Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ATEN Secure KVM Switch Series (models CS118xxx, CS114xxx)
CCEVS-VR-10830-2018
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
name ATEN Secure KVM Switch Series (models CS118xxx, CS114xxx) HarmonyOS 3.0 on Huawei MatePad Pro
category Other Devices and Systems Mobility
scheme US NL
status archived active
not_valid_after 29.01.2020 19.12.2028
not_valid_before 29.01.2018 19.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10830-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10830-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10830-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf
manufacturer ATEN International Co., LTD Huawei Device Co., Ltd.
manufacturer_web https://www.aten.com https://www.huawei.com/
security_level {} EAL2+, ALC_FLR.3
dgst 2fada5b47921512d c85f7e09316c6900
heuristics/cert_id CCEVS-VR-10830-2018 NSCIB-CC-0531255-CR
heuristics/cert_lab US
heuristics/cpe_matches {} cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-46765, CVE-2023-46770, CVE-2022-44557, CVE-2022-48358, CVE-2023-49244, CVE-2022-48302, CVE-2023-52542, CVE-2023-52955, CVE-2023-41299, CVE-2023-52543, CVE-2023-44110, CVE-2023-41300, CVE-2022-48354, CVE-2022-44555, CVE-2023-44095, CVE-2023-52377, CVE-2022-48289, CVE-2022-48355, CVE-2024-58043, CVE-2024-56449, CVE-2023-39388, CVE-2023-41308, CVE-2023-46764, CVE-2023-39406, CVE-2023-52545, CVE-2023-52537, CVE-2023-34164, CVE-2023-52387, CVE-2024-45441, CVE-2023-52713, CVE-2023-52954, CVE-2023-52104, CVE-2023-41309, CVE-2023-44093, CVE-2023-52112, CVE-2023-44109, CVE-2023-46767, CVE-2023-3455, CVE-2023-1695, CVE-2024-56447, CVE-2023-49247, CVE-2023-39391, CVE-2023-39394, CVE-2023-41311, CVE-2022-48298, CVE-2023-52368, CVE-2023-52098, CVE-2023-46766, CVE-2024-54097, CVE-2022-48359, CVE-2023-49243, CVE-2023-52554, CVE-2023-49246, CVE-2022-48288, CVE-2023-46773, CVE-2023-46761, CVE-2024-32990, CVE-2024-51528, CVE-2024-30414, CVE-2022-48350, CVE-2023-4566, CVE-2023-6273, CVE-2023-3456, CVE-2024-54100, CVE-2023-52111, CVE-2023-52549, CVE-2024-56440, CVE-2022-48513, CVE-2024-54099, CVE-2023-41302, CVE-2023-4565, CVE-2023-37241, CVE-2024-32995, CVE-2023-39400, CVE-2024-27896, CVE-2023-39381, CVE-2023-46756, CVE-2023-39395, CVE-2023-52378, CVE-2024-45444, CVE-2024-32991, CVE-2023-46760, CVE-2023-52550, CVE-2023-41301, CVE-2023-52359, CVE-2024-36501, CVE-2023-37238, CVE-2022-48299, CVE-2022-48360, CVE-2024-45450, CVE-2023-52363, CVE-2023-44115, CVE-2023-41307, CVE-2023-44094, CVE-2023-52719, CVE-2022-48347, CVE-2024-39673, CVE-2023-52107, CVE-2023-44104, CVE-2023-39380, CVE-2024-39670, CVE-2023-46758, CVE-2022-41591, CVE-2022-48352, CVE-2023-46774, CVE-2024-32998, CVE-2023-39399, CVE-2023-52374, CVE-2023-52380, CVE-2023-41310, CVE-2023-41296, CVE-2022-48290, CVE-2022-48300, CVE-2023-39382, CVE-2023-52379, CVE-2023-7265, CVE-2023-52375, CVE-2024-51529, CVE-2022-44556, CVE-2023-46755, CVE-2022-48313, CVE-2022-44560, CVE-2024-32999, CVE-2024-57961, CVE-2023-39392, CVE-2024-47291, CVE-2023-49241, CVE-2024-30418, CVE-2023-44103, CVE-2023-52365, CVE-2023-52101, CVE-2023-1691, CVE-2023-52109, CVE-2023-44096, CVE-2023-26548, CVE-2024-45445, CVE-2024-42031, CVE-2023-49242, CVE-2022-44553, CVE-2023-37245, CVE-2023-39409, CVE-2023-52372, CVE-2023-39385, CVE-2023-41293, CVE-2024-42033, CVE-2023-7271, CVE-2023-52362, CVE-2022-44561, CVE-2024-36499, CVE-2023-39398, CVE-2023-52103, CVE-2023-52383, CVE-2023-52385, CVE-2022-48508, CVE-2023-46759, CVE-2024-39674, CVE-2023-52544, CVE-2023-46771, CVE-2023-49248, CVE-2023-52367, CVE-2024-42036, CVE-2023-44108, CVE-2023-52541, CVE-2023-52553, CVE-2024-56448, CVE-2023-52953, CVE-2023-1696, CVE-2024-36500, CVE-2022-48346, CVE-2024-42038, CVE-2024-42037, CVE-2023-44097, CVE-2024-54096, CVE-2023-52388, CVE-2023-52720, CVE-2023-52552, CVE-2024-45447, CVE-2023-52551, CVE-2023-39383, CVE-2023-41304, CVE-2023-52716, CVE-2023-52364, CVE-2024-54101, CVE-2024-45443, CVE-2023-5801, CVE-2022-48297, CVE-2023-39393, CVE-2024-47293, CVE-2023-52386, CVE-2023-26547, CVE-2023-41298, CVE-2023-26549, CVE-2023-41305, CVE-2023-44100, CVE-2023-52540, CVE-2024-42039, CVE-2023-46762, CVE-2022-48292, CVE-2022-48293, CVE-2022-44548, CVE-2024-56441, CVE-2022-48357, CVE-2023-44117, CVE-2023-44113, CVE-2022-44562, CVE-2023-46768, CVE-2023-52539, CVE-2024-32993, CVE-2023-39401, CVE-2024-36502, CVE-2023-52366, CVE-2023-44102, CVE-2023-39408, CVE-2022-41590, CVE-2023-52097, CVE-2024-32996, CVE-2024-30417, CVE-2023-39397, CVE-2023-39405, CVE-2024-27897, CVE-2024-30416, CVE-2024-47292, CVE-2023-52384, CVE-2024-47290, CVE-2023-1693, CVE-2023-52369, CVE-2023-52381, CVE-2024-42032, CVE-2023-52376, CVE-2023-44111, CVE-2024-30415, CVE-2023-52099, CVE-2022-48349, CVE-2023-39404, CVE-2024-36503, CVE-2024-47294, CVE-2023-52538, CVE-2023-46763, CVE-2024-32997, CVE-2023-37239, CVE-2023-44119, CVE-2022-48348, CVE-2022-48606, CVE-2023-39403, CVE-2022-48361, CVE-2022-48621, CVE-2022-44559, CVE-2023-1692, CVE-2024-51530, CVE-2022-48286, CVE-2023-39402, CVE-2023-41312, CVE-2023-39387, CVE-2023-44099, CVE-2022-48613, CVE-2023-41295, CVE-2023-49239, CVE-2023-52113, CVE-2024-51527, CVE-2023-52370, CVE-2022-48301, CVE-2023-52108, CVE-2021-46856, CVE-2024-57960, CVE-2023-52373, CVE-2023-52102, CVE-2023-49240, CVE-2023-52114, CVE-2023-44116, CVE-2024-45446, CVE-2023-44105, CVE-2023-39389, CVE-2023-44098, CVE-2023-41303, CVE-2023-52358, CVE-2024-54098, CVE-2024-56442, CVE-2023-44114, CVE-2023-39396, CVE-2022-48296, CVE-2023-52714, CVE-2022-48314, CVE-2023-52357, CVE-2024-32992, CVE-2023-39390, CVE-2024-42034, CVE-2023-52116, CVE-2023-44112, CVE-2022-48291, CVE-2023-46769, CVE-2024-45449, CVE-2023-44118, CVE-2023-44106, CVE-2022-48351, CVE-2023-37242, CVE-2023-39384, CVE-2023-49245, CVE-2023-39386, CVE-2023-37240, CVE-2023-52717, CVE-2023-1694
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 AGD_OPE.1, ALC_FLR.3
heuristics/extracted_versions - 3.0
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 29.01.2018
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 29.01.2020
  • id: CCEVS-VR-VID10830
  • product: ATEN Secure KVM Switch Series (models CS118xxx, CS114xxx)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10830
  • vendor: ATEN International Co., Ltd.
heuristics/protection_profiles da2e45c9b3fbb700 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf {}
pdf_data/cert_filename st_vid10830-ci.pdf nscib-cc-23-0531255-cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10830-2018: 1
  • NL:
    • CC-23-0531255: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20180208163129-05'00'
  • /ModDate: D:20180208163129-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 177858
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10830-vr.pdf nscib-cc-23-0531255-cr.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-10830-2018
    • cert_item: for ATEN Secure KVM Switch Series of Peripheral Sharing Switches
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10830-2018: 1
  • NL:
    • NSCIB-CC-0531255-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FMT:
    • FMT_MOF.1.1: 1
    • FMT_SMF: 1
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 9
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_metadata
pdf_data/st_filename st_vid10830-st.pdf nscib-cc-23-0531255-st_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 3
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 4
  • FIA:
    • FIA_UAU: 2
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID: 2
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 3
    • FMT_SMF: 2
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
    • FMT_SMR: 2
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 2
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 1
    • FPT_PHP: 4
    • FPT_PHP.1: 4
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 3
    • FTA_ATH_EXT.1: 3
    • FTA_ATH_EXT.1.1: 1
    • FTA_CIN_EXT: 3
    • FTA_CIN_EXT.1: 3
    • FTA_CIN_EXT.1.1: 1
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • O:
    • O.USER_AUTHENTICATION_TERMINATION: 2
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
  • /CreationDate: D:20180208163011-05'00'
  • /ModDate: D:20180208163011-05'00'
  • pdf_file_size_bytes: 1025426
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different