Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 12 - Spring
CCEVS-VR-VID-11228-2022
KONICA MINOLTA bizhub C360i/bizhub C300i/bizhub C250i/bizhub C036DNi/bizhub 030DNi/bizhub C025DNi with FK-514, DEVELOP ineo+ 360i/ineo+ 300i/ineo+ 250i with FK-514 G00-45
JISEC-CC-CRP-C0669-01-2020
name Samsung Galaxy Devices on Android 12 - Spring KONICA MINOLTA bizhub C360i/bizhub C300i/bizhub C250i/bizhub C036DNi/bizhub 030DNi/bizhub C025DNi with FK-514, DEVELOP ineo+ 360i/ineo+ 300i/ineo+ 250i with FK-514 G00-45
category Mobility Multi-Function Devices
scheme US JP
not_valid_after 25.05.2024 17.03.2025
not_valid_before 25.05.2022 17.03.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0669kz_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0669_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0669_est.pdf
manufacturer Samsung Electronics Co., Ltd. KONICA MINOLTA, INC.
manufacturer_web https://www.samsung.com https://www.konicaminolta.com/index.html
dgst a5d5bc8a08fcbe07 441e6dc9572ee269
heuristics/cert_id CCEVS-VR-VID-11228-2022 JISEC-CC-CRP-C0669-01-2020
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:* cpe:2.3:h:konicaminolta:bizhub_360i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_300i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*
heuristics/related_cves CVE-2023-30710, CVE-2024-34668, CVE-2024-34642, CVE-2023-42528, CVE-2023-30712, CVE-2024-34637, CVE-2024-20811, CVE-2023-21430, CVE-2025-20904, CVE-2024-34666, CVE-2023-30696, CVE-2024-20879, CVE-2024-20810, CVE-2024-20815, CVE-2023-21456, CVE-2024-34610, CVE-2023-30701, CVE-2023-30679, CVE-2024-20832, CVE-2023-21454, CVE-2024-20900, CVE-2024-34608, CVE-2023-21461, CVE-2025-20886, CVE-2024-34646, CVE-2023-30699, CVE-2023-21437, CVE-2023-30685, CVE-2024-34595, CVE-2023-42568, CVE-2024-20813, CVE-2024-20803, CVE-2024-34602, CVE-2024-34652, CVE-2023-42559, CVE-2023-21423, CVE-2023-30706, CVE-2024-34605, CVE-2023-21457, CVE-2024-20863, CVE-2023-21485, CVE-2025-20907, CVE-2024-34655, CVE-2023-30716, CVE-2024-20820, CVE-2024-49411, CVE-2023-30693, CVE-2024-34583, CVE-2023-21435, CVE-2023-42557, CVE-2023-21460, CVE-2024-20819, CVE-2023-21502, CVE-2024-34607, CVE-2024-20842, CVE-2024-34619, CVE-2024-34615, CVE-2024-34591, CVE-2023-21493, CVE-2024-49415, CVE-2024-20889, CVE-2023-30687, CVE-2023-42537, CVE-2024-34651, CVE-2023-21495, CVE-2024-20866, CVE-2024-20857, CVE-2023-21488, CVE-2024-20875, CVE-2025-20882, CVE-2023-30691, CVE-2023-21451, CVE-2023-42530, CVE-2024-20848, CVE-2023-30654, CVE-2023-42564, CVE-2024-20818, CVE-2023-30692, CVE-2025-20889, CVE-2024-20865, CVE-2025-20884, CVE-2023-30727, CVE-2023-21458, CVE-2024-20891, CVE-2025-20888, CVE-2024-34604, CVE-2023-30721, CVE-2024-20817, CVE-2023-42570, CVE-2023-21504, CVE-2024-49414, CVE-2023-30731, CVE-2024-20898, CVE-2023-42556, CVE-2024-34639, CVE-2024-34612, CVE-2023-30718, CVE-2024-34667, CVE-2024-20862, CVE-2024-34589, CVE-2024-34616, CVE-2023-21427, CVE-2023-30690, CVE-2023-30720, CVE-2023-21436, CVE-2024-20897, CVE-2023-21446, CVE-2023-42531, CVE-2023-30688, CVE-2023-30708, CVE-2023-21487, CVE-2024-20836, CVE-2024-20814, CVE-2024-20895, CVE-2024-20878, CVE-2023-42562, CVE-2023-42569, CVE-2024-20831, CVE-2023-21429, CVE-2024-34640, CVE-2024-20890, CVE-2023-30713, CVE-2024-20892, CVE-2025-20883, CVE-2024-20846, CVE-2024-20843, CVE-2024-34587, CVE-2024-34606, CVE-2023-21452, CVE-2023-21490, CVE-2024-34678, CVE-2024-20894, CVE-2024-20845, CVE-2023-21425, CVE-2023-21492, CVE-2024-34614, CVE-2024-34609, CVE-2024-20835, CVE-2024-20847, CVE-2024-20816, CVE-2023-30681, CVE-2023-30717, CVE-2023-30739, CVE-2024-34585, CVE-2023-21438, CVE-2023-42533, CVE-2024-20859, CVE-2024-20896, CVE-2023-30694, CVE-2024-49410, CVE-2023-30700, CVE-2024-20882, CVE-2024-20861, CVE-2024-34638, CVE-2024-34680, CVE-2023-42535, CVE-2024-20804, CVE-2024-20899, CVE-2024-34669, CVE-2024-34592, CVE-2023-30711, CVE-2023-21441, CVE-2023-21428, CVE-2024-34676, CVE-2024-20881, CVE-2023-30714, CVE-2024-34674, CVE-2024-20893, CVE-2024-20877, CVE-2025-20891, CVE-2024-34588, CVE-2024-34611, CVE-2023-21491, CVE-2023-42534, CVE-2023-21486, CVE-2025-20890, CVE-2024-34653, CVE-2024-34648, CVE-2023-21442, CVE-2025-20934, CVE-2024-34673, CVE-2024-34590, CVE-2024-34593, CVE-2024-34677, CVE-2023-21439, CVE-2023-30715, CVE-2023-21424, CVE-2024-34665, CVE-2024-20812, CVE-2025-20881, CVE-2024-34618, CVE-2023-30686, CVE-2024-20844, CVE-2023-42560, CVE-2024-20805, CVE-2024-20880, CVE-2023-42566, CVE-2023-21421, CVE-2023-21445, CVE-2023-30733, CVE-2023-42532, CVE-2024-34645, CVE-2024-20888, CVE-2024-34641, CVE-2023-21489, CVE-2024-20833, CVE-2024-20834, CVE-2023-21484, CVE-2023-42563, CVE-2024-20830, CVE-2024-20806, CVE-2023-42529, CVE-2024-20901, CVE-2023-21422, CVE-2023-30707, CVE-2025-20885, CVE-2024-34594, CVE-2025-20887, CVE-2024-34586, CVE-2023-42538, CVE-2023-30697, CVE-2025-20905, CVE-2023-30719, CVE-2024-20858, CVE-2023-21496, CVE-2023-30680, CVE-2024-20849, CVE-2024-34647, CVE-2023-42527, CVE-2023-42561, CVE-2023-30689, CVE-2023-42536, CVE-2023-30709, CVE-2024-20876 {}
heuristics/extracted_sars ATE_IND.1, AVA_VAN.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_CMS.1, AGD_OPE.1, ALC_CMC.1, ADV_FSP.1 ATE_IND.1, ASE_ECD.1, AVA_VAN.1, AGD_PRE.1, ASE_OBJ.1, ASE_INT.1, ALC_CMS.1, AGD_OPE.1, ADV_FSP.1, ASE_SPD.1, ALC_CMC.1, ASE_REQ.1, ASE_CCL.1, ASE_TSS.1
heuristics/extracted_versions 12 514, 45
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0669
  • certification_date: 01.03.2020
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0669
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000002xcb-att/c0669_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Section, Multimedia Technology team, Information and Communication Research Division
    • product: KONICA MINOLTA bizhub C360i/bizhub C300i/bizhub C250i/bizhub C036DNi/bizhub C030DNi/bizhub C025DNi with FK-514, DEVELOP ineo+ 360i/ineo+ 300i/ineo+ 250i with FK-514
    • product_type: Multi-Function Printer
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000002xcb-att/c0669_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000002xcb-att/c0669_est.pdf
    • toe_version: G00-45
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.04.2025
  • revalidations: [frozendict({'date': '2020-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0669_it9717_01.html'})]
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_name: KONICA MINOLTA bizhub C360i / bizhub C300i / bizhub C250i / bizhub C036DNi / bizhub C030DNi / bizhub C025DNi with FK-514, DEVELOP ineo+ 360i / ineo+ 300i / ineo+ 250i with FK-514G00-45
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0669_it9717.html
  • toe_overseas_name: KONICA MINOLTA bizhub C360i / bizhub C300i / bizhub C250i / bizhub C036DNi / bizhub C030DNi / bizhub C025DNi with FK-514, DEVELOP ineo+ 360i / ineo+ 300i / ineo+ 250i with FK-514 Sindoh D452 / D451 / D450 / CM3093 / CM3035 / CM2075 with FK-514G00-45
heuristics/protection_profiles 731bdcc989507942, c40ae795865a0dba, 83014eb399a802f3, c88af12926be2779, 0525a97b2c253a6b b2cfec7a92fa2940
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf
pdf_data/cert_filename st_vid11228-ci.pdf c0669kz_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11228-2022: 1
  • JP:
    • JISEC-CC-CRP-C0669-01-2020: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20220526133456-04'00'
  • /ModDate: D:20220526133456-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181572
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200826162441+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20200826162622+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 89908
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11228-vr.pdf c0669_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11228-2022
    • cert_item: Samsung Galaxy Devices on Android 12 - Spring
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11228-2022: 1
  • JP:
    • JISEC-CC-CRP-C0669-01-2020: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 38
  • Samsung:
    • Samsung: 65
  • Microsoft:
    • Microsoft: 14
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 9
  • VPN:
    • VPN: 11
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_metadata
  • /Author: comptont
  • /CreationDate: D:20220629171025-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220629171025-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 429023
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search, http://www.kb.cert.org/vuls/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /CreationDate: D:20200415133324+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20200415133408+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 432221
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
pdf_data/st_filename st_vid11228-st.pdf c0669_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 19
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM_EXT: 21
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 2
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 49
    • FCS_COP.1: 9
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 6
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 9
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 6
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 7
    • FDP_UPC_EXT.1: 4
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 18
    • FIA_BLT_EXT.1: 2
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 2
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 1
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 11
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_UAU.6.2: 1
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 1
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 14
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 18
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 17
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 3
    • FPT_TUD_EXT: 10
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 1
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.6: 1
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 10
    • FTP_BLT_EXT.1: 1
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 1
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 1
    • FTP_ITC_EXT: 5
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 35
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 17
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 61
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 25
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 6
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 3
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 10
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 2
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 7
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • D:
    • D.TSF: 7
    • D.USER: 79
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 2
    • O.COMMS_PROTECTION: 7
    • O.FAX_NET_SEPARATION: 1
    • O.STORAGE_ENCRYPTION: 1
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 3
  • Qualcomm:
    • Qualcomm: 64
  • Samsung:
    • Samsung: 193
  • Microsoft:
    • Microsoft: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 22
      • AES-: 5
      • AES-128: 1
      • AES-256: 11
  • constructions:
    • MAC:
      • HMAC: 13
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 3
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 6
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 2
  • RSA:
    • RSA-2048: 1
    • RSA-3072: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 24
      • SHA-384: 3
      • SHA-512: 2
  • scrypt:
    • scrypt: 3
  • SHA:
    • SHA1:
      • SHA-1: 11
    • SHA2:
      • SHA-224: 2
      • SHA-256: 16
      • SHA-384: 8
      • SHA-512: 11
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KEX:
    • Key Exchange: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 13
    • IKEv2: 11
  • IPsec:
    • IPsec: 42
  • TLS:
    • TLS:
      • TLS: 57
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 98
  • IKE:
    • IKE: 9
    • IKEv1: 19
    • IKEv2: 9
  • IPsec:
    • IPsec: 59
  • SSH:
    • SSH: 9
  • TLS:
    • TLS:
      • TLS: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 14
    • RNG: 1
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 8
    • secp256r1: 2
    • secp384r1: 2
  • NIST:
    • P-256: 10
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 22
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 4
  • other:
    • TEE: 26
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 7
    • FIPS 186-4: 8
    • FIPS 197: 10
    • FIPS 198-1: 6
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 4
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 4
    • SP 800-38A: 2
    • SP 800-38C: 2
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 5
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 3
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 3
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
    • RFC 8247: 1
    • RFC 8784: 1
  • X509:
    • X.509: 11
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 13
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 18031:2011: 5
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-90A: 5
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 3602: 10
    • RFC 4106: 6
    • RFC 4109: 4
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 6
    • RFC 4868: 9
    • RFC 5282: 3
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_metadata
  • /Author:
  • /Comments:
  • /CreationDate: D:20200413165958+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 15
  • /Keywords:
  • /ModDate: D:20200413170048+09'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20200413075942
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1337019
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 88
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different