Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
Composite system comprised of ECI LightSOFT Software, STMS Software and Apollo Software
IC3S/KOL01/ECITelecom/EAL2/0420/0019
name HarmonyOS 3.0 on Huawei MatePad Pro Composite system comprised of ECI LightSOFT Software, STMS Software and Apollo Software
category Mobility Network and Network-Related Devices and Systems
scheme NL IN
not_valid_after 19.12.2028 12.04.2027
not_valid_before 19.12.2023 13.04.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI%20CC%20Certificate.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-%20ECITL%20EAL2%20version%201.0%20.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI%20LightSOFT-STMS-Apollo%20Security%20Target%20v1.3.pdf
manufacturer Huawei Device Co., Ltd. ECI Telecom Ltd., 30 Hasivim Street, Petach Tikvah, 4959388, Israel
manufacturer_web https://www.huawei.com/ https://info.rbbn.com/eci-now-ribbon/
security_level EAL2+, ALC_FLR.3 EAL2
dgst c85f7e09316c6900 f83e964eac1e84f7
heuristics/cert_id NSCIB-CC-0531255-CR IC3S/KOL01/ECITelecom/EAL2/0420/0019
heuristics/cert_lab []
heuristics/cpe_matches cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-52370, CVE-2023-52367, CVE-2023-41310, CVE-2023-46771, CVE-2023-52104, CVE-2023-39385, CVE-2025-54611, CVE-2023-39402, CVE-2025-66325, CVE-2022-48347, CVE-2023-44103, CVE-2024-56447, CVE-2022-48606, CVE-2023-52363, CVE-2023-39394, CVE-2023-52374, CVE-2023-37241, CVE-2022-48348, CVE-2023-39383, CVE-2023-52373, CVE-2022-44553, CVE-2023-39393, CVE-2023-52720, CVE-2023-46769, CVE-2023-44113, CVE-2024-47294, CVE-2024-42032, CVE-2022-48513, CVE-2023-3455, CVE-2023-39381, CVE-2025-66329, CVE-2022-44548, CVE-2023-6273, CVE-2023-1695, CVE-2025-48902, CVE-2023-52542, CVE-2023-52366, CVE-2024-36499, CVE-2024-57960, CVE-2023-46761, CVE-2024-58043, CVE-2022-48298, CVE-2023-44098, CVE-2023-5801, CVE-2022-48358, CVE-2023-4565, CVE-2024-54101, CVE-2023-46766, CVE-2022-48293, CVE-2023-7271, CVE-2023-41300, CVE-2024-56441, CVE-2023-52097, CVE-2023-52364, CVE-2023-52099, CVE-2023-39404, CVE-2023-44095, CVE-2023-39392, CVE-2023-52376, CVE-2025-54646, CVE-2023-52378, CVE-2024-51527, CVE-2023-39391, CVE-2024-45444, CVE-2023-41299, CVE-2023-52109, CVE-2024-30416, CVE-2023-46763, CVE-2023-44109, CVE-2025-58314, CVE-2022-48508, CVE-2024-47292, CVE-2023-39397, CVE-2023-44100, CVE-2023-44115, CVE-2023-44099, CVE-2023-41305, CVE-2023-52368, CVE-2023-46755, CVE-2023-52544, CVE-2024-36501, CVE-2025-58276, CVE-2023-39408, CVE-2023-52714, CVE-2022-48621, CVE-2022-48288, CVE-2024-42039, CVE-2023-52387, CVE-2023-52553, CVE-2023-46768, CVE-2023-1696, CVE-2023-52381, CVE-2023-44108, CVE-2023-41302, CVE-2022-41591, CVE-2024-42038, CVE-2023-1693, CVE-2023-52380, CVE-2023-46764, CVE-2022-48301, CVE-2023-7265, CVE-2023-52717, CVE-2023-52369, CVE-2023-41309, CVE-2023-52113, CVE-2025-54641, CVE-2023-37242, CVE-2023-41301, CVE-2025-53186, CVE-2022-48352, CVE-2022-48289, CVE-2024-51530, CVE-2024-54099, CVE-2024-45449, CVE-2023-52103, CVE-2022-48346, CVE-2024-32995, CVE-2022-48361, CVE-2024-30414, CVE-2023-39380, CVE-2023-52551, CVE-2023-39390, CVE-2024-36500, CVE-2023-52375, CVE-2022-48296, CVE-2023-1694, CVE-2024-32996, CVE-2023-39405, CVE-2024-42034, CVE-2024-30418, CVE-2024-30417, CVE-2023-44119, CVE-2022-48297, CVE-2023-39396, CVE-2023-37240, CVE-2025-68959, CVE-2023-46762, CVE-2023-41296, CVE-2023-39395, CVE-2023-41298, CVE-2024-56449, CVE-2024-47291, CVE-2023-44093, CVE-2023-49243, CVE-2023-52377, CVE-2023-46770, CVE-2024-47293, CVE-2023-46759, CVE-2023-52955, CVE-2023-52716, CVE-2023-39388, CVE-2023-46760, CVE-2023-44114, CVE-2023-41308, CVE-2024-54097, CVE-2023-44118, CVE-2022-48313, CVE-2023-1692, CVE-2022-41590, CVE-2022-48349, CVE-2024-32998, CVE-2023-52550, CVE-2023-52114, CVE-2024-45441, CVE-2023-52358, CVE-2024-42037, CVE-2023-39398, CVE-2024-56448, CVE-2023-52953, CVE-2023-52101, CVE-2024-32992, CVE-2024-36502, CVE-2023-26547, CVE-2024-32999, CVE-2025-68970, CVE-2022-48357, CVE-2023-52385, CVE-2023-39406, CVE-2023-37239, CVE-2021-46856, CVE-2023-52549, CVE-2023-49239, CVE-2023-52098, CVE-2024-30415, CVE-2025-58302, CVE-2023-52954, CVE-2024-32990, CVE-2022-44557, CVE-2022-48350, CVE-2023-44104, CVE-2023-39387, CVE-2023-44116, CVE-2023-49245, CVE-2023-44096, CVE-2022-48314, CVE-2022-48291, CVE-2023-1691, CVE-2022-48302, CVE-2023-46756, CVE-2023-52362, CVE-2023-39386, CVE-2023-46758, CVE-2023-52372, CVE-2024-54100, CVE-2024-45445, CVE-2023-52116, CVE-2022-48355, CVE-2024-45443, CVE-2023-49248, CVE-2024-39673, CVE-2022-44555, CVE-2023-46774, CVE-2023-41312, CVE-2025-54642, CVE-2023-4566, CVE-2023-3456, CVE-2023-52111, CVE-2023-39382, CVE-2023-49247, CVE-2022-48300, CVE-2023-49242, CVE-2023-52108, CVE-2022-48290, CVE-2023-52383, CVE-2023-26548, CVE-2023-52357, CVE-2023-49244, CVE-2023-52552, CVE-2023-52102, CVE-2023-52543, CVE-2024-39670, CVE-2024-27896, CVE-2024-51528, CVE-2024-27897, CVE-2022-44561, CVE-2023-52107, CVE-2023-46765, CVE-2023-52359, CVE-2023-44110, CVE-2023-41304, CVE-2024-36503, CVE-2024-42031, CVE-2023-52386, CVE-2023-49240, CVE-2023-52539, CVE-2024-32993, CVE-2023-44102, CVE-2023-34164, CVE-2022-44556, CVE-2022-48354, CVE-2024-32991, CVE-2023-44105, CVE-2022-48359, CVE-2025-31175, CVE-2023-52541, CVE-2023-52388, CVE-2024-39674, CVE-2024-56442, CVE-2024-57961, CVE-2022-48299, CVE-2023-52545, CVE-2025-54637, CVE-2023-44111, CVE-2023-52379, CVE-2024-45447, CVE-2023-46767, CVE-2024-51529, CVE-2022-44560, CVE-2023-44117, CVE-2023-44094, CVE-2024-45446, CVE-2023-49241, CVE-2024-32997, CVE-2023-41311, CVE-2023-26549, CVE-2024-54098, CVE-2024-42036, CVE-2023-52713, CVE-2022-48292, CVE-2023-39403, CVE-2023-39399, CVE-2022-44562, CVE-2023-44106, CVE-2023-39384, CVE-2023-52112, CVE-2023-49246, CVE-2022-48613, CVE-2023-52538, CVE-2023-41293, CVE-2023-39389, CVE-2023-39401, CVE-2023-46773, CVE-2023-41303, CVE-2023-52365, CVE-2022-48360, CVE-2024-56440, CVE-2023-41295, CVE-2023-37238, CVE-2022-48351, CVE-2025-54636, CVE-2023-52540, CVE-2023-41307, CVE-2022-44559, CVE-2023-52384, CVE-2023-52537, CVE-2023-44112, CVE-2023-52719, CVE-2024-45450, CVE-2022-48286, CVE-2023-39400, CVE-2024-47290, CVE-2023-52554, CVE-2023-37245, CVE-2023-44097, CVE-2024-54096, CVE-2024-42033, CVE-2023-39409 {}
heuristics/extracted_sars ALC_FLR.3, AGD_OPE.1 ALC_CMC.2, ASE_SPD.1, ASE_CCL.1, ALC_CMS.2, ASE_REQ.2, AGD_PRE.1, AGD_OPE.1, ADV_TDS.1, ALC_DEL.1, ATE_COV.1, ASE_ECD.1, ATE_IND.2, ADV_FSP.2, ADV_ARC.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.2, ASE_OBJ.2, ASE_TSS.1
heuristics/extracted_versions 3.0 -
heuristics/scheme_data
pdf_data/cert_filename nscib-cc-23-0531255-cert.pdf ECI CC Certificate.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-23-0531255: 1
  • IN:
    • IC3S/KOLO1/ECITelecom/EAL2/0420/0019/CR: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 1
pdf_data/cert_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA2: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220413171637163850+09'00'
  • /ModDate: D:20220413072325Z00'00'
  • /Producer: macOS Version 11.4 (Build 20F71) Quartz PDFContext, AppendMode 1.1
  • pdf_file_size_bytes: 2295809
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 4
pdf_data/report_filename nscib-cc-23-0531255-cr.pdf CR- ECITL EAL2 version 1.0 .pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
  • NL:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0531255-CR: 11
  • IN:
    • IC3S/KOL01/ECITelecom/EAL2/0420/0019: 1
    • IC3S/KOL01/ECITelecom/EAL2/0420/0019 /CR: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
  • EAL:
    • EAL 2: 2
    • EAL 4: 2
    • EAL2: 5
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.ECI: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.MGMTNETWORK: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.ORACLE: 1
    • A.ORBIX: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.PROTCT: 1
    • A.SOLARIS: 1
    • A.TRUSTED_ADMINISTRATOR: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 5
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_metadata
  • /Author: Tapas Bandopadhyay
  • /CreationDate: D:20220309165723+05'30'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220309165723+05'30'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1296405
  • pdf_hyperlinks: http://www.commoncriteria-india.gov.in/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename nscib-cc-23-0531255-st_v1.0.pdf ECI LightSOFT-STMS-Apollo Security Target v1.3.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
  • EAL:
    • EAL2: 6
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
  • A:
    • A.ECI: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.MGMTNETW: 1
    • A.MGMTNETWOR: 1
    • A.MGMTNETWORK: 1
    • A.NOEVIL: 3
    • A.NOTRST: 3
    • A.ORACLE: 3
    • A.ORBIX: 3
    • A.PROTCT: 3
    • A.SOLARIS: 3
  • O:
    • O.ACCESS: 9
    • O.AUDITS: 3
    • O.EADMIN: 5
    • O.IDAUTH: 13
    • O.INVFLW: 1
    • O.PROTCT: 6
  • OE:
    • OE.CREDEN: 4
    • OE.ECI: 3
    • OE.INSTAL: 4
    • OE.MGMTNET: 1
    • OE.MGMTNETWORK: 2
    • OE.ORACLE: 2
    • OE.ORBIX: 3
    • OE.PERSON: 5
    • OE.PHYCAL: 6
    • OE.SOLARIS: 2
    • OE.TIME: 4
  • T:
    • T.COMINT: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
  • /Author: User
  • /CreationDate: D:20220316143332+05'30'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220316143332+05'30'
  • /Producer: Microsoft® Word 2016
  • /Title: SECURITY TARGET
  • pdf_file_size_bytes: 889470
  • pdf_hyperlinks: http://www.ecitele.com/, http://www.consulting-cc.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different