Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SECORA™ ID v2.02 (SLJ38Gxymm2ap)
NSCIB-CC-2400063-01-CR
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
name SECORA™ ID v2.02 (SLJ38Gxymm2ap) HarmonyOS 3.0 on Huawei MatePad Pro
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
not_valid_after 20.12.2029 19.12.2028
not_valid_before 20.12.2024 19.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400063-01-Cert.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400063-01-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400063-01-ST_1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf
manufacturer Infineon Technologies AG Huawei Device Co., Ltd.
manufacturer_web https://www.infineon.com/ https://www.huawei.com/
security_level EAL6+, ALC_FLR.1 ALC_FLR.3, EAL2+
dgst 94973cb9e99c074b c85f7e09316c6900
heuristics/cert_id NSCIB-CC-2400063-01-CR NSCIB-CC-0531255-CR
heuristics/cpe_matches {} cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-56447, CVE-2023-49246, CVE-2023-46770, CVE-2023-52364, CVE-2023-52537, CVE-2022-44553, CVE-2022-48357, CVE-2023-46766, CVE-2024-45443, CVE-2023-52114, CVE-2021-46856, CVE-2023-46774, CVE-2023-52107, CVE-2023-52380, CVE-2023-4565, CVE-2023-39406, CVE-2022-48314, CVE-2023-52108, CVE-2023-44110, CVE-2023-49241, CVE-2023-41293, CVE-2023-39390, CVE-2022-48289, CVE-2023-46771, CVE-2023-52368, CVE-2022-48299, CVE-2024-36502, CVE-2023-52370, CVE-2024-42038, CVE-2024-36500, CVE-2024-30417, CVE-2023-3455, CVE-2023-52388, CVE-2023-39397, CVE-2023-39404, CVE-2023-41307, CVE-2024-45447, CVE-2023-52116, CVE-2023-52358, CVE-2023-44108, CVE-2023-1691, CVE-2023-52373, CVE-2024-30414, CVE-2023-44112, CVE-2023-44111, CVE-2022-48352, CVE-2023-52538, CVE-2023-52369, CVE-2023-52719, CVE-2023-46767, CVE-2024-27897, CVE-2023-41302, CVE-2024-32995, CVE-2023-39400, CVE-2024-32998, CVE-2023-52386, CVE-2023-39391, CVE-2023-52111, CVE-2023-52543, CVE-2023-39382, CVE-2023-41303, CVE-2022-44561, CVE-2023-52359, CVE-2023-39383, CVE-2024-32993, CVE-2023-37240, CVE-2023-52545, CVE-2023-26549, CVE-2024-45444, CVE-2023-52357, CVE-2023-39401, CVE-2022-48508, CVE-2024-56440, CVE-2023-41305, CVE-2023-44117, CVE-2022-48347, CVE-2022-48358, CVE-2023-52376, CVE-2023-44103, CVE-2023-52381, CVE-2022-48302, CVE-2022-41590, CVE-2024-56441, CVE-2023-39395, CVE-2022-48292, CVE-2023-26548, CVE-2024-36499, CVE-2023-44095, CVE-2023-41310, CVE-2023-52544, CVE-2023-52379, CVE-2023-52367, CVE-2023-34164, CVE-2023-52103, CVE-2023-39388, CVE-2024-39673, CVE-2023-52374, CVE-2024-42037, CVE-2023-41309, CVE-2023-52101, CVE-2023-44104, CVE-2023-52717, CVE-2023-37238, CVE-2023-52385, CVE-2023-41304, CVE-2023-39398, CVE-2025-31175, CVE-2024-42033, CVE-2024-47293, CVE-2023-39403, CVE-2023-52542, CVE-2023-52365, CVE-2024-27896, CVE-2023-39399, CVE-2022-48621, CVE-2023-52540, CVE-2024-36503, CVE-2022-48288, CVE-2022-44559, CVE-2024-54098, CVE-2023-52375, CVE-2024-47294, CVE-2023-52541, CVE-2023-52383, CVE-2022-48290, CVE-2023-39408, CVE-2023-39387, CVE-2023-41299, CVE-2023-49247, CVE-2023-52372, CVE-2023-41300, CVE-2023-5801, CVE-2022-48350, CVE-2023-44097, CVE-2022-48348, CVE-2023-52953, CVE-2023-52366, CVE-2024-51529, CVE-2023-46762, CVE-2022-48300, CVE-2022-48301, CVE-2024-51527, CVE-2023-41298, CVE-2023-52955, CVE-2023-44100, CVE-2023-52112, CVE-2023-52714, CVE-2023-26547, CVE-2024-32992, CVE-2022-48296, CVE-2023-52109, CVE-2023-52098, CVE-2024-36501, CVE-2023-44105, CVE-2023-52550, CVE-2024-54099, CVE-2024-54097, CVE-2023-41295, CVE-2023-46758, CVE-2024-45449, CVE-2023-39393, CVE-2024-47290, CVE-2023-52716, CVE-2022-48313, CVE-2024-30415, CVE-2023-52551, CVE-2022-44556, CVE-2024-54100, CVE-2023-44102, CVE-2023-1694, CVE-2023-52552, CVE-2024-45450, CVE-2023-44094, CVE-2023-41312, CVE-2023-44093, CVE-2023-46761, CVE-2022-48349, CVE-2023-46764, CVE-2023-44096, CVE-2023-1693, CVE-2023-44115, CVE-2024-51530, CVE-2024-54101, CVE-2022-48297, CVE-2022-44560, CVE-2022-48361, CVE-2023-52113, CVE-2023-39384, CVE-2022-48293, CVE-2024-54096, CVE-2023-49245, CVE-2023-52377, CVE-2023-52549, CVE-2024-45446, CVE-2024-47291, CVE-2023-39409, CVE-2023-1692, CVE-2024-30418, CVE-2023-52362, CVE-2023-1696, CVE-2024-51528, CVE-2024-57961, CVE-2023-37241, CVE-2024-47292, CVE-2022-48355, CVE-2023-7271, CVE-2023-39396, CVE-2024-32996, CVE-2022-48613, CVE-2022-48286, CVE-2023-44113, CVE-2023-49242, CVE-2023-49240, CVE-2023-46759, CVE-2023-37242, CVE-2022-48513, CVE-2023-49248, CVE-2023-44119, CVE-2023-52713, CVE-2023-6273, CVE-2024-56442, CVE-2023-41296, CVE-2023-46763, CVE-2024-39674, CVE-2023-46769, CVE-2024-32997, CVE-2024-42039, CVE-2024-42031, CVE-2023-52363, CVE-2023-44106, CVE-2023-46760, CVE-2024-42034, CVE-2023-41301, CVE-2022-48354, CVE-2024-32999, CVE-2023-39402, CVE-2022-44562, CVE-2023-4566, CVE-2023-39394, CVE-2023-7265, CVE-2023-44099, CVE-2024-42036, CVE-2024-30416, CVE-2022-48351, CVE-2023-46755, CVE-2023-41308, CVE-2024-32991, CVE-2023-49239, CVE-2022-48346, CVE-2023-52104, CVE-2023-49243, CVE-2023-52387, CVE-2023-52099, CVE-2024-39670, CVE-2023-39405, CVE-2023-46773, CVE-2022-48360, CVE-2022-48298, CVE-2025-48902, CVE-2022-44557, CVE-2024-56449, CVE-2022-48359, CVE-2023-52554, CVE-2023-44114, CVE-2023-46765, CVE-2023-52553, CVE-2023-44098, CVE-2023-44118, CVE-2022-44555, CVE-2023-3456, CVE-2024-57960, CVE-2023-52384, CVE-2022-44548, CVE-2023-39381, CVE-2023-52954, CVE-2023-39385, CVE-2023-39389, CVE-2023-44109, CVE-2023-52539, CVE-2023-49244, CVE-2024-32990, CVE-2023-39392, CVE-2023-1695, CVE-2023-52097, CVE-2023-39386, CVE-2023-52102, CVE-2023-52720, CVE-2023-46756, CVE-2024-56448, CVE-2023-52378, CVE-2023-41311, CVE-2023-44116, CVE-2023-37245, CVE-2024-45445, CVE-2023-46768, CVE-2024-42032, CVE-2022-41591, CVE-2022-48291, CVE-2024-45441, CVE-2023-39380, CVE-2023-37239, CVE-2022-48606, CVE-2024-58043
heuristics/extracted_sars ALC_FLR.1, AGD_OPE.1, ALC_TAT.2, ASE_ECD.1, ADV_TDS.4, ATE_DPT.1, ALC_DEL.1, ALC_CMS.4, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ADV_INT.2, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ADV_SPM.1, ASE_TSS.1, AVA_VAN.5, ATE_COV.2, ATE_FUN.1, ALC_DVS.2, ADV_FSP.5, AGD_PRE.1, ALC_CMC.4 ALC_FLR.3, AGD_OPE.1
heuristics/extracted_versions 2.02 3.0
heuristics/report_references/directly_referenced_by NSCIB-CC-2400169-01-CR, NSCIB-CC-2400171-01-CR, NSCIB-CC-2400167-01-CR, NSCIB-CC-2400168-01-CR {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-1169-V4-2024 {}
heuristics/report_references/indirectly_referenced_by NSCIB-CC-2400171-01-CR, NSCIB-CC-2400169-01-CR, NSCIB-CC-2400167-01-CR, NSCIB-CC-2400168-01-CR {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1169-V4-2024, BSI-DSZ-CC-1169-V2-2022, BSI-DSZ-CC-1169-V3-2024 {}
heuristics/scheme_data
heuristics/st_references/directly_referenced_by NSCIB-CC-2400169-01-CR, NSCIB-CC-2400171-01-CR, NSCIB-CC-2400167-01-CR, NSCIB-CC-2400168-01-CR {}
heuristics/st_references/directly_referencing BSI-DSZ-CC-1169-V4-2024 {}
heuristics/st_references/indirectly_referenced_by NSCIB-CC-2400171-01-CR, NSCIB-CC-2400169-01-CR, NSCIB-CC-2400167-01-CR, NSCIB-CC-2400168-01-CR {}
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1169-V4-2024 {}
heuristics/protection_profiles 7f886b64878b68c1 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf {}
pdf_data/cert_filename NSCIB-CC-2400063-01-Cert.pdf nscib-cc-23-0531255-cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • NSCIB-2400063-01: 1
    • NSCIB-CC-2400063-01: 1
  • NL:
    • CC-23-0531255: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL7: 1
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Gebruiker
  • /CreationDate: D:20241224160107+00'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20241224160107+00'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 177896
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename NSCIB-CC-2400063-01-CR.pdf nscib-cc-23-0531255-cr.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-2400063-01-CR
    • cert_item: SECORA™ ID v2.02 (SLJ38Gxymm2ap
    • cert_lab: SGS Brightsight B.V.
    • developer: Infineon Technologies AG
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1169-V4-2024: 2
  • NL:
    • NSCIB-2400063-01: 1
    • NSCIB-CC-2400063-01-CR: 12
  • NL:
    • NSCIB-CC-0531255-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 3
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN.5: 1
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 5
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • TUV:
    • TÜV Informationstechnik: 2
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 1
      • SHA224: 1
      • SHA256: 3
      • SHA384: 2
      • SHA512: 2
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
  • SCA:
    • Side channel: 1
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 36: 2
    • AIS31: 1
  • PKCS:
    • PKCS#1: 1
pdf_data/report_metadata
pdf_data/st_filename NSCIB-CC-2400063-01-ST_1.1.pdf nscib-cc-23-0531255-st_v1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1169-V4-2024: 2
  • NL:
    • NSCIB-CC-2400063-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL 6+: 2
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 2
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 7
    • ADV_IMP.1: 8
    • ADV_INT.2: 1
    • ADV_SPM.1: 7
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 9
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 2
    • ALC_FLR.1: 3
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 9
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 1
    • FCS_COP: 9
    • FCS_COP.1: 13
    • FCS_RNG: 4
    • FCS_RNG.1: 19
  • FDP:
    • FDP_ACC: 28
    • FDP_ACC.1: 10
    • FDP_ACC.2: 11
    • FDP_ACF: 24
    • FDP_ACF.1: 26
    • FDP_IFC: 24
    • FDP_IFC.1: 8
    • FDP_IFC.2: 2
    • FDP_IFF: 15
    • FDP_IFF.1: 11
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 14
    • FDP_ITC.2: 10
    • FDP_ITT.1: 1
    • FDP_RIP: 47
    • FDP_RIP.1: 9
    • FDP_ROL: 15
    • FDP_ROL.1: 4
    • FDP_SDC.1: 2
    • FDP_SDI: 6
    • FDP_SDI.2: 4
    • FDP_UIT: 9
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 5
    • FIA_ATD.1: 1
    • FIA_UAU: 16
    • FIA_UAU.1: 2
    • FIA_UAU.4: 1
    • FIA_UID: 20
    • FIA_UID.1: 7
    • FIA_UID.2: 1
    • FIA_USB: 5
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 94
    • FMT_MSA.1: 14
    • FMT_MSA.2: 1
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 1
    • FMT_MTD: 10
    • FMT_MTD.1: 1
    • FMT_MTD.3: 1
    • FMT_SMF: 27
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 28
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 6
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 21
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RCV: 6
    • FPT_RCV.3: 4
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 12
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 1
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 6
    • D.APP_I_DATA: 7
    • D.APP_KEY: 1
    • D.APP_KEYS: 4
    • D.CM_DATA: 4
    • D.CRYPTO: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 6
    • D.JCS_KEYS: 1
    • D.PIN: 6
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 13
    • O.APPLET: 16
    • O.ARRAY_VIEWS_CONFID: 6
    • O.ARRAY_VIEWS_INTEG: 5
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 47
    • O.CIPHER: 8
    • O.CODE_CAP_FILE: 12
    • O.CODE_PKG: 2
    • O.COMMUNICATION: 19
    • O.DELETION: 7
    • O.FIREWALL: 19
    • O.GLOBAL_ARRAYS_CONFID: 7
    • O.GLOBAL_ARRAYS_INTEG: 7
    • O.INSTALL: 10
    • O.JAVAOBJECT: 42
    • O.KEY-MNGT: 7
    • O.LOAD: 15
    • O.NATIVE: 9
    • O.OBJ-DELETION: 6
    • O.OPERATE: 17
    • O.PIN-MNGT: 8
    • O.REALLOCATION: 7
    • O.RECOVERY: 1
    • O.RESOURCES: 8
    • O.RNG: 9
    • O.SAND_BOX: 15
    • O.SCP: 40
    • O.SID: 15
    • O.TDES: 1
    • O.TRANSACTION: 8
    • O.VERIFICATION: 1
  • OE:
    • OE.CAP_FILE: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 11
    • OE.SCP: 3
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 2
    • OP.ARRAY_T_ASTORE: 3
    • OP.ARRAY_T_LOAD: 1
    • OP.CREATE: 6
    • OP.DELETE_APPLET: 4
    • OP.DELETE_CAP_FILE: 3
    • OP.DELETE_CAP_FILE_APPLET: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 6
    • OP.PUT: 4
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.SAND_BOX_ACCESS: 1
    • OP.SAND_BOX_ACCESS_SFR: 1
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.SAND_BOX: 2
    • OSP.VERIFICATION: 3
  • R:
    • R.JAVA: 12
  • T:
    • T.COMMUNICATION: 4
    • T.CONFID-APPLI-DATA: 6
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 6
    • T.DELETION: 4
    • T.EXE-CODE: 6
    • T.INSTALL: 4
    • T.INTEG-: 3
    • T.INTEG-APPLI-: 5
    • T.INTEG-APPLI-CODE: 5
    • T.INTEG-APPLI-DATA: 7
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 4
    • T.LIFE_CYCLE: 4
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 4
    • T.RESOURCES: 5
    • T.RNG: 5
    • T.SAND_BOX: 5
    • T.SID: 9
    • T.UNAUTHORIZED_CA: 1
    • T.UNAUTHORIZED_CARD_MNGT: 3
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 7
    • Infineon Technologies: 6
    • Infineon Technologies AG: 4
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDES: 8
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 3
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 1
      • SHA224: 7
      • SHA256: 10
      • SHA384: 8
      • SHA512: 2
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 9
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 12
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 44
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 3
  • SCA:
    • DPA: 1
    • physical probing: 2
    • side channel: 2
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 4
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 186-4: 4
    • FIPS 197: 6
    • FIPS PUB 198-1: 3
  • ICAO:
    • ICAO: 7
  • ISO:
    • ISO/IEC 9797: 2
    • ISO/IEC 9797-1: 7
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38B: 1
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 3
  • SCP:
    • SCP 02: 1
    • SCP 03: 1
    • SCP02: 3
    • SCP03: 3
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • EC:
      • ALG_EC_SVDP_DH_PLAIN: 1
      • ALG_EC_SVDP_DH_PLAIN_XY: 1
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 1
  • org:
    • org.globalplatform: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
  • /Author: Kalaiselvam Suruddaiyan;Infineon Technologies AG
  • /CreationDate: D:20241219110741+01'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: Infineon
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ActionId: e0f13a61-3a8e-4be9-ba91-693349c4ba23
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ContentBits: 0
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Enabled: true
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Method: Standard
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Name: a15a25aa-e944-415d-b7a7-40f6b9180b6b
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SetDate: 2023-05-03T10:08:12Z
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SiteId: eeb8d0e8-3544-41d3-aac6-934c309faf5a
  • /ModDate: D:20241219112443+01'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: SECORA™ ID SLJ38G v2.02 Security Target
  • pdf_file_size_bytes: 2052644
  • pdf_hyperlinks: mailto:dsscustomerservice@infineon.com, http://www.infineon.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different