Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
S3FT9MF/S3FT9MT/S3FT9MS (S3FT9MF_20231219) (ANSSI-CC-2024/07)
ANSSI-CC-2024/07
name HarmonyOS 3.0 on Huawei MatePad Pro S3FT9MF/S3FT9MT/S3FT9MS (S3FT9MF_20231219) (ANSSI-CC-2024/07)
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NL FR
not_valid_after 19.12.2028 16.05.2029
not_valid_before 19.12.2023 16.05.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_07fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_07fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_07.pdf
manufacturer Huawei Device Co., Ltd. Samsung Electronics Co., Ltd.
manufacturer_web https://www.huawei.com/ https://www.samsung.com
security_level EAL2+, ALC_FLR.3 EAL6+, ASE_TSS.2
dgst c85f7e09316c6900 c7adb2b7e2ee6ae2
heuristics/cert_id NSCIB-CC-0531255-CR ANSSI-CC-2024/07
heuristics/cert_lab []
heuristics/cpe_matches cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-44114, CVE-2024-47291, CVE-2022-48314, CVE-2024-36501, CVE-2023-46774, CVE-2023-52720, CVE-2022-48297, CVE-2023-37238, CVE-2024-45450, CVE-2023-39392, CVE-2022-48360, CVE-2023-41308, CVE-2024-42036, CVE-2024-30418, CVE-2023-3455, CVE-2024-27896, CVE-2024-54096, CVE-2024-42031, CVE-2023-52381, CVE-2023-39383, CVE-2023-52368, CVE-2022-41590, CVE-2022-44562, CVE-2023-39394, CVE-2024-45447, CVE-2023-52714, CVE-2022-48350, CVE-2023-52369, CVE-2024-32990, CVE-2023-52388, CVE-2023-52108, CVE-2023-39405, CVE-2024-47290, CVE-2023-44098, CVE-2023-39399, CVE-2023-52359, CVE-2023-46767, CVE-2023-37240, CVE-2023-44110, CVE-2024-32995, CVE-2023-52357, CVE-2023-44099, CVE-2022-48293, CVE-2023-39403, CVE-2023-52550, CVE-2023-46756, CVE-2023-41311, CVE-2023-52114, CVE-2024-54100, CVE-2022-44555, CVE-2023-44093, CVE-2023-41307, CVE-2023-52955, CVE-2023-52551, CVE-2022-48357, CVE-2024-36500, CVE-2024-57960, CVE-2023-52364, CVE-2024-36503, CVE-2022-48291, CVE-2024-30417, CVE-2023-52367, CVE-2024-45444, CVE-2024-57961, CVE-2022-48354, CVE-2023-46762, CVE-2023-41312, CVE-2023-39398, CVE-2023-41298, CVE-2022-48300, CVE-2022-48621, CVE-2023-52953, CVE-2023-46758, CVE-2023-37245, CVE-2023-52372, CVE-2022-48352, CVE-2024-54097, CVE-2024-54101, CVE-2023-4565, CVE-2023-46761, CVE-2024-32999, CVE-2023-39382, CVE-2024-30416, CVE-2023-52366, CVE-2023-52554, CVE-2023-52538, CVE-2023-26549, CVE-2024-45443, CVE-2023-52553, CVE-2023-46773, CVE-2023-44109, CVE-2023-52102, CVE-2023-4566, CVE-2022-48513, CVE-2022-48361, CVE-2023-49241, CVE-2023-44097, CVE-2023-39386, CVE-2022-48359, CVE-2022-48355, CVE-2023-37239, CVE-2024-39670, CVE-2023-52104, CVE-2024-42037, CVE-2024-56448, CVE-2023-46768, CVE-2022-48508, CVE-2023-5801, CVE-2023-39391, CVE-2023-44112, CVE-2024-39674, CVE-2023-44105, CVE-2023-52379, CVE-2023-46759, CVE-2023-44116, CVE-2023-52362, CVE-2024-32998, CVE-2023-1693, CVE-2023-52375, CVE-2023-39402, CVE-2023-7265, CVE-2023-46769, CVE-2022-48302, CVE-2023-44103, CVE-2023-52374, CVE-2023-46755, CVE-2023-37241, CVE-2023-52385, CVE-2023-39388, CVE-2023-52111, CVE-2023-44102, CVE-2024-42032, CVE-2024-39673, CVE-2023-52545, CVE-2023-52373, CVE-2023-46760, CVE-2022-48613, CVE-2022-48351, CVE-2023-52107, CVE-2023-46764, CVE-2023-44094, CVE-2023-52549, CVE-2023-49242, CVE-2024-32992, CVE-2023-49240, CVE-2023-46766, CVE-2023-3456, CVE-2023-39396, CVE-2024-45441, CVE-2023-44111, CVE-2024-56447, CVE-2024-42038, CVE-2023-52716, CVE-2023-52719, CVE-2024-56441, CVE-2022-48296, CVE-2023-52363, CVE-2023-7271, CVE-2023-52537, CVE-2024-45445, CVE-2023-34164, CVE-2023-39395, CVE-2023-39387, CVE-2023-39393, CVE-2023-52358, CVE-2023-41296, CVE-2022-44559, CVE-2022-48299, CVE-2023-52370, CVE-2024-45449, CVE-2023-44104, CVE-2023-39397, CVE-2023-49246, CVE-2023-39400, CVE-2023-44119, CVE-2023-52097, CVE-2023-44118, CVE-2024-51528, CVE-2023-52365, CVE-2023-52717, CVE-2022-48286, CVE-2023-39389, CVE-2023-52109, CVE-2022-44560, CVE-2024-32996, CVE-2023-41301, CVE-2024-54098, CVE-2022-48358, CVE-2023-46763, CVE-2022-48290, CVE-2023-41304, CVE-2023-49239, CVE-2023-26547, CVE-2023-52101, CVE-2023-41293, CVE-2023-52113, CVE-2022-44561, CVE-2023-1695, CVE-2023-6273, CVE-2023-41310, CVE-2024-42033, CVE-2023-1692, CVE-2023-44100, CVE-2024-30415, CVE-2023-52377, CVE-2023-52954, CVE-2023-49247, CVE-2023-52387, CVE-2024-47294, CVE-2024-51529, CVE-2023-52380, CVE-2022-48346, CVE-2022-48349, CVE-2023-41302, CVE-2023-39381, CVE-2023-1694, CVE-2024-32991, CVE-2022-48347, CVE-2024-51527, CVE-2022-48292, CVE-2024-42039, CVE-2023-1696, CVE-2021-46856, CVE-2024-36502, CVE-2023-52103, CVE-2022-44548, CVE-2023-41305, CVE-2023-39384, CVE-2023-41300, CVE-2023-39401, CVE-2022-44553, CVE-2023-52112, CVE-2023-41295, CVE-2022-44556, CVE-2023-44115, CVE-2023-46765, CVE-2024-32993, CVE-2023-44096, CVE-2022-48298, CVE-2022-48301, CVE-2023-1691, CVE-2024-45446, CVE-2023-52384, CVE-2023-39409, CVE-2024-42034, CVE-2023-52542, CVE-2024-54099, CVE-2023-44113, CVE-2024-47293, CVE-2023-26548, CVE-2023-49245, CVE-2023-44108, CVE-2023-39380, CVE-2023-44095, CVE-2023-52713, CVE-2023-52386, CVE-2023-52544, CVE-2023-46770, CVE-2023-41309, CVE-2022-48606, CVE-2022-48289, CVE-2024-30414, CVE-2023-52539, CVE-2024-58043, CVE-2023-49248, CVE-2023-52116, CVE-2023-52099, CVE-2023-52378, CVE-2023-37242, CVE-2023-46771, CVE-2025-31175, CVE-2024-32997, CVE-2023-39385, CVE-2023-52541, CVE-2023-39406, CVE-2024-56442, CVE-2023-49243, CVE-2023-39404, CVE-2023-44117, CVE-2024-36499, CVE-2023-44106, CVE-2024-27897, CVE-2023-52552, CVE-2023-41299, CVE-2024-56440, CVE-2022-44557, CVE-2023-52383, CVE-2022-41591, CVE-2023-52540, CVE-2023-39408, CVE-2024-51530, CVE-2023-39390, CVE-2024-56449, CVE-2023-41303, CVE-2023-52543, CVE-2023-49244, CVE-2022-48288, CVE-2023-52098, CVE-2022-48313, CVE-2024-47292, CVE-2023-52376, CVE-2022-48348 {}
heuristics/extracted_sars ALC_FLR.3, AGD_OPE.1 ADV_IMP.2, ADV_ARC.1, AVA_VAN.5, ADV_FSP.5, ALC_CMC.5, ADV_TDS.5, AGD_OPE.1, ATE_DPT.3, ATE_COV.3, ASE_TSS.2, ASE_REQ.2, ADV_SPM.1, ATE_FUN.2, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, ASE_OBJ.2, ASE_INT.1, ALC_TAT.3, ASE_SPD.1, ALC_CMS.5, ALC_LCD.1
heuristics/extracted_versions 3.0 07, 2024
heuristics/scheme_data
heuristics/protection_profiles {} cf0f01bcd7be3e9c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename nscib-cc-23-0531255-cert.pdf Certificat-CC-2024_07fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-23-0531255: 1
  • FR:
    • ANSSI-CC-2024/07: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL2: 1
    • EAL6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
  • ASE:
    • ASE_TSS.2: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240524143914+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240524150419+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 163458
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename nscib-cc-23-0531255-cr.pdf ANSSI-CC-2024_07fr.pdf
pdf_data/report_frontpage
  • FR:
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
  • FR:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0531255-CR: 11
  • FR:
    • ANSSI-CC-2024/07: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
  • EAL:
    • EAL2: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_FLR: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
pdf_data/st_filename nscib-cc-23-0531255-st_v1.0.pdf ANSSI-cible-CC-2024_07.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084: 1
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL6: 5
    • EAL6 augmented: 1
    • EAL6+: 2
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 2
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 11
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 40
    • FCS_CKM.1: 41
    • FCS_CKM.2: 4
    • FCS_CKM.4: 26
    • FCS_CMK: 5
    • FCS_COP: 45
    • FCS_COP.1: 21
    • FCS_RNG: 25
    • FCS_RNG.1: 18
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 14
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 22
    • FDP_ITC.2: 22
    • FDP_ITT: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 14
    • FDP_SDC.1.1: 2
    • FDP_SDI: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 12
    • FIA_API.1.1: 2
  • FMT:
    • FMT_LIM: 22
    • FMT_LIM.1: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 32
    • FMT_LIM.2.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 17
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
  • O:
    • O.AES: 5
    • O.ECDH: 7
    • O.ECDSA: 6
    • O.MEM_ACCESS: 1
    • O.RND: 6
    • O.RSA: 8
    • O.SHA: 7
    • O.TDES: 7
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
  • Samsung:
    • Samsung: 17
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 30
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 16
      • Triple-DES: 5
    • DES:
      • DES: 11
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
  • ECC:
    • ECC:
      • ECC: 22
    • ECDH:
      • ECDH: 18
    • ECDSA:
      • ECDSA: 24
  • FF:
    • DH:
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 7
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA224: 4
      • SHA256: 4
      • SHA384: 4
      • SHA512: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
  • KA:
    • Key Agreement: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 11
    • RNG: 8
  • TRNG:
    • DTRNG: 62
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
  • Brainpool:
    • brainpoolP192r1: 3
    • brainpoolP192t1: 3
    • brainpoolP224r1: 3
    • brainpoolP224t1: 3
    • brainpoolP256r1: 3
    • brainpoolP256t1: 3
    • brainpoolP320r1: 3
    • brainpoolP320t1: 3
    • brainpoolP384r1: 3
    • brainpoolP384t1: 3
    • brainpoolP512r1: 3
    • brainpoolP512t1: 3
  • NIST:
    • P-192: 6
    • P-224: 6
    • P-256: 6
    • P-384: 6
    • secp192k1: 3
    • secp192r1: 3
    • secp224k1: 3
    • secp224r1: 3
    • secp256k1: 3
    • secp256r1: 3
    • secp384r1: 3
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 5
    • Malfunction: 26
    • malfunction: 13
    • physical tampering: 3
  • SCA:
    • DPA: 6
    • Leak-Inherent: 24
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 5
    • physical probing: 9
    • side channel: 2
    • side-channel: 3
    • timing attack: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 4
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/cplc_data
  • ICVersion:
    • IC Version: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS31: 10
    • BSI-AIS31: 3
  • CC:
    • CCMB-2017-04-001: 3
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 3
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 1
    • FIPS PUB 180-3: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-67: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different