name |
Samsung Galaxy Devices on Android 10 - Spring |
Huawei GaussDB 200 version 6.5.1 build e3690037 |
category |
Mobility |
Databases |
scheme |
US |
ES |
status |
archived |
active |
not_valid_after |
30.04.2022 |
22.03.2027 |
not_valid_before |
30.04.2020 |
22.03.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
Huawei Technologies Co., Ltd. |
manufacturer_web |
https://www.samsung.com |
https://www.huawei.com |
security_level |
{} |
EAL2+, ALC_FLR.2 |
dgst |
f628c89a64a0e7b5 |
b91f3f25e268a1e0 |
heuristics/cert_id |
CCEVS-VR-11042-2020 |
2019-32-INF-3664 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:o:samsung:android:10.0:-:*:*:*:*:*:* |
cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-21426, CVE-2023-21441, CVE-2023-21436, CVE-2023-21437, CVE-2023-21430, CVE-2023-21421, CVE-2023-21429, CVE-2023-21425, CVE-2023-21420 |
CVE-2020-1811, CVE-2020-1790, CVE-2020-1853 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
10 |
6.5.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Mobility, Virtual Private Network
- certification_date: 30.04.2020
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 30.04.2022
- id: CCEVS-VR-VID11042
- product: Samsung Galaxy Devices on Android 10 - Spring
- scheme: US
- url: https://www.niap-ccevs.org/product/11042
- vendor: Samsung Electronics Co., Ltd.
|
- category: Database management systems
- certification_date: 22.03.2022
- enhanced:
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei GaussDB 200 version 6.5.1 build e3690037
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
df09b703c88c665a, c88af12926be2779, f4474c6c73660987 |
3f6ac99252bbf14e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf |
pdf_data/cert_filename |
st_vid11042-ci.pdf |
2019-32_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11042-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200519123948-04'00'
- /ModDate: D:20200519123948-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181995
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20220310164952+01'00'
- /ModDate: D:20220310164952+01'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 847729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid11042-vr.pdf |
2019-32-INF-3664.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-11042-2020
- cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 10 - Spring
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 7
- EAL2+: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 4
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.2: 8
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_TSE.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 14
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 3
- TLSv1.1: 1
- TLSv1.2: 2
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /Author: comptont
- /CreationDate: D:20200519122942-04'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20200519122942-04'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 1153840
- pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
|
pdf_data/st_filename |
st_vid11042-st.pdf |
2019-32-ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 3
- ALC_CMS: 1
- ALC_CMS.1: 4
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL: 2
- FAU_SEL.1: 1
- FAU_SEL.1.1: 1
- FAU_STG: 4
- FAU_STG.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 1
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 11
- FCS_CKM_EXT: 18
- FCS_CKM_EXT.1: 1
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 2
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 5
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 2
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 1
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 1
- FCS_CKM_EXT.6.1: 1
- FCS_COP.1: 52
- FCS_RBG_EXT: 6
- FCS_RBG_EXT.1: 14
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_RBG_EXT.2: 1
- FCS_RBG_EXT.2.1: 1
- FCS_SRV_EXT: 7
- FCS_SRV_EXT.1.1: 1
- FCS_SRV_EXT.2.1: 1
- FCS_STG_EXT: 9
- FCS_STG_EXT.1: 2
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 4
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 2
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 17
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.2.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF_EXT: 10
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 2
- FDP_ACF_EXT.2.1: 1
- FDP_ACF_EXT.3.1: 1
- FDP_DAR_EXT: 6
- FDP_DAR_EXT.1: 1
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 2
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 3
- FDP_IFC_EXT.1: 1
- FDP_IFC_EXT.1.1: 1
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 1
- FDP_RIP.2.1: 1
- FDP_STG_EXT: 3
- FDP_STG_EXT.1: 2
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 3
- FDP_UPC_EXT.1: 1
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL_EXT: 3
- FIA_AFL_EXT.1: 3
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 15
- FIA_BLT_EXT.1: 1
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 1
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 1
- FIA_BLT_EXT.3.1: 2
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.6: 1
- FIA_BLT_EXT.6.1: 1
- FIA_BMG_EXT: 3
- FIA_BMG_EXT.1: 17
- FIA_BMG_EXT.6: 1
- FIA_BMG_EXT.6.1: 1
- FIA_PAE_EXT: 3
- FIA_PAE_EXT.1: 1
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 1
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 3
- FIA_PSK_EXT.1: 1
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_TRT_EXT: 3
- FIA_TRT_EXT.1: 1
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 4
- FIA_UAU.5: 2
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 9
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.4: 1
- FIA_UAU_EXT.4.1: 1
- FIA_UAU_EXT.4.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF_EXT: 4
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 9
- FMT_SMF: 4
- FMT_SMF.1: 1
- FMT_SMF_EXT: 11
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 9
- FMT_SMF_EXT.2: 1
- FMT_SMF_EXT.2.1: 2
- FMT_SMF_EXT.3: 4
- FMT_SMF_EXT.3.1: 1
- FPT:
- FPT_AEX_EXT: 19
- FPT_AEX_EXT.1: 1
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 1
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 1
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_AEX_EXT.5: 1
- FPT_AEX_EXT.5.1: 1
- FPT_AEX_EXT.5.2: 1
- FPT_AEX_EXT.6.1: 1
- FPT_BBD_EXT: 3
- FPT_BBD_EXT.1: 1
- FPT_BBD_EXT.1.1: 1
- FPT_JTA_EXT: 3
- FPT_JTA_EXT.1: 1
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 9
- FPT_KST_EXT.1: 1
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 1
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 1
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 3
- FPT_NOT_EXT.1: 1
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM.1.1: 1
- FPT_TST_EXT: 13
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 10
- FPT_TUD_EXT: 6
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FTA:
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB: 2
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 3
- FTA_WSE_EXT.1: 2
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC_EXT: 8
- FTP_ITC_EXT.1: 2
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 2
- FAU_MTD.1: 2
- FAU_SEL.1: 10
- FAU_SEL.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 17
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 2
- FIA:
- FIA_ATD.1: 16
- FIA_ATD.1.1: 2
- FIA_UAU.1: 9
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 15
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_REV.1: 15
- FMT_REV.1.1: 5
- FMT_REV.1.2: 3
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 21
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 11
- FPT_TRC.1.1: 2
- FPT_TRC.1.2: 2
- FTA:
- FTA_MCS.1: 9
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
|
- A:
- A.AUTHUSER: 2
- A.CONNECT: 3
- A.MANAGE: 3
- A.NO_GENERA: 1
- A.NO_GENERAL_PURPOSE: 2
- A.PEER_FUNC: 1
- A.PHYSICAL: 3
- A.SUPPORT: 4
- A.TRAINEDUS: 1
- A.TRAINEDUSER: 1
- O:
- O.ADMIN_RO: 3
- O.ADMIN_ROL: 1
- O.ADMIN_ROLE: 7
- O.AUDIT: 2
- O.AUDIT_GE: 2
- O.AUDIT_GENERATION: 3
- O.DISCRETIO: 3
- O.DISCRETIONARY: 1
- O.DISCRETIONARY_ACCESS: 5
- O.MANAGE: 13
- O.MEDIATE: 9
- O.RESIDUAL: 2
- O.RESIDUAL_: 1
- O.RESIDUAL_I: 1
- O.RESIDUAL_INFORM: 1
- O.RESIDUAL_INFORMATION: 6
- O.TOE_ACCE: 8
- O.TOE_ACCES: 1
- O.TOE_ACCESS: 10
- OE:
- OE.ADMIN: 10
- OE.INFO: 5
- OE.INFO_PRO: 4
- OE.INFO_PROTECT: 11
- OE.IT_REMOT: 4
- OE.IT_REMOTE: 6
- OE.IT_TRUST: 4
- OE.IT_TRUSTED: 1
- OE.IT_TRUSTED_SYSTEM: 5
- OE.NO_GENE: 3
- OE.NO_GENERAL: 1
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL: 8
- T:
- T.ACCESS_TSF: 2
- T.ACCESS_TSFDATA: 2
- T.ACCESS_TSFFUNC: 1
- T.IA_MASQUE: 2
- T.IA_MASQUERADE: 2
- T.IA_USER: 2
- T.RESIDUAL_: 1
- T.RESIDUAL_DATA: 2
- T.TSF: 1
- T.TSF_COMPR: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHOR: 2
- T.UNAUTHORIZED_ACCESS: 2
|
pdf_data/st_keywords/vendor |
- Broadcom:
- Qualcomm:
- Samsung:
|
- Huawei:
- Huawei: 9
- Huawei Technologies Co: 87
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 12
- IKEv1: 14
- IKEv2: 11
- IPsec:
- TLS:
- TLS:
- TLS: 46
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 2
- secp384r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 197: 9
- FIPS PUB 197: 2
- NIST:
- PKCS:
- PKCS #1: 1
- PKCS 2: 1
- PKCS#12: 2
- RFC:
- RFC 2246: 1
- RFC 2560: 2
- RFC 2818: 2
- RFC 3394: 2
- RFC 3602: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4346: 1
- RFC 4945: 2
- RFC 5216: 1
- RFC 5246: 9
- RFC 5280: 4
- RFC 5282: 2
- RFC 5288: 1
- RFC 5289: 6
- RFC 5759: 1
- RFC 6125: 1
- RFC 6379: 2
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.samsung.android.knox.net.vpn: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools: 1
- Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz: 1
- Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the: 1
- including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE: 1
- is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to: 1
- out of scope: 7
- provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a: 1
- this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE: 1
- with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are: 1
|
pdf_data/st_metadata |
- /Author: hmnye
- /CreationDate: D:20200817105001-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20200817105001-04'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title: Microsoft Word - Samsung-MDFPP-Galaxy-Devices-on-Android-10-Spring-ST-v1.1-0710
- pdf_file_size_bytes: 777149
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |