Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin F1DN104KVM-UNN4, F1DN204KVM-UNN4, F1DN102KVM-UNN4, F1DN202KVM-UNN4 Firmware Version 44404-E7E7 Peripheral Sharing Devices
533-EWA
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
name Belkin F1DN104KVM-UNN4, F1DN204KVM-UNN4, F1DN102KVM-UNN4, F1DN202KVM-UNN4 Firmware Version 44404-E7E7 Peripheral Sharing Devices HarmonyOS 3.0 on Huawei MatePad Pro
category Other Devices and Systems Mobility
scheme CA NL
not_valid_after 08.07.2026 19.12.2028
not_valid_before 08.07.2021 19.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/533-EWA%20CT%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/533-EWA%20CR%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Belkin_CFG_PSD-AO-KM-VI_ST_1.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf
manufacturer Belkin International, Inc. Huawei Device Co., Ltd.
manufacturer_web https://www.belkin.com https://www.huawei.com/
security_level {} EAL2+, ALC_FLR.3
dgst 441afa9dfe09aa74 c85f7e09316c6900
heuristics/cert_id 533-EWA NSCIB-CC-0531255-CR
heuristics/cert_lab CANADA
heuristics/cpe_matches {} cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-39398, CVE-2023-39396, CVE-2022-48508, CVE-2023-52101, CVE-2023-39406, CVE-2023-1692, CVE-2023-1696, CVE-2023-49243, CVE-2024-36500, CVE-2023-52363, CVE-2022-44557, CVE-2022-48288, CVE-2023-52539, CVE-2024-57961, CVE-2023-39390, CVE-2023-52358, CVE-2023-39405, CVE-2023-52716, CVE-2022-48292, CVE-2023-39381, CVE-2023-41298, CVE-2023-39383, CVE-2023-46766, CVE-2022-48350, CVE-2023-49242, CVE-2023-44105, CVE-2023-52383, CVE-2023-44093, CVE-2022-44560, CVE-2022-48298, CVE-2023-46773, CVE-2024-47291, CVE-2024-45447, CVE-2023-46770, CVE-2023-44115, CVE-2023-52370, CVE-2024-32992, CVE-2024-36503, CVE-2024-47290, CVE-2023-52388, CVE-2023-49239, CVE-2023-52372, CVE-2022-44562, CVE-2023-52550, CVE-2022-41591, CVE-2023-49245, CVE-2023-52541, CVE-2023-46765, CVE-2022-48289, CVE-2023-4565, CVE-2024-47292, CVE-2024-47294, CVE-2023-49240, CVE-2024-32993, CVE-2023-52369, CVE-2023-39402, CVE-2023-41307, CVE-2024-54097, CVE-2023-52385, CVE-2023-52098, CVE-2022-48606, CVE-2023-52386, CVE-2023-49247, CVE-2024-56441, CVE-2023-52717, CVE-2022-44561, CVE-2023-37239, CVE-2023-52713, CVE-2023-46760, CVE-2022-48302, CVE-2024-54101, CVE-2024-32997, CVE-2023-39384, CVE-2023-52537, CVE-2023-41295, CVE-2021-46856, CVE-2023-44119, CVE-2024-32991, CVE-2023-6273, CVE-2024-36502, CVE-2023-44096, CVE-2022-48300, CVE-2022-48352, CVE-2022-44548, CVE-2023-39391, CVE-2023-52379, CVE-2022-48293, CVE-2022-48361, CVE-2024-42033, CVE-2024-54096, CVE-2022-48314, CVE-2023-44102, CVE-2022-44556, CVE-2023-52387, CVE-2023-52378, CVE-2024-27896, CVE-2024-56448, CVE-2023-41304, CVE-2023-39393, CVE-2023-52542, CVE-2024-42036, CVE-2023-41309, CVE-2022-48621, CVE-2023-52545, CVE-2023-52955, CVE-2023-44113, CVE-2024-56447, CVE-2023-46769, CVE-2023-52376, CVE-2023-52377, CVE-2024-27897, CVE-2022-48513, CVE-2024-36501, CVE-2022-48357, CVE-2023-46768, CVE-2023-26548, CVE-2024-56440, CVE-2023-39408, CVE-2023-52107, CVE-2022-48296, CVE-2023-26549, CVE-2023-46755, CVE-2023-52362, CVE-2023-46756, CVE-2024-30415, CVE-2023-52380, CVE-2023-52374, CVE-2023-52375, CVE-2024-56449, CVE-2024-45444, CVE-2022-48290, CVE-2023-46762, CVE-2022-48351, CVE-2023-52373, CVE-2023-41311, CVE-2024-36499, CVE-2022-48286, CVE-2024-32990, CVE-2023-37241, CVE-2022-48360, CVE-2022-48313, CVE-2023-52108, CVE-2022-48347, CVE-2023-52114, CVE-2024-30418, CVE-2024-39670, CVE-2023-44117, CVE-2023-52549, CVE-2024-51530, CVE-2023-39387, CVE-2023-52112, CVE-2023-52720, CVE-2023-52540, CVE-2022-48346, CVE-2023-37238, CVE-2023-39401, CVE-2024-42038, CVE-2023-52103, CVE-2025-31175, CVE-2023-46767, CVE-2024-45450, CVE-2023-52384, CVE-2023-41293, CVE-2023-37240, CVE-2023-52366, CVE-2024-42037, CVE-2023-52359, CVE-2023-52097, CVE-2024-51529, CVE-2023-39404, CVE-2023-41305, CVE-2024-42031, CVE-2023-49244, CVE-2023-46771, CVE-2023-1695, CVE-2024-30417, CVE-2023-44098, CVE-2023-44106, CVE-2023-52109, CVE-2024-56442, CVE-2022-44555, CVE-2023-41302, CVE-2023-37245, CVE-2023-39400, CVE-2023-46759, CVE-2024-45449, CVE-2024-54099, CVE-2023-44112, CVE-2023-39386, CVE-2023-52113, CVE-2023-52552, CVE-2023-52365, CVE-2023-39389, CVE-2023-39382, CVE-2023-41301, CVE-2024-45443, CVE-2023-44108, CVE-2023-39399, CVE-2023-39388, CVE-2023-44100, CVE-2022-48613, CVE-2023-44103, CVE-2022-48299, CVE-2023-41308, CVE-2023-46764, CVE-2023-49248, CVE-2023-39397, CVE-2023-7265, CVE-2023-41310, CVE-2024-30414, CVE-2024-51527, CVE-2023-52099, CVE-2023-52553, CVE-2023-46763, CVE-2023-39394, CVE-2023-39409, CVE-2024-32998, CVE-2024-39674, CVE-2022-48355, CVE-2023-52104, CVE-2022-48349, CVE-2023-5801, CVE-2023-1693, CVE-2023-52543, CVE-2024-54100, CVE-2023-44104, CVE-2023-44097, CVE-2024-57960, CVE-2024-32999, CVE-2024-58043, CVE-2022-48358, CVE-2023-52953, CVE-2023-41303, CVE-2023-52381, CVE-2023-41300, CVE-2023-52954, CVE-2023-52714, CVE-2023-4566, CVE-2023-49246, CVE-2023-37242, CVE-2022-48291, CVE-2024-51528, CVE-2022-48301, CVE-2024-42032, CVE-2024-32996, CVE-2022-48354, CVE-2023-41312, CVE-2023-41296, CVE-2024-45446, CVE-2023-44095, CVE-2023-52102, CVE-2022-44559, CVE-2022-41590, CVE-2023-44116, CVE-2023-52554, CVE-2024-42034, CVE-2023-3456, CVE-2023-39380, CVE-2023-52364, CVE-2023-39385, CVE-2023-52116, CVE-2023-49241, CVE-2023-7271, CVE-2024-32995, CVE-2023-3455, CVE-2024-54098, CVE-2023-44094, CVE-2024-45445, CVE-2022-48359, CVE-2022-44553, CVE-2023-1694, CVE-2023-52544, CVE-2023-52551, CVE-2022-48348, CVE-2023-44114, CVE-2023-44118, CVE-2023-1691, CVE-2024-47293, CVE-2023-26547, CVE-2023-34164, CVE-2023-39395, CVE-2023-41299, CVE-2023-52719, CVE-2023-39403, CVE-2022-48297, CVE-2024-42039, CVE-2023-52368, CVE-2023-46758, CVE-2023-44099, CVE-2023-52111, CVE-2023-46774, CVE-2023-44111, CVE-2024-30416, CVE-2024-45441, CVE-2023-44109, CVE-2023-52538, CVE-2023-39392, CVE-2024-39673, CVE-2023-52357, CVE-2023-44110, CVE-2023-46761, CVE-2023-52367
heuristics/extracted_sars ASE_TSS.1, ASE_ECD.1, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, AGD_OPE.1, ASE_OBJ.2, ALC_CMS.1, ATE_IND.1, ADV_FSP.1, ASE_CCL.1, ASE_INT.1, ASE_SPD.1, ASE_REQ.2 ALC_FLR.3, AGD_OPE.1
heuristics/extracted_versions 44404 3.0
heuristics/scheme_data
  • certification_date: 08.07.2021
  • level: PP_PSD_v4.0, MOD_AO_V1.0, MOD_KM_V1.0, MOD_VI_V1.0
  • product: Belkin F1DN104KVM-UNN4, F1DN204KVM-UNN4, F1DN102KVM-UNN4, F1DN202KVM-UNN4 Firmware Version 44404-E7E7 Peripheral Sharing Devices Belkin F1DN104KVM-UNN4, F1DN204KVM-UNN4, F1DN102KVM-UNN4, F1DN202KVM-UNN4, F1DN104KVM-HA-4, F1DN204KVM-HA-4, F1DN102KVM-HA-4, F1DN202KVM-HA-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices (April 2023)
  • vendor: Belkin International, Inc.
heuristics/protection_profiles 814f66c77bc7f33b, 76f8f05a35d87f59, 42cf355b24450489, 9d5c0dd877473e05 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ao_v1.0.pdf {}
pdf_data/cert_filename 533-EWA CT v1.0.pdf nscib-cc-23-0531255-cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 533-EWA: 1
  • NL:
    • CC-23-0531255: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20210712111402-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1643902
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 533-EWA CR v1.1.pdf nscib-cc-23-0531255-cr.pdf
pdf_data/report_frontpage
  • NL:
  • CA:
    • cert_id: 533-EWA
    • cert_lab: CANADA
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 533-EWA: 1
  • NL:
    • NSCIB-CC-0531255-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_metadata
pdf_data/st_filename Belkin_CFG_PSD-AO-KM-VI_ST_1.9.pdf nscib-cc-23-0531255-st_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_AFL_EXT: 4
    • FDP_AFL_EXT.1: 10
    • FDP_AFL_EXT.1.1: 2
    • FDP_APC_EXT: 36
    • FDP_APC_EXT.1: 22
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_CDS_EXT: 4
    • FDP_CDS_EXT.1: 17
    • FDP_CDS_EXT.1.1: 3
    • FDP_FIL_EXT: 16
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_IPC_EXT: 4
    • FDP_IPC_EXT.1: 10
    • FDP_IPC_EXT.1.1: 2
    • FDP_IPC_EXT.1.2: 2
    • FDP_PDC_EXT: 41
    • FDP_PDC_EXT.1: 39
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 11
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 12
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_PUD_EXT: 4
    • FDP_PUD_EXT.1: 14
    • FDP_PUD_EXT.1.1: 2
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 14
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP: 5
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 10
    • FDP_RIP_EXT.1.1: 2
    • FDP_SPR_EXT: 18
    • FDP_SPR_EXT.1: 6
    • FDP_SPR_EXT.1.1: 1
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 13
    • FDP_SWI_EXT.1.1: 2
    • FDP_SWI_EXT.2: 10
    • FDP_SWI_EXT.2.1: 2
    • FDP_SWI_EXT.2.2: 2
    • FDP_SWI_EXT.3: 15
    • FDP_SWI_EXT.3.1: 2
    • FDP_UDF_EXT: 22
    • FDP_UDF_EXT.1: 7
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 11
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 10
    • FPT_TST_EXT.1.1: 2
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 2
    • FTA_CIN_EXT.1.2: 3
    • FTA_CIN_EXT.1.3: 2
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO: 1
    • A.NO_MICROPHONES: 1
    • A.NO_PHYSICAL: 1
    • A.NO_SPECIAL: 1
    • A.NO_SPECIAL_ANALOG: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.COMPUTER_TO: 2
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.PROTECTED: 1
    • O.PROTECTED_EDID: 3
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 11
    • O.UNIDIRECTIONAL_AUDIO_OUT: 3
    • O.USER_DATA: 2
  • OE:
    • OE.NO: 1
    • OE.NO_MICROPHONES: 1
    • OE.NO_SPECIAL: 1
    • OE.NO_SPECIAL_ANALOG: 1
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.AUDIO_REVERSED: 2
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 2
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 1
    • physical tampering: 6
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 4
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different