Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PR/SM for IBM z14 and IBM LinuxONE Systems Driver Level D36C with Bundle Level S08a
BSI-DSZ-CC-1109-2019
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
name PR/SM for IBM z14 and IBM LinuxONE Systems Driver Level D36C with Bundle Level S08a HarmonyOS 3.0 on Huawei MatePad Pro
category Other Devices and Systems Mobility
scheme DE NL
status archived active
not_valid_after 19.08.2024 19.12.2028
not_valid_before 19.08.2019 19.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1109c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1109a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1109b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf
manufacturer IBM Corporation Huawei Device Co., Ltd.
manufacturer_web https://www.ibm.com https://www.huawei.com/
security_level ALC_TAT.3, AVA_VAN.5, EAL5+, ALC_FLR.3, ATE_FUN.2 ALC_FLR.3, EAL2+
dgst c2f2fdbe03716621 c85f7e09316c6900
heuristics/cert_id BSI-DSZ-CC-1109-2019 NSCIB-CC-0531255-CR
heuristics/cert_lab BSI
heuristics/cpe_matches {} cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-52098, CVE-2023-46770, CVE-2023-39393, CVE-2024-45445, CVE-2025-58314, CVE-2023-39387, CVE-2023-41296, CVE-2022-41591, CVE-2022-48297, CVE-2024-47291, CVE-2024-27897, CVE-2025-54611, CVE-2024-54100, CVE-2023-52363, CVE-2022-48513, CVE-2023-52720, CVE-2023-52370, CVE-2023-37240, CVE-2022-48291, CVE-2024-45449, CVE-2023-39406, CVE-2023-39405, CVE-2023-52552, CVE-2022-48293, CVE-2025-54637, CVE-2022-48302, CVE-2024-42033, CVE-2023-52113, CVE-2023-52717, CVE-2023-39382, CVE-2024-42034, CVE-2023-52386, CVE-2024-39674, CVE-2023-39381, CVE-2024-45447, CVE-2023-46764, CVE-2023-46755, CVE-2024-54096, CVE-2024-47292, CVE-2024-36500, CVE-2024-30417, CVE-2023-46768, CVE-2023-52544, CVE-2022-44559, CVE-2023-44119, CVE-2023-52719, CVE-2024-36503, CVE-2023-49243, CVE-2023-39408, CVE-2023-52366, CVE-2024-42031, CVE-2023-44109, CVE-2024-30418, CVE-2023-52540, CVE-2023-41304, CVE-2022-48355, CVE-2023-37245, CVE-2022-44560, CVE-2023-26549, CVE-2023-52554, CVE-2022-48350, CVE-2022-44556, CVE-2023-52380, CVE-2022-48288, CVE-2023-52108, CVE-2023-52376, CVE-2023-49246, CVE-2023-39404, CVE-2023-49242, CVE-2023-52385, CVE-2023-52104, CVE-2023-52387, CVE-2022-48289, CVE-2022-48357, CVE-2023-39386, CVE-2023-52716, CVE-2022-48359, CVE-2024-54097, CVE-2023-44115, CVE-2022-48290, CVE-2022-48292, CVE-2023-52377, CVE-2023-52114, CVE-2022-48349, CVE-2023-39398, CVE-2023-26547, CVE-2022-48300, CVE-2023-39397, CVE-2023-44105, CVE-2023-46774, CVE-2024-32991, CVE-2025-54636, CVE-2024-42032, CVE-2023-46761, CVE-2023-1691, CVE-2023-52553, CVE-2022-41590, CVE-2025-66325, CVE-2024-39673, CVE-2023-52375, CVE-2024-45443, CVE-2024-42037, CVE-2024-32996, CVE-2022-48346, CVE-2024-36502, CVE-2022-48299, CVE-2023-46758, CVE-2022-48613, CVE-2023-44095, CVE-2023-37238, CVE-2025-48902, CVE-2023-52364, CVE-2024-47290, CVE-2022-44555, CVE-2023-44098, CVE-2024-56442, CVE-2024-45446, CVE-2023-52543, CVE-2023-44103, CVE-2023-52102, CVE-2025-58302, CVE-2023-7271, CVE-2024-45450, CVE-2023-44117, CVE-2023-39399, CVE-2023-52369, CVE-2023-44106, CVE-2022-44557, CVE-2023-34164, CVE-2023-52378, CVE-2024-56440, CVE-2023-52103, CVE-2023-41299, CVE-2023-44116, CVE-2023-41305, CVE-2023-44097, CVE-2023-5801, CVE-2023-1695, CVE-2023-46765, CVE-2023-52365, CVE-2023-44094, CVE-2023-52955, CVE-2024-32992, CVE-2022-48354, CVE-2023-52545, CVE-2022-48361, CVE-2023-52538, CVE-2023-52383, CVE-2024-51529, CVE-2024-45444, CVE-2022-48360, CVE-2024-51528, CVE-2023-44111, CVE-2023-41300, CVE-2023-44112, CVE-2024-54099, CVE-2023-39395, CVE-2023-41307, CVE-2023-39383, CVE-2023-52384, CVE-2023-52367, CVE-2024-32997, CVE-2023-49244, CVE-2023-4566, CVE-2023-41293, CVE-2023-41303, CVE-2023-41310, CVE-2025-31175, CVE-2023-52549, CVE-2024-32990, CVE-2023-52388, CVE-2023-52099, CVE-2023-52097, CVE-2024-30414, CVE-2024-30416, CVE-2024-51527, CVE-2023-46759, CVE-2022-48298, CVE-2022-48508, CVE-2023-1696, CVE-2023-46773, CVE-2023-39400, CVE-2024-54101, CVE-2023-44102, CVE-2023-52713, CVE-2023-52373, CVE-2023-1694, CVE-2022-44548, CVE-2023-49247, CVE-2023-41309, CVE-2023-6273, CVE-2023-44096, CVE-2023-52359, CVE-2023-52111, CVE-2024-32998, CVE-2023-41301, CVE-2022-48348, CVE-2023-44100, CVE-2023-44099, CVE-2023-49240, CVE-2023-52539, CVE-2023-52954, CVE-2023-52357, CVE-2024-58043, CVE-2023-3456, CVE-2023-49241, CVE-2023-46760, CVE-2024-56447, CVE-2023-37241, CVE-2023-4565, CVE-2023-41302, CVE-2025-53186, CVE-2024-56441, CVE-2023-39389, CVE-2023-3455, CVE-2024-57961, CVE-2023-49248, CVE-2024-27896, CVE-2023-39391, CVE-2023-46756, CVE-2023-41298, CVE-2023-52362, CVE-2023-39401, CVE-2023-44118, CVE-2023-52372, CVE-2023-46763, CVE-2023-46767, CVE-2023-52116, CVE-2024-47293, CVE-2024-56449, CVE-2025-54646, CVE-2023-52381, CVE-2025-54641, CVE-2024-32999, CVE-2023-44108, CVE-2023-52551, CVE-2025-58276, CVE-2023-39388, CVE-2023-46766, CVE-2023-49239, CVE-2023-52374, CVE-2023-52542, CVE-2023-41312, CVE-2023-41308, CVE-2024-36501, CVE-2022-48621, CVE-2023-46762, CVE-2023-1693, CVE-2023-52714, CVE-2024-56448, CVE-2022-48358, CVE-2023-52358, CVE-2022-48352, CVE-2023-37239, CVE-2023-39385, CVE-2023-52112, CVE-2023-44104, CVE-2023-41295, CVE-2022-48351, CVE-2022-44553, CVE-2022-48286, CVE-2023-52107, CVE-2021-46856, CVE-2023-46771, CVE-2023-46769, CVE-2024-51530, CVE-2025-66329, CVE-2023-41311, CVE-2022-48314, CVE-2023-52101, CVE-2024-36499, CVE-2023-39403, CVE-2023-39402, CVE-2023-39390, CVE-2023-7265, CVE-2023-52953, CVE-2024-42039, CVE-2023-37242, CVE-2022-44561, CVE-2023-52537, CVE-2023-39380, CVE-2023-52368, CVE-2022-44562, CVE-2024-32995, CVE-2022-48313, CVE-2022-48301, CVE-2022-48347, CVE-2023-44110, CVE-2023-44113, CVE-2023-52550, CVE-2023-39409, CVE-2025-54642, CVE-2022-48296, CVE-2022-48606, CVE-2023-1692, CVE-2023-52541, CVE-2023-39384, CVE-2024-54098, CVE-2024-42036, CVE-2023-49245, CVE-2023-44093, CVE-2024-42038, CVE-2023-39392, CVE-2023-26548, CVE-2024-32993, CVE-2024-39670, CVE-2023-39394, CVE-2023-52109, CVE-2023-39396, CVE-2024-57960, CVE-2023-52379, CVE-2023-44114, CVE-2024-30415, CVE-2024-45441, CVE-2024-47294
heuristics/extracted_sars ALC_FLR.3, ASE_CCL.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, ATE_FUN.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_TAT.3, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 AGD_OPE.1, ALC_FLR.3
heuristics/extracted_versions - 3.0
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1133-2020 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-1048-2018 {}
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1222-2024, BSI-DSZ-CC-1186-2023 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-1048-2018 {}
heuristics/scheme_data
pdf_data/cert_filename 1109c_pdf.pdf nscib-cc-23-0531255-cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1109-2019: 1
  • NL:
    • CC-23-0531255: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20190826140630+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a, BSI-DSZ-CC-1109-2019"
  • /ModDate: D:20190826143604+02'00'
  • /Producer: LibreOffice 6.1
  • /Subject: PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a from IBM Corporation
  • /Title: Certification Report BSI-DSZ-CC-1109-2019
  • pdf_file_size_bytes: 291533
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1109a_pdf.pdf nscib-cc-23-0531255-cr.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1109-2019
    • cert_item: PR/SM for IBM z14 and IBM LinuxONE GA2 Systems Driver Level D36C with Bundle Level S08a
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • NL:
  • DE:
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1048-2018: 3
    • BSI-DSZ-CC-1109-2019: 15
  • NL:
    • NSCIB-CC-0531255-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 4
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 4
    • ALC_TAT.3: 5
  • ATE:
    • ATE_DPT.3: 1
    • ATE_FUN.2: 5
  • AVA:
    • AVA_VAN.5: 5
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 14
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 2, 2019-08-01, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] z14 Hardware Management Console Operations Guide Version 2.14.1, Version 2.14.1, Date: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename 1109b_pdf.pdf nscib-cc-23-0531255-st_v1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1109: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 25
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 43
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 14
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.SIE: 3
  • T:
    • T.LPAR_XCTL: 5
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 6
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 24
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different