name |
Huawei iTrustee 5.0 |
Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8 |
category |
Operating Systems |
Multi-Function Devices |
scheme |
NL |
JP |
status |
archived |
archived |
not_valid_after |
19.12.2024 |
31.03.2021 |
not_valid_before |
19.12.2019 |
31.03.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cert%20019-016828.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-19-0016828-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0505_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CC%20Huawei%20iTrustee%20Software%20V5.0%20Security%20Target%20V6.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0505_est.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www.huawei.com |
https://www.fujixerox.co.jp/eng/ |
security_level |
AVA_TEE.2, EAL2 |
EAL2+, ALC_FLR.2 |
dgst |
5d570a7228cacac4 |
d134e9e8b6240ca4 |
heuristics/cert_id |
NSCIB-CC-19-0016828-CR |
JISEC-CC-CRP-C0505 |
heuristics/cert_lab |
|
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:fujixerox:apeosport_3060:-:*:*:*:*:*:*:*, cpe:2.3:h:fujixerox:docucentre-v_3065:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_TDS.1, AVA_TEE.2, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
5.0 |
1.0.13, 2.0.8 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0505
- certification_date: 01.03.2016
- claim: EAL2+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0505_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax
- product_type: Multi Function Device
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/c0505_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0505_est.pdf
- toe_version: Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.04.2021
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0505_it5559.html
- toe_overseas_name: Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
43ce79b420f23a00 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
pdf_data/cert_filename |
cert 019-016828.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 2
- EAL2 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 1
- Huawei Technologies Co: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20191223131613+01'00'
- /Creator: NL-ARN-SAL-C
- /ModDate: D:20191223133219+01'00'
- /Producer: KONICA MINOLTA bizhub C300i
- pdf_file_size_bytes: 76186
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
NSCIB-CC-19-0016828-CR.pdf |
c0505_erpt.pdf |
pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-0016828-CR
- cert_item: Huawei iTrustee v5.0
- cert_lab: Brightsight
- developer: Huawei Technologies Co., Ltd
|
|
pdf_data/report_keywords/cc_cert_id |
- NL:
- CC-19-0016828: 1
- NSCIB-CC-0016828-CR: 12
|
- JP:
- CRP-C0505-01: 1
- Certification No. C0505: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 4
- EAL2 augmented: 2
- EAL2+: 1
- EAL4: 1
|
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 18
- Huawei Technologies Co: 4
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- other:
- JIL: 1
- reverse engineering: 1
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20191223171225+01'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report_NSCIB-CC-19-0016828-CR.pdf
- pdf_file_size_bytes: 305591
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
- /CreationDate: D:20160519151340+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20160519151527+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 479332
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
[ST] CC Huawei iTrustee Software V5.0 Security Target V6.0.pdf |
c0505_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- AVA:
- AVA_TEE: 4
- AVA_TEE.2: 17
- AVA_VAN: 2
- AVA_VAN.2: 5
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN.1: 2
- FAU_SAA.1: 2
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 9
- FDP_ACF: 24
- FDP_ACF.1: 12
- FDP_IFC: 18
- FDP_IFC.1: 5
- FDP_IFC.2: 3
- FDP_IFF: 19
- FDP_IFF.1: 8
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT: 9
- FDP_ITT.1: 2
- FDP_RIP: 8
- FDP_RIP.1: 2
- FDP_ROL: 8
- FDP_ROL.1: 3
- FDP_SDI.2: 17
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 47
- FMT_MSA.1: 5
- FMT_MSA.3: 10
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 15
- FPT_FLS.1.1: 1
- FPT_INI.1: 1
- FPT_ITT: 1
- FPT_STM: 1
- FPT_TEE.1: 8
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 99
- FDP_ACC.1.1: 8
- FDP_ACF.1: 92
- FDP_ACF.1.1: 8
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 8
- FDP_IFC: 1
- FDP_IFC.1: 8
- FDP_IFF: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 19
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 22
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 99
- FMT_MSA.1.1: 8
- FMT_MSA.3: 90
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 8
- FMT_MTD.1: 23
- FMT_MTD.1.1: 2
- FMT_SMF.1: 38
- FMT_SMF.1.1: 1
- FMT_SMR.1: 45
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 16
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.INTEGRATION: 5
- A.PROTECTION_AFTER_DELILVERY: 1
- A.PROTECTION_AFTER_DELIVER: 1
- A.PROTECTION_AFTER_DELIVERY: 3
- A.ROLLBACK: 5
- A.SECUREBOOT: 5
- A.SECURE_HARDWARE_PLATFO: 1
- A.SECURE_HARDWARE_PLATFORM: 4
- A.TA_DEVELOPMENT: 5
- O:
- O.CA_TA_IDENTIFICATION: 11
- O.INITIALIZATION: 22
- O.INSTANCE_TIME: 1
- O.KEYS_USAGE: 14
- O.OPERATION: 34
- O.RNG: 1
- O.RUNTIME_CONFIDENTIALITY: 22
- O.RUNTIME_INTEGRITY: 24
- O.TA_AUTHENTICITY: 17
- O.TA_ISOLATION: 21
- O.TEE_DATA_PROTECTION: 18
- O.TEE_ID: 1
- O.TEE_ISOLATION: 16
- O.TRUSTED_STORAGE: 26
- OE:
- OE.INITIALIZATION: 26
- OE.INSTANCE_TIME: 6
- OE.INSTANC_TIME: 1
- OE.INTEGRATION_CONFIGURATI: 3
- OE.INTEGRATION_CONFIGURATION: 12
- OE.PROTECTION_AFTER_DELIVE: 3
- OE.PROTECTION_AFTER_DELIVERY: 8
- OE.RNG: 7
- OE.ROLLBACK: 9
- OE.SECRETS: 6
- OE.TA_DEVELOPMENT: 7
- OE.TEE_ID: 11
- OE.TRUSTED_HARDWARE: 24
- OP:
- OP.EXTRACT_KEY: 4
- OP.LOAD: 3
- OP.STORE: 4
- OP.USE_KEY: 4
- OSP:
- OSP: 1
- OSP.INTEGRATION_CONFIGURAT: 1
- OSP.INTEGRATION_CONFIGURATION: 4
- OSP.SECRETS: 5
- T:
- T.ABUSE_FUNCT: 15
- T.CLONE: 12
- T.FLASH_DUMP: 6
- T.IMPERSONATION: 8
- T.PERTURBATION: 14
- T.RAM: 11
- T.RNG: 9
- T.ROGUE_CODE_EXECUTION: 15
- T.SPY: 9
- T.STORAGE_CORRUPTION: 12
- T.TEE_FIRMWARE_DOWNGRADE: 8
|
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 13
- D.DOC: 60
- D.FUNC: 53
- D.PROT: 4
- O:
- O.AUDIT: 8
- O.AUDIT_ACCESS: 10
- O.AUDIT_STORAGE: 10
- O.CIPHER: 8
- O.CONF: 16
- O.DOC: 16
- O.FUNC: 8
- O.INTERFACE: 8
- O.PROT: 8
- O.SOFTWARE: 8
- O.USER: 14
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 157
- Huawei Technologies Co: 77
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA224: 4
- SHA384: 4
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 197: 1
- FIPS 46: 1
- FIPS 81: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- PKCS #1: 2
- PKCS #3: 1
- PKCS1: 2
- RFC:
- RFC 1321: 2
- RFC 2202: 1
- RFC 3610: 1
- RFC 4231: 1
- RFC2119: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- design and development. Delivering image of iTrustee to device manufacturer. The other phases are out of scope of this ST. The TOE doesn’t provides TA management. CC Huawei iTustee Software Security Target 2: 1
- out of scope: 1
|
- ConfidentialDocument:
- When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
|
pdf_data/st_metadata |
|
- /Author:
- /CreationDate: D:20160519092202+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160519092202+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Title:
- pdf_file_size_bytes: 849926
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 136
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |