Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SDoT Filter SW Version 6.2a Revision 6.2.15566.31149
CSA_CC_22008
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
name SDoT Filter SW Version 6.2a Revision 6.2.15566.31149 HarmonyOS 3.0 on Huawei MatePad Pro
category Boundary Protection Devices and Systems Mobility
scheme SG NL
not_valid_after 07.09.2028 19.12.2028
not_valid_before 07.09.2023 19.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/-CER-SDoT-Filter-SW-CC-Certificate.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/-CER-SDoT-Filter-SW-Certificate-Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_SDoTSGW6.2a_SecurityTarget_Lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf
manufacturer INFODAS GmbH Huawei Device Co., Ltd.
manufacturer_web https://www.infodas.com/en/ https://www.huawei.com/
security_level EAL4+, ALC_FLR.2, AVA_VAN.5 EAL2+, ALC_FLR.3
dgst 771ab894e3d06375 c85f7e09316c6900
heuristics/cert_id CSA_CC_22008 NSCIB-CC-0531255-CR
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-46765, CVE-2023-46770, CVE-2022-44557, CVE-2022-48358, CVE-2023-49244, CVE-2022-48302, CVE-2023-52542, CVE-2023-52955, CVE-2023-41299, CVE-2023-52543, CVE-2023-44110, CVE-2023-41300, CVE-2022-48354, CVE-2022-44555, CVE-2023-44095, CVE-2023-52377, CVE-2022-48289, CVE-2022-48355, CVE-2024-58043, CVE-2024-56449, CVE-2023-39388, CVE-2023-41308, CVE-2023-46764, CVE-2023-39406, CVE-2023-52545, CVE-2023-52537, CVE-2023-34164, CVE-2023-52387, CVE-2024-45441, CVE-2023-52713, CVE-2023-52954, CVE-2023-52104, CVE-2023-41309, CVE-2023-44093, CVE-2023-52112, CVE-2023-44109, CVE-2023-46767, CVE-2023-3455, CVE-2023-1695, CVE-2024-56447, CVE-2023-49247, CVE-2023-39391, CVE-2023-39394, CVE-2023-41311, CVE-2022-48298, CVE-2023-52368, CVE-2023-52098, CVE-2023-46766, CVE-2024-54097, CVE-2022-48359, CVE-2023-49243, CVE-2023-52554, CVE-2023-49246, CVE-2022-48288, CVE-2023-46773, CVE-2023-46761, CVE-2024-32990, CVE-2024-51528, CVE-2024-30414, CVE-2022-48350, CVE-2023-4566, CVE-2023-6273, CVE-2023-3456, CVE-2024-54100, CVE-2023-52111, CVE-2023-52549, CVE-2024-56440, CVE-2022-48513, CVE-2024-54099, CVE-2023-41302, CVE-2023-4565, CVE-2023-37241, CVE-2024-32995, CVE-2023-39400, CVE-2024-27896, CVE-2023-39381, CVE-2023-46756, CVE-2023-39395, CVE-2023-52378, CVE-2024-45444, CVE-2024-32991, CVE-2023-46760, CVE-2023-52550, CVE-2023-41301, CVE-2023-52359, CVE-2024-36501, CVE-2023-37238, CVE-2022-48299, CVE-2022-48360, CVE-2024-45450, CVE-2023-52363, CVE-2023-44115, CVE-2023-41307, CVE-2023-44094, CVE-2023-52719, CVE-2022-48347, CVE-2024-39673, CVE-2023-52107, CVE-2023-44104, CVE-2023-39380, CVE-2024-39670, CVE-2023-46758, CVE-2022-41591, CVE-2022-48352, CVE-2023-46774, CVE-2024-32998, CVE-2023-39399, CVE-2023-52374, CVE-2023-52380, CVE-2023-41310, CVE-2023-41296, CVE-2022-48290, CVE-2022-48300, CVE-2023-39382, CVE-2023-52379, CVE-2023-7265, CVE-2023-52375, CVE-2024-51529, CVE-2022-44556, CVE-2023-46755, CVE-2022-48313, CVE-2022-44560, CVE-2024-32999, CVE-2024-57961, CVE-2023-39392, CVE-2024-47291, CVE-2023-49241, CVE-2024-30418, CVE-2023-44103, CVE-2023-52365, CVE-2023-52101, CVE-2023-1691, CVE-2023-52109, CVE-2023-44096, CVE-2023-26548, CVE-2024-45445, CVE-2024-42031, CVE-2023-49242, CVE-2022-44553, CVE-2023-37245, CVE-2023-39409, CVE-2023-52372, CVE-2023-39385, CVE-2023-41293, CVE-2024-42033, CVE-2023-7271, CVE-2023-52362, CVE-2022-44561, CVE-2024-36499, CVE-2023-39398, CVE-2023-52103, CVE-2023-52383, CVE-2023-52385, CVE-2022-48508, CVE-2023-46759, CVE-2024-39674, CVE-2023-52544, CVE-2023-46771, CVE-2023-49248, CVE-2023-52367, CVE-2024-42036, CVE-2023-44108, CVE-2023-52541, CVE-2023-52553, CVE-2024-56448, CVE-2023-52953, CVE-2023-1696, CVE-2024-36500, CVE-2022-48346, CVE-2024-42038, CVE-2024-42037, CVE-2023-44097, CVE-2024-54096, CVE-2023-52388, CVE-2023-52720, CVE-2023-52552, CVE-2024-45447, CVE-2023-52551, CVE-2023-39383, CVE-2023-41304, CVE-2023-52716, CVE-2023-52364, CVE-2024-54101, CVE-2024-45443, CVE-2023-5801, CVE-2022-48297, CVE-2023-39393, CVE-2024-47293, CVE-2023-52386, CVE-2023-26547, CVE-2023-41298, CVE-2023-26549, CVE-2023-41305, CVE-2023-44100, CVE-2023-52540, CVE-2024-42039, CVE-2023-46762, CVE-2022-48292, CVE-2022-48293, CVE-2022-44548, CVE-2024-56441, CVE-2022-48357, CVE-2023-44117, CVE-2023-44113, CVE-2022-44562, CVE-2023-46768, CVE-2023-52539, CVE-2024-32993, CVE-2023-39401, CVE-2024-36502, CVE-2023-52366, CVE-2023-44102, CVE-2023-39408, CVE-2022-41590, CVE-2023-52097, CVE-2024-32996, CVE-2024-30417, CVE-2023-39397, CVE-2023-39405, CVE-2024-27897, CVE-2024-30416, CVE-2024-47292, CVE-2023-52384, CVE-2024-47290, CVE-2023-1693, CVE-2023-52369, CVE-2023-52381, CVE-2024-42032, CVE-2023-52376, CVE-2023-44111, CVE-2024-30415, CVE-2023-52099, CVE-2022-48349, CVE-2023-39404, CVE-2024-36503, CVE-2024-47294, CVE-2023-52538, CVE-2023-46763, CVE-2024-32997, CVE-2023-37239, CVE-2023-44119, CVE-2022-48348, CVE-2022-48606, CVE-2023-39403, CVE-2022-48361, CVE-2022-48621, CVE-2022-44559, CVE-2023-1692, CVE-2024-51530, CVE-2022-48286, CVE-2023-39402, CVE-2023-41312, CVE-2023-39387, CVE-2023-44099, CVE-2022-48613, CVE-2023-41295, CVE-2023-49239, CVE-2023-52113, CVE-2024-51527, CVE-2023-52370, CVE-2022-48301, CVE-2023-52108, CVE-2021-46856, CVE-2024-57960, CVE-2023-52373, CVE-2023-52102, CVE-2023-49240, CVE-2023-52114, CVE-2023-44116, CVE-2024-45446, CVE-2023-44105, CVE-2023-39389, CVE-2023-44098, CVE-2023-41303, CVE-2023-52358, CVE-2024-54098, CVE-2024-56442, CVE-2023-44114, CVE-2023-39396, CVE-2022-48296, CVE-2023-52714, CVE-2022-48314, CVE-2023-52357, CVE-2024-32992, CVE-2023-39390, CVE-2024-42034, CVE-2023-52116, CVE-2023-44112, CVE-2022-48291, CVE-2023-46769, CVE-2024-45449, CVE-2023-44118, CVE-2023-44106, CVE-2022-48351, CVE-2023-37242, CVE-2023-39384, CVE-2023-49245, CVE-2023-39386, CVE-2023-37240, CVE-2023-52717, CVE-2023-1694
heuristics/extracted_sars ASE_TSS.1, ASE_ECD.1, ASE_SPD.1, ASE_INT.1, AVA_VAN.5, ASE_OBJ.2, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 AGD_OPE.1, ALC_FLR.3
heuristics/extracted_versions 6.2, 6.2.15566.31149 3.0
heuristics/scheme_data
pdf_data/cert_filename -CER-SDoT-Filter-SW-CC-Certificate.pdf nscib-cc-23-0531255-cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • SG:
    • CSA_CC_22008: 1
  • NL:
    • CC-23-0531255: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20230920180946+08'00'
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-02-18T04:59:28Z
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2021-08-12T02:02:37.1377634Z
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20230920180946+08'00'
  • pdf_file_size_bytes: 388012
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename -CER-SDoT-Filter-SW-Certificate-Report.pdf nscib-cc-23-0531255-cr.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
pdf_data/report_keywords/cc_cert_id
  • SG:
    • CSA_CC_22008: 2
  • NL:
    • NSCIB-CC-0531255-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 2
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 2
  • ATE:
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 2
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC: 2
  • FIA:
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MTD.3: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.ACCESS: 1
    • OE.AUDIT_ENFORCE: 1
    • OE.BOOT: 1
    • OE.DEDICATED_ADMIN_NET: 1
    • OE.DIFF_NET: 1
    • OE.HIGH_AVAILABILITY: 1
    • OE.HIGH_PROTECTION: 1
    • OE.HSM: 1
    • OE.NTP_SERVER: 1
    • OE.PKI: 1
    • OE.ROLE_SEPARATION: 1
    • OE.TRUSTW_ONLY: 1
    • OE.TRUSTW_STAFF: 1
    • OE.USER_IDENT: 1
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 4
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
    • CCMB-2018-04-003: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_metadata
  • /CreationDate: D:20230928144140+08'00'
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-08-02T09:37:22Z
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2020-11-20T03:35:11.8228409Z
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20230928144141+08'00'
  • pdf_file_size_bytes: 538747
  • pdf_hyperlinks: https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/singapore-common-criteria-scheme/product-list, https://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
pdf_data/st_filename ST_SDoTSGW6.2a_SecurityTarget_Lite.pdf nscib-cc-23-0531255-st_v1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • SG:
    • CSA_CC_22008: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 5
    • EAL4 augmented: 3
    • EAL4+: 1
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 3
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 2
    • ASE_ECD: 1
    • ASE_ECD.1: 2
    • ASE_INT: 1
    • ASE_INT.1: 2
    • ASE_OBJ: 1
    • ASE_OBJ.2: 2
    • ASE_REQ: 1
    • ASE_REQ.2: 2
    • ASE_SPD: 1
    • ASE_SPD.1: 2
    • ASE_TSS: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 1
    • FAU_ARP.1: 8
    • FAU_ARP.1.1: 1
    • FAU_GEN: 2
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 9
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 6
    • FAU_STG.2: 10
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 9
    • FAU_STG.3.1: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 11
    • FCS_CKM.1: 15
    • FCS_CKM.2: 8
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 45
    • FCS_COP.1: 7
  • FDP:
    • FDP_ACC: 37
    • FDP_ACC.1: 17
    • FDP_ACF: 37
    • FDP_ACF.1: 37
    • FDP_IFC: 38
    • FDP_IFC.1: 18
    • FDP_IFF: 52
    • FDP_IFF.1: 39
    • FDP_IFF.3: 8
    • FDP_IFF.3.1: 1
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
  • FIA:
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 17
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 1
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 31
    • FMT_MTD.1: 7
    • FMT_MTD.3: 7
    • FMT_MTD.3.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 12
    • FMT_SMR.2: 11
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_INC: 4
    • FPT_INC.1: 11
    • FPT_INC.1.1: 2
    • FPT_INC.1.2: 2
    • FPT_INC.1.3: 2
    • FPT_STM: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TDC: 1
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_TRP: 2
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 4
    • A.AUDIT: 5
    • A.BOOT: 5
    • A.DEDICATED_ADMIN: 1
    • A.DEDICATED_ADMIN_NET: 4
    • A.DIFF_NET: 5
    • A.HIGH_AVAILABILITY: 5
    • A.HIGH_PROTECTION: 4
    • A.HSM: 5
    • A.NTP_SERVER: 5
    • A.PKI: 5
    • A.ROLE_SEPARATION: 4
    • A.TRUSTW_ONLY: 4
    • A.TRUSTW_STAFF: 5
    • A.USER_IDENT: 5
  • OE:
    • OE.ACCESS: 4
    • OE.AUDIT_ENFORCE: 5
    • OE.BOOT: 4
    • OE.DEDICATED_ADMIN_NET: 3
    • OE.DIFF_NET: 7
    • OE.HIGH_AVAILABILITY: 5
    • OE.HIGH_PROTECTION: 8
    • OE.HSM: 2
    • OE.NTP_SERVER: 5
    • OE.PKI: 5
    • OE.ROLE_SEPARATION: 5
    • OE.TRUSTW_ONLY: 4
    • OE.TRUSTW_STAFF: 6
    • OE.USER_IDENT: 2
  • OSP:
    • OSP.AUDIT: 5
    • OSP.CONFIG_AUDIT: 5
    • OSP.DUAL_CONTROL: 4
    • OSP.FLOW_CONTROL: 5
    • OSP.PROTOCOLS: 6
  • OT:
    • OT.AUDIT: 10
    • OT.AUDIT_CHANGE_LOG: 8
    • OT.AUDIT_LOG_AVAILABILITY: 10
    • OT.AUDIT_PROTECT: 8
    • OT.BANDWIDTH: 6
    • OT.DEFAULT: 4
    • OT.FILTER: 16
    • OT.FOUR_EYES: 6
    • OT.INIT: 10
    • OT.LABELS: 12
    • OT.PRE_FILTER: 6
    • OT.PROTECTION: 6
    • OT.PROTOCOLS: 11
    • OT.PROTOCOL_DENY: 11
    • OT.ROLE_SEPARATION: 13
    • OT.SANITISED_DATA: 9
    • OT.SECURE_CHANNEL: 8
    • OT.USER_AUTHENTICATION: 11
    • OT.WARNING: 10
  • T:
    • T.AUDIT_ACCESS: 7
    • T.AUDIT_COLLAPSE: 6
    • T.AUDIT_CONTROL: 5
    • T.AUTH: 6
    • T.INSERT: 6
    • T.MALICIOUS_CODE: 8
    • T.MISCONFIG: 6
    • T.REVEAL_TO_LOW: 15
    • T.WRONG_LABEL: 6
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 3
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 2
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
      • SHA-256: 1
      • SHA-384: 1
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 17
      • TLS 1.2: 1
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 41: 1
  • CC:
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2104: 2
    • RFC 3447: 1
    • RFC 3986: 1
    • RFC3986: 1
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
  • /Author: INFODAS GmbH
  • /CreationDate: D:20230925100039+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /ModDate: D:20230925100039+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: Security Target
  • /Title: Security Target
  • pdf_file_size_bytes: 1889726
  • pdf_hyperlinks: http://www.w3.org/TR/xmldsig-core1/, http://www.w3.org/TR/xml/, http://www.xmlspif.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 103
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different