name |
Huawei 3900 Series LTE eNodeB Core Software V100R015C10SPC270 |
CardOS V5.3 QES, V1.0 |
category |
Other Devices and Systems |
Products for Digital Signatures |
scheme |
ES |
DE |
status |
active |
archived |
not_valid_after |
04.11.2026 |
01.09.2019 |
not_valid_before |
04.11.2021 |
06.08.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-34%20CCRA.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-34%20INF-3639.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-34%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921b_pdf.pdf |
manufacturer |
Huawei Technologies Co. Ltd. |
Atos IT Solutions and Services GmbH |
manufacturer_web |
https://www.huawei.com |
https://www.de.atos.net |
security_level |
ALC_FLR.1, EAL4+ |
EAL4+, AVA_VAN.5 |
dgst |
db9d4b17cfd52950 |
60c5f6b486bdffeb |
heuristics/cert_id |
2019-34-INF-3639 |
BSI-DSZ-CC-0921-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_TAT.1, ALC_FLR.1, ADV_ARC.1, ALC_CMC.4, ATE_COV.2, AVA_VAN.3, ADV_IMP.1, ASE_CCL.1, ALC_DEL.1, ASE_REQ.2, ASE_INT.1, AGD_OPE.1, ATE_FUN.1 |
ADV_ARC.1, ALC_CMC.4, ADV_FSP.4, ALC_DVS.1, ASE_OBJ.2, ADV_COMP.1, ALC_FLR.3, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, APE_SPD.1, ALC_DEL.1, ATE_FUN.1, ATE_DPT.1, ALC_TAT.1, ATE_COV.2, APE_ECD.1, ALC_CMS.4, ASE_ECD.1, APE_CCL.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, APE_REQ.2, AVA_VAN.5, ADV_IMP.1, APE_OBJ.2, ADV_INT.3, ASE_CCL.1, ADV_TDS.3, ADV_SPM.1, AGD_OPE.1, APE_INT.1 |
heuristics/extracted_versions |
3900 |
1.0, 5.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
- category: Others
- certification_date: 04.11.2021
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1292
- certification_date: 04.11.2021
- description: The TOE is the core part of the software that is deployed into a LTE eNodeB base station, which is the wireless access node in LTE/SAE system. It provides the communication with the EPC/Backhaul network (through S1 and X2 interfaces), the management interfaces and other security related functionality. The TOE is the core part of the software that is deployed into a Huawei 3900 series LTE eNodeB base station and the major security features implemented and included in the evaluation scope are: Management network. Identification and Authentication. Access control. Communications security. Telecom network: S1 and X2 backhaul interface protection. Resource management: session establishment mechanisms and VLAN separation. Security function management: command groups, trusted channels, users, etc. Digital signature: for the verification of software packages when loaded. Auditing of security events.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL4 + ALC_FLR.1
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1293
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1294
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei 3900 Series LTE eNodeB Core Software V100R015C10SPC270
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/492-huawei-3900-series-lte-enodeb-core-software-v100r015c10spc270
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1193-2024 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1193-2024 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
d918b28fd7bb5d79 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf |
pdf_data/cert_filename |
2019-34 CCRA.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 962930
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-34 INF-3639.pdf |
0921a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0921-2014
- cert_item: CardOS V5.3 QES, V1.0
- cert_lab: BSI
- developer: Atos IT Solutions and Services GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782: 1
- BSI-DSZ-CC-0782-2012: 2
- BSI-DSZ-CC-0782-2012-MA-01: 4
- BSI-DSZ-CC-0921-2014: 27
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 4
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 7
- EAL4+: 1
- ITSEC:
|
- EAL:
- EAL 4: 6
- EAL 4 augmented: 3
- EAL 5: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 2
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 2
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FCS:
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU: 2
- FIA_UAU.5: 1
- FIA_UID: 1
- FMT:
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FTA:
- FTP:
|
- FCS:
- FIA:
- FIA_AFL: 3
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 14
- Huawei Technologies Co: 3
|
- Infineon:
- Infineon: 9
- Infineon Technologies AG: 5
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 5
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 4
- TDEA: 1
- TDES: 5
- Triple-DES: 1
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 5
- SHA-256: 6
- SHA-384: 3
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 3
- NIST:
- Curve P-256: 4
- Curve P-384: 4
- P-256: 5
- P-384: 5
- curve P-256: 1
- curve P-384: 1
- secp256r1: 2
- secp384r1: 2
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 2
- AIS 34: 2
- AIS 36: 3
- AIS 38: 1
- FIPS:
- ISO:
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- & Release Notes 'CardOS V5.3 QES, V1.0', Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential document) [15] Administrator Guidance 'CardOS V5.3 QES, V1.0', Revision 1.20, 07 May 2014, Atos IT Solutions: 1
- ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜV Informationstechnik GmbH, (confidential document) [12] Configuration List 'CardOS V5.3 QES, V1.0', Revision 1.30, 30 July 2014, Atos IT Solutions: 1
- GmbH, (confidential document) [17] Application Digital Signature 'CardOS V5.3 QES, V1.0', Revision 1.10, 07 May 2014, Atos IT: 1
- Services GmbH, (confidential document) [13] Users Manual CardOS V5.3, Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential: 1
- Services GmbH, (confidential document) [16] User Guidance 'CardOS V5.3 QES, V1.0', Revision 1.30, 02 May 2014, Atos IT Solutions and: 1
- Technical Report BSI-DSZ-CC-0921-2014, Version 3.0, 31 July 2014, TÜV Informationstechnik GmbH, (confidential document) [9] Certification Report BSI-DSZ-CC-0782-2012 for Infineon Security Controller M7892 B11 with: 1
- and Services GmbH, (confidential document) [18] ISO 7816 Part 3: Electronic Signals and Transmission Protocols – ISO/IEC 7816-3:1997/Amd: 1
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
2019-34 ST.pdf |
0921b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-2012-MA-01: 6
- BSI-DSZ-CC-921: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP-0035-2007: 2
- BSI-CC-PP-0059-: 3
- BSI-CC-PP-0059-2009-MA-: 2
- BSI-CC-PP-0059-2009-MA-01: 45
- BSI-CC-PP-0071: 4
- BSI-CC-PP-0071-2012: 2
- BSI-PP-0006-2002: 1
- BSI-PP-0035: 4
- BSI-PP0059-2009: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4+: 1
- EAL 6+: 3
- EAL4: 8
- EAL4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 10
- ASE_CCL.1: 1
- ASE_ECD: 5
- ASE_ECD.1: 1
- ASE_INT: 16
- ASE_INT.1: 1
- ASE_OBJ: 11
- ASE_OBJ.2: 1
- ASE_REQ: 33
- ASE_REQ.2: 1
- ASE_SPD: 6
- ASE_SPD.1: 1
- ASE_TSS: 17
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM: 15
- FCS_CKM.1: 3
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 9
- FCS_COP: 21
- FCS_COP.1: 2
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 4
- FDP_ACC.1.1: 3
- FDP_ACF: 19
- FDP_ACF.1: 3
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 2
- FIA_UAU: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 16
- FIA_UID.1: 2
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_TSE: 12
- FTA_TSE.1.1: 2
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 26
- FCS_CKM.2: 6
- FCS_CKM.4: 33
- FCS_CKM.4.1: 1
- FCS_COP: 98
- FCS_COP.1: 15
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 55
- FDP_ACC.1: 23
- FDP_ACF: 39
- FDP_ACF.1: 25
- FDP_IFC.1: 11
- FDP_ITC.1: 20
- FDP_ITC.2: 20
- FDP_ITT.1: 1
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_SDI: 19
- FDP_SDI.1: 3
- FDP_SDI.2: 5
- FIA:
- FIA_AFL: 54
- FIA_AFL.1: 14
- FIA_API: 17
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU.1: 21
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 28
- FMT_MSA.1: 7
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 25
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 40
- FMT_MTD.1: 3
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 8
- FPT_EMS.1: 22
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 14
- FPT_TST.1.1: 6
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CGA: 4
- A.III: 2
- A.SCA: 5
- OE:
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 13
- Huawei Technologies Co: 1
|
- Infineon:
- Infineon: 17
- Infineon Technologies: 1
- Infineon Technologies AG: 3
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 7
- TDES: 15
- Triple-DES: 10
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 11
- SHA-256: 15
- SHA-384: 8
- SHA-512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 5
- brainpoolP384r1: 5
- NIST:
- Curve P-256: 4
- Curve P-384: 4
- P-256: 8
- P-384: 8
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- physical tampering: 5
- SCA:
- DPA: 2
- SPA: 3
- physical probing: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- no longer needed for any tasks concerning Application for QES. It has to be deleted. 10. Step 22 is out of scope of the TOE. 28 Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014 Copyright © Atos: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: Atos IT Solutions and Services GmbH
- /CreationDate: D:20140723191014+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Security Target, CardOS
- /ModDate: D:20140723191641+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Security Target CardOS V5.3 QES (SSCD for QES)
- /Title: Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014
- pdf_file_size_bytes: 530532
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 102
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |