Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ZTE Optical Transmission Equipment Series
SERTIT-042
Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual
ANSSI-CC-2013/70
name ZTE Optical Transmission Equipment Series Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NO FR
not_valid_before 25.02.2013 14.02.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-042%20CR%20v%201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_70__rapport.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FQR%20110%206731%20Ed1.pdf
manufacturer ZTE Corporation Oberthur Technologies / NXP Semiconductors GmbH
manufacturer_web https://wwwen.zte.com.cn/global/index.html https://www.oberthur.com/
security_level EAL2+, ALC_FLR.2 AVA_VAN.5, EAL4+, ALC_DVS.2
dgst a041cccd8254ec7a ca15fe621a99931f
heuristics/cert_id SERTIT-042 ANSSI-CC-2013/70
heuristics/cert_lab [] THALES
heuristics/extracted_sars ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ALC_FLR.2 ALC_DVS.2, ADV_IMP.1, AGD_OPE.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_PRE.1, ATE_DPT.2, ATE_FUN.1
heuristics/extracted_versions - 7.0.1, 2.0, 1.0.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0555-2009, ANSSI-CC-2010/40, ANSSI-CC-2010/58
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2009/11, ANSSI-CC-2009/36, ANSSI-CC-2009/48, ANSSI-CC-2010/40, ANSSI-CC-2010/58, BSI-DSZ-CC-0411-2007, ANSSI-CC-2010/38, ANSSI-CC-2009/47, ANSSI-CC-2010/37, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0857-2013, ANSSI-CC-2010/36, ANSSI-CC-2009/46
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 25.02.2013
  • developer: ZTE Corporation
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-042
    • certification_date: 25.02.2013
    • description: SERTIT-042 C
    • developer: ZTE Corporation
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134824-1607951230/SERTIT/Sertifikater/2013/42/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134821-1607951226/SERTIT/Sertifikater/2013/42/SERTIT-042%20CR%20v%201.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 2, ALC_FLR.2
    • mutual_recognition: CCRA
    • product: ZXONE 5800 v1.10, ZXMP S325 v2.10, ZXMP S385 v2.60, ZXMP M720 v1.00, ZXMP M820 v2.51, ZXWM M920 V4.20P01, ZXONE 8300 v1.00, ZXONE 8500 v1.00
    • sponsor: ZTE Corporation
  • product: ZTE Optical Transmission Equipment Series
  • url: https://sertit.no/certified-products/product-archive/zte-optical-transmission-equipment-series
heuristics/st_references/directly_referencing {} ANSSI-CC-2010/40, BSI-DSZ-CC-0555-2009, ANSSI-CC-2009/48, ANSSI-CC-2012/30
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2009/48, BSI-DSZ-CC-0555-2009, ANSSI-CC-2010/40, ANSSI-CC-2012/30
heuristics/protection_profiles {} 40002c3611fc465f, 9863a376f3bb4175
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename SERTIT-042 CR v 1.0.pdf ANSSI-CC-2013_70__rapport.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2013/70
    • cert_item: Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual
    • cert_item_version: Applet version 6179 Plateforme Cosmo v7.0.1-n R2.0
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: Oberthur Technologies 420 rue d’Estienne d’Orves, CS 40008 92705 Colombes Cedex, France NXP Semiconductors GmbH Stresemannallee 101 22529 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, CS 40008 92705 Colombes Cedex
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-042: 23
  • DE:
    • BSI-DSZ-CC-0555-2009: 1
    • BSI-DSZ-CC-0857-2013: 2
  • FR:
    • ANSSI-CC-2010/40: 3
    • ANSSI-CC-2010/58: 3
    • ANSSI-CC-2013/70: 21
  • NL:
    • CC-0555-2009: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0005-: 1
    • BSI-PP-0005-2002: 3
    • BSI-PP-0006-2002: 3
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
    • EAL 2 augmented: 2
    • EAL 2+: 21
    • EAL1: 1
    • EAL2: 1
    • EAL2+: 2
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 1
    • FAU_GEN.3: 2
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
    • FAU_STG.4: 1
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_SSL.3: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.AUDITING: 1
    • O.AUTHENTICATE: 1
    • O.AUTHORISE: 1
  • OE:
    • OE.CLIENT_SECURITY: 1
    • OE.SERVER_SECURITY: 1
    • OE.TIME: 1
    • OE.TRUSTED_NETWORKS: 1
  • T:
    • T.AUTHORISED: 1
    • T.CONFIDENTIALITY: 1
    • T.INTEGRITY: 1
    • T.PHYSICAL_ATTACK: 1
    • T.UNAUTHORISED: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STM: 1
  • NXP:
    • NXP: 30
    • NXP Semiconductors: 1
  • Oberthur:
    • Oberthur Technologies: 13
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 4
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 29
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 15408: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
pdf_data/report_metadata
  • /Author: Kvassnes, Kjartan Jæger
  • /CreationDate: D:20130321125808+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20130321125953+01'00'
  • /Producer: Microsoft® Word 2010
  • /Title: tittel
  • pdf_file_size_bytes: 1423728
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: Jonathan Gimenez
  • /CreationDate: D:20140221105451+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.011
  • /ModDate: D:20140221105451+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual
  • /Title: ANSSI-CC-2013/70
  • pdf_file_size_bytes: 775355
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename ZTE Optical Transmission Equipment Security Target v1.2.pdf FQR 110 6731 Ed1.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0555-2009: 1
  • FR:
    • ANSSI-CC-2009/48: 1
    • ANSSI-CC-2010/40: 1
    • ANSSI-CC-2012/30: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0005-2002: 1
    • BSI-PP-0006-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
  • EAL:
    • EAL 4+: 2
    • EAL4: 3
    • EAL4 augmented: 2
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 7
    • AGD_OPE.1: 1
    • AGD_PRE: 13
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 5
    • ALC_FLR: 1
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 1
    • FAU_GEN.3: 8
    • FAU_GEN.3.1: 3
    • FAU_GEN.3.2: 2
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.2: 5
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID: 2
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 1
  • FTA:
    • FTA_MCS.1: 5
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_ARP.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 6
    • FCS_COP: 2
    • FCS_COP.1: 55
    • FCS_RNG: 9
    • FCS_RNG.1: 5
    • FCS_RNG.1.1: 4
    • FCS_RNG.1.2: 4
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 11
    • FDP_ACF: 2
    • FDP_ACF.1: 28
    • FDP_ETC: 2
    • FDP_ETC.1: 6
    • FDP_ITC: 2
    • FDP_ITC.1: 9
    • FDP_RIP: 2
    • FDP_RIP.1.1: 3
    • FDP_SDI: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 2
    • FDP_UCT.1: 6
    • FDP_UIT: 2
    • FDP_UIT.1: 16
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1.1: 1
    • FIA_ATD: 2
    • FIA_UAU: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 2
    • FIA_UID.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 6
    • FMT_MTD.1: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_FLS: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3.1: 1
    • FPT_TEE: 2
    • FPT_TST: 2
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 30
    • FTP_ITC.1.3: 2
    • FTP_TRP: 5
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.TRUSTED_NETWORK: 2
  • O:
    • O.ACCESS: 4
    • O.AUDITING: 4
    • O.AUTHENTICATE: 4
    • O.AUTHORISE: 4
  • OE:
    • OE.CLIENT_SECURITY: 3
    • OE.SERVER_SECURITY: 2
    • OE.TIME: 3
    • OE.TRUSTED_NETWORK: 1
    • OE.TRUSTED_NETWORKS: 1
  • OSP:
    • OSP.FLEXIBLE_MANAGEMENT: 2
  • T:
    • T.AUTHORISED: 2
    • T.CONFIDENTIALITY: 2
    • T.INTEGRITY: 2
    • T.PHYSICAL_ATTACK: 2
    • T.UNAUTHORISED: 2
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • D:
    • D.APPLI: 1
    • D.AUTH_CRYPTOGRAM: 1
    • D.AUTH_KEYS: 7
    • D.DTBS: 3
    • D.EPHEMERAL_KEYS: 4
    • D.ESERVICES_KEYS: 1
    • D.IDENTIFICATION_DATA: 1
    • D.RAD: 1
    • D.SCD: 1
    • D.SCD_ID: 1
    • D.SM_DATA: 1
    • D.STATE: 2
    • D.SVD: 1
    • D.TOE_AUTH_PRIVATE_KEYS: 1
    • D.TOE_AUTH_PUBLIC_KEYS: 1
    • D.VAD: 1
  • OE:
    • OE.HI_VAD: 4
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 8
  • Oberthur:
    • OBERTHUR: 12
    • Oberthur Technologies: 114
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 24
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 31
  • FF:
    • DH:
      • DH: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 21
    • SHA2:
      • SHA-256: 17
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 6
    • Key agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • Side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • FIPS:
    • FIPS 140-2: 5
    • FIPS PUB 180-2: 1
    • FIPS180-2: 1
  • PKCS:
    • PKCS #1: 6
    • PKCS#1: 4
    • PKCS#15: 3
    • PKCS#3: 6
  • SCP:
    • SCP02: 4
pdf_data/st_keywords/javacard_packages
  • com:
    • com.cn: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Operations Operations in the TOE are divided into • Topology: 1
    • for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope for this ST. Accounting: The TOE supports flexible logging and auditing of events. General This: 1
    • for ZTE maintenance staff that regularly services the TOE using the systems console, but this is out of scope for this ST. Accounting: The EMS supports flexible logging and auditing of security, operation and: 1
    • out of scope: 3
pdf_data/st_metadata
  • /CreationDate: D:20120816120620+02'00'
  • /Creator: PDF24 Creator
  • /ModDate: D:20120816120620+02'00'
  • /Producer: GPL Ghostscript 8.61
  • pdf_file_size_bytes: 699350
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
  • /Author: FERAUD
  • /CreationDate: D:20130822140818+02'00'
  • /Creator: PDFCreator Version 0.9.5
  • /Keywords:
  • /ModDate: D:20130822140818+02'00'
  • /Producer: GPL Ghostscript 8.61
  • /Subject:
  • /Title: FQR 110 6731 Ed1
  • pdf_file_size_bytes: 968663
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 109
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different