.1: 9
- AGD:
- AGD_ADM: 3
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 12
- ATE_FUN: 1
- ATE_FUN.1: 2
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_SOF: 1
- AVA_SOF.1: 3
- AVA_VLA: 2
- AVA_VLA.2: 1
- AVA_VLA.4: 15
|
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 5
- FAU_SAA: 12
- FAU_SAA.1: 3
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS: 2
- FAU_SAS.1: 1
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 5
- FCO_NRO.1: 4
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 92
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP: 35
- FCS_COP.1: 16
- FCS_COP.1.1: 4
- FCS_RND: 7
- FCS_RND.1: 6
- FCS_RND.1.1: 3
- FCS_RND.2: 9
- FCS_RND.2.1: 3
- FDP:
- FDP_ACC: 32
- FDP_ACC.1: 19
- FDP_ACC.1.1: 3
- FDP_ACC.2: 6
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 22
- FDP_ACF.1: 17
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 4
- FDP_DAU: 5
- FDP_DAU.1: 3
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 10
- FDP_ETC.1: 3
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 5
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 3
- FDP_IFC.1: 13
- FDP_IFC.1.1: 2
- FDP_IFF.1: 2
- FDP_ITC: 33
- FDP_ITC.1: 14
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT: 3
- FDP_ITT.1: 5
- FDP_ITT.1.1: 2
- FDP_RIP: 7
- FDP_RIP.1: 4
- FDP_RIP.1.1: 3
- FDP_SDI: 7
- FDP_SDI.1: 2
- FDP_SDI.2: 3
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 9
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 6
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UAU.3: 3
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UID: 11
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB: 7
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 5
- FMT_LIM.1.1: 2
- FMT_LIM.2: 5
- FMT_LIM.2.1: 2
- FMT_MOF: 1
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 4
- FMT_MSA.2: 13
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD: 1
- FMT_MTD.1: 2
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 14
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT.1: 8
- FPT_FLS: 17
- FPT_FLS.1: 10
- FPT_FLS.1.1: 5
- FPT_ITT: 3
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_PHP: 14
- FPT_PHP.3: 3
- FPT_PHP.3.1: 3
- FPT_SEP: 15
- FPT_SEP.1: 4
- FPT_SEP.1.1: 3
- FPT_SEP.1.2: 3
- FPT_TDC: 5
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 26
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 16
- FPT_TST.2.1: 3
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 2
- FRU_FLT.2: 4
- FRU_FLT.2.1: 2
- FRU_VRC: 2
- FRU_VRC.1: 1
- FRU_VRC.1.1: 2
- FRU_VRC.1.2: 2
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG: 4
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 2
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 2
- FCS_CKM_EXT: 18
- FCS_CKM_EXT.1: 2
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 2
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 3
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 2
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 2
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 2
- FCS_CKM_EXT.6.1: 1
- FCS_COP.1: 34
- FCS_COP.1.1: 6
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 12
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SRV_EXT: 3
- FCS_SRV_EXT.1: 2
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 9
- FCS_STG_EXT.1: 3
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 4
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 3
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 15
- FCS_TLSC_EXT.1: 9
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 3
- FCS_TLSC_EXT.2.1: 1
- FDP:
- FDP_ACF_EXT: 3
- FDP_ACF_EXT.1: 1
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_DAR_EXT: 6
- FDP_DAR_EXT.1: 2
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 3
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 3
- FDP_IFC_EXT.1: 2
- FDP_IFC_EXT.1.1: 1
- FDP_PBA_EXT: 2
- FDP_PBA_EXT.1: 2
- FDP_PBA_EXT.1.1: 1
- FDP_STG_EXT: 3
- FDP_STG_EXT.1: 3
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 3
- FDP_UPC_EXT.1: 1
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL_EXT: 3
- FIA_AFL_EXT.1: 2
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 12
- FIA_BLT_EXT.1: 1
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 1
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 1
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.4.1: 1
- FIA_BMG_EXT: 1
- FIA_BMG_EXT.1: 5
- FIA_BMG_EXT.1.1: 5
- FIA_BMG_EXT.1.2: 2
- FIA_PAE_EXT: 3
- FIA_PAE_EXT.1: 2
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 2
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 3
- FIA_TRT_EXT.1: 2
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 4
- FIA_UAU.5: 2
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 2
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 6
- FIA_UAU_EXT.1: 2
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UAU_EXT.2.1: 2
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT: 3
- FMT_MOF_EXT.1: 3
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 11
- FMT_SMF_EXT.1: 6
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 2
- FMT_SMF_EXT.2.1: 2
- FPT:
- FPT_AEX_EXT: 12
- FPT_AEX_EXT.1: 2
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 2
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 2
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 1
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_JTA_EXT: 2
- FPT_JTA_EXT.1: 2
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 9
- FPT_KST_EXT.1: 2
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 2
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 2
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 3
- FPT_NOT_EXT.1: 2
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST_EXT: 9
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 9
- FPT_TST_EXT.2.1: 2
- FPT_TUD_EXT: 6
- FPT_TUD_EXT.1: 2
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 1
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FTA:
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_WSE_EXT: 3
- FTA_WSE_EXT.1: 3
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC_EXT: 9
- FTP_ITC_EXT.1: 4
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.DEV_DIS_ES: 1
- O.DLV_DATA: 1
- O.INIT_ACS: 1
- O.MEM_ACCESS: 1
- O.MOD_: 1
- O.OPE-: 1
- O.PERS: 2
- O.RANGE_CHK: 1
- O.REUSE: 1
- O.RND: 1
- O.RSA: 1
- O.SAMPLE_ACS: 1
- O.SFR_ACCESS: 1
- O.SHA: 1
- O.TAMPER_ES: 1
- T:
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_EXE: 2
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.RND: 1
- T.T_CMD: 2
- T.T_ES: 3
- T.T_TOOLS: 1
|
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.AUTH: 1
- O.AUTH_COMM: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 3
- T.NETWORK: 1
- T.PERSISTENT: 3
- T.PHYSICAL: 3
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED: 1
|
pdf_data/st_keywords/vendor |
- GD:
- Gemplus:
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
- Oberthur:
- Philips:
|
|
pdf_data/st_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- DES:
- 3DES:
- 3-DES: 10
- TDEA: 3
- Triple-DES: 17
- DES:
|
- AES_competition:
- AES:
- AES: 22
- AES-: 2
- AES-128: 1
- AES-256: 7
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 6
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 12
- P-384: 10
- secp256r1: 2
- secp384r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 11
- Malfunction: 6
- malfunction: 6
- physical tampering: 2
- SCA:
- DPA: 9
- Leak-Inherent: 3
- Physical Probing: 2
- Physical probing: 1
- SPA: 7
- Timing Attacks: 1
- Timing attacks: 1
- physical probing: 5
- side channel: 2
- timing attack: 2
- timing attacks: 4
- other:
- JIL: 17
- reverse engineering: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
- ARM:
- ARM TrustZone: 1
- TrustZone: 7
- other:
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- FIPS:
- FIPS 180-1: 2
- FIPS 186-2: 2
- FIPS 46-3: 1
- FIPS PUB 46: 1
- FIPS PUB 46-3: 2
- ISO:
- ISO/IEC 10373: 2
- ISO/IEC 7810: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-: 1
- ISO/IEC 7816-4: 3
- ISO/IEC 7816-8: 1
- ISO/IEC 7816-9: 3
- ISO/IEC 9796: 4
- ISO/IEC 9796-2: 2
- ISO/IEC 9798-3: 3
- PKCS:
|
- FIPS:
- FIPS PUB 186-4: 4
- FIPS PUB 197: 4
- ISO:
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-38A: 3
- NIST SP 800-38C: 1
- NIST SP 800-38D: 2
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-56A: 1
- NIST SP 800-57: 1
- NIST SP 800-90A: 1
- SP 186-4: 1
- SP 800-108: 2
- SP 800-132: 2
- SP 800-38F: 1
- SP 800-90A: 1
- RFC:
- RFC 2818: 2
- RFC 3394: 2
- RFC 5216: 1
- RFC 5246: 2
- RFC 5280: 5
- RFC 5289: 12
- RFC 5759: 2
- RFC 6125: 1
- RFC5246: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20040512134514
- /Creator:
- /ModDate: D:20040512135111+02'00'
- /Producer: Acrobat Distiller 4.05 for Windows
- /Title: ST Introduction
- pdf_file_size_bytes: 901852
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 173
|
- /CreationDate: D:20220118130640Z00'00'
- /Creator: Word
- /ModDate: D:20220118130640Z00'00'
- /Producer: macOS Version 11.6.1 (Build 20G224) Quartz PDFContext
- /Title: Microsoft Word - Huawei EMUI 11.0 M40 Pro_MDFPP31_ST v1.0.docx
- pdf_file_size_bytes: 1739846
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |