| name |
Web Bytes Xilnex Framework version 3.0 |
Medical Access Port_1BK_1.0.0, Bauform Einboxkonnektor 1.0 |
| category |
Other Devices and Systems |
Other Devices and Systems |
| scheme |
MY |
DE |
| status |
archived |
archived |
| not_valid_after |
16.02.2017 |
10.09.2023 |
| not_valid_before |
16.02.2012 |
10.09.2018 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0928c_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C030-CR-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0928a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0928b_pdf.pdf |
| manufacturer |
Web Bytes Sdn Bhd |
T-Systems International GMBH |
| manufacturer_web |
https://www.webbytes.com.my |
https://www.t-systems.de/ |
| security_level |
EAL1 |
EAL3+, ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_TDS.3, ADV_IMP.1, ALC_FLR.2 |
| dgst |
0136a64efd2140e4 |
c031d5aaa81bcc38 |
| heuristics/cert_id |
ISCB-5-RPT-C030-CR-v1a |
BSI-DSZ-CC-0928-2018 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ADV_TDS.3, ALC_TAT.1, AGD_PRE.1, ALC_FLR.2, AVA_VAN.5, ATE_DPT.1, AGD_OPE.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ADV_IMP.1 |
| heuristics/extracted_versions |
3.0 |
1.0, 1.0.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0928-V2-2019, BSI-DSZ-CC-0596-V2-2018 |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0928-V2-2019, BSI-DSZ-CC-0596-V2-2018, BSI-DSZ-CC-0596-V3-2023 |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2012-002-C030
- certification_date: 16.02.2012
- developer: Web Bytes Sdn Bhd
- enhanced:
- assurance_level: EAL1
- category: Other Devices and Systems
- cert_id: C030
- certification_date: 16.02.2012
- developer: Ooi Boon-Sheng Unit 1-2-33, Kompleks Mayang Mall,Jalan Mayang Pasir 1,11950 Bayan Baru,Pulau Pinang MALAYSIA URL: http://www.webbytes.com.myEmail: [email protected]:+ 6012 472 9615Fax:+ 604 611 0162
- expiration_date: 16.02.2017
- mutual_recognition: CCRA
- product: Web Bytes Xilnex Framework version 3.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/ISCB-5-RPT-C030-CR-v1a.pdf
- scope: Web Bytes Xilnex Framework Version 3.0 is a distribution and synchronization platform which distributes subscribed applications to multiple clients as well performs data synchronisation between all the clients in the same group. The TOE comprises of two primary components as follows: Client Software. The client software that installs directly on each user's PC which operates the daily process and update based on the user activities. Server Software. The server software that extends client software with secure communication, identification and authentication, and data synchronization. The security functions that the TOE provides include the following: Secure Transmission – All communications between the server and the client is through an SSL channel. It protects the user data from disclosure and modification. Access control – The TOE allows users to launch only the applications they subscribed to as well as accessing the database. The TOE will check the user ID and their organization ID to ensure the applications that the user is allowed to run. Identification and Authentication – Users will have to present their credentials to the server for identification and authentication before the user is allowed to launch the applications and access the user data at the backend and at the local cache. Encryption – Username and passwords are always hashed when they are being stored into the database and during authentication. Management – The TOE contains various management functions to ensure efficient and secure management of the TOE. The TOE maintains two roles, users and administrator, to ensure that the functions are restricted to only the TOE administrator.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf
- type: Distribution and synchronization platform
- expiration_date: 16.02.2017
- level: EAL1
- product: Web Bytes Xilnex Framework version 3.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/152
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
26737279a6cc79e1 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0047b_pdf.pdf |
| pdf_data/cert_filename |
|
0928c_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
- EAL 5: 1
|
| pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- ALC_FLR: 1
- ALC_FLR.2: 1
- ALC_TAT.1: 1
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180920084053+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Medical Access Port_1BK_1.0.0, Bauform Einboxkonnekor, T-Systems International GmbH"
- /ModDate: D:20181012115728+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-0928-2018
- pdf_file_size_bytes: 345148
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C030-CR-v1a.pdf |
0928a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ALC_TAT.1, ALC_FLR.2, AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0928-2018
- cert_item: Medical Access Port_1BK_1.0.0, Bauform Einboxkonnektor 1.0
- cert_lab: BSI
- developer: T-Systems International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Schutzprofil (Protection Profile) Schutzprofil 1: Anforderungen an den Netzkonnektor (NK-PP), Version 3.2.2, 11.04.2016, BSI-CC-PP- 0047-2015
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C030-CR-v1a: 29
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0047-2015: 2
- BSI-CC-PP-0047-2015: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL 5: 3
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- ALC_FLR: 3
- ALC_FLR.2: 4
- ALC_TAT.1: 4
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_ITT.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 15
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 7
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- TLS:
- TLS:
- TLS: 19
- TLS v1.1: 1
- TLSv1.1: 4
- TLSv1.2: 5
- VPN:
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
- BSI TR-03116-1: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS180-4: 9
- FIPS186-4: 1
- FIPS197: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- PKCS:
- RFC:
- RFC 3447: 1
- RFC 4303: 1
- RFC 5246: 1
- RFC1321: 2
- RFC2104: 5
- RFC2404: 2
- RFC3268: 1
- RFC3526: 3
- RFC3602: 3
- RFC4301: 2
- RFC4303: 2
- RFC4346: 5
- RFC4492: 2
- RFC4868: 2
- RFC5116: 2
- RFC5246: 6
- RFC5288: 1
- RFC5639: 2
- RFC5996: 4
- RFC7027: 2
- X509:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2015 [14] RFC Conformity Report IKE, Evaluation Facility T-Systems International GmbH, Version 1.0 (confidential document) [15] RFC Conformity Report TLS, Evaluation Facility T-Systems International GmbH, Version 1.3, 18: 1
- 2018 (confidential document) 22 / 24 BSI-DSZ-CC-0928-2018 Certification Report C. Excerpts from the Criteria For the meaning: 1
- GmbH [7] Evaluation Technical Report, Version 1.3, July 27, 2018, T-Systems International GmbH (confidential document) [8] Common Criteria Schutzprofil (Protection Profile) Schutzprofil 1: Anforderungen an den: 1
- T-Systems International GmbH, Version 1.0.1, 05.04.2018 [10] Configuration lists for the TOE (confidential documents) patched_source_config_list_sha256_Rev_3bddaa659.txt patched_source_config_list_sha1_Rev_3bddaa659: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
| pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180920084034+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20181009115738+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Medical Access Port_1BK_1.0.0, Bauform Einboxkonnektor 1.0
- /Title: Certification Report BSI-DSZ-CC-0928-2018
- pdf_file_size_bytes: 643471
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, http://www.sogisportal.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
| pdf_data/st_filename |
Web Bytes EAL1 Security Target (Xilnex Framework) v1.1.pdf |
0928b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0046: 1
- BSI-CC-PP-0047: 2
- BSI-CC-PP-0082: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 14
- EAL3+: 4
- EAL4+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 5
- ADV_IMP.1: 7
- ADV_TDS.1: 1
- ADV_TDS.2: 2
- ADV_TDS.3: 6
- AGD:
- AGD_OPE.1: 12
- AGD_PRE.1: 1
- ALC:
- ALC_DEL.1: 6
- ALC_FLR.2: 5
- ALC_TAT.1: 5
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP: 11
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 4
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
|
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 3
- FAU_GEN.2: 1
- FCS:
- FCS_CKM: 56
- FCS_CKM.1: 11
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 2
- FCS_COP: 45
- FCS_COP.1: 7
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 5
- FDP_ACF: 7
- FDP_ACF.1: 5
- FDP_IFC: 17
- FDP_IFC.1: 8
- FDP_IFF: 20
- FDP_IFF.1: 65
- FDP_ITC: 7
- FDP_ITC.1: 11
- FDP_ITC.2: 8
- FDP_RIP: 7
- FDP_RIP.1: 1
- FIA:
- FIA_UAU: 13
- FIA_UAU.1: 2
- FIA_UAU.5: 2
- FIA_UID: 10
- FIA_UID.1: 5
- FMT:
- FMT_MSA: 44
- FMT_MSA.1: 2
- FMT_MSA.3: 5
- FMT_MSA.4: 1
- FMT_MTD: 7
- FMT_MTD.1: 1
- FMT_SMF: 15
- FMT_SMF.1: 3
- FMT_SMR: 20
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FPT:
- FPT_EMS: 17
- FPT_EMS.1: 6
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_ITC: 1
- FPT_STM: 11
- FPT_STM.1: 3
- FPT_TDC: 9
- FPT_TDC.1: 2
- FPT_TST: 7
- FPT_TST.1: 3
- FTP:
- FTP_ITC: 29
- FTP_ITC.1: 12
- FTP_TRP: 8
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN: 1
- OE.CERTIFICATES: 1
- OE.DATABASE: 1
- OE.ENVIRONMENT: 1
- OE.INSTALL: 1
- OE.NETWORK: 1
- OE.PHYSICAL: 1
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 4
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 5
- AES-: 1
- AES-256: 1
- constructions:
- MAC:
- HMAC: 10
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 3
- SHA-512: 3
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03116: 2
- BSI TR-03116-1: 1
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-1: 1
- FIPS 180-2: 2
- FIPS140-1: 1
- RFC:
|
- CC:
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 180-4: 5
- PKCS:
- RFC:
- RFC 1812: 2
- RFC 2131: 2
- RFC 2132: 2
- RFC 2404: 2
- RFC 2406: 1
- RFC 3447: 3
- RFC 3526: 2
- RFC 3602: 2
- RFC 3947: 1
- RFC 4035: 2
- RFC 4055: 1
- RFC 4301: 2
- RFC 4302: 2
- RFC 4303: 2
- RFC 4306: 1
- RFC 4346: 1
- RFC 4868: 2
- RFC 5246: 1
- RFC 5280: 1
- RFC 5282: 1
- RFC 5652: 1
- RFC 5905: 1
- RFC 7296: 3
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Mahendra
- /CreationDate: D:20111229110718+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111229110718+08'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: Xilnex Framework
- pdf_file_size_bytes: 520561
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Federal_Information_Processing_Standard, http://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology, http://en.wikipedia.org/wiki/Cryptographic_hash_function, http://en.wikipedia.org/wiki/Stream_cipher, http://www.webopedia.com/TERM/E/encryption.html, http://www.webopedia.com/TERM/C/cryptography.html, http://www.webopedia.com/TERM/K/key.html, http://www.webopedia.com/TERM/I/Internet.html, http://www.webopedia.com/TERM/P/protocol.html, http://www.webopedia.com/TERM/N/Netscape.html, http://www.microsoft.com/downloads/details.aspx?FamilyID=9cfb2d51-5ff4-4491-b0e5-b386f32c0992&displaylang=en
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: OpenLimit SignCubes
- /CreationDate: D:20180713184302+02'00'
- /Creator: LaTeX with hyperref package
- /Keywords: CC, Common Criteria, ST, Security Target, Sicherheitsvorgaben, eHealth, gematik, Telematik Infrastruktur, Konnektor
- /ModDate: D:20180713184302+02'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.16 (TeX Live 2015/Debian) kpathsea version 6.2.1
- /Producer: pdfTeX-1.40.16
- /Subject: Sicherheitsvorgaben Lite für den Medical Access Port-1BK-1.0.0 Netzkonnektor Bauform Einboxkonnektor BSI-DSZ-CC-0928
- /Title: Sicherheitsvorgaben Lite für den Medical Access Port-1BK-1.0.0 Netzkonnektor Bauform Einboxkonnektor BSI-DSZ-CC-0928
- /Trapped: /False
- pdf_file_size_bytes: 1009137
- pdf_hyperlinks: http://www.rfc-editor.org/rfc/rfc2404.txt, http://www.ietf.org/rfc/rfc2406.txt, https://www.ietf.org/rfc/rfc5280.txt, http://www.dimdi.de, https://www.ietf.org/rfc/rfc3447.txt, http://www.ietf.org/rfc/rfc5282.txt, http://www.ietf.org/rfc/rfc2131.txt, http://www.bmg.bund.de, http://www.ietf.org/rfc/rfc5905.txt, http://dx.doi.org/10.6028/NIST.FIPS.180-4, http://www.gematik.de, http://www.ietf.org/rfc/rfc4306.txt, http://www.ietf.org/rfc/rfc3947.txt, http://www.ietf.org/rfc/rfc4035.txt, http://www.ietf.org/rfc/rfc2132.txt, http://www.rfc-editor.org/rfc/rfc4868.txt, https://tools.ietf.org/html/rfc7296, http://www.ietf.org/rfc/rfc4303.txt, http://www.ietf.org/rfc/rfc4302.txt, http://www.rfc-editor.org/rfc/rfc3602.txt, http://www.rfc-editor.org/rfc/rfc3526.txt, http://www.ietf.org/rfc/rfc5652.txt, http://www.ietf.org/rfc/rfc5246.txt, http://www.ietf.org/rfc/rfc4301.txt, http://www.ietf.org/rfc/rfc4346.txt, https://www.ietf.org/rfc/rfc4055.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 151
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |