Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TrustWare 3.0 (v3.0.5)
NSCIB-CC-234008-CR
Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)
CCEVS-VR-VID-10705-2016
name TrustWare 3.0 (v3.0.5) Vertiv Secure KVM and Matrix (formerly as Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)
category Trusted Computing Other Devices and Systems
scheme NL US
not_valid_after 11.10.2024 24.03.2018
not_valid_before 11.10.2019 24.03.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-19-234008.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-234008-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TrustWare%203.0%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-st.pdf
manufacturer Samsung Electronics Co., Ltd. Vertiv
manufacturer_web https://www.samsung.com https://www.vertivco.com
security_level EAL2+, AVA_TEE.2 {}
dgst 455e10571eb0cf1c d22e3c1b13290920
heuristics/cert_id NSCIB-CC-234008-CR CCEVS-VR-VID-10705-2016
heuristics/cert_lab US
heuristics/extracted_sars ASE_INT.1, AVA_TEE.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ADV_FSP.1, ALC_CMC.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1
heuristics/extracted_versions 3.0.5, 3.0 -
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 24.03.2016
  • evaluation_facility: DXC.technology
  • expiration_date: 24.03.2019
  • id: CCEVS-VR-VID10705
  • product: Vertiv Secure KVM and Matrix (formerly Emerson Secure KVM models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10705
  • vendor: Vertiv IT Systems
heuristics/protection_profiles {} da2e45c9b3fbb700
maintenance_updates
  • maintenance_date: 19.03.2018
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10705-add2.pdf
  • maintenance_st_link: None
  • maintenance_title: Maintenance Update for Vertiv Secure KVM and Matrix Models: SC820, SC820DD, SC820H SCM120, SCM120H, SC920H, SC920D, SC920XD, SC840 ,SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC80H, SC845H, SC940H, SC945H, SC945XD, SCM145, SC1045XD, SC885, SC985, SC8165

protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf
pdf_data/cert_filename Signed certificate CC-19-234008.pdf st_vid10705-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-19-234008: 1
  • US:
    • CCEVS-VR-VID10705-2016: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20191011155832+01'00'
  • /Creator: C458-M&S
  • /ModDate: D:20191011155832+01'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S19101115580
  • pdf_file_size_bytes: 184548
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20160325131240-04'00'
  • /ModDate: D:20160325131320-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 178490
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename Certification Report NSCIB-CC-234008-CR.pdf st_vid10705-vr.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-234008-CR
    • cert_item: TrustWare 3.0 (v3.0.5
    • cert_lab: Brightsight
    • developer: Samsung Electronics Co., Ltd
  • US:
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID10705-2016
    • cert_item: Emerson Secure KVM (identified 2, 4, 8, 16 port models
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-234008-CR: 12
  • US:
    • CCEVS-VR-VID10705-2016: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.SECURE_ENVIORNMENT: 1
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_: 2
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 5
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 1
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA224: 4
      • SHA256: 2
      • SHA384: 4
      • SHA512: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 4
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
    • Reverse engineering: 1
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 22
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS #3: 1
    • PKCS#1: 4
    • PKCS5: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
    • RFC1423: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/javacard_api_const
  • curves:
    • ED25519: 1
    • X25519: 1
pdf_data/report_metadata
pdf_data/st_filename TrustWare 3.0 Security Target v1.0.pdf st_vid10705-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_TEE: 4
    • AVA_TEE.2: 17
    • AVA_VAN: 2
    • AVA_VAN.2: 4
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 2
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 21
    • FCS_COP.1.1: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 28
    • FDP_ACC.1: 8
    • FDP_ACF: 24
    • FDP_ACF.1: 11
    • FDP_IFC: 17
    • FDP_IFC.1: 5
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 7
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ITT: 9
    • FDP_ITT.1: 2
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_ROL: 8
    • FDP_ROL.1: 3
    • FDP_SDI.2: 17
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 47
    • FMT_MSA.1: 4
    • FMT_MSA.3: 9
    • FMT_SMF: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_INI: 3
    • FPT_INI.1: 12
    • FPT_INI.1.1: 2
    • FPT_INI.1.2: 2
    • FPT_INI.1.3: 2
    • FPT_ITT: 11
    • FPT_ITT.1: 1
    • FPT_STM: 1
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 79
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 85
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 13
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROTECTION_AFTER_DELIVERY: 5
    • A.ROLLBACK: 5
    • A.SECURE_INITIALISATION: 1
    • A.SECURE_INITIALIZATION: 4
    • A.SECURE_PLATFORM: 6
    • A.TA_DEVELOPMENT: 5
  • O:
    • O.CA_TA_IDENTIFICATION: 8
    • O.INITIALIZATION: 22
    • O.INSTANCE_TIME: 1
    • O.KEYS_USAGE: 16
    • O.OPERATION: 24
    • O.RNG: 10
    • O.RUNTIME_CONFIDENTIALITY: 21
    • O.RUNTIME_INTEGRITY: 24
    • O.TA_AUTHENTICITY: 15
    • O.TA_ISOLATION: 14
    • O.TEE_DATA_PROTECTION: 18
    • O.TEE_ID: 9
    • O.TEE_ISOLATION: 15
    • O.TRUSTED_STORAGE: 23
  • OE:
    • OE.INITALIZATION: 1
    • OE.INITIALIZATION: 24
    • OE.INSTANCE_TIME: 3
    • OE.INTEGRATION_CONFIGURATION: 9
    • OE.PROTECTION_AFTER_DELIVERY: 9
    • OE.ROLLBACK: 7
    • OE.SECRETS: 5
    • OE.SECURE_HARDWARE_PLATFORM: 1
    • OE.SECURE_PLATFORM: 20
    • OE.TA_DEVELOPMENT: 7
  • OP:
    • OP.EXTRACT_KEY: 4
    • OP.LOAD: 3
    • OP.STORE: 4
    • OP.USE_KEY: 4
  • OSP:
    • OSP.INTEGRATION_CONFIGURATION: 5
    • OSP.SECRETS: 5
  • T:
    • T.ABUSE_FUNCT: 14
    • T.CLONE: 9
    • T.FLASH_DUMP: 4
    • T.IMPERSONATION: 6
    • T.PERTURBATION: 7
    • T.RAM: 8
    • T.RNG: 5
    • T.ROGUE_CODE_EXECUTION: 12
    • T.SPY: 6
    • T.STORAGE_CORRUPTION: 9
    • T.TEE_FIRMWARE_DOWNGRADE: 5
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 11
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 2
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 9
    • O.PERIPHERAL_PORTS_ISOLATION: 12
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 9
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 8
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 7
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA-256: 1
      • SHA224: 4
      • SHA256: 2
      • SHA384: 4
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 37
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side-channel: 3
    • side-channels: 1
  • FI:
    • physical tampering: 14
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 5
  • other:
    • TEE: 349
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS #3: 1
    • PKCS#1: 4
    • PKCS5: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
    • RFC1423: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/javacard_api_const
  • curves:
    • ED25519: 1
    • X25519: 1
pdf_data/st_metadata
  • /Author: brightsight
  • /CreationDate: D:20190906104654+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190906104654+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1398540
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different