name |
TNOR Guard v. 1.1.3 |
STARCOS 3.4 Health QES C1 |
category |
Boundary Protection Devices and Systems |
Products for Digital Signatures |
scheme |
NO |
DE |
status |
active |
archived |
not_valid_after |
12.05.2027 |
01.09.2019 |
not_valid_before |
12.05.2022 |
30.04.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20C%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0582a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0582b.pdf |
manufacturer |
Thales Norway AS |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.thales.no/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL4+, AVA_VAN.4, ALC_FLR.3 |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst |
03972af324dcd07f |
409febcff1b19214 |
heuristics/cert_id |
SERTIT-120 |
BSI-DSZ-CC-0582-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1 |
heuristics/extracted_versions |
1.1.3 |
3.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007 |
heuristics/scheme_data |
- category: Boundary Protection Devices and Systems
- certification_date: 12.05.2022
- developer: Thales Norway AS
- enhanced:
- category: Boundary Protection Devices and Systems
- cert_id: SERTIT-120
- certification_date: 12.05.2022
- description: TNOR Guard is a technology that provides controlled information flow between networks with different system and application security policies. The TNOR Guard (TOE) is part of the XOmail product family for messaging and information exchange in mission-critical military and civilian networks. The Guard implements high-assurance information flow control for the trusted exchange of information across security domain boundaries. This product is also described in this report as the Target of Evaluation (TOE). The main security feature of the TOE is to mediate a one-way or bidirectional flow between two security domains. The TOE inspects every information object that is requested sent between the security domains, and makes an automated release decision according to configured policy. The TOE covers the following four Guard products: STANAG 4406 Ed 2 Message Guard For connectivity towards the NATO standard Military Message Handling System (MMHS), SMTP Message Guard (E-mail) For connectivity towards standard e-mail systems such as Microsoft Exchange. Supports RFC 6477 for Military Message Handling attributes within the SMTP domain, Chat (XMPP) Guard Instant Messaging service between security domains. XML/SOAP Guard Exchange of XML/SOAP data between security domains.
- developer: Thales Norway AS
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/1311036-1656573547/SERTIT/Sertifikater/2022/120/SERTIT-120%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/1310630-1654589563/SERTIT/Sertifikater/2022/120/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/1310627-1654589561/SERTIT/Sertifikater/2022/120/SERTIT-120%20CR%20v1.0.pdf'})]})
- evaluation_facility: System Sikkerhet AS
- expiration_date: 12.05.2027
- level: EAL 4, ALC_FLR.3, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: TNOR Guard version 1.1.3
- sponsor: Forsvarsmateriell IKT-kapasiteter
- product: TNOR Guard
- url: https://sertit.no/certified-products/tnor-guard-article2842-1919.html
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
SERTIT-120 C v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: helgerudt
- /CreationDate: D:20220629133919+02'00'
- /Creator: Hewlett-Packard MFP
- /ModDate: D:20220629142649+02'00'
- /Producer: PixEdit AS, PixEdit Version 8.7.4.6
- /Subject: 201676 201334 VEDLEGG01
- pdf_file_size_bytes: 1289183
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
SERTIT-120 CR v1.0.pdf |
0582a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0582-2009
- cert_item: STARCOS 3.4 Health QES C1
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0410-2007-MA-04: 1
- BSI-DSZ-CC-0582-2009: 22
- BSI-DSZ-CC-430-2008: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 27
- EAL 4 augmented: 24
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 4+: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 26
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 4
- ATE_IND: 5
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 6
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 3
- Giesecke & Devrient: 19
- NXP:
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- ISO:
- ISO/IEC 15408: 8
- ISO/IEC 17025: 2
- ISO/IEC 18045: 2
- RFC:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 3
- AIS 25: 2
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 2
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- C1 (confidential document) [9] Security Target BSI-DSZ-CC-0582-2009, Version 0.8, 19.03.2009, Security Target Lite STARCOS 3: 1
- Health QES C1, TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.2, 16.04.2009, Configuration List STARCOS 3.4 Health: 1
- P5CD080V0B Secure Smart Card Controller, Version 1.1, 23.04.2008, BSI-DSZ-CC-430-2008, T-Systems (confidential document) 9 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
- Version 0.8, 19.03.2009, Security Target STARCOS 3.4 Health QES C1, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 3, 23.04.2009, Evaluation Technikal Report for STARCOS 3: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20220518100037+02'00'
- /ModDate: D:20220518100037+02'00'
- pdf_file_size_bytes: 529073
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090512085839+02'00'
- /Creator: Writer
- /Keywords: "STARCOS 3.4 Health QES C1, Giesecke & Devrient GmbH, BSI-DSZ-CC-0582-2009, Common Criteria, Certification, Zertifizierung"
- /ModDate: D:20090512092323+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0582-2009
- pdf_file_size_bytes: 780442
- pdf_hyperlinks: http://www.bsi.bund.de/, https://certificates.gi-de.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
TNOR Guards 739_20726_aaaa_sc_ed10-4-public.pdf |
0582b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410-2007: 3
- BSI-DSZ-CC-0410-2007-MA-04: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0006-2002: 1
- BSI-PP-0002-2001: 2
- BSI-PP-0006-2002: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 5
|
- EAL:
- EAL 4: 21
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 4
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ALC:
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_OBJ: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- AVA:
|
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.3: 1
- ACM_CAP.4: 2
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.1: 10
- ADV_FSP.2: 3
- ADV_HLD.1: 2
- ADV_HLD.2: 4
- ADV_IMP.1: 6
- ADV_LLD.1: 5
- ADV_RCR.1: 5
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 10
- AGD_USR.1: 9
- ALC:
- ALC_DVS.1: 4
- ALC_LCD.1: 2
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 5
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 9
- AVA_SOF: 1
- AVA_SOF.1: 3
- AVA_VLA.4: 10
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 9
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 10
- FAU_SAR: 1
- FAU_SAR.1: 11
- FAU_SAR.2: 8
- FAU_STG: 1
- FAU_STG.1: 12
- FAU_STG.3: 9
- FAU_STG.4: 9
- FCO:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP: 1
- FCS_COP.1: 10
- FCS_NRO.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.2: 10
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ETC: 1
- FDP_ETC.2: 13
- FDP_IFC: 19
- FDP_IFC.1: 14
- FDP_IFC.2: 11
- FDP_IFF: 19
- FDP_IFF.1: 16
- FDP_IFF.2: 16
- FDP_IFF.2.2: 1
- FDP_ITC: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 15
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.2: 10
- FDP_UIT: 1
- FDP_UIT.1: 9
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 9
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 13
- FMT:
- FMT_MOF: 19
- FMT_MOF.1: 5
- FMT_MSA: 1
- FMT_MSA.1: 10
- FMT_MSA.3: 15
- FMT_MTD: 2
- FMT_MTD.1: 12
- FMT_MTD.3: 8
- FMT_MTS: 1
- FMT_REV: 1
- FMT_REV.1: 9
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMR: 1
- FMT_SMR.1: 9
- FMT_SMR.2: 16
- FMT_TST.1: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 11
- FPT_RCV: 1
- FPT_RCV.4: 10
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 11
- FPT_TST: 1
- FPT_TST.1: 12
- FRU:
- FTP:
- FTP_ITC.1: 4
- FTP_TRP: 1
- FTP_TRP.1: 15
- FTP_TRP.2: 2
|
- FAU:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 10
- FCS_CKM.1.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 14
- FCS_COP: 12
- FCS_COP.1: 9
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 14
- FDP_ACF: 26
- FDP_ACF.1: 17
- FDP_ACF.1.4: 1
- FDP_ETC: 5
- FDP_ETC.1: 3
- FDP_ITC: 6
- FDP_ITC.1: 7
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_SDI: 10
- FDP_SDI.2: 6
- FDP_UIT: 11
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 3
- FMT_MSA: 9
- FMT_MSA.1: 8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 3
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 3
- FMT_SMF.1: 10
- FMT_SMF.1.1: 3
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 2
- FPT_PHP: 1
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 2
- FPT_RVM: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 9
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 11
- FTP_ITC.1: 8
- FTP_TRP: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A..Z: 1
- A.APPROVED_CRYPTO: 3
- A.APPROVED_PKI: 2
- A.CORRECT_CONFIGURATION: 3
- A.NETWORK_PROTECTED: 2
- A.PHYSICAL_ACCESS_MANAGED: 3
- A.TRUSTED_AND_TRAINED_ADMIN: 2
- A.TRUSTED_LABELLER: 3
- O:
- O.ACCESS: 8
- O.AUDIT: 13
- O.CMD_ACL: 10
- O.CONFIGURATION_CHANGE: 5
- O.CONTROLLED_INFORMATION: 1
- O.CONTROLLED_INFORMATION_FLOW: 5
- O.CORRECT_TSF_OPERATION: 6
- O.INTERNAL_LEAST_PRIVILEG: 1
- O.INTERNAL_LEAST_PRIVILEGE: 9
- O.LABEL_MAPPING: 8
- O.MAC: 5
- O.MGMT_MODE: 6
- O.MINIMAL_PROXY: 10
- O.OBJECT_INTEGRITY: 9
- O.RESIDUAL_INFORMATION: 7
- O.RESOURCE_SHARING: 7
- O.SECURE_STATE: 8
- O.SUBJECT_ISOLATION: 12
- O.TRANSITION: 5
- O.TSF_INTEGRITY: 9
- O.VALID_LABEL: 6
- OE:
- OE.APPROVED_CRYPTO: 7
- OE.APPROVED_PKI: 7
- OE.BORDER_PROTECTION: 12
- OE.CONFIGURATION: 8
- OE.CONTENT_INSPECTION_S: 1
- OE.CONTENT_INSPECTION_SE: 2
- OE.CONTENT_INSPECTION_SERVICE: 6
- OE.DIRECTORY_SERVICE: 6
- OE.MINIMAL_POSTURE: 10
- OE.NETWORK: 10
- OE.PHYSICAL_ACCESS_MANA: 2
- OE.PHYSICAL_ACCESS_MANAG: 1
- OE.PHYSICAL_ACCESS_MANAGED: 6
- OE.PLATFORM: 10
- OE.TIME_SOURCE: 6
- OE.TRUSTED_AND_TRAINED_: 1
- OE.TRUSTED_AND_TRAINED_A: 1
- OE.TRUSTED_AND_TRAINED_ADMIN: 8
- OE.TRUSTED_AND_TRAINED_ADMINS: 1
- OE.TRUSTED_LABELLER: 7
- T:
- T.ADMIN_MASQUERADE: 4
- T.AUDIT_COMPROMISE: 2
- T.COVERT_CHANNEL: 2
- T.DOS: 4
- T.INFORMATION_LEAK: 2
- T.INSECURE_STATE: 4
- T.MALWARE_INJECTION: 2
- T.METADATA_LEAK: 4
- T.NETWORK_ATTACK: 2
- T.OBJECT_TAMPERING: 4
- T.RECONNAISSANCE: 4
- T.RESIDUAL_DATA: 2
- T.TSF_COMPROMISE: 3
- T.UNATTENDED_ADMIN_SESSION: 2
- T.UNAUTHORIZED_ACCESS: 4
- T.UNNOTICED_ATTACK: 2
|
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 8
- Giesecke & Devrient: 4
- NXP:
- NXP: 5
- NXP Semiconductors: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 9
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- PKCS:
- PKCS #11: 2
- PKCS#11: 4
- PKCS11: 2
- RFC:
- RFC 5321: 1
- RFC 5322: 1
- RFC 6120: 1
- RFC 6121: 1
- RFC 6477: 1
- RFC 7622: 2
- RFC3507: 2
- RFC5905: 1
- RFC6120: 2
- RFC6121: 1
- X509:
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS 32: 1
- AIS20: 1
- AIS31: 1
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 9796-2: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Radical
- /CreationDate: D:20220510093219+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220510093219+02'00'
- /Producer: Microsoft® Word 2016
- /Title: System/Subsystem Specification
- pdf_file_size_bytes: 3028038
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /Author: Giesecke & Devrient
- /Company: Giesecke & Devrient
- /CreationDate: D:20090416113143+02'00'
- /Creator: Acrobat PDFMaker 7.0 für Word
- /Keywords: Version 0.8/Status 19.03.2009
- /ModDate: D:20090416113402+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: STARCOS 3.4 Health QES C1
- /Title: Security Target Lite
- pdf_file_size_bytes: 329315
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 71
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |