Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MX-FR22 Version:C.10
JISEC-CC-CRP-C0281
Huawei Mobile Devices (P40 series) with EMUI 11.0
OCSI/CERT/ATS/06/2020/RC
name MX-FR22 Version:C.10 Huawei Mobile Devices (P40 series) with EMUI 11.0
category Other Devices and Systems Mobility
scheme JP IT
status archived active
not_valid_after 01.02.2016 27.10.2026
not_valid_before 28.01.2011 27.10.2021
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0281_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_p40_emui11_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0281_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_p40_emui11_v1.11.pdf
manufacturer Sharp Corporation Huawei Device Co., Ltd.
manufacturer_web https://sharp-world.com/ https://www.huawei.com/
security_level EAL3 {}
dgst 4fbf34a09f38882f ba3faf4e8ec21084
heuristics/cert_id JISEC-CC-CRP-C0281 OCSI/CERT/ATS/06/2020/RC
heuristics/cpe_matches {} cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-40012, CVE-2021-37069, CVE-2022-41597, CVE-2022-34742, CVE-2022-44559, CVE-2023-6273, CVE-2021-37033, CVE-2021-22322, CVE-2021-22373, CVE-2021-46789, CVE-2021-40039, CVE-2021-22308, CVE-2021-37020, CVE-2022-31758, CVE-2021-22475, CVE-2022-48300, CVE-2021-40026, CVE-2021-22438, CVE-2021-40029, CVE-2022-37007, CVE-2021-40053, CVE-2021-40050, CVE-2022-41593, CVE-2022-38978, CVE-2023-41310, CVE-2021-22374, CVE-2021-46885, CVE-2021-22337, CVE-2020-9146, CVE-2021-22394, CVE-2021-37032, CVE-2023-46772, CVE-2021-22474, CVE-2020-9144, CVE-2023-39388, CVE-2022-41582, CVE-2021-22487, CVE-2023-39403, CVE-2021-22448, CVE-2021-22345, CVE-2022-44549, CVE-2022-31751, CVE-2023-44112, CVE-2022-48292, CVE-2022-38983, CVE-2021-22323, CVE-2021-22490, CVE-2023-46765, CVE-2023-1691, CVE-2021-22392, CVE-2021-22430, CVE-2021-36991, CVE-2023-52107, CVE-2023-34156, CVE-2021-40059, CVE-2021-22386, CVE-2021-46884, CVE-2021-36988, CVE-2021-22427, CVE-2022-44548, CVE-2022-48507, CVE-2021-37035, CVE-2022-41578, CVE-2022-31760, CVE-2023-26549, CVE-2021-37093, CVE-2021-46814, CVE-2021-40045, CVE-2021-22407, CVE-2022-48606, CVE-2023-52114, CVE-2021-22352, CVE-2021-22385, CVE-2021-37041, CVE-2021-46787, CVE-2022-48291, CVE-2023-39383, CVE-2020-9140, CVE-2021-37040, CVE-2021-40038, CVE-2022-37004, CVE-2023-44104, CVE-2022-41596, CVE-2023-31225, CVE-2022-39003, CVE-2021-22388, CVE-2021-22343, CVE-2021-22384, CVE-2022-34736, CVE-2021-37052, CVE-2021-40020, CVE-2021-22351, CVE-2023-39382, CVE-2021-22334, CVE-2021-22445, CVE-2021-40015, CVE-2021-40040, CVE-2022-22257, CVE-2021-37049, CVE-2022-41592, CVE-2022-44557, CVE-2021-22333, CVE-2021-40049, CVE-2023-52113, CVE-2022-44561, CVE-2021-37043, CVE-2021-39993, CVE-2021-40052, CVE-2021-37074, CVE-2021-36992, CVE-2021-40044, CVE-2022-48314, CVE-2021-37042, CVE-2021-46886, CVE-2021-22369, CVE-2022-34741, CVE-2021-22485, CVE-2021-39966, CVE-2021-40061, CVE-2022-37002, CVE-2021-46882, CVE-2022-41585, CVE-2022-22254, CVE-2021-22404, CVE-2021-39969, CVE-2021-22350, CVE-2023-1693, CVE-2022-38997, CVE-2022-48293, CVE-2022-48287, CVE-2021-22473, CVE-2022-31759, CVE-2021-36999, CVE-2023-39405, CVE-2021-37034, CVE-2021-40047, CVE-2021-22434, CVE-2021-22347, CVE-2022-22256, CVE-2021-46742, CVE-2023-49248, CVE-2021-40063, CVE-2023-44119, CVE-2021-40016, CVE-2021-22401, CVE-2023-49239, CVE-2021-37053, CVE-2021-37046, CVE-2021-22344, CVE-2021-40065, CVE-2022-34743, CVE-2022-41576, CVE-2022-37003, CVE-2022-41594, CVE-2022-37008, CVE-2023-39408, CVE-2022-41599, CVE-2023-39409, CVE-2021-36987, CVE-2021-22375, CVE-2022-48295, CVE-2022-48513, CVE-2021-40055, CVE-2021-22444, CVE-2020-9139, CVE-2023-46764, CVE-2021-22402, CVE-2021-22491, CVE-2023-34167, CVE-2022-41603, CVE-2021-22370, CVE-2020-9147, CVE-2020-9148, CVE-2022-22252, CVE-2022-47974, CVE-2023-46774, CVE-2023-52116, CVE-2023-52098, CVE-2023-52101, CVE-2022-46317, CVE-2023-39389, CVE-2021-40013, CVE-2021-37027, CVE-2022-41598, CVE-2022-41581, CVE-2022-48517, CVE-2022-41595, CVE-2023-34163, CVE-2022-38979, CVE-2023-46756, CVE-2021-46883, CVE-2022-41584, CVE-2023-39401, CVE-2021-36990, CVE-2023-26548, CVE-2022-31762, CVE-2022-48488, CVE-2021-39973, CVE-2022-31755, CVE-2022-44563, CVE-2021-22406, CVE-2023-52102, CVE-2023-39391, CVE-2021-40010, CVE-2023-39395, CVE-2023-41305, CVE-2021-22371, CVE-2021-22367, CVE-2021-37111, CVE-2021-40034, CVE-2022-41580, CVE-2023-49246, CVE-2023-44100, CVE-2021-36998, CVE-2021-22415, CVE-2021-37097, CVE-2021-22446, CVE-2021-37047, CVE-2021-37050, CVE-2021-37055, CVE-2022-48515, CVE-2022-37005, CVE-2021-36985, CVE-2022-44555, CVE-2023-46763, CVE-2022-46318, CVE-2021-22354, CVE-2021-37030, CVE-2021-46839, CVE-2021-37039, CVE-2021-22319, CVE-2021-22353, CVE-2022-48491, CVE-2022-48516, CVE-2021-40030, CVE-2022-39005, CVE-2021-40011, CVE-2022-48346, CVE-2022-46761, CVE-2022-46312, CVE-2022-41600, CVE-2021-39998, CVE-2022-44562, CVE-2022-48494, CVE-2023-44106, CVE-2021-36995, CVE-2023-39381, CVE-2021-22390, CVE-2021-22379, CVE-2021-37110, CVE-2021-37037, CVE-2021-46786, CVE-2022-48496, CVE-2023-52108, CVE-2022-34735, CVE-2022-48302, CVE-2022-31752, CVE-2021-22482, CVE-2023-49241, CVE-2023-49243, CVE-2021-40037, CVE-2021-22442, CVE-2023-34161, CVE-2022-31757, CVE-2023-1694, CVE-2021-37002, CVE-2022-41591, CVE-2023-44118, CVE-2021-36989, CVE-2022-39001, CVE-2021-36996, CVE-2022-41587, CVE-2022-22258, CVE-2022-41586, CVE-2022-48296, CVE-2022-39000, CVE-2022-39006, CVE-2021-40054, CVE-2021-22313, CVE-2021-46887, CVE-2021-22481, CVE-2021-37117, CVE-2021-22317, CVE-2021-37029, CVE-2022-39002, CVE-2021-22389, CVE-2023-41296, CVE-2022-48349, CVE-2021-46788, CVE-2021-22433, CVE-2021-22488, CVE-2023-44116, CVE-2023-39387, CVE-2022-31756, CVE-2021-22447, CVE-2023-39398, CVE-2022-44550, CVE-2023-52099, CVE-2020-9142, CVE-2021-46811, CVE-2023-1695, CVE-2021-37021, CVE-2022-31753, CVE-2021-37119, CVE-2022-31761, CVE-2023-39400, CVE-2023-39399, CVE-2021-40031, CVE-2021-22372, CVE-2021-22405, CVE-2021-22316, CVE-2021-22381, CVE-2023-44093, CVE-2020-36600, CVE-2021-36994, CVE-2021-22349, CVE-2021-22335, CVE-2023-46759, CVE-2022-48508, CVE-2021-22324, CVE-2022-44553, CVE-2023-4565, CVE-2021-22472, CVE-2023-44098, CVE-2021-22443, CVE-2021-22412, CVE-2022-39004, CVE-2022-48294, CVE-2021-40051, CVE-2023-26547, CVE-2022-44552, CVE-2021-40048, CVE-2021-22486, CVE-2023-44105, CVE-2022-34740, CVE-2022-48357, CVE-2023-34166, CVE-2022-34739, CVE-2020-9158, CVE-2021-22431, CVE-2023-49242, CVE-2021-46881, CVE-2021-22325, CVE-2022-46319, CVE-2023-52112, CVE-2021-22403, CVE-2023-44103, CVE-2021-22483, CVE-2021-22426, CVE-2022-41588, CVE-2021-46813, CVE-2021-37114, CVE-2022-48286, CVE-2022-34737, CVE-2021-22387, CVE-2021-22391, CVE-2021-37044, CVE-2021-40017, CVE-2021-40009, CVE-2023-41300, CVE-2022-46321, CVE-2023-49240, CVE-2022-48480, CVE-2021-46840, CVE-2021-46741, CVE-2021-22395, CVE-2022-48359, CVE-2023-46758, CVE-2022-48301, CVE-2023-1696, CVE-2023-49245, CVE-2021-36986, CVE-2021-22336, CVE-2022-34738, CVE-2021-22435, CVE-2022-41601, CVE-2021-37001, CVE-2021-37051, CVE-2022-44551, CVE-2022-44558, CVE-2023-1692, CVE-2021-22428, CVE-2021-37103, CVE-2021-36997, CVE-2022-41602, CVE-2021-37031, CVE-2021-22348, CVE-2021-40064, CVE-2022-46320, CVE-2021-40035, CVE-2021-22346, CVE-2020-9149, CVE-2022-44560, CVE-2022-22253, CVE-2021-22429, CVE-2021-36993, CVE-2023-39402, CVE-2021-22436, CVE-2021-39996, CVE-2021-22432
heuristics/extracted_sars ADV_ARC.1, ALC_DVS.1, ASE_OBJ.2, ALC_CMS.3, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, ALC_CMC.3, ATE_DPT.1, AVA_VAN.2, ADV_FSP.3, ADV_TDS.2, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, AGD_OPE.1 ASE_SPD.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, ASE_OBJ.1, ALC_TSU_EXT.1, ATE_IND.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ASE_INT.1, ALC_CMC.1
heuristics/extracted_versions 10 11.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0281
  • certification_date: 01.01.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0281_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an "MFD"). One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functionality The TOE counters unauthorized disclosure of image data by: - The encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD or the Flash memory in the MFD, - The cryptographic key generation function, generates a seed for a cryptographic key once when the TOE is installed, and generates a constant cryptographic key from the seed whenever the MFD is powered, and stores the key in a volatile memory for the encryption function, - The data erasure function, which automatically overwrites to erase image data no longer in use in storages such as HDD, and overwrites to erase all data when invoked by the administrator of an MFD in use or no longer in use, - The authentication function, which authenticates the TOE administrator with a password, and provides the TOE administrator with a management function for changing his password, - The confidential file function, which provides image data filed by users with password protection, and - The network protection functions, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - The fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: MX-FR22
    • product_type: Data protection function in Multi Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0281_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0281_est.pdf
    • toe_version: C.10
    • vendor: Sharp Corporation
  • expiration_date: 01.02.2016
  • revalidations: [frozendict({'date': '2011-07', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0281_it0295_01.html'})]
  • supplier: Sharp Corporation
  • toe_japan_name: MX-FR22 C.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0281_it0295.html
  • toe_overseas_name: MX-FR22 C.11
  • certification_date: 27.10.2021
  • level: conforme a PP_MD_V3.1
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/huawei/cr_huawei_p40_emui11_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/huawei/rc_huawei_p40_emui11_v1.0_it.pdf
  • supplier: Huawei Device Co., Ltd.
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/huawei/st_huawei_p40_emui11_v1.11.pdf
  • title: Huawei Mobile Devices (P40 series) with EMUI 11.0
heuristics/protection_profiles {} c88af12926be2779, df09b703c88c665a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf
pdf_data/report_filename c0281_erpt.pdf cr_huawei_p40_emui11_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0281-01: 1
    • Certification No. C0281: 1
  • IT:
    • OCSI/CERT/ATS/06/2020/RC: 25
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 3
    • ASE_REQ.1: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 2
    • T.REMOTE: 2
    • T.SPOOF: 2
    • T.TAMPER: 2
    • T.TAP: 2
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 21
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • atsec:
    • atsec: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 7
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 6
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110809101005+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110809101058+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 768246
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author: OCSI
  • /CreationDate: D:20211026152051+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20211026152051+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: Certification Report "Huawei Mobile Devices (P40 series) with EMUI 11.0"
  • pdf_file_size_bytes: 792444
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename c0281_est.pdf st_huawei_p40_emui11_v1.11.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 3
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 19
    • FCS_CKM.1: 5
    • FCS_CKM.2: 3
    • FCS_CKM.4: 12
    • FCS_COP: 23
    • FCS_COP.1: 5
  • FDP:
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1: 4
    • FIA_SOS: 15
    • FIA_SOS.1: 2
    • FIA_UAU: 46
    • FIA_UAU.1: 10
    • FIA_UAU.2: 2
    • FIA_UAU.7: 2
    • FIA_UID: 25
    • FIA_UID.1: 10
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF: 27
    • FMT_MOF.1: 3
    • FMT_MSA.3: 5
    • FMT_MTD: 30
    • FMT_MTD.1: 3
    • FMT_SMF.1: 35
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 16
  • FTA:
    • FTA_TSE.1: 9
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 18
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 2
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 2
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 3
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 35
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 2
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 3
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 16
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 3
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 2
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 12
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 5
    • FIA_BMG_EXT.1.1: 5
    • FIA_BMG_EXT.1.2: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 2
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 2
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.1: 2
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 2
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 2
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 2
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 2
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 9
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 2
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC_EXT: 9
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 4
    • A.OPERATOR: 4
  • O:
    • O.FAXTONET: 5
    • O.FILTER: 9
    • O.MANAGE: 14
    • O.REMOV: 1
    • O.REMOVE: 6
    • O.RESIDUAL: 7
    • O.TRP: 8
    • O.USER: 6
  • OE:
    • OE.CIPHER: 3
    • OE.ERASEALL: 3
    • OE.FIREWALL: 3
    • OE.OPERATE: 3
    • OE.PC-USER: 4
    • OE.SUBNET: 3
    • OE.USER: 3
  • T:
    • T.RECOVER: 5
    • T.REMOTE: 3
    • T.SPOOF: 4
    • T.TAMPER: 3
    • T.TAP: 4
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Huawei:
    • Huawei: 112
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
    • Rijndael:
      • Rijndael: 5
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 24
      • AES-: 3
      • AES-128: 1
      • AES-256: 8
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 7
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 5
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 23
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 16
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 9
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 2
    • P-256: 10
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 27
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 7
  • other:
    • TEE: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 4
  • ISO:
    • ISO/IEC 646: 4
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 29147:2018: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 180-4: 2
    • SP 186-4: 4
    • SP 198-1: 1
    • SP 800-108: 2
    • SP 800-132: 2
    • SP 800-38A: 2
    • SP 800-38D: 1
    • SP 800-38E: 1
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 2
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 5
    • RFC 5289: 12
    • RFC 5759: 2
    • RFC 6125: 1
    • RFC5246: 2
  • X509:
    • X.509: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20110804103001+09'00'
  • /ModDate: D:20110804103001+09'00'
  • pdf_file_size_bytes: 321927
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
  • /Author: Rasma
  • /CreationDate: D:20210913121013Z00'00'
  • /Creator: Word
  • /ModDate: D:20210913121013Z00'00'
  • /Producer: macOS Version 11.1 (Build 20C69) Quartz PDFContext
  • /Title: Huawei P40 series EMUI 11.0_MDFPP31_ST v1.11
  • pdf_file_size_bytes: 1655965
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different