name |
FusionAccess Software version V100R006C20 |
Samsung STRONGV2P0 of S5E9840 with Specific IC Dedicated Software revision 1.1 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
ES |
status |
archived |
active |
not_valid_after |
22.11.2023 |
19.03.2027 |
not_valid_before |
22.11.2018 |
19.03.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-03-CCRA.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-30_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-03_INF-2526.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-30%20INF-3758.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-03_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-30%20ST_Lite.pdf |
manufacturer |
Huawei Technologies Co. Ltd. |
Samsung Electronics Co., Ltd. |
manufacturer_web |
https://www.huawei.com |
https://www.samsung.com |
security_level |
EAL3+, ALC_FLR.2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
a094f9e703ffd620 |
72599c19fe609d91 |
heuristics/cert_id |
2017-3-INF-2526 |
2020-30-INF-3758 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Smart Cards and similiar devices
- certification_date: 19.03.2022
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1402
- certification_date: 19.03.2022
- description: The Target of Evaluation (TOE), the STRONGV2P0 secure subsystem is a Hard macro instantiated within an SOC which is composed of a processing unit, security components, hardware circuit for testing purpose during the manufacturing process and volatile and non-volatile memories (hardware). The TOE also includes any IC Designer/Manufacturer proprietary IC Dedicated Software as long as it physically exists in an STRONGV2P0 after being delivered by the IC Manufacturer. Such software (also known as IC bootloader/firmware) is used for providing additional services to facilitate the usage of the hardware and/or to provide additional services, a random number generation library and a random number generator. All other software is called Security IC Embedded Software and is not part of the TOE. The Security IC Embedded Software is initially stored in encrypted form in external NVM (Flash). The SoC S5E9840 is necessary to operate the STRONGV2P0 but it is not TOE hardware.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Samsung Electronics Co., Ltd
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1403
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1401
- type: Product
- manufacturer: Samsung Electronics Co., Ltd
- product: Samsung STRONGV2P0 of S5E9840 with Specific IC Dedicated Software revision 1.1
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/802-samsung-strongv2p0-of-s5e9840-with-specific-ic-dedicated-software-revision-1-1
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
2017-03-CCRA.pdf |
2020-30_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 857543
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20220304170813+01'00'
- /ModDate: D:20220304170813+01'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 888641
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
2017-03_INF-2526.pdf |
2020-30 INF-3758.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL3: 8
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE: 5
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_FLR.2: 8
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FAU_STG.3: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UAU: 2
- FIA_UID: 2
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.3: 1
- FMT_SMR.1: 1
- FTA:
- FTP:
|
- FAU:
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_DAU: 1
- FDP_IFC.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_SDR.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 4
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-512: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 362183
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
|
pdf_data/st_filename |
2017-03_ST.pdf |
2020-30 ST_Lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084: 1
- BSI-CC-PP-0084-: 1
- BSI-PP-0084: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL5: 6
- EAL5 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU: 12
- FIA_UAU.2: 1
- FIA_UAU.2.1: 2
- FIA_UID: 12
- FIA_UID.1: 5
- FIA_UID.2: 1
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS.1: 6
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.4: 5
- FCS_COP: 15
- FCS_COP.1: 9
- FCS_RNG: 6
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 19
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 7
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT: 1
- FDP_ITT.1: 18
- FDP_ITT.1.1: 1
- FDP_SDC: 11
- FDP_SDC.1: 15
- FDP_SDC.1.1: 2
- FDP_SDI: 8
- FDP_SDI.1: 3
- FDP_SDI.2: 10
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDR: 6
- FDP_SDR.1: 11
- FDP_SDR.1.1: 2
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_URC: 12
- FDP_URC.1: 6
- FDP_URC.1.1: 1
- FDP_URC.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_UID: 7
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 82
- FMT_LIM.1: 12
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_ETD: 1
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FPT_RPL: 7
- FPT_RPL.1: 3
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 16
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 5
- O.MEM_ACCESS: 1
- O.RND: 6
- O.TDES: 7
- T:
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 70
- Huawei Technologies Co: 56
- Microsoft:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 16
- Triple-DES: 6
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 2
- SHA-512: 2
- SHA2: 1
- SHA384: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 2
- TLS 1.2: 2
- TLSv1.2: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 26
- malfunction: 10
- physical tampering: 2
- SCA:
- DPA: 3
- Leak-Inherent: 21
- Physical Probing: 4
- Physical probing: 2
- SPA: 2
- physical probing: 9
- side-channel: 2
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 3
- CCMB-2017-04-002: 3
- CCMB-2017-04-003: 3
- CCMB-2017-04-004: 3
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS PUB 180-3: 3
- FIPS197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 1 Evaluated Configuration 15 1.4.2 Logical Scope 15 1.4.3 Physical Scope 16 1.4.4 Summary of items out of scope of the TOE 17 2 CC Conformance Claim 18 3 TOE Security Problem Definition 19 3.1 Assets 19 3.2: 1
- Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 17 1.4.4 Summary of items out of scope of the TOE The items out of scope of the TOE include the components with which FusionAccess is: 1
- out of scope: 3
|
- OutOfScope:
- out of scope: 2
- out of scope) GCM mode (out of scope) 21 TORNADO-H Built-in hardware accelerator for big number calculation: 1
- the security of the crypto service for the user is not in the scope of the evaluation. CTR mode (out of scope) GCM mode (out of scope) 21 TORNADO-H Built-in hardware accelerator for big number calculation: 1
|
pdf_data/st_metadata |
- /Author:
- /Comments:
- /Company:
- /CreationDate: D:20181123092144+08'21'
- /Creator: WPS Office Community
- /Keywords:
- /ModDate: D:20181123092144+08'21'
- /Producer:
- /SourceModified: D:20181123092144+08'21'
- /Subject:
- /Title:
- /Trapped: False
- pdf_file_size_bytes: 523833
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: Samsung
- /CreationDate: D:20220217191933+09'00'
- /Creator: Microsoft® Word 2016
- /Keywords: ST_lite S5E9840_SSP01
- /ModDate: D:20220217192349+09'00'
- /Producer: Microsoft® Word 2016
- /Subject: ST_lite S5E9840_SSP01
- /Title: ST_lite S5E9840_SSP01
- pdf_file_size_bytes: 1193990
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 102
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |