Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Google Pixel Devices on Android 13
CCEVS-VR-11317-2023
Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21
ISCB-5-RPT-C034-CR-v1a
name Google Pixel Devices on Android 13 Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21
category Mobility Other Devices and Systems
scheme US MY
not_valid_after 24.01.2025 22.03.2017
not_valid_before 24.01.2023 22.03.2012
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11317-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11317-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C034-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11317-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
manufacturer Google LLC JMCS Sdn Bhd
manufacturer_web https://www.google.com https://www.nltvc.com
security_level {} EAL2
dgst 8923ae99cb281ff9 efb467462d13a42a
heuristics/cert_id CCEVS-VR-11317-2023 ISCB-5-RPT-C034-CR-v1a
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*, cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*, cpe:2.3:o:google:android:13.0.0:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2024-31312, CVE-2014-9968, CVE-2015-9053, CVE-2023-21231, CVE-2022-20325, CVE-2025-48536, CVE-2023-21273, CVE-2024-40657, CVE-2014-9962, CVE-2024-43084, CVE-2023-40098, CVE-2023-40114, CVE-2025-48546, CVE-2023-21345, CVE-2017-8233, CVE-2024-23705, CVE-2023-40080, CVE-2024-43093, CVE-2024-31331, CVE-2016-5871, CVE-2022-20461, CVE-2023-21028, CVE-2023-21247, CVE-2023-20966, CVE-2024-49736, CVE-2017-8257, CVE-2023-21114, CVE-2023-20936, CVE-2024-43096, CVE-2023-20911, CVE-2022-20511, CVE-2023-21342, CVE-2022-20310, CVE-2022-20275, CVE-2024-31313, CVE-2022-20540, CVE-2022-20455, CVE-2023-21170, CVE-2025-48540, CVE-2023-21213, CVE-2025-48554, CVE-2015-9036, CVE-2024-25993, CVE-2023-21211, CVE-2025-48591, CVE-2023-21308, CVE-2017-9684, CVE-2023-21252, CVE-2022-20331, CVE-2023-21378, CVE-2022-20280, CVE-2024-31332, CVE-2023-21393, CVE-2025-48622, CVE-2015-9043, CVE-2022-20286, CVE-2025-32349, CVE-2023-35679, CVE-2015-9029, CVE-2014-9973, CVE-2023-20962, CVE-2024-25986, CVE-2017-7366, CVE-2025-22418, CVE-2022-20541, CVE-2022-20300, CVE-2022-20279, CVE-2023-21186, CVE-2016-10239, CVE-2023-21246, CVE-2025-22427, CVE-2024-0026, CVE-2022-20526, CVE-2025-48593, CVE-2023-20983, CVE-2017-7371, CVE-2016-10386, CVE-2023-21339, CVE-2024-40654, CVE-2022-20276, CVE-2024-0018, CVE-2023-21317, CVE-2017-8261, CVE-2015-9031, CVE-2025-48558, CVE-2024-25990, CVE-2023-21370, CVE-2022-20419, CVE-2025-48533, CVE-2015-8596, CVE-2024-49731, CVE-2024-0020, CVE-2022-20417, CVE-2023-21123, CVE-2022-20484, CVE-2022-20299, CVE-2023-20990, CVE-2023-21145, CVE-2016-10332, CVE-2023-21109, CVE-2023-40123, CVE-2023-21126, CVE-2022-20485, CVE-2016-10381, CVE-2022-20527, CVE-2022-20290, CVE-2024-25992, CVE-2023-21136, CVE-2025-32326, CVE-2016-10388, CVE-2022-20318, CVE-2023-21285, CVE-2022-20281, CVE-2017-8263, CVE-2016-5347, CVE-2022-20413, CVE-2023-21383, CVE-2025-20980, CVE-2023-35667, CVE-2024-27205, CVE-2023-21269, CVE-2024-49749, CVE-2024-27204, CVE-2023-21295, CVE-2022-20321, CVE-2022-20256, CVE-2023-20926, CVE-2024-34737, CVE-2022-20495, CVE-2015-8995, CVE-2015-9046, CVE-2022-20258, CVE-2025-48631, CVE-2014-9977, CVE-2023-21100, CVE-2016-10383, CVE-2023-21091, CVE-2025-26438, CVE-2022-20522, CVE-2022-20311, CVE-2023-21177, CVE-2025-48576, CVE-2015-9041, CVE-2025-26428, CVE-2017-8260, CVE-2023-21184, CVE-2023-21113, CVE-2022-20274, CVE-2025-48527, CVE-2024-27235, CVE-2023-35680, CVE-2024-43771, CVE-2023-35657, CVE-2023-20947, CVE-2014-9974, CVE-2017-7365, CVE-2024-31339, CVE-2022-20502, CVE-2023-21098, CVE-2025-21024, CVE-2023-21131, CVE-2015-9050, CVE-2014-9972, CVE-2022-20309, CVE-2015-8998, CVE-2025-48633, CVE-2023-40130, CVE-2015-9027, CVE-2023-21168, CVE-2022-20478, CVE-2015-8996, CVE-2023-35658, CVE-2025-22435, CVE-2022-20547, CVE-2023-20965, CVE-2025-22428, CVE-2022-20487, CVE-2024-22007, CVE-2023-21029, CVE-2022-20246, CVE-2016-10334, CVE-2023-35666, CVE-2024-27224, CVE-2022-20410, CVE-2023-20968, CVE-2025-48548, CVE-2024-34719, CVE-2023-40093, CVE-2022-20296, CVE-2022-20451, CVE-2023-40073, CVE-2023-21178, CVE-2022-20486, CVE-2014-9960, CVE-2023-21206, CVE-2023-35668, CVE-2022-20284, CVE-2024-49744, CVE-2022-20398, CVE-2023-21239, CVE-2025-48552, CVE-2023-21017, CVE-2025-48543, CVE-2023-21372, CVE-2015-0574, CVE-2017-8242, CVE-2024-0034, CVE-2023-20958, CVE-2023-40117, CVE-2014-9936, CVE-2023-21198, CVE-2024-23710, CVE-2022-20338, CVE-2024-0048, CVE-2015-9072, CVE-2023-40100, CVE-2022-20457, CVE-2016-10336, CVE-2023-20977, CVE-2024-27219, CVE-2022-20544, CVE-2025-26462, CVE-2023-20986, CVE-2024-43081, CVE-2023-21097, CVE-2023-20904, CVE-2023-21183, CVE-2023-20980, CVE-2024-34730, CVE-2014-9935, CVE-2015-9023, CVE-2021-0734, CVE-2015-9026, CVE-2023-21327, CVE-2024-40655, CVE-2025-32329, CVE-2017-8241, CVE-2022-20320, CVE-2024-43090, CVE-2015-8593, CVE-2025-48541, CVE-2025-48628, CVE-2023-21196, CVE-2023-20953, CVE-2022-20291, CVE-2023-45773, CVE-2023-21277, CVE-2022-20303, CVE-2023-21112, CVE-2023-40104, CVE-2023-21132, CVE-2023-20995, CVE-2025-26444, CVE-2025-32347, CVE-2015-9063, CVE-2023-21305, CVE-2024-34741, CVE-2024-40656, CVE-2014-9411, CVE-2023-21019, CVE-2024-49738, CVE-2016-10340, CVE-2023-40124, CVE-2023-21116, CVE-2022-20449, CVE-2017-8234, CVE-2023-35671, CVE-2023-21341, CVE-2023-21094, CVE-2023-21318, CVE-2022-20272, CVE-2023-20991, CVE-2024-0033, CVE-2024-31317, CVE-2023-35673, CVE-2023-21253, CVE-2017-7372, CVE-2024-27212, CVE-2022-20450, CVE-2016-10342, CVE-2023-40109, CVE-2023-21141, CVE-2022-20471, CVE-2022-20467, CVE-2022-39903, CVE-2015-9038, CVE-2025-48615, CVE-2023-21243, CVE-2022-20491, CVE-2017-9685, CVE-2025-48562, CVE-2025-48563, CVE-2023-20982, CVE-2025-48525, CVE-2014-9965, CVE-2024-31327, CVE-2023-21026, CVE-2023-35665, CVE-2017-0865, CVE-2024-0021, CVE-2023-21288, CVE-2023-21346, CVE-2024-0053, CVE-2024-31316, CVE-2023-40081, CVE-2023-20913, CVE-2017-7364, CVE-2023-21260, CVE-2024-25991, CVE-2023-20959, CVE-2022-39898, CVE-2023-35684, CVE-2022-39905, CVE-2023-21110, CVE-2023-21282, CVE-2025-26458, CVE-2023-21301, CVE-2023-20996, CVE-2022-20443, CVE-2023-20927, CVE-2024-0016, CVE-2024-22006, CVE-2023-21181, CVE-2022-20254, CVE-2022-20482, CVE-2023-20974, CVE-2023-21366, CVE-2022-20445, CVE-2024-34727, CVE-2015-8592, CVE-2022-20516, CVE-2022-20330, CVE-2023-21016, CVE-2023-21287, CVE-2015-9047, CVE-2022-20264, CVE-2025-48626, CVE-2016-5858, CVE-2023-21377, CVE-2015-9032, CVE-2023-21033, CVE-2017-8265, CVE-2022-20556, CVE-2024-49737, CVE-2025-22423, CVE-2023-20922, CVE-2025-26445, CVE-2023-21230, CVE-2017-8255, CVE-2016-5859, CVE-2014-9975, CVE-2023-40140, CVE-2015-9037, CVE-2024-23704, CVE-2023-21251, CVE-2022-20494, CVE-2023-21108, CVE-2017-6421, CVE-2023-21381, CVE-2015-9062, CVE-2023-20993, CVE-2023-21387, CVE-2024-0044, CVE-2023-21174, CVE-2017-8256, CVE-2015-9044, CVE-2023-21169, CVE-2023-20939, CVE-2025-48620, CVE-2015-9020, CVE-2025-0089, CVE-2016-10338, CVE-2025-22425, CVE-2016-10389, CVE-2014-9981, CVE-2022-20301, CVE-2024-27236, CVE-2023-21245, CVE-2023-21082, CVE-2022-20611, CVE-2025-26449, CVE-2025-32312, CVE-2021-0975, CVE-2023-21289, CVE-2022-20501, CVE-2014-9979, CVE-2016-5864, CVE-2023-21007, CVE-2024-43765, CVE-2025-48542, CVE-2024-49720, CVE-2023-21300, CVE-2022-20500, CVE-2023-21349, CVE-2023-21312, CVE-2024-0037, CVE-2022-20543, CVE-2024-43095, CVE-2022-20199, CVE-2023-21235, CVE-2015-9049, CVE-2023-21083, CVE-2023-40091, CVE-2023-21167, CVE-2024-0031, CVE-2024-27228, CVE-2025-48580, CVE-2024-27206, CVE-2023-40096, CVE-2022-20523, CVE-2015-9025, CVE-2024-40653, CVE-2023-21191, CVE-2023-21025, CVE-2022-20496, CVE-2023-20933, CVE-2023-21187, CVE-2022-20489, CVE-2023-35674, CVE-2015-9048, CVE-2025-48529, CVE-2025-22415, CVE-2022-20548, CVE-2022-20288, CVE-2022-20558, CVE-2024-49733, CVE-2023-20912, CVE-2025-22421, CVE-2023-21315, CVE-2015-9039, CVE-2025-48573, CVE-2015-8594, CVE-2023-21307, CVE-2024-34736, CVE-2022-20532, CVE-2022-20469, CVE-2025-48537, CVE-2015-9021, CVE-2022-20453, CVE-2023-20984, CVE-2016-10347, CVE-2023-21103, CVE-2023-20934, CVE-2022-20454, CVE-2022-20294, CVE-2023-21265, CVE-2023-21030, CVE-2025-26421, CVE-2016-10392, CVE-2024-43080, CVE-2022-39908, CVE-2023-21296, CVE-2015-8999, CVE-2022-20499, CVE-2023-21180, CVE-2022-20536, CVE-2023-21134, CVE-2023-21128, CVE-2025-48526, CVE-2017-8236, CVE-2024-34731, CVE-2024-27222, CVE-2024-27220, CVE-2023-21122, CVE-2022-39900, CVE-2022-20312, CVE-2023-21281, CVE-2023-20942, CVE-2023-40134, CVE-2017-8272, CVE-2022-20520, CVE-2023-21389, CVE-2023-40135, CVE-2025-48522, CVE-2025-26429, CVE-2023-21010, CVE-2022-20477, CVE-2017-8235, CVE-2023-20989, CVE-2017-9682, CVE-2022-20329, CVE-2017-8243, CVE-2023-40085, CVE-2022-20315, CVE-2024-31314, CVE-2024-31318, CVE-2014-9963, CVE-2014-9978, CVE-2008-7298, CVE-2022-20497, CVE-2014-9961, CVE-2022-20339, CVE-2022-20498, CVE-2022-20415, CVE-2024-49745, CVE-2024-27230, CVE-2022-20517, CVE-2017-8262, CVE-2023-20960, CVE-2023-21364, CVE-2023-21111, CVE-2023-20919, CVE-2023-45777, CVE-2015-9028, CVE-2025-48544, CVE-2025-32323, CVE-2023-21012, CVE-2025-26442, CVE-2025-22437, CVE-2017-7368, CVE-2023-21202, CVE-2016-5863, CVE-2022-20411, CVE-2023-21280, CVE-2017-9680, CVE-2024-34720, CVE-2023-21274, CVE-2023-21107, CVE-2023-40105, CVE-2022-20510, CVE-2023-21254, CVE-2022-20554, CVE-2025-32325, CVE-2025-48621, CVE-2011-0419, CVE-2022-20306, CVE-2024-0014, CVE-2023-21267, CVE-2022-20488, CVE-2023-21240, CVE-2016-10387, CVE-2023-21194, CVE-2014-9966, CVE-2016-10384, CVE-2025-48590, CVE-2023-21319, CVE-2023-20981, CVE-2024-22010, CVE-2023-40121, CVE-2023-21008, CVE-2023-21208, CVE-2022-20512, CVE-2022-20426, CVE-2023-20946, CVE-2023-40131, CVE-2025-48538, CVE-2014-9971, CVE-2023-21022, CVE-2023-21099, CVE-2023-21293, CVE-2023-20972, CVE-2022-20456, CVE-2023-21199, CVE-2023-20992, CVE-2025-32321, CVE-2023-21392, CVE-2025-48553, CVE-2016-10341, CVE-2023-21195, CVE-2015-9034, CVE-2022-20504, CVE-2023-21304, CVE-2024-43763, CVE-2015-9003, CVE-2023-21266, CVE-2024-0032, CVE-2025-48575, CVE-2024-25985, CVE-2023-40083, CVE-2023-20956, CVE-2023-40094, CVE-2023-40113, CVE-2023-20915, CVE-2024-27226, CVE-2025-26420, CVE-2023-21087, CVE-2023-20964, CVE-2024-0025, CVE-2023-21394, CVE-2023-21332, CVE-2025-22431, CVE-2023-21004, CVE-2023-21396, CVE-2023-21291, CVE-2016-5855, CVE-2017-8266, CVE-2017-7373, CVE-2022-20277, CVE-2025-20979, CVE-2023-21001, CVE-2024-31319, CVE-2023-40097, CVE-2023-21203, CVE-2022-20292, CVE-2023-21081, CVE-2017-0864, CVE-2023-21323, CVE-2023-20971, CVE-2017-0843, CVE-2022-20559, CVE-2025-48627, CVE-2022-20452, CVE-2024-43089, CVE-2024-25987, CVE-2024-22005, CVE-2022-20319, CVE-2015-9001, CVE-2023-40101, CVE-2015-9060, CVE-2022-20255, CVE-2022-20324, CVE-2022-20322, CVE-2015-9030, CVE-2023-21013, CVE-2023-40108, CVE-2022-20530, CVE-2022-20285, CVE-2023-21302, CVE-2023-21362, CVE-2024-27234, CVE-2023-21336, CVE-2023-40115, CVE-2015-9051, CVE-2025-48524, CVE-2023-21299, CVE-2022-42535, CVE-2023-21391, CVE-2025-48612, CVE-2023-21292, CVE-2022-20506, CVE-2024-40672, CVE-2024-43764, CVE-2023-21105, CVE-2024-31325, CVE-2024-27221, CVE-2024-0027, CVE-2022-20493, CVE-2025-26453, CVE-2023-21328, CVE-2024-43767, CVE-2023-20967, CVE-2023-20997, CVE-2024-27213, CVE-2023-21135, CVE-2024-43770, CVE-2022-20271, CVE-2024-0023, CVE-2025-48535, CVE-2023-20931, CVE-2023-21209, CVE-2023-20963, CVE-2022-20341, CVE-2022-20287, CVE-2022-20293, CVE-2023-21313, CVE-2025-26423, CVE-2024-40676, CVE-2014-9980, CVE-2024-43088, CVE-2022-20302, CVE-2015-9068, CVE-2023-21390, CVE-2017-0862, CVE-2015-9067, CVE-2016-5860, CVE-2022-20328, CVE-2022-20503, CVE-2025-48639, CVE-2022-20261, CVE-2024-49724, CVE-2023-21379, CVE-2015-9065, CVE-2023-21335, CVE-2023-21129, CVE-2025-48549, CVE-2022-20250, CVE-2022-20479, CVE-2022-20550, CVE-2025-48588, CVE-2023-21250, CVE-2015-9061, CVE-2023-20985, CVE-2017-8268, CVE-2024-49747, CVE-2016-10385, CVE-2017-7369, CVE-2022-20251, CVE-2022-20539, CVE-2023-20952, CVE-2022-39899, CVE-2024-0017, CVE-2025-32328, CVE-2025-26443, CVE-2023-21014, CVE-2023-20909, CVE-2016-10337, CVE-2023-20921, CVE-2023-21324, CVE-2023-21192, CVE-2023-21090, CVE-2022-20307, CVE-2023-21242, CVE-2023-21286, CVE-2025-26426, CVE-2025-48551, CVE-2024-43085, CVE-2016-5854, CVE-2023-20988, CVE-2015-9040, CVE-2022-20518, CVE-2022-20551, CVE-2023-35675, CVE-2015-9055, CVE-2025-48545, CVE-2024-43768, CVE-2023-21368, CVE-2023-21088, CVE-2025-48555, CVE-2023-40084, CVE-2024-31322, CVE-2022-20305, CVE-2023-40110, CVE-2023-40095, CVE-2022-20266, CVE-2022-20342, CVE-2022-20468, CVE-2023-20935, CVE-2025-32330, CVE-2023-21095, CVE-2022-20533, CVE-2023-20917, CVE-2022-20282, CVE-2017-8253, CVE-2023-21084, CVE-2024-43083, CVE-2017-8237, CVE-2015-9045, CVE-2023-21171, CVE-2022-20519, CVE-2023-20970, CVE-2023-20954, CVE-2023-21021, CVE-2022-20278, CVE-2025-48603, CVE-2024-43097, CVE-2023-21310, CVE-2024-40658, CVE-2016-10346, CVE-2023-21201, CVE-2025-26455, CVE-2023-21234, CVE-2025-26427, CVE-2022-20418, CVE-2022-20553, CVE-2022-20241, CVE-2022-20509, CVE-2022-20483, CVE-2023-21256, CVE-2025-48604, CVE-2023-21331, CVE-2023-21330, CVE-2024-23712, CVE-2025-22422, CVE-2023-21268, CVE-2023-40139, CVE-2025-48599, CVE-2022-20462, CVE-2022-20268, CVE-2024-0022, CVE-2022-20515, CVE-2022-20395, CVE-2024-34734, CVE-2023-40074, CVE-2023-35670, CVE-2023-21143, CVE-2022-20535, CVE-2017-7367, CVE-2022-42544, CVE-2024-27208, CVE-2023-21380, CVE-2025-22438, CVE-2025-22432, CVE-2024-31310, CVE-2017-8270, CVE-2023-21340, CVE-2025-22419, CVE-2023-20908, CVE-2023-20999, CVE-2017-9678, CVE-2025-48566, CVE-2023-21197, CVE-2023-21316, CVE-2023-20944, CVE-2022-20546, CVE-2022-20473, CVE-2023-21212, CVE-2023-40132, CVE-2023-40127, CVE-2024-0050, CVE-2022-20416, CVE-2022-20425, CVE-2022-20525, CVE-2023-21089, CVE-2022-20537, CVE-2022-20334, CVE-2023-21290, CVE-2023-21278, CVE-2023-21385, CVE-2023-20998, CVE-2023-21395, CVE-2020-13843, CVE-2024-27223, CVE-2024-43086, CVE-2023-21329, CVE-2023-21275, CVE-2023-21133, CVE-2022-20470, CVE-2023-21270, CVE-2017-8238, CVE-2023-40138, CVE-2016-5853, CVE-2023-21388, CVE-2022-20298, CVE-2023-21325, CVE-2023-21032, CVE-2024-49730, CVE-2022-20335, CVE-2024-34721, CVE-2023-35676, CVE-2022-39907, CVE-2022-20490, CVE-2024-0019, CVE-2025-22433, CVE-2023-21034, CVE-2025-48565, CVE-2025-22442, CVE-2023-20951, CVE-2023-21138, CVE-2024-0051, CVE-2023-21334, CVE-2023-21283, CVE-2024-0046, CVE-2024-43091, CVE-2023-40120, CVE-2023-21144, CVE-2024-27209, CVE-2023-21027, CVE-2024-0035, CVE-2025-22439, CVE-2024-22008, CVE-2025-48523, CVE-2022-20420, CVE-2022-39906, CVE-2017-8254, CVE-2022-20538, CVE-2025-48534, CVE-2023-40125, CVE-2014-9969, CVE-2015-9064, CVE-2023-21117, CVE-2016-5861, CVE-2023-20906, CVE-2023-35687, CVE-2024-49714, CVE-2023-21311, CVE-2023-21382, CVE-2015-0576, CVE-2022-20465, CVE-2025-48614, CVE-2024-40650, CVE-2023-21232, CVE-2015-9052, CVE-2022-20270, CVE-2023-40087, CVE-2024-40673, CVE-2023-21140, CVE-2024-0040, CVE-2022-20333, CVE-2022-20252, CVE-2022-20332, CVE-2023-21398, CVE-2023-21182, CVE-2022-20244, CVE-2022-20545, CVE-2023-21207, CVE-2022-20441, CVE-2025-48589, CVE-2022-20260, CVE-2024-23717, CVE-2025-26436, CVE-2022-20555, CVE-2023-21271, CVE-2017-8240, CVE-2022-20289, CVE-2025-22414, CVE-2025-0076, CVE-2022-20507, CVE-2023-20979, CVE-2015-9071, CVE-2023-21173, CVE-2023-21137, CVE-2025-0087, CVE-2024-34739, CVE-2017-9679, CVE-2022-20257, CVE-2015-1529, CVE-2015-9033, CVE-2023-20973, CVE-2016-5872, CVE-2021-0735, CVE-2015-8595, CVE-2025-26416, CVE-2025-48601, CVE-2023-21241, CVE-2024-27233, CVE-2015-9035, CVE-2024-0024, CVE-2023-21384, CVE-2024-0015, CVE-2022-20505, CVE-2024-40661, CVE-2024-23709, CVE-2025-26454, CVE-2023-21020, CVE-2024-49748, CVE-2023-21085, CVE-2023-21172, CVE-2025-26463, CVE-2024-31315, CVE-2024-25988, CVE-2023-21338, CVE-2024-31311, CVE-2024-40652, CVE-2023-21006, CVE-2022-20295, CVE-2023-21188, CVE-2023-21343, CVE-2025-48596, CVE-2023-21011, CVE-2023-21139, CVE-2024-0030, CVE-2023-35681, CVE-2024-43769, CVE-2023-21176, CVE-2023-40088, CVE-2023-21130, CVE-2023-21320, CVE-2023-40137, CVE-2016-10333, CVE-2023-21185, CVE-2023-21237, CVE-2023-21002, CVE-2022-20262, CVE-2023-20932, CVE-2022-20480, CVE-2022-20269, CVE-2017-7370, CVE-2022-20308, CVE-2022-20243, CVE-2023-21298, CVE-2023-20918, CVE-2023-20920, CVE-2025-48561, CVE-2023-21200, CVE-2025-48550, CVE-2023-21210, CVE-2024-23708, CVE-2024-34740, CVE-2025-26441, CVE-2022-20249, CVE-2023-21365, CVE-2023-21344, CVE-2023-40075, CVE-2023-21397, CVE-2024-40675, CVE-2023-20930, CVE-2016-10343, CVE-2022-20314, CVE-2022-20524, CVE-2024-49728, CVE-2023-21179, CVE-2017-0863, CVE-2023-20987, CVE-2023-21024, CVE-2022-20340, CVE-2023-21205, CVE-2024-0049, CVE-2023-21000, CVE-2016-10380, CVE-2023-21248, CVE-2023-40106, CVE-2023-21035, CVE-2023-21127, CVE-2023-40129, CVE-2024-0029, CVE-2024-27210, CVE-2023-40133, CVE-2022-20362, CVE-2022-20552, CVE-2015-9073, CVE-2016-10344, CVE-2022-20466, CVE-2024-34723, CVE-2023-21124, CVE-2023-35669, CVE-2022-20259, CVE-2023-40128, CVE-2025-32322, CVE-2023-21297, CVE-2014-9964, CVE-2025-48531, CVE-2023-21375, CVE-2024-40677, CVE-2022-20245, CVE-2024-43087, CVE-2023-20955, CVE-2023-21279, CVE-2014-9937, CVE-2023-21204, CVE-2023-20969, CVE-2023-21009, CVE-2017-8267, CVE-2022-20273, CVE-2022-20529, CVE-2023-20943, CVE-2023-35682, CVE-2023-45780, CVE-2023-20940, CVE-2023-21031, CVE-2025-48564, CVE-2022-20447, CVE-2023-20994, CVE-2022-20542, CVE-2015-0575, CVE-2024-27225, CVE-2023-21080, CVE-2022-20297, CVE-2016-10390, CVE-2023-21086, CVE-2023-21238, CVE-2024-0036, CVE-2022-20475, CVE-2023-21018, CVE-2022-20492, CVE-2022-20336, CVE-2021-39810, CVE-2015-9024, CVE-2023-35677, CVE-2022-20265, CVE-2022-20247, CVE-2023-21093, CVE-2024-22009, CVE-2023-21306, CVE-2022-20317, CVE-2023-21189, CVE-2016-10382, CVE-2014-9976, CVE-2022-20549, CVE-2025-22441, CVE-2024-25984, CVE-2023-20929, CVE-2023-21190, CVE-2023-20910, CVE-2022-20248, CVE-2025-26450, CVE-2016-10339, CVE-2023-40090, CVE-2023-21142, CVE-2025-48547, CVE-2024-27207, CVE-2025-48618, CVE-2022-42542, CVE-2025-22420, CVE-2022-20557, CVE-2025-26448, CVE-2023-21321, CVE-2023-21347, CVE-2021-0934, CVE-2023-21369, CVE-2024-0045, CVE-2025-22429, CVE-2023-40136, CVE-2022-20304, CVE-2014-9967, CVE-2022-20474, CVE-2023-21376, CVE-2024-40662, CVE-2023-21104, CVE-2022-20448, CVE-2023-20976, CVE-2023-21096, CVE-2023-21244, CVE-2022-20528, CVE-2024-25989, CVE-2023-40077, CVE-2023-35683, CVE-2023-20975, CVE-2022-20326, CVE-2022-20481, CVE-2022-20316, CVE-2022-20396, CVE-2024-31324, CVE-2024-43762, CVE-2025-26419, CVE-2025-48572, CVE-2023-21015, CVE-2022-20283, CVE-2023-35689, CVE-2023-21314, CVE-2023-35664, CVE-2024-0043, CVE-2023-21193, CVE-2015-8997, CVE-2023-21348, CVE-2015-9002, CVE-2023-21175, CVE-2016-10335, CVE-2022-20267, CVE-2023-40107, CVE-2016-10391, CVE-2023-21326, CVE-2022-20327, CVE-2023-21214, CVE-2024-49742, CVE-2015-9042, CVE-2019-20606, CVE-2022-20242, CVE-2022-20521, CVE-2025-48629, CVE-2024-23713, CVE-2023-45781, CVE-2023-21003, CVE-2023-21371, CVE-2023-21294, CVE-2023-21367, CVE-2024-40664, CVE-2015-9054, CVE-2023-21333, CVE-2022-20253, CVE-2023-21257, CVE-2015-9069, CVE-2024-0039, CVE-2022-20323, CVE-2022-20514, CVE-2023-21303, CVE-2023-21249, CVE-2023-21229, CVE-2023-21262, CVE-2015-9000, CVE-2023-21337, CVE-2023-21092, CVE-2022-20414, CVE-2022-20513, CVE-2023-40092, CVE-2024-27211, CVE-2023-20948, CVE-2025-22416, CVE-2015-9022, CVE-2022-20472, CVE-2023-21118, CVE-2024-34722, CVE-2023-45774, CVE-2016-5862, CVE-2015-9070, CVE-2023-21284, CVE-2022-20263, CVE-2016-5867, CVE-2022-20412, CVE-2023-21276, CVE-2021-0518, CVE-2023-21005, CVE-2022-20508, CVE-2017-8239, CVE-2025-48559, CVE-2022-20313, CVE-2023-21309, CVE-2015-9066, CVE-2024-34738 {}
heuristics/extracted_sars AGD_PRE.1, ALC_CMC.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, ALC_TSU_EXT.1, ADV_FSP.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 13 6.3.0.0, 0.21, 7.0.0.1, 6.1
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11317/
  • categories: ['Mobility']
  • category: Mobility
  • certification_date: 24.01.2023
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 24.01.2025
  • id: CCEVS-VR-VID11317
  • product: Google Pixel Devices on Android 13
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11317
  • vendor: Google LLC
  • cert_no: 2012-003-C034
  • certification_date: 22.03.2012
  • developer: JMCS Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Other Devices and Systems
    • cert_id: C034
    • certification_date: 22.03.2012
    • developer: NLTVC Sdn. Bhd. Level 2, Block C, Science@USMNo 10, Persiaran Bukit Jambul,11900 Penang, MALAYSIA. URL: http://www.nltvc.comEmail: [email protected]: +60 (4) 653 3005Fax: +60 (4) 653 3001
    • expiration_date: 22.03.2017
    • mutual_recognition: CCRA
    • product: Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/ISCB-5-RPT-C034-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE), Northern Light Video Conferencing System (NLVC), is a multipoint-to-multipoint video conferencing system. It allows conferencing of any desired number of people around the world using existing LAN infrastructure, without affecting current applications. It is software based and uses non-proprietary hardware. The TOE components include: NLVC Client version 6.3.0.0. A user based GUI application that works on the end user's PC or NLVC boardroom codec system. NLVC Server Webadmin Tool version 7.0.0.1. A web based interface use to ease the administration of the TOE (NLVC Server). NLVC Server version 6.1-0.21. The main purpose is to maintain and control conference according to the Real Time Switching (RSW) control criteria used. The evaluated security functionalities for the TOE includes: Identification and Authentication – the TOE requires that each user is successfully identified (User ID) and authenticated (password) before they are allowed to access the functionality of the TOE. Secure communication – the TOE provides a secure SSL session between the client and the server in order to protect the video feeds and command data when transmitted between the client and the server. Security Management – the TOE manages functions to ensure efficient and secure management of the TOE and its security functions. The TOE restricts access to the management functions based on the role of the user. The roles maintained by the TOE are: Chairman, Participant, Observer, and Administrator. Each access control list maps users and roles to the operations that they are permitted to perform on the object. User Data Protection – the TOE manages access control on configuration data and functions based on user role and access control lists.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C034/JMCS%20Systems%20EAL2%20Security%20Target%20(Northern%20Light%20Video%20Conferencing)%20v1.2.pdf
    • type: Multipoint-to-multipoint video conferencing system.
  • expiration_date: 22.03.2017
  • level: EAL2
  • product: Northern Light Video Conferencing System (NLVC) consist of: - NLVC Client version 6.3.0.0 - NLVC Server Webadmin Tool version 7.0.0.1 - NLVC Server version 6.1-0.21
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/151
heuristics/protection_profiles 83014eb399a802f3, 593b939921a117e0, 51729b94f0ac139f, c40ae795865a0dba {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLANC_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf {}
pdf_data/cert_filename st_vid11317-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11317-2023: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20230125130717-05'00'
  • /ModDate: D:20230125130717-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181904
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11317-vr.pdf ISCB-5-RPT-C034-CR-v1a.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-11317-2023
    • cert_item: for Google Pixel Devices on Android 13
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11317-2023: 1
  • MY:
    • ISCB-5-RPT-C034-CR-v1a: 35
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 9
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITT.1: 1
  • FIA:
    • FIA_UAU: 2
    • FIA_UAU.2: 2
    • FIA_UID: 2
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 4
    • FMT_MSA.1: 1
    • FMT_MSA.3: 2
    • FMT_MSA.3.1: 2
    • FMT_MTD: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPR:
    • FPR_ITT.1: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 7
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 9
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 9
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 12
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: comptont
  • /CreationDate: D:20230124163933-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230124163933-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 311925
  • pdf_hyperlinks: http://www.kb.cert.org/vuls/, https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20120327111223+08'00'
  • /Creator: Acrobat PDFMaker 8.1 for Word
  • /Keywords: C034 Northern Light Video Conferencing (NLVC) System
  • /ModDate: D:20120327111314+08'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20120327031203
  • /Subject: Northern Light Video Conferencing System (NLVC)
  • /Title: C034 Certification Report
  • pdf_file_size_bytes: 439358
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
pdf_data/st_filename st_vid11317-st.pdf JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 1
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM_EXT.1: 3
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 3
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 10
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 5
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 3
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 4
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 58
    • FCS_COP.1: 7
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT.1: 3
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2: 2
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 5
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 7
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 2
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 2
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLS_EXT.1: 3
    • FCS_WPA_EXT.1: 3
    • FCS_WPA_EXT.1.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT.1: 3
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_ACF_EXT.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_DAR_EXT.1: 4
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 4
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT.1: 3
    • FDP_IFC_EXT.1.1: 1
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 4
    • FDP_UPC_EXT.1: 5
  • FIA:
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT.1: 3
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 3
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 3
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 3
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 2
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 3
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_MBE_EXT: 2
    • FIA_MBE_EXT.1: 2
    • FIA_MBE_EXT.1.1: 1
    • FIA_MBE_EXT.2: 1
    • FIA_MBV_EXT: 6
    • FIA_MBV_EXT.1: 5
    • FIA_MBV_EXT.2: 1
    • FIA_PAE_EXT.1: 3
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.7: 1
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.1: 3
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 3
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 2
    • FMT_SMF_EXT.1: 2
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 3
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 3
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 2
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 3
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_BBD_EXT.1: 3
    • FPT_BBD_EXT.1.1: 1
    • FPT_BDP_EXT.1: 2
    • FPT_BDP_EXT.1.1: 1
    • FPT_BDP_EXT.1.2: 1
    • FPT_JTA_EXT.1: 3
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT.1: 3
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 4
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT.1: 3
    • FPT_NOT_EXT.1.1: 1
    • FPT_PBT_EXT.1: 2
    • FPT_PBT_EXT.1.1: 1
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 8
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 2
    • FPT_TST_EXT.3: 2
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 2
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.6: 2
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT.1: 3
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB.1: 1
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 6
    • FTP_BLT_EXT.1: 3
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 2
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 1
    • FTP_ITC.1: 3
    • FTP_ITC_EXT: 1
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 2
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP: 1
    • FCS_COP.1: 4
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 5
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ITT: 2
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
  • FIA:
    • FIA_UAU: 10
    • FIA_UAU.1: 2
    • FIA_UAU.2.1: 2
    • FIA_UID: 13
    • FIA_UID.1: 8
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA: 23
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 4
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD: 17
    • FMT_MTD.1.1: 3
    • FMT_SMF: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • A:
    • A.ADMIN: 2
    • A.CRYPTO: 2
    • A.DATABASE: 2
    • A.ENVIRONMENT: 2
    • A.MANAGEMENT: 2
    • A.PHYSICAL: 2
    • A.TRUST: 2
  • O:
    • O.ACCESS: 4
    • O.COMMS: 3
    • O.MANAGE: 2
    • O.PASSWORD: 3
    • O.USER: 3
  • OE:
    • OE.ADMIN: 2
    • OE.CRYPTO: 1
    • OE.DATABASE: 2
    • OE.ENVIRONMENT: 2
    • OE.MANAGEMENT: 2
    • OE.PHYSICAL: 2
    • OE.TRUST: 2
  • T:
    • T.ACCESS: 2
    • T.MANAGEMENT: 2
    • T.PASSWORD: 2
    • T.SNIFFING: 2
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 33
      • AES-128: 1
      • AES-256: 17
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 6
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 18
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 13
      • SHA-384: 4
      • SHA-512: 2
      • SHA256: 1
  • scrypt:
    • scrypt: 3
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • TLS:
    • TLS:
      • TLS: 67
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 21
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 7
  • VPN:
    • VPN: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 22
  • RNG:
    • RBG: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 3
  • GCM:
    • GCM: 9
  • XTS:
    • XTS: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 8
    • P-521: 4
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 24
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • IBM:
    • Secure Execution: 1
  • other:
    • TEE: 29
    • Trusty: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 13
    • FIPS 186-4: 14
    • FIPS 197: 14
    • FIPS 198-1: 12
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 9
    • SP 800-38A: 4
    • SP 800-38C: 1
    • SP 800-38D: 2
    • SP 800-38E: 4
    • SP 800-56A: 1
    • SP 800-90A: 6
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 4346: 1
    • RFC 5216: 1
    • RFC 5246: 3
    • RFC 5280: 4
    • RFC 5288: 2
    • RFC 5289: 8
    • RFC 5746: 1
    • RFC 6125: 1
    • RFC 6960: 1
  • X509:
    • X.509: 13
pdf_data/st_metadata
  • /Author: muzamir
  • /CreationDate: D:20120223110837+08'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120223110837+08'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /Title: Microsoft Word - JMCS Systems EAL2 Security Target (Northern Light Video Conferencing) v1.2.docx
  • pdf_file_size_bytes: 336015
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different