Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 10 - Spring
CCEVS-VR-11042-2020
RSA Archer Suite v6.7
ISCB-5-RPT-C113-CR-v1
name Samsung Galaxy Devices on Android 10 - Spring RSA Archer Suite v6.7
category Mobility Other Devices and Systems
scheme US MY
not_valid_after 30.04.2022 15.10.2025
not_valid_before 30.04.2020 15.10.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C113-CERTIFICATE-v1%20signed.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C113-CR-V1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%206.7_ST_v1.0_09-29-2020.pdf
manufacturer Samsung Electronics Co., Ltd. RSA Security LLC
manufacturer_web https://www.samsung.com https://rsa.com
security_level {} EAL2+, ALC_FLR.2
dgst f628c89a64a0e7b5 15b820d1481c0d81
heuristics/cert_id CCEVS-VR-11042-2020 ISCB-5-RPT-C113-CR-v1
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:samsung:android:10.0:smr-mar-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:-:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2020-r1:*:*:*:*:*:* cpe:2.3:a:rsa:archer:6.7:*:*:*:*:*:*:*
heuristics/related_cves CVE-2023-21437, CVE-2023-21441, CVE-2021-25395, CVE-2021-25487, CVE-2021-25369, CVE-2023-21421, CVE-2025-21041, CVE-2023-21429, CVE-2025-20934, CVE-2023-21420, CVE-2021-25337, CVE-2023-21436, CVE-2025-21009, CVE-2023-21426, CVE-2021-25489, CVE-2021-25394, CVE-2023-21425, CVE-2021-25370, CVE-2025-21008, CVE-2023-21430 CVE-2020-5335, CVE-2022-26947, CVE-2020-29535, CVE-2021-33616, CVE-2020-29538, CVE-2021-38362, CVE-2021-29252, CVE-2020-5332, CVE-2020-5333, CVE-2022-26950, CVE-2020-29536, CVE-2021-33615, CVE-2022-30584, CVE-2020-5331, CVE-2020-5337, CVE-2022-37317, CVE-2020-5336, CVE-2020-29537, CVE-2021-41594, CVE-2022-26949, CVE-2022-30585, CVE-2020-5334, CVE-2022-26948, CVE-2022-26951, CVE-2021-29253
heuristics/extracted_sars AGD_PRE.1, ALC_CMC.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, ALC_TSU_EXT.1, ADV_FSP.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 10 6.7
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11042/
  • categories: ['Mobility', ' Virtual Private Network']
  • category: Mobility
  • certification_date: 30.04.2020
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 30.04.2022
  • id: CCEVS-VR-VID11042
  • product: Samsung Galaxy Devices on Android 10 - Spring
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11042
  • vendor: Samsung Electronics Co., Ltd.
  • cert_no: 2020-006-C113
  • certification_date: 24.11.2017
  • developer: RSA Security LLC
  • enhanced:
    • assurance_level: EAL2+ ALC_FLR.2
    • category: Other Devices and Systems
    • cert_id: C113
    • certification_date: 24.11.2017
    • developer: 13200 Metcalf Avenue,Suite 300 Overland Park,Kansas 66213,The United States of America Name & Tel: Jeremy Fisher (913-549-1565)Email: [email protected]: https://www.rsa.com/
    • expiration_date: 24.11.2022
    • mutual_recognition: CCRA
    • product: RSA Archer Suite v6.7
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/ISCB-5-RPT-C113-CR-V1.pdf
    • scope: The Target of Evaluation (TOE) is RSA Archer Suite v6.7. It is a software product that supports business-level management of governance, risk management and compliance. Users access the TOE via a web-based graphical user interface (GUI). All users require an account in order to log on to the TOE. The user account specifies the user’s groups and access roles. An access role is a collection of application-level and page-level rights that an administrator can create and assign to any number of users and groups to control user privileges (create, read, update, and delete). The Content API, Web Services API and RESTful APIs programmatically extend the functionality of the TOE to external applications through several classes and methods which expose many of its features, allowing for a high level of integration with other products. All users must be successfully identified and authenticated by the TOE before gaining access to any other TOE services.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/RSA_Archer_6.7_ST_v1.0_09-29-2020.pdf
    • type: Other Devices and Systems
  • expiration_date: 24.11.2022
  • level: EAL2+ ALC_FLR.2
  • product: RSA Archer Suite v6.7
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/139
heuristics/protection_profiles f4474c6c73660987, c88af12926be2779, df09b703c88c665a {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf {}
pdf_data/cert_filename st_vid11042-ci.pdf ISCB-5-CERT-C113-CERTIFICATE-v1 signed.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11042-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20200519123948-04'00'
  • /ModDate: D:20200519123948-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181995
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20201105094515+08'00'
  • /Creator: ISCB Printer
  • /ModDate: D:20201105130733+08'00'
  • /Producer: KONICA MINOLTA bizhub C360i
  • /Title: SISCB Print20110509450
  • pdf_file_size_bytes: 206626
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11042-vr.pdf ISCB-5-RPT-C113-CR-V1.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-11042-2020
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 10 - Spring
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11042-2020: 1
  • MY:
    • ISCB-5-RPT-C113-CR-V1: 36
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A.CRYPTO: 1
    • A.MANAGE: 1
    • A.PROTECT: 1
    • A.SECURE_COMMS: 1
    • A.TIME: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 21
  • Samsung:
    • Samsung: 60
  • Microsoft:
    • Microsoft: 11
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • Leidos:
    • Leidos: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 11
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/standard_id
  • PKCS:
    • PKCS #1: 1
  • X509:
    • X.509: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: comptont
  • /CreationDate: D:20200519122942-04'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20200519122942-04'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 1153840
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /CreationDate: D:20201019095731Z00'00'
  • /Creator: Word
  • /ModDate: D:20201019095731Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 817137
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename st_vid11042-st.pdf RSA Archer 6.7_ST_v1.0_09-29-2020.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 2
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 16
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 11
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 52
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 14
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 7
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 10
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 15
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 2
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BMG_EXT: 3
    • FIA_BMG_EXT.1: 17
    • FIA_BMG_EXT.6: 1
    • FIA_BMG_EXT.6.1: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF_EXT: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 9
    • FMT_SMF: 4
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 9
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.3: 4
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 19
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 8
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 6
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 9
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS: 3
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 5
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 5
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 2
    • FMT_REV: 3
    • FMT_REV.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_TAB: 3
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE: 3
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.CRYPTO: 3
    • A.MANAGE: 2
    • A.PROTECT: 2
    • A.SECURE_COMMS: 3
    • A.TIME: 2
  • O:
    • O.ACCESS_CONTROL: 4
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.I_AND_A: 3
    • O.LOGON_BANNER: 4
    • O.PASSWORD_CONTROLS: 3
    • O.SECURITY_MANAGEMENT: 4
    • O.SESSION_LIMITATION: 3
    • O.SESSION_TERMINATION: 4
    • O.THROTTLE: 3
  • OE:
    • OE.CRYPTO: 3
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
    • OE.SECURE_COMMS: 2
    • OE.TIME: 3
  • T:
    • T.BRUTE_FORCE: 3
    • T.DATA_COMPROMISE: 2
    • T.INAPPROPRIATE_USE: 2
    • T.INAPPRORIATE_USE: 1
    • T.NO_ACCOUNTABILITY: 2
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 6
  • Qualcomm:
    • Qualcomm: 43
  • Samsung:
    • Samsung: 172
  • Microsoft:
    • Microsoft: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
  • constructions:
    • MAC:
      • HMAC: 11
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 4
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 14
    • IKEv2: 11
  • IPsec:
    • IPsec: 41
  • TLS:
    • TLS:
      • TLS: 46
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 102
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 14
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 22
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 4
  • other:
    • Kinibi: 1
    • TEE: 25
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 9
    • FIPS PUB 197: 2
  • NIST:
    • SP 800-108: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 2
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 9
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 1
    • RFC 5289: 6
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
  • X509:
    • X.509: 9
  • FIPS:
    • FIPS 140-2: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_metadata
  • /Author: hmnye
  • /CreationDate: D:20200817105001-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200817105001-04'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title: Microsoft Word - Samsung-MDFPP-Galaxy-Devices-on-Android-10-Spring-ST-v1.1-0710
  • pdf_file_size_bytes: 777149
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
  • /CreationDate: D:20201019095805Z00'00'
  • /Creator: Word
  • /ModDate: D:20201019095805Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 765259
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different