Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
OCSI/CERT/ATS/10/2020/RC
Athena IDProtect Duo v5 avec application IASECC en configuration ICAO BAC sur composant AT90SC28880RCFV
ANSSI-CC-2013/36
name Huawei Mate 40 Pro (M40 pro) with EMUI 11.0 Athena IDProtect Duo v5 avec application IASECC en configuration ICAO BAC sur composant AT90SC28880RCFV
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IT FR
status active archived
not_valid_after 20.01.2027 01.09.2019
not_valid_before 20.01.2022 11.06.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_m40_emui11_v1.0_en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-36fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_m40_emui11_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-36en.pdf
manufacturer Huawei Device Co., Ltd. Athena Smartcard Solutions Inc. / Inside Secure S.A.
manufacturer_web https://www.huawei.com/ https://www.athena-scs.com/
security_level {} ADV_TDS.4, ATE_DPT.3, ADV_FSP.5, EAL4+, ALC_CMS.5, ADV_INT.2, ALC_TAT.2, ALC_DVS.2
dgst 4646e2bd9bf0b59d a511de6c91b6af95
heuristics/cert_id OCSI/CERT/ATS/10/2020/RC ANSSI-CC-2013/36
heuristics/cert_lab [] THALES
heuristics/cpe_matches cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2021-22445, CVE-2021-22404, CVE-2021-40044, CVE-2021-40039, CVE-2023-52107, CVE-2020-9146, CVE-2021-39973, CVE-2021-40016, CVE-2021-22323, CVE-2021-22433, CVE-2022-38978, CVE-2023-52116, CVE-2021-46789, CVE-2021-36996, CVE-2021-22325, CVE-2023-39400, CVE-2023-46758, CVE-2021-22352, CVE-2022-48302, CVE-2023-39395, CVE-2023-26548, CVE-2023-41310, CVE-2021-22319, CVE-2021-22347, CVE-2022-39003, CVE-2023-44104, CVE-2021-37119, CVE-2021-22473, CVE-2021-39993, CVE-2021-37020, CVE-2023-39399, CVE-2021-22386, CVE-2021-22381, CVE-2021-39998, CVE-2021-22346, CVE-2021-37069, CVE-2022-31760, CVE-2022-48494, CVE-2023-31225, CVE-2021-40053, CVE-2023-52112, CVE-2021-37044, CVE-2021-22350, CVE-2022-37004, CVE-2023-44105, CVE-2021-22407, CVE-2021-37030, CVE-2021-22428, CVE-2023-44093, CVE-2021-37110, CVE-2021-37040, CVE-2021-40037, CVE-2021-40009, CVE-2023-52113, CVE-2022-37002, CVE-2021-46884, CVE-2020-9158, CVE-2022-38979, CVE-2023-39409, CVE-2023-1692, CVE-2021-46741, CVE-2022-48287, CVE-2023-46759, CVE-2022-31762, CVE-2021-22436, CVE-2022-44563, CVE-2022-46312, CVE-2023-46763, CVE-2021-22431, CVE-2021-22447, CVE-2022-41597, CVE-2023-34156, CVE-2023-39402, CVE-2021-22434, CVE-2021-36998, CVE-2021-37050, CVE-2022-48346, CVE-2022-39004, CVE-2021-22324, CVE-2021-40050, CVE-2021-46742, CVE-2022-46321, CVE-2022-41581, CVE-2023-52102, CVE-2021-22412, CVE-2021-40061, CVE-2021-36993, CVE-2021-37074, CVE-2021-22333, CVE-2023-49246, CVE-2022-44553, CVE-2020-9147, CVE-2023-4565, CVE-2022-39006, CVE-2021-46839, CVE-2022-31757, CVE-2021-22403, CVE-2023-34167, CVE-2022-41592, CVE-2021-46885, CVE-2021-46883, CVE-2021-37046, CVE-2020-9139, CVE-2023-1691, CVE-2023-44112, CVE-2022-48517, CVE-2022-48507, CVE-2022-44549, CVE-2021-40026, CVE-2022-31753, CVE-2022-46761, CVE-2023-34163, CVE-2021-22429, CVE-2021-40048, CVE-2023-44103, CVE-2022-31761, CVE-2022-41588, CVE-2021-22351, CVE-2023-46772, CVE-2021-46840, CVE-2021-40030, CVE-2021-22317, CVE-2022-31759, CVE-2021-36997, CVE-2021-22345, CVE-2021-22444, CVE-2021-22485, CVE-2022-48491, CVE-2021-22373, CVE-2021-37117, CVE-2022-41603, CVE-2021-22387, CVE-2021-22316, CVE-2022-41598, CVE-2021-22375, CVE-2021-37037, CVE-2021-46886, CVE-2021-22406, CVE-2022-34740, CVE-2023-41300, CVE-2021-22491, CVE-2021-37093, CVE-2021-22405, CVE-2022-39000, CVE-2023-44100, CVE-2022-46320, CVE-2021-22474, CVE-2021-40055, CVE-2022-46318, CVE-2023-1694, CVE-2021-37002, CVE-2022-48349, CVE-2021-37031, CVE-2020-9149, CVE-2022-41576, CVE-2021-22426, CVE-2021-40045, CVE-2023-49245, CVE-2021-40063, CVE-2022-41593, CVE-2022-22257, CVE-2021-22374, CVE-2021-22370, CVE-2022-41587, CVE-2023-1696, CVE-2022-44550, CVE-2023-49242, CVE-2021-22353, CVE-2022-48513, CVE-2021-22475, CVE-2023-49248, CVE-2021-36991, CVE-2021-22379, CVE-2021-39969, CVE-2021-22481, CVE-2021-46811, CVE-2022-46317, CVE-2021-40034, CVE-2022-47974, CVE-2021-22487, CVE-2022-39005, CVE-2022-41594, CVE-2021-22389, CVE-2022-39002, CVE-2022-44557, CVE-2021-37039, CVE-2021-37033, CVE-2022-37005, CVE-2023-46765, CVE-2023-44098, CVE-2021-37049, CVE-2021-37052, CVE-2023-44118, CVE-2021-37043, CVE-2021-22337, CVE-2021-36985, CVE-2021-22394, CVE-2021-37021, CVE-2021-40031, CVE-2021-40017, CVE-2021-46786, CVE-2023-44119, CVE-2022-41599, CVE-2021-37034, CVE-2023-52114, CVE-2023-46774, CVE-2023-49241, CVE-2021-46881, CVE-2022-46319, CVE-2021-37051, CVE-2022-44552, CVE-2021-37114, CVE-2023-39391, CVE-2021-22401, CVE-2021-46787, CVE-2021-36986, CVE-2021-40051, CVE-2020-9142, CVE-2022-48508, CVE-2021-40013, CVE-2021-40049, CVE-2021-37032, CVE-2022-37007, CVE-2021-36992, CVE-2021-37047, CVE-2022-31756, CVE-2021-22472, CVE-2021-22390, CVE-2021-22385, CVE-2021-40010, CVE-2023-52101, CVE-2021-22344, CVE-2021-22427, CVE-2021-22490, CVE-2022-41596, CVE-2022-44559, CVE-2023-39408, CVE-2023-39387, CVE-2021-22392, CVE-2022-22252, CVE-2023-34166, CVE-2022-48300, CVE-2023-26547, CVE-2021-37042, CVE-2021-36989, CVE-2020-9148, CVE-2021-40040, CVE-2023-52098, CVE-2022-48606, CVE-2022-41586, CVE-2022-41578, CVE-2021-22388, CVE-2022-41585, CVE-2021-22372, CVE-2021-40035, CVE-2023-34161, CVE-2022-44560, CVE-2021-40064, CVE-2021-36994, CVE-2022-34743, CVE-2022-41601, CVE-2022-41602, CVE-2021-46813, CVE-2021-37055, CVE-2023-49240, CVE-2023-6273, CVE-2022-41595, CVE-2021-22482, CVE-2021-22335, CVE-2023-44106, CVE-2021-22448, CVE-2022-38997, CVE-2021-22349, CVE-2021-46887, CVE-2022-34742, CVE-2023-49239, CVE-2021-22443, CVE-2021-22435, CVE-2023-49243, CVE-2021-22391, CVE-2023-52099, CVE-2021-40029, CVE-2021-22402, CVE-2021-22371, CVE-2021-36987, CVE-2021-37029, CVE-2021-22486, CVE-2021-22384, CVE-2022-48359, CVE-2021-22446, CVE-2021-40054, CVE-2023-39381, CVE-2023-39389, CVE-2021-39966, CVE-2022-34737, CVE-2022-34738, CVE-2021-37097, CVE-2023-44116, CVE-2022-48291, CVE-2021-22308, CVE-2021-36999, CVE-2021-37053, CVE-2022-41600, CVE-2022-48357, CVE-2022-48314, CVE-2020-36600, CVE-2021-37001, CVE-2023-52108, CVE-2020-9144, CVE-2021-46814, CVE-2022-34735, CVE-2021-22348, CVE-2022-34741, CVE-2021-22432, CVE-2022-41584, CVE-2022-31752, CVE-2021-22334, CVE-2022-37008, CVE-2023-39382, CVE-2022-44561, CVE-2022-37003, CVE-2023-39383, CVE-2023-26549, CVE-2022-48294, CVE-2023-39401, CVE-2021-22442, CVE-2023-41305, CVE-2022-31758, CVE-2022-48515, CVE-2021-40047, CVE-2022-48292, CVE-2021-39996, CVE-2021-37027, CVE-2022-48516, CVE-2022-44558, CVE-2023-39388, CVE-2021-40038, CVE-2023-39398, CVE-2022-38983, CVE-2021-22438, CVE-2023-39403, CVE-2020-9140, CVE-2021-22354, CVE-2022-41582, CVE-2022-22258, CVE-2022-39001, CVE-2021-22488, CVE-2021-22415, CVE-2022-48480, CVE-2022-48301, CVE-2022-48496, CVE-2022-48296, CVE-2021-37111, CVE-2021-46882, CVE-2021-22369, CVE-2021-40020, CVE-2021-46788, CVE-2023-46764, CVE-2021-40059, CVE-2023-1693, CVE-2021-40012, CVE-2022-48293, CVE-2021-36990, CVE-2021-37041, CVE-2021-40065, CVE-2022-48286, CVE-2021-37035, CVE-2022-31755, CVE-2021-36988, CVE-2021-40015, CVE-2023-41296, CVE-2021-22430, CVE-2022-22256, CVE-2021-22395, CVE-2022-34736, CVE-2021-22367, CVE-2022-44562, CVE-2022-48295, CVE-2022-22254, CVE-2021-22343, CVE-2021-22313, CVE-2022-22253, CVE-2023-39405, CVE-2021-40052, CVE-2022-44551, CVE-2022-41580, CVE-2022-44555, CVE-2022-48488, CVE-2021-36995, CVE-2022-31751, CVE-2022-44548, CVE-2021-22336, CVE-2023-46756, CVE-2021-22322, CVE-2022-34739, CVE-2022-41591, CVE-2021-22483, CVE-2021-37103, CVE-2023-1695, CVE-2021-40011 {}
heuristics/extracted_sars ALC_TSU_EXT.1, AGD_OPE.1, AGD_PRE.1, ASE_OBJ.1, ATE_IND.1, ASE_ECD.1, AVA_VAN.1, ASE_CCL.1, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ASE_REQ.1 ALC_CMS.5, AGD_OPE.1, ALC_TAT.2, ASE_ECD.1, ADV_TDS.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, AVA_VAN.4, ASE_SPD.1, ADV_INT.2, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_DPT.3, ATE_IND.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, ALC_DVS.2, ADV_FSP.5, ALC_CMC.4, AGD_PRE.1
heuristics/extracted_versions 11.0 -
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/22
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2012/22
heuristics/scheme_data
  • certification_date: 20.01.2022
  • level: conforme a PP_MD_V3.1
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/huawei/cr_huawei_m40_emui11_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/huawei/rc_huawei_m40_emui11_v1.0_it.pdf
  • supplier: Huawei Device Co., Ltd.
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/huawei/st_huawei_m40_emui11_v1.0.pdf
  • title: Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2014/79, ANSSI-CC-2014/78
heuristics/st_references/directly_referencing {} ANSSI-CC-2012/22
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2014/79, ANSSI-CC-2014/78
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2012/22
heuristics/protection_profiles c88af12926be2779, df09b703c88c665a 60455fc9564e2545
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/report_filename cr_huawei_m40_emui11_v1.0_en.pdf ANSSI-CC_2013-36fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmenté ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2013/36
    • cert_item: Athena IDProtect Duo v5 avec application IASECC en configuration ICAO BAC sur composant AT90SC28880RCFV
    • cert_item_version: - Athena IDProtect Duo v5 : release date 1245, correctif P2, release level 0002 - Athena IASECC applet : version 4, correctif F2, build 10 - Inside Secure AT90SC28880RCFV Microcontroller : AT59U05, révision I - Inside Secure Toolbox version: 00.03.12.00
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: Athena Smartcard Solutions Inc. 20380 Town Center Lane – Suite 240 Cupertino CA95014 United States of America Inside Secure S.A. Maxwell Building - Scottish Enterprise technology Park, East Kilbride, G75 0QR, Scotland, United Kingdom Commanditaire Athena Smartcard Solutions Inc. 1-14-16, Motoyokoyama-cho Hachioji-shi, Tokyo, 192-0063, Japan
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-CC-PP-0055-2009, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/ATS/10/2020/RC: 25
  • FR:
    • ANSSI-2012/22-M01: 1
    • ANSSI-CC-2012/22: 1
    • ANSSI-CC-2013/36: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 2
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 3
    • ASE_REQ.1: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_FSP.5: 2
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_INT.2: 2
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.3: 2
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.3: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 17
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ICAO:
    • ICAO: 35
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20220120071420+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20220120071420+00'00'
  • /Title: Certification Report "Huawei Mate 40 Pro (M40 pro) with EMUI 11.0"
  • pdf_file_size_bytes: 469187
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /CreationDate: D:20130611131615+02'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20130711135150+02'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 252728
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_huawei_m40_emui11_v1.0.pdf ANSSI-CC-cible_2013-36en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/22: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP0055: 1
    • BSI-CC-PP0056: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
  • EAL:
    • EAL 4: 19
    • EAL 4 augmented: 3
    • EAL 4+: 3
    • EAL 5+: 4
    • EAL4: 7
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_FSP.5: 6
    • ADV_IMP.1: 5
    • ADV_INT.2: 5
    • ADV_TDS.1: 1
    • ADV_TDS.3: 2
    • ADV_TDS.4: 6
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 5
    • ALC_DEL.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
    • ALC_TAT.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_DPT.3: 5
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 2
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 2
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 3
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 2
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 3
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 15
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 2
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 2
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 12
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 5
    • FIA_BMG_EXT.1.1: 5
    • FIA_BMG_EXT.1.2: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 2
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 2
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.1: 2
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 2
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 2
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 2
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 2
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 9
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 2
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC_EXT: 9
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 8
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 1
    • FCS_COP: 16
    • FCS_COP.1: 7
    • FCS_RND: 8
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 2
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 4
    • FDP_UCT.1: 5
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 4
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 7
    • FIA_API.1: 9
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 4
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 4
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MTD: 8
    • FMT_MTD.1: 6
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 3
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED: 1
  • OT:
    • OT.CCLI_END: 1
    • OT.PATCH_END: 1
    • OT.PATCH_SEC: 1
  • T:
    • T.MOD_SOFT: 1
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 120
  • Thales:
    • Thales: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 22
      • AES-: 2
      • AES-128: 1
      • AES-256: 7
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
  • DES:
    • 3DES:
      • TDES: 21
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 6
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 7
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 6
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 9
  • PRNG:
    • DRBG: 2
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 25
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 2
  • SCA:
    • DPA: 2
    • SPA: 2
    • Timing attacks: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 7
  • other:
    • TEE: 13
  • IBM:
    • SSC: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 11
    • EF.DG1: 25
    • EF.DG13: 3
    • EF.DG14: 2
    • EF.DG15: 4
    • EF.DG16: 25
    • EF.DG2: 10
    • EF.DG3: 9
    • EF.DG4: 8
    • EF.DG5: 8
    • EF.SOD: 11
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
  • ISO:
    • ISO/IEC 29147:2018: 1
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38A: 3
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 186-4: 1
    • SP 800-108: 2
    • SP 800-132: 2
    • SP 800-38F: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 5216: 1
    • RFC 5246: 2
    • RFC 5280: 5
    • RFC 5289: 12
    • RFC 5759: 2
    • RFC 6125: 1
    • RFC5246: 2
  • X509:
    • X.509: 7
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 140-2: 4
    • FIPS 180-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 84
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-2: 3
  • RFC:
    • RFC3369: 1
  • SCP:
    • SCP01: 2
    • SCP02: 2
    • SCP03: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.2.2: 2
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • ECDSA:
      • ALG_ECDSA_SHA: 1
      • ALG_ECDSA_SHA256: 1
      • ALG_ECDSA_SHA_224: 1
    • RSA:
      • ALG_RSA_NOPAD: 1
      • ALG_RSA_PCKS1: 1
      • ALG_RSA_SHA256_PKCS1: 1
      • ALG_RSA_SHA256_PKCS1_PSS: 1
      • ALG_RSA_SHA_ISO9796: 1
      • ALG_RSA_SHA_PKCS1: 1
      • ALG_RSA_SHA_PKCS1_PSS: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20220118130640Z00'00'
  • /Creator: Word
  • /ModDate: D:20220118130640Z00'00'
  • /Producer: macOS Version 11.6.1 (Build 20G224) Quartz PDFContext
  • /Title: Microsoft Word - Huawei EMUI 11.0 M40 Pro_MDFPP31_ST v1.0.docx
  • pdf_file_size_bytes: 1739846
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
  • /CreationDate: D:20120828164424-07'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130711135152+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title:
  • pdf_file_size_bytes: 1261965
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different