Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei iTrustee 5.0
NSCIB-CC-19-0016828-CR
Belkin F1DN102MOD-BA-4, F1DN202MOD-BA-4, F1DN104MOD-BA-4, F1DN204MOD-BA-4, F1DN108MOD-BA-4, F1DN208MOD-BA-4, F1DN102MOD-HH-4, F1DN102MOD-PP-4, F1DN102MOD-DD-4, F1DN202MOD-HH-4, F1DN202MOD-PP-4, F1DN202MOD-DD-4, F1DN104MOD-HH-4, F1DN104MOD-PP-4, F1DN108MOD-PP-4, F1DN104MOD-DD-4, F1DN204MOD-HH-4, F1DN204MOD-PP-4, F1DN208MOD-PP-4, F1DN204MOD-DD-4, F1DN104MOD-XX-4, F1DN204MOD-XX-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices
534-EWA
name Huawei iTrustee 5.0 Belkin F1DN102MOD-BA-4, F1DN202MOD-BA-4, F1DN104MOD-BA-4, F1DN204MOD-BA-4, F1DN108MOD-BA-4, F1DN208MOD-BA-4, F1DN102MOD-HH-4, F1DN102MOD-PP-4, F1DN102MOD-DD-4, F1DN202MOD-HH-4, F1DN202MOD-PP-4, F1DN202MOD-DD-4, F1DN104MOD-HH-4, F1DN104MOD-PP-4, F1DN108MOD-PP-4, F1DN104MOD-DD-4, F1DN204MOD-HH-4, F1DN204MOD-PP-4, F1DN208MOD-PP-4, F1DN204MOD-DD-4, F1DN104MOD-XX-4, F1DN204MOD-XX-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices
category Operating Systems Other Devices and Systems
scheme NL CA
status archived active
not_valid_after 19.12.2024 11.07.2026
not_valid_before 19.12.2019 11.07.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cert%20019-016828.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/534-EWA%20CT%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-19-0016828-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/534-EWA%20CR%20v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CC%20Huawei%20iTrustee%20Software%20V5.0%20Security%20Target%20V6.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/534-EWA%20ST%20v1.6.pdf
manufacturer Huawei Technologies Co., Ltd. Belkin International, Inc.
manufacturer_web https://www.huawei.com https://www.belkin.com
security_level AVA_TEE.2, EAL2 {}
dgst 5d570a7228cacac4 e37581368981ae68
heuristics/cert_id NSCIB-CC-19-0016828-CR 534-EWA
heuristics/cert_lab CANADA
heuristics/extracted_sars ADV_TDS.1, AVA_TEE.2, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 5.0 44404, 4
heuristics/scheme_data
  • certification_date: 11.07.2021
  • level: PP_PSD_v4.0, MOD_KM_v1.0, MOD_VI_v1.0
  • product: Belkin F1DN102MOD-xx-4, F1DN202MOD-xx-4, F1DN104MOD-xx-4, F1DN204MOD-xx-4, F1DN108MOD-xx-4, F1DN208MOD-xx-4 Firmware Version 44404-E7E7 Peripheral Sharing Devices
  • vendor: Belkin International, Inc.
heuristics/protection_profiles {} 42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf
pdf_data/cert_filename cert 019-016828.pdf 534-EWA CT v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-19-0016828: 1
  • CA:
    • 534-EWA: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/cert_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 1
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/tee_name
  • other:
    • iTrustee: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20191223131613+01'00'
  • /Creator: NL-ARN-SAL-C
  • /ModDate: D:20191223133219+01'00'
  • /Producer: KONICA MINOLTA bizhub C300i
  • pdf_file_size_bytes: 76186
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20210812121605-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1643891
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename NSCIB-CC-19-0016828-CR.pdf 534-EWA CR v1.0.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0016828-CR
    • cert_item: Huawei iTrustee v5.0
    • cert_lab: Brightsight
    • developer: Huawei Technologies Co., Ltd
  • CA:
  • NL:
  • CA:
    • cert_id: 534-EWA
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • NL:
    • CC-19-0016828: 1
    • NSCIB-CC-0016828-CR: 12
  • CA:
    • 534-EWA: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 4
    • EAL2 augmented: 2
    • EAL2+: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 3
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
    • reverse engineering: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 22
    • iTrustee: 20
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20191223171225+01'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report_NSCIB-CC-19-0016828-CR.pdf
  • pdf_file_size_bytes: 305591
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 12
pdf_data/st_filename [ST] CC Huawei iTrustee Software V5.0 Security Target V6.0.pdf 534-EWA ST v1.6.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • AVA:
    • AVA_TEE: 4
    • AVA_TEE.2: 17
    • AVA_VAN: 2
    • AVA_VAN.2: 5
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 10
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 2
    • FAU_SAA.1: 2
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 28
    • FDP_ACC.1: 9
    • FDP_ACF: 24
    • FDP_ACF.1: 12
    • FDP_IFC: 18
    • FDP_IFC.1: 5
    • FDP_IFC.2: 3
    • FDP_IFF: 19
    • FDP_IFF.1: 8
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ITT: 9
    • FDP_ITT.1: 2
    • FDP_RIP: 8
    • FDP_RIP.1: 2
    • FDP_ROL: 8
    • FDP_ROL.1: 3
    • FDP_SDI.2: 17
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 47
    • FMT_MSA.1: 5
    • FMT_MSA.3: 10
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 15
    • FPT_FLS.1.1: 1
    • FPT_INI.1: 1
    • FPT_ITT: 1
    • FPT_STM: 1
    • FPT_TEE.1: 8
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 27
    • FDP_APC_EXT.1: 17
    • FDP_APS_EXT.1.1: 1
    • FDP_APS_EXT.1.2: 1
    • FDP_APS_EXT.1.3: 1
    • FDP_APS_EXT.1.4: 1
    • FDP_APS_EXT.2.2: 1
    • FDP_CDS_EXT: 4
    • FDP_CDS_EXT.1: 31
    • FDP_CDS_EXT.1.1: 9
    • FDP_FIL_EXT: 17
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_IPC_EXT: 4
    • FDP_IPC_EXT.1: 21
    • FDP_IPC_EXT.1.1: 5
    • FDP_IPC_EXT.1.2: 5
    • FDP_PDC_EXT: 51
    • FDP_PDC_EXT.1: 32
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 16
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 29
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 16
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP: 7
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 9
    • FDP_RIP_EXT.1.1: 2
    • FDP_SPR_EXT: 61
    • FDP_SPR_EXT.1: 18
    • FDP_SPR_EXT.1.1: 1
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 14
    • FDP_SWI_EXT.1.1: 2
    • FDP_SWI_EXT.2: 10
    • FDP_SWI_EXT.2.1: 2
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 16
    • FDP_SWI_EXT.3.1: 2
    • FDP_UDF_EXT: 16
    • FDP_UDF_EXT.1: 6
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 11
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 12
    • FPT_TST_EXT.1.1: 2
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 13
    • FTA_CIN_EXT.1.1: 2
    • FTA_CIN_EXT.1.2: 3
    • FTA_CIN_EXT.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.INTEGRATION: 5
    • A.PROTECTION_AFTER_DELILVERY: 1
    • A.PROTECTION_AFTER_DELIVER: 1
    • A.PROTECTION_AFTER_DELIVERY: 3
    • A.ROLLBACK: 5
    • A.SECUREBOOT: 5
    • A.SECURE_HARDWARE_PLATFO: 1
    • A.SECURE_HARDWARE_PLATFORM: 4
    • A.TA_DEVELOPMENT: 5
  • O:
    • O.CA_TA_IDENTIFICATION: 11
    • O.INITIALIZATION: 22
    • O.INSTANCE_TIME: 1
    • O.KEYS_USAGE: 14
    • O.OPERATION: 34
    • O.RNG: 1
    • O.RUNTIME_CONFIDENTIALITY: 22
    • O.RUNTIME_INTEGRITY: 24
    • O.TA_AUTHENTICITY: 17
    • O.TA_ISOLATION: 21
    • O.TEE_DATA_PROTECTION: 18
    • O.TEE_ID: 1
    • O.TEE_ISOLATION: 16
    • O.TRUSTED_STORAGE: 26
  • OE:
    • OE.INITIALIZATION: 26
    • OE.INSTANCE_TIME: 6
    • OE.INSTANC_TIME: 1
    • OE.INTEGRATION_CONFIGURATI: 3
    • OE.INTEGRATION_CONFIGURATION: 12
    • OE.PROTECTION_AFTER_DELIVE: 3
    • OE.PROTECTION_AFTER_DELIVERY: 8
    • OE.RNG: 7
    • OE.ROLLBACK: 9
    • OE.SECRETS: 6
    • OE.TA_DEVELOPMENT: 7
    • OE.TEE_ID: 11
    • OE.TRUSTED_HARDWARE: 24
  • OP:
    • OP.EXTRACT_KEY: 4
    • OP.LOAD: 3
    • OP.STORE: 4
    • OP.USE_KEY: 4
  • OSP:
    • OSP: 1
    • OSP.INTEGRATION_CONFIGURAT: 1
    • OSP.INTEGRATION_CONFIGURATION: 4
    • OSP.SECRETS: 5
  • T:
    • T.ABUSE_FUNCT: 15
    • T.CLONE: 12
    • T.FLASH_DUMP: 6
    • T.IMPERSONATION: 8
    • T.PERTURBATION: 14
    • T.RAM: 11
    • T.RNG: 9
    • T.ROGUE_CODE_EXECUTION: 15
    • T.SPY: 9
    • T.STORAGE_CORRUPTION: 12
    • T.TEE_FIRMWARE_DOWNGRADE: 8
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_SPECIAL: 1
    • A.NO_SPECIAL_ANALOG: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.PROTECTED: 1
    • O.PROTECTED_EDID: 3
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 7
    • O.USER_DATA: 2
  • OE:
    • OE.NO_SPECIAL: 1
    • OE.NO_SPECIAL_ANALOG: 1
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 157
    • Huawei Technologies Co: 77
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 4
    • SHA2:
      • SHA-2: 2
      • SHA224: 4
      • SHA384: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 29
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • XTS:
    • XTS: 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side-channels: 1
  • FI:
    • physical tampering: 6
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
  • other:
    • TEE: 397
    • iTrustee: 48
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 197: 1
    • FIPS 46: 1
    • FIPS 81: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 1
    • PKCS1: 2
  • RFC:
    • RFC 1321: 2
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 1
    • RFC2119: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • design and development. Delivering image of iTrustee to device manufacturer. The other phases are out of scope of this ST. The TOE doesn’t provides TA management. CC Huawei iTustee Software Security Target 2: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different