Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 14 - Fall
CCEVS-VR-VID-11539-2024
Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02
JISEC-CC-CRP-C0536
name Samsung Galaxy Devices on Android 14 - Fall Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02
category Mobility Access Control Devices and Systems
scheme US JP
status active archived
not_valid_after 23.12.2026 13.02.2022
not_valid_before 23.12.2024 13.02.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf
manufacturer Samsung Electronics Co., Ltd. Hitachi, Ltd.
manufacturer_web https://www.samsung.com https://www.hitachi.com/
security_level {} EAL2+, ALC_FLR.1
dgst ccfb157305084c14 bd28ac0feda9039e
heuristics/cert_id CCEVS-VR-VID-11539-2024 JISEC-CC-CRP-C0536
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2024-49413, CVE-2024-20891, CVE-2024-34612, CVE-2024-34594, CVE-2023-42563, CVE-2024-34589, CVE-2024-20864, CVE-2024-34647, CVE-2024-49415, CVE-2025-20889, CVE-2024-34595, CVE-2023-42562, CVE-2023-42567, CVE-2025-20887, CVE-2024-20836, CVE-2024-34604, CVE-2024-20855, CVE-2025-20891, CVE-2023-42565, CVE-2023-42564, CVE-2024-34646, CVE-2024-20865, CVE-2024-20892, CVE-2024-34666, CVE-2025-20884, CVE-2024-34678, CVE-2024-49402, CVE-2024-20857, CVE-2024-20831, CVE-2023-42556, CVE-2024-20884, CVE-2024-34655, CVE-2024-20900, CVE-2025-20904, CVE-2025-20893, CVE-2024-34682, CVE-2024-20895, CVE-2024-20843, CVE-2024-34652, CVE-2024-34669, CVE-2024-34583, CVE-2024-20893, CVE-2024-20885, CVE-2024-20817, CVE-2024-20849, CVE-2024-34588, CVE-2023-42561, CVE-2024-20814, CVE-2024-20859, CVE-2024-20860, CVE-2025-20881, CVE-2025-20885, CVE-2024-34607, CVE-2024-34614, CVE-2024-20848, CVE-2024-20832, CVE-2024-20875, CVE-2024-20888, CVE-2024-34665, CVE-2024-34676, CVE-2024-20897, CVE-2024-34609, CVE-2024-34619, CVE-2025-20905, CVE-2024-34587, CVE-2024-20847, CVE-2024-34668, CVE-2024-34642, CVE-2024-20812, CVE-2023-52432, CVE-2024-49410, CVE-2024-20818, CVE-2024-34618, CVE-2024-20876, CVE-2024-34616, CVE-2023-42560, CVE-2024-34593, CVE-2024-34651, CVE-2024-20819, CVE-2024-20874, CVE-2024-34611, CVE-2024-49411, CVE-2024-34590, CVE-2024-34650, CVE-2024-20833, CVE-2024-34602, CVE-2024-20842, CVE-2024-20811, CVE-2024-20898, CVE-2024-20899, CVE-2024-34605, CVE-2025-20907, CVE-2024-34680, CVE-2024-34603, CVE-2024-20815, CVE-2024-34585, CVE-2023-42559, CVE-2024-34641, CVE-2024-20890, CVE-2023-42557, CVE-2024-34615, CVE-2025-20883, CVE-2024-20879, CVE-2024-34637, CVE-2024-20806, CVE-2024-20894, CVE-2024-20896, CVE-2024-34610, CVE-2024-34586, CVE-2024-34617, CVE-2024-34677, CVE-2024-34644, CVE-2024-34608, CVE-2024-34643, CVE-2024-20803, CVE-2024-20830, CVE-2024-20813, CVE-2025-20886, CVE-2024-20882, CVE-2024-34674, CVE-2024-20863, CVE-2023-42570, CVE-2024-20889, CVE-2025-20890, CVE-2024-34591, CVE-2024-49414, CVE-2024-20877, CVE-2024-34606, CVE-2024-20834, CVE-2025-20888, CVE-2024-34592, CVE-2024-34679, CVE-2024-20856, CVE-2024-20880, CVE-2024-20816, CVE-2024-34654, CVE-2024-20901, CVE-2024-20862, CVE-2024-20861, CVE-2024-34648, CVE-2024-34620, CVE-2024-49401, CVE-2024-34673, CVE-2024-20883, CVE-2024-34675, CVE-2025-20882, CVE-2024-20858, CVE-2025-20892, CVE-2024-20835, CVE-2024-34649, CVE-2023-42566, CVE-2024-20878, CVE-2024-34667, CVE-2024-34653 {}
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 14 8.0.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0536
  • certification_date: 01.02.2017
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0536_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software
    • product_type: Access Control Device and Systems
    • report_link: https://www.ipa.go.jp/en/security/c0536_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0536_est.pdf
    • toe_version: 8.0.1-02
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.03.2022
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html
  • toe_overseas_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
heuristics/protection_profiles 29ba341b00e9bd10, c40ae795865a0dba, e8fcfe94dc27b54b, f84bb9133ca2c8db, 83014eb399a802f3, 593b939921a117e0 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLAN_AS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.4_PP.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf {}
pdf_data/cert_filename st_vid11539-ci.pdf c0536_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11539-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /Producer: WeasyPrint 62.3
  • /Title: VID11539-FINAL CERT
  • pdf_file_size_bytes: 136750
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20170911161211+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /ModDate: D:20170911161350+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title:
  • pdf_file_size_bytes: 453124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11539-vr.pdf c0536_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11539-2024
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Fall
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11539-2024: 1
  • JP:
    • CRP-C0536-01: 1
    • Certification No. C0536: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 2
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.UNAUTHORISED_ACCESS: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 3
  • Samsung:
    • Samsung: 34
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 5
  • TLS:
    • TLS:
      • TLS: 9
  • VPN:
    • VPN: 11
  • SSH:
    • SSH: 1
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
  • IBM:
    • SE: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20171211090255+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171211090339+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 207872
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
pdf_data/st_filename st_vid11539-st.pdf c0536_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 8
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 6
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 20
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM_EXT: 21
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 1
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 50
    • FCS_COP.1: 9
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 6
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 1
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 1
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1.1: 1
    • FCS_WPA_EXT: 4
    • FCS_WPA_EXT.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 9
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 3
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 6
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 2
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 7
    • FDP_UPC_EXT.1: 4
    • FDP_VPN_EXT: 3
    • FDP_VPN_EXT.1.1: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 18
    • FIA_BLT_EXT.1: 2
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 2
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 1
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 3
    • FIA_MBE_EXT: 1
    • FIA_MBE_EXT.1: 2
    • FIA_MBE_EXT.1.1: 1
    • FIA_MBE_EXT.2: 3
    • FIA_MBE_EXT.2.1: 1
    • FIA_MBV_EXT: 4
    • FIA_MBV_EXT.1: 5
    • FIA_MBV_EXT.2: 2
    • FIA_MBV_EXT.2.1: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 11
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 2
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 18
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_BDP_EXT.1: 1
    • FPT_BDP_EXT.1.1: 1
    • FPT_BDP_EXT.1.2: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 6
    • FPT_KST_EXT.1: 3
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 3
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_PBT_EXT.1: 1
    • FPT_PBT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 19
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 2
    • FPT_TST_EXT.3: 2
    • FPT_TUD_EXT: 10
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 1
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.6: 1
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 1
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 10
    • FTP_BLT_EXT.1: 1
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 1
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 4
    • FTP_ITC.1: 3
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 1
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.PROTECTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.ADMINISTRATORS: 4
    • A.CLIENTS: 3
    • A.NETWORKS: 3
    • A.PASSWORD: 4
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 24
  • Samsung:
    • Samsung: 144
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
      • AES-: 5
      • AES-128: 1
      • AES-256: 11
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 21
      • SHA-384: 3
      • SHA-512: 3
  • scrypt:
    • scrypt: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv2: 18
  • IPsec:
    • IPsec: 39
  • TLS:
    • TLS:
      • TLS: 67
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 96
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 15
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 23
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 8
  • other:
    • TEE: 33
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 8
    • FIPS 197: 10
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 4
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 4
    • SP 800-38A: 2
    • SP 800-38C: 2
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 3
    • SP 800-90A: 5
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 1
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 4
    • RFC 5289: 8
    • RFC 5746: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
    • RFC 8247: 1
    • RFC 8603: 1
    • RFC 8784: 1
  • X509:
    • X.509: 12
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
pdf_data/st_metadata
  • /CreationDate: D:20171130192201+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20171130192201+09'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1103262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different