Huawei ECC800 software management component version V100R021C00SPC100

CSV information ?

Status active
Valid from 18.05.2021
Valid until 18.05.2026
Scheme 🇪🇸 ES
Manufacturer Huawei Technologies Co. Ltd.
Category Other Devices and Systems
Security level ALC_FLR.2, EAL3+

Heuristics summary ?

Certificate ID: 2019-50-INF-3506

Certificate ?

Extracted keywords

Vendor
Huawei, Huawei Technologies Co

Security level
EAL3
Claims
O.E, A.U
Security Assurance Requirements (SAR)
ALC_FLR.2
Evaluation facilities
DEKRA Testing and Certification

File metadata

Creation date D:20210426151719+02'00'
Pages 2

Certification report ?

Extracted keywords

Vendor
Huawei, Huawei Technologies Co

Security level
EAL3, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Claims
A.U
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.2, AGD_OPE.1, AGD_PRE, AGD_OPE, ALC_FLR.2, ALC_CMC.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR, ATE_COV.2, ATE_DPT.1, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN_EXT.3, FAU_SAR.1, FAU_STG.1, FDP_ACC.1, FDP_AFL.1, FIA_UAU.2, FIA_UID.2, FMT_MOF.1, FMT_MSA.3, FMT_SMR.1, FPT_STM.1, FTA_SSL.3, FTA_TSE.1
Certificates
2019-50-INF-3506- v1
Evaluation facilities
DEKRA Testing and Certification

File metadata

Author 9308
Creation date D:20210517103341+02'00'
Modification date D:20210517103341+02'00'
Pages 13
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Security target ?

Extracted keywords

Asymmetric Algorithms
ECC
Hash functions
SHA256
Libraries
OpenSSL

Vendor
Huawei, Huawei Technologies Co

Security level
EAL3
Claims
OE.TIME
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_FLR.2
Security Functional Requirements (SFR)
FAU_GEN_EXT.3, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.3, FAU_GEN.1, FAU_GEN, FAU_GEN_EXT, FAU_GEN_EXT.3.1, FAU_GEN_EXT.3.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_MCS.1, FTA_SSL.3, FTA_SSL.4, FTA_TSE.1, FTA_TAB.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TSE.1.1, FTA_TAB.1.1

File metadata

Title Release Notes
Author Administrator
Creation date D:20210318161214+15'12'
Modification date D:20210318161214+15'12'
Pages 38
Creator WPS Writer

Heuristics ?

Certificate ID: 2019-50-INF-3506

Extracted SARs

ATE_COV.2, AVA_VAN.2, ASE_INT.1, AGD_OPE.1, ASE_CCL.1, ALC_DVS.1, ALC_DEL.1, ALC_FLR.2, ASE_TSS.1, ALC_CMC.3, ADV_TDS.2, ATE_DPT.1, ASE_REQ.2, ADV_ARC.1

Scheme data ?

Product Huawei ECC800 software management component version V100R021C00SPC100
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/514-huawei-ecc800-software-management-component-version-v100r021c00spc100
Category Others
Manufacturer Huawei Technologies Co., Ltd.
Certification Date 18.05.2021
Enhanced
Description The TOE is a software to manage and monitor devices inside the smart module data center. It provides a web interface that allow users to operate with the TOE in order to change values and parameters The TOE provides the following key security features: Authentication and Authorization: Only authenticated users are allowed to log in to the TOE, query TOE data, and set TOE parameters. Only authorized users are able to execute the previous actions based on their privileges. If a user fails to be authenticated for multiple consecutive times, the user is locked to prevent unauthorized access. Auditing: An operation log records the operation that a local administrator has performed on the system and the result of the operation and is used for tracing and auditing. Only authorized local administrators can review and query the records. Management: The TOE provides two different user roles (administrator and operator). Also, the TOE provides the functionality to manage: time settings, user configuration, updates and logs export. TOE Access: The TOE is able to manage the concurrent multiple sessions by limiting the number of active sessions per user. The TOE is also able to terminate an interactive session after an inactivity period of time.
Category Others
Manufacturer Huawei Technologies Co., Ltd.
Type Product
Evaluation Facility DEKRA Testing and Certification S.A.U.
Status Certified
Certification Date 18.05.2021
Cc Version Common Criteria 3.1 release 5
Level EAL3 + (ALC_FLR.2)
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1150
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1151
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1152

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2021-05-18'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '876c8404c941a2eb37c00bbb446550b6a0967689d88da63775a5911d06814cac', 'txt_hash': 'b85e91d1f863a294431fbfe8e2cdc6c7e44ad3c6412c98e4e99c653696f46c42'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3bc94ec444d12ae066c8a72de1a2276297f0c63e318fb2ceac190efdb80ff51c', 'txt_hash': '5f17b1821217a223d57c3a8b0e413acdc8f259b649fe888dc35b4973751be7a0'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2d3d5d7fd148c0e9ae7e96a5a9e85dc17559860396b6c82a0cfe2b38f0c3f3e7', 'txt_hash': '125589eed0118bbedccdab54f69ca63ee860e8d9ed9d9510b908437cc0827482'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 938791, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Author': '9308', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20210517103341+02'00'", '/ModDate': "D:20210517103341+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis.eu/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 687275, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Author': 'Administrator', '/Comments': '', '/Company': '', '/CreationDate': "D:20210318161214+15'12'", '/Creator': 'WPS Writer', '/Keywords': '', '/ModDate': "D:20210318161214+15'12'", '/Producer': '', '/SourceModified': "D:20210318161214+15'12'", '/Subject': '', '/Title': 'Release Notes', '/Trapped': False, 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://support.huawei.com/carrier/', 'http://www.huawei.com/', 'mailto:[email protected]']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 746377, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20210426151719+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'ES': {'2019-50-INF-3506- v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 8, 'EAL 1': 1, 'EAL 4': 2, 'EAL 2': 1, 'EAL2': 1}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE': 2, 'AGD_OPE': 1}, 'ALC': {'ALC_FLR.2': 8, 'ALC_CMC.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_FLR': 3}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN_EXT.3': 1, 'FAU_SAR.1': 1, 'FAU_STG.1': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_AFL.1': 1}, 'FIA': {'FIA_UAU.2': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MSA.3': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTA': {'FTA_SSL.3': 1, 'FTA_TSE.1': 1}}, 'cc_claims': {'A': {'A.U': 5}}, 'vendor': {'Huawei': {'Huawei': 15, 'Huawei Technologies Co': 3}}, 'eval_facility': {'DEKRA': {'DEKRA Testing and Certification': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {'FAU': {'FAU_GEN_EXT.3': 22, 'FAU_GEN.2': 11, 'FAU_SAR.1': 7, 'FAU_SAR.2': 4, 'FAU_STG.1': 7, 'FAU_STG.3': 5, 'FAU_GEN.1': 4, 'FAU_GEN': 1, 'FAU_GEN_EXT': 1, 'FAU_GEN_EXT.3.1': 2, 'FAU_GEN_EXT.3.2': 2, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FDP': {'FDP_ACC.1': 10, 'FDP_ACF.1': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL.1': 6, 'FIA_ATD.1': 5, 'FIA_UAU.2': 7, 'FIA_UAU.6': 5, 'FIA_UID.2': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF.1': 7, 'FMT_MSA.1': 4, 'FMT_MSA.3': 8, 'FMT_SMF.1': 6, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_MCS.1': 6, 'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_TSE.1': 6, 'FTA_TAB.1': 6, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TSE.1.1': 1, 'FTA_TAB.1.1': 1}}, 'cc_claims': {'OE': {'OE.TIME': 1}}, 'vendor': {'Huawei': {'Huawei': 82, 'Huawei Technologies Co': 43}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'A': {'A.U': 1}}, 'vendor': {'Huawei': {'Huawei': 3, 'Huawei Technologies Co': 2}}, 'eval_facility': {'DEKRA': {'DEKRA Testing and Certification': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 2019-50 INF-3506.pdf.
    • The st_filename property was set to 2019-50 ST.pdf.
    • The cert_filename property was set to 2019-50 CCRA.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to 2019-50-INF-3506.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-50%20INF-3506.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-50%20ST.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The cert_keywords property was set to None.
    • The cert_filename property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Huawei ECC800 software management component version V100R021C00SPC100 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-50%20CCRA.pdf",
  "dgst": "d1001a9a6c669976",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2019-50-INF-3506",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Others",
      "certification_date": "2021-05-18",
      "enhanced": {
        "category": "Others",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1151",
        "certification_date": "2021-05-18",
        "description": "The TOE is a software to manage and monitor devices inside the smart module data center. It provides a web interface that allow users to operate with the TOE in order to change values and parameters The TOE provides the following key security features: Authentication and Authorization: Only authenticated users are allowed to log in to the TOE, query TOE data, and set TOE parameters. Only authorized users are able to execute the previous actions based on their privileges. If a user fails to be authenticated for multiple consecutive times, the user is locked to prevent unauthorized access. Auditing: An operation log records the operation that a local administrator has performed on the system and the result of the operation and is used for tracing and auditing. Only authorized local administrators can review and query the records. Management: The TOE provides two different user roles (administrator and operator). Also, the TOE provides the functionality to manage: time settings, user configuration, updates and logs export. TOE Access: The TOE is able to manage the concurrent multiple sessions by limiting the number of active sessions per user. The TOE is also able to terminate an interactive session after an inactivity period of time.",
        "evaluation_facility": "DEKRA Testing and Certification S.A.U.",
        "level": "EAL3 + (ALC_FLR.2)",
        "manufacturer": "Huawei Technologies Co., Ltd.",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1152",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1150",
        "type": "Product"
      },
      "manufacturer": "Huawei Technologies Co., Ltd.",
      "product": "Huawei ECC800 software management component version V100R021C00SPC100",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/514-huawei-ecc800-software-management-component-version-v100r021c00spc100"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Huawei Technologies Co. Ltd.",
  "manufacturer_web": "https://www.huawei.com",
  "name": "Huawei ECC800 software management component version V100R021C00SPC100",
  "not_valid_after": "2026-05-18",
  "not_valid_before": "2021-05-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2019-50 CCRA.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.U": 1
        },
        "O": {
          "O.E": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DEKRA": {
          "DEKRA Testing and Certification": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 3,
          "Huawei Technologies Co": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20210426151719+02\u002700\u0027",
      "pdf_file_size_bytes": 746377,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2019-50 INF-3506.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2019-50-INF-3506- v1": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.U": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 3,
          "ALC_FLR.2": 8
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL3": 8
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN_EXT.3": 1,
          "FAU_SAR.1": 1,
          "FAU_STG.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_AFL.1": 1
        },
        "FIA": {
          "FIA_UAU.2": 1,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.3": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_STM.1": 1
        },
        "FTA": {
          "FTA_SSL.3": 1,
          "FTA_TSE.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DEKRA": {
          "DEKRA Testing and Certification": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 15,
          "Huawei Technologies Co": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "9308",
      "/CreationDate": "D:20210517103341+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20210517103341+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 938791,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "2019-50 ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.TIME": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_FLR.2": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 4,
          "FAU_GEN.2": 11,
          "FAU_GEN.2.1": 1,
          "FAU_GEN_EXT": 1,
          "FAU_GEN_EXT.3": 22,
          "FAU_GEN_EXT.3.1": 2,
          "FAU_GEN_EXT.3.2": 2,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 4,
          "FAU_SAR.2.1": 1,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 5,
          "FAU_STG.3.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 10,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.6": 5,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 3,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 4,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 2
        },
        "FTA": {
          "FTA_MCS.1": 6,
          "FTA_MCS.1.1": 1,
          "FTA_MCS.1.2": 1,
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 6,
          "FTA_SSL.4.1": 1,
          "FTA_TAB.1": 6,
          "FTA_TAB.1.1": 1,
          "FTA_TSE.1": 6,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 2
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 82,
          "Huawei Technologies Co": 43
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Administrator",
      "/Comments": "",
      "/Company": "",
      "/CreationDate": "D:20210318161214+15\u002712\u0027",
      "/Creator": "WPS Writer",
      "/Keywords": "",
      "/ModDate": "D:20210318161214+15\u002712\u0027",
      "/Producer": "",
      "/SourceModified": "D:20210318161214+15\u002712\u0027",
      "/Subject": "",
      "/Title": "Release Notes",
      "/Trapped": false,
      "pdf_file_size_bytes": 687275,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "https://support.huawei.com/carrier/",
          "http://www.huawei.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-50%20INF-3506.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL3+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-50%20ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2d3d5d7fd148c0e9ae7e96a5a9e85dc17559860396b6c82a0cfe2b38f0c3f3e7",
      "txt_hash": "125589eed0118bbedccdab54f69ca63ee860e8d9ed9d9510b908437cc0827482"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "876c8404c941a2eb37c00bbb446550b6a0967689d88da63775a5911d06814cac",
      "txt_hash": "b85e91d1f863a294431fbfe8e2cdc6c7e44ad3c6412c98e4e99c653696f46c42"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3bc94ec444d12ae066c8a72de1a2276297f0c63e318fb2ceac190efdb80ff51c",
      "txt_hash": "5f17b1821217a223d57c3a8b0e413acdc8f259b649fe888dc35b4973751be7a0"
    }
  },
  "status": "active"
}