This page was not yet optimized for use on mobile
devices.
Hikvision Network Camera Series DS-2CD5, DS-2CD7 and PTZ version 1.1
CSV information
| Status | active |
|---|---|
| Valid from | 30.06.2022 |
| Valid until | 30.06.2027 |
| Scheme | 🇪🇸 ES |
| Manufacturer | Hangzhou HIKVISION Digital Technology Co. |
| Category | Other Devices and Systems |
| Security level | ALC_FLR.2, EAL3+ |
Heuristics summary
Certificate ID: 2020-72-INF-3810
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 2, EAL3Claims
O.ESecurity Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2Evaluation facilities
BrightsightCertification report
Extracted keywords
Protocols
TLS v1.2Security level
EAL3+, EAL3, EAL 1, EAL 4, EAL 2, EAL2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.2, AGD_OPE.1, AGD_PRE, ALC_FLR.2, ALC_CMC.3, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FIA_AFL.1, FIA_UAU.7, FIA_ATD.1, FMT_SMR.2, FMT_MOF.1, FPT_STM.1, FPT_APW.1, FPT_TFU.1, FTA_MCS.1, FTA_SSL.4, FTP_TRP.1Certificates
2020-72-INF-3810- v2Evaluation facilities
BrightsightFile metadata
| Pages | 12 |
|---|
Security target
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
RSA2048, RSA 2048, DHE, Diffie-HellmanHash functions
SHA256, SHA-512, SHA-256, SHA-384Protocols
TLS, TLS1.1, TLS 1.2, TLS1.2Block cipher modes
CBC, GCMTLS cipher suites
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256Security level
EAL3, EAL3 augmentedClaims
O.USER_AUTHENTICATION, O.USER_AUTHORISATION, O.USER_MANAGEMENT, O.AUDIT_LOGS, O.AUDIT_VIEW, O.AUDIT_EXPORT, O.VIDEO_INTEGRITY, O.FIRMWARE_LOAD_INTEGRITY, O.TRUSTED_PATH, O.VIDEO_PROTECTION, O.SOFTWARE_VERIFIED, O.KEY_SECRECY, O.AUDIT_REVIEW, T.UNAUTHORISED_ACCESS, T.TRANSMISSION_DISCLOSURE, T.VIDEO_MANIPULATION, T.CAMERA_UNAVAILABLE, T.UPDATE_COMPROMISE, A.TRUSTED_USERS, A.TRUSTED_NETWORK_SYSTEMS, A.NO_PHYSICAL_ACCESS, OE.TRUSTED_USERS, OE.TRUSTED_NETWORK_SYSTEMS, OE.TOE_AVAILABILITY, OE.NO_PHYSICAL_ACCESS, OE.PASSWORDSSecurity Assurance Requirements (SAR)
ADV_TDS.2, ADV_ARC.1, ADV_FSP.3, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_TSS.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_AEG, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_AEG.1, FAU_AEG.1.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR, FIA_AFL.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.7, FIA_UID.1, FIA_ATD.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_ATD.1.1, FIA_AFL, FIA_UAU, FIA_ATD, FMT_SMR.2, FMT_SMF.1, FMT_MOF.1, FMT_MTD.1, FMT_SMR.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1.1, FMT_MOF.1.1, FMT_SMR, FMT_MTD.1.1, FMT_SMF, FMT_MOF, FMT_MTD, FPT_TFU, FPT_SKP, FPT_APW, FPT_STM.1, FPT_SKP.1, FPT_APW.1, FPT_TST.1, FPT_TFU.1, FPT_TFU.1.1, FPT_TFU.1.2, FPT_TFU.1.3, FPT_TFU.1.4, FPT_SKP.1.1, FPT_APW.1.1, FPT_APW.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_STM, FPT_TST, FTA_MCS.1, FTA_SSL.3, FTA_SSL.4, FTA_MCS.1.1, FTA_MCS.1.2, FTA_SSL.3.1, FTA_SSL.4.1, FTA_MCS, FTA_SSL, FTP_TRP.1, FTP_ITC.1, FTP_ITC, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRPEvaluation facilities
BrightsightStandards
FIPS PUB 180-4, FIPS PUB 186-4, RFC5288, RFC5246, RFC3268File metadata
| Pages | 42 |
|---|
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2020-72-INF-3810Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data
| Product | Hikvision Network Camera Series DS-2CD5, DS-2CD7 and PTZ version 1.1 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/842-hikvision-network-camera-series-ds-2cd5-ds-2cd7-and-ptz-version-1-1 | |
| Category | Others | |
| Manufacturer | Hangzhou Hikvision Digital Technology Co. | |
| Certification Date | 29.06.2022 | |
| Enhanced | ||
| Description | The Target Of Evaluation (TOE) is a Network Camera developed by Hikvision, and will hereafter be referred to as the TOE throughout this document. The TOE is a Network camera which comprises a hardware board and a specific firmware for the hardware. Hikvision has considered the European data law GDPR and as a result selected a set of SFRs to be included in the ST. The TOE provides the following functionality: Management interface. Video over IP. Security audit | |
| Category | Others | |
| Manufacturer | Hangzhou Hikvision Digital Technology Co. | |
| Type | Product | |
| Evaluation Facility | SGS Brightsight Barcelona S.L. (Unipersonal) | |
| Status | Certified | |
| Certification Date | 29.06.2022 | |
| Cc Version | Common Criteria 3.1 release 5 | |
| Level | EAL3 + (ALC_FLR.2) | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1525 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1526 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1527 | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-72_Certificado.pdf",
"dgst": "7773a6d0d99eb667",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "2020-72-INF-3810",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Others",
"certification_date": "2022-06-29",
"enhanced": {
"category": "Others",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1526",
"certification_date": "2022-06-29",
"description": "The Target Of Evaluation (TOE) is a Network Camera developed by Hikvision, and will hereafter be referred to as the TOE throughout this document. The TOE is a Network camera which comprises a hardware board and a specific firmware for the hardware. Hikvision has considered the European data law GDPR and as a result selected a set of SFRs to be included in the ST. The TOE provides the following functionality: Management interface. Video over IP. Security audit",
"evaluation_facility": "SGS Brightsight Barcelona S.L. (Unipersonal)",
"level": "EAL3 + (ALC_FLR.2)",
"manufacturer": "Hangzhou Hikvision Digital Technology Co.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1527",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1525",
"type": "Product"
},
"manufacturer": "Hangzhou Hikvision Digital Technology Co.",
"product": "Hikvision Network Camera Series DS-2CD5, DS-2CD7 and PTZ version 1.1",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/842-hikvision-network-camera-series-ds-2cd5-ds-2cd7-and-ptz-version-1-1"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hangzhou HIKVISION Digital Technology Co.",
"manufacturer_web": "https://www.hikvision.com/en/",
"name": "Hikvision Network Camera Series DS-2CD5, DS-2CD7 and PTZ version 1.1",
"not_valid_after": "2027-06-30",
"not_valid_before": "2022-06-30",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "2020-72_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.E": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL3": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "2020-72-INF-3810.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-72-INF-3810- v2": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 3,
"ALC_FLR.2": 8,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL3": 7,
"EAL3+": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAR.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD.1": 1,
"FIA_UAU.7": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_SMR.2": 1
},
"FPT": {
"FPT_APW.1": 1,
"FPT_STM.1": 1,
"FPT_TFU.1": 1
},
"FTA": {
"FTA_MCS.1": 1,
"FTA_SSL.4": 1
},
"FTP": {
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS v1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 856048,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "2020-72-ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DHE": 6,
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 2048": 1,
"RSA2048": 2
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_PHYSICAL_ACCESS": 3,
"A.TRUSTED_NETWORK_SYSTEMS": 2,
"A.TRUSTED_USERS": 3
},
"O": {
"O.AUDIT_EXPORT": 4,
"O.AUDIT_LOGS": 5,
"O.AUDIT_REVIEW": 1,
"O.AUDIT_VIEW": 3,
"O.FIRMWARE_LOAD_INTEGRITY": 4,
"O.KEY_SECRECY": 4,
"O.SOFTWARE_VERIFIED": 4,
"O.TRUSTED_PATH": 5,
"O.USER_AUTHENTICATION": 4,
"O.USER_AUTHORISATION": 4,
"O.USER_MANAGEMENT": 4,
"O.VIDEO_INTEGRITY": 4,
"O.VIDEO_PROTECTION": 4
},
"OE": {
"OE.NO_PHYSICAL_ACCESS": 3,
"OE.PASSWORDS": 3,
"OE.TOE_AVAILABILITY": 4,
"OE.TRUSTED_NETWORK_SYSTEMS": 4,
"OE.TRUSTED_USERS": 3
},
"T": {
"T.CAMERA_UNAVAILABLE": 2,
"T.TRANSMISSION_DISCLOSURE": 2,
"T.UNAUTHORISED_ACCESS": 3,
"T.UPDATE_COMPROMISE": 3,
"T.VIDEO_MANIPULATION": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR": 1,
"ALC_FLR.2": 2,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 2,
"EAL3 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_AEG": 4,
"FAU_AEG.1": 6,
"FAU_AEG.1.1": 2,
"FAU_GEN": 4,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR": 1,
"FAU_SAR.1": 4,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 17,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 4,
"FMT_MOF.1.1": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 3,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 1,
"FMT_SMR.2": 9,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW": 4,
"FPT_APW.1": 8,
"FPT_APW.1.1": 2,
"FPT_APW.1.2": 2,
"FPT_SKP": 4,
"FPT_SKP.1": 8,
"FPT_SKP.1.1": 2,
"FPT_STM": 1,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1,
"FPT_TFU": 4,
"FPT_TFU.1": 6,
"FPT_TFU.1.1": 2,
"FPT_TFU.1.2": 2,
"FPT_TFU.1.3": 2,
"FPT_TFU.1.4": 2,
"FPT_TST": 1,
"FPT_TST.1": 4,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1
},
"FTA": {
"FTA_MCS": 1,
"FTA_MCS.1": 5,
"FTA_MCS.1.1": 1,
"FTA_MCS.1.2": 1,
"FTA_SSL": 2,
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 1,
"FTP_TRP.1": 7,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 17,
"TLS 1.2": 1,
"TLS1.1": 1,
"TLS1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 3,
"SHA256": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 180-4": 2,
"FIPS PUB 186-4": 2
},
"RFC": {
"RFC3268": 4,
"RFC5246": 4,
"RFC5288": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 3
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 767927,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.hikvision.com/en/support/download/firmware-with-cc",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-72-INF-3810.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-72-ST.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "584de70c58a661a35e4777abaa4c90bf4bab969a46a58c963e108d977f050fa6",
"txt_hash": "04cd1a45010aba16a5a2fc5164ac80dbfe1757aa4fd75c0db98d0923cc140fa3"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f66fe9a46441f5a9fe393c1cecd89de55303d0cd6162bfa34e34a590062a25b9",
"txt_hash": "bb27ab7f1798b6fd12a39351a8e666bc891e58a3e68dc606803166afb9918ff6"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "6e20a09e23d388e3301f50f13edc8f497a1e14673f57bddbebf50cdafe930631",
"txt_hash": "ff5ddf6253b28dec324378833b320d11e3e65e30022ed74604192bb70d97ac65"
}
},
"status": "active"
}